IT is getting harder to manage as a result of BYOD, cloud computing, IT consumerization, and mobility. As these trends perpetuate, CISOs find themselves in the proverbial hot seat. CISOs must explain the elements of risk-based granular security policies/enforcement to business managers. Security vendors like IBM, LogRhythm, Splunk, and 21CT are making a similar bet. The bad guys want to steal our data-at-rest and in-motion. Its back to basics here with data discovery, classification, and associated controls for specific data types.”]

