8.6.1 Information Security Trends and Directions