Research firm IDC believes 2013 is the year security will get a handle on BYOD policy, and will find a way to channel social networking in a secure but strategic way. Do you agree? As I’ve mentioned previously in Leading Edge, prediction stories don’t really get my attention too often. But I am interested in a release I received this week from market-intelligence firm IDC (a sister company to IDG Enterprise, which publishes CSO), particularly because it delves into what they believe will priorities specific to CSOs and CISOs in the coming year.IDC is hosting a free web conference tomorrow, January 9th, at 11am EST. Titled “IDC’s 2013 Chief Information Security Officer (CISO) Predictions: Securing the Expanding Walls of an Enterprise,” it will feature Chris Christiansen, Program Vice President, Security Products and Services, who will discuss how the growth of BYOD strategies, cloud deployments and social media have changed the scope and size of the enterprise and, therefore, the span of security strategies.[Should security be responsible for BYOD policy?]“Securing the enterprise has taken on a whole new meaning and requires a new set of information technology tools,” according to Christiansen. Among the predictions IDC is making, Christiansen believes the following trends will have an impact on the CISO role in the coming year:Prediction #1: CISOs will get agreement with the C-suite about BYOD security policy “This year, we predict CISOs will arrive at a BYOD security policy that strikes a balance between user freedom and protection of corporate assets. The next generation of mobile security will “containerize” corporate and consumer apps, data, and access. By blending MDM and MAM (Mobile Applications Management), IT can categorize corporate apps, data, and access and containerize these elements. IT will just control the corporate portion of the device, leaving the consumer portion unencumbered.”Prediction #2: CISOs will organize corporate social networking activities that are driven by customer experience, brand identity, return on value, and security.If you’re interested in hearing more, you can register for the web cast here: https://bit.ly/IDC_Predictions2013_CISOWhat do you think of these “predictions”? Do either of them touch upon priorities you’re planning for 2013? Related content feature Why CSOs and CISOs need to care about machine learning Michael A. Davis of CounterTack explains the security challenges around machine learning, and how some of the issues can be solved for free (yes, free!) By Joan Goodchild May 03, 2017 2 mins Data and Information Security IT Leadership Security news How CISOs can explain privacy to the C-suite With the recent moves by the FCC, it is imperative that chief security officers make the company aware of privacy issues. By Ryan Francis Apr 13, 2017 5 mins Privacy Careers Security feature Realistic ways to lock down IoT How CSOs can best secure and understand IoT devices that enter their organization's network infrastructure By Joan Goodchild Apr 07, 2017 1 min Application Security Security news Follow the money! Where VC security investment is occurring By Joan Goodchild Mar 22, 2017 1 min Technology Industry IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe