Cloud computing is revolutionary evolution- it is continuous, rapid, radical, and pervasive. More than 90 percent of enterprises are leveraging public cloud computing to provide some level of business services. We have embarked on a journey into the cloud that is irreversible, largely unknown, and unknowable. Fueled by highly complex cloud computing systems and ubiquitous networking, not only will most transactions be performed digitally, but increasingly connected cloud systems will act autonomously. These future forms of computing will be incredibly diverse and distributed systems of larger systems. The result is the creation of Massively Integrated Systems of Smart Transducers (MIST), which can utilize the cloud to acquire information, sense their surroundings, and actively intervene in situations to effect "desirable" outcomes. The challenge is to discern how and when to apply security to the fog of the cloud computing and the technology revolution - and so-called improvements in cybersecurity are only maintaining the status quo. As the primary mechanism for governance and policy implementation, cybersecurity must adapt to this approaching wave of change. Traditional cybersecurity practice, policy, and governance will quickly fail in the face of this radical change and new cybersecurity paradigms are needed to effectively manage security in the MIST. What's next?
Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.