Aussie CIOs making security their top priority


By Dylan Bushell-Embling
Wednesday, 24 June, 2015


Aussie CIOs making security their top priority

Australian CIOs are for the first time making security their top priority across the technology pillars of big data, mobility, cloud and social, according to IDC.

The four pillars, collectively referred to by IDC as Third Platform technologies, are now dominated by security concern, research from the firm shows.

In the big data category, security ranks ahead of data visualisation, source and quality as well as skills training as the top concern. In mobility, the top priorities are security, applications, consulting services and hardware.

Cloud-based security concerns likewise rank ahead of platforms, on-premise deployments, systems and cloud orchestration. Security also outranks collaboration, business applications, unified communications and videoconferencing in the social business category.

IDC Software and Security Market Analyst Lydie Virollet said the results demonstrate an increasing awareness of the importance of security among the C-suite of Australian businesses.

“With a fast-evolving threat landscape and Australia being one of the top target countries for attackers, Australian companies must invest in security to protect their intellectual property and other assets,” Virollet said.

“This investment needs be strategic and will primarily be targeted at protecting the network and sensitive data through a combination of integrated solutions.”

CIOs are also reassessing security requirements in terms of the technology, people and processes required to protect a borderless enterprise.

For companies seeking to take control of IT security, IDC recommends conducting an assessment of existing security solutions in place, establishing a contingency security budget as part of an IT risk management strategy and choosing vendors based on track record and risk management expertise.

Image courtesy of American Advisors Group under CC

Related Articles

Lessons from the Land Rover cyber attack: seeing risk before it strikes

The recent Jaguar Land Rover cyber attack saga is a stark demonstration of what happens when...

Why AI agents are a new insider threat for business

AI-powered insiders are non-human actors operating within the perimeter, inheriting trusted...

Securing SMB organisations: closing the cyber gap through culture

Limited budgets and resources mean SMBs cannot financially prioritise cybersecurity as much as...


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd