IDG Contributor Network: Protecting data in an increasingly insecure world

IDG Contributor Network: Protecting data in an increasingly insecure world

If data is the life blood of organizations, how are businesses protecting it. Michelle Finneran Dennedy in her book, the Privacy Engineer’s Manifesto, describes five stages of protecting data in the information age:

  1. Firewalls
  2. Nets
  3. Extranets
  4. Access
  5. Intelligence

The question is, where are CIOs in this progression of protecting data? This was a recent topic of discussion at our weekly #CIOChat Twitter chat session.

Should CIOs be focused on creating better fortresses? Or securing data and whom can access it?

There are clearly two distinct views amongst CIOs. Some believe that while the fortress is a past mindset, it is still important. They believe the fortress represents the first line of defense, but restrictions on access rights and usage need to be part of the mix.

9 warning signs of bad IT architecture and see why these 10 old-school IT principles still rule. | Sign up for CIO newsletters. ]

These CIOs assert that you shouldn’t surrender your boundaries entirely, if only to keep junk traffic and DDoS traffic out. They suggest boundaries are foundational. These CIOs think data security and access rights are the next thing IT organizations needs to get better at. They go onto say that while the fortress must be strong, the people part of the equation is the weakest link to protecting the enterprise. If someone has acquired an employee’s credentials especially if they have their phone and broke a weak password, they can handle Multi-Factor Authorization. Here the fortress is broken.

Other CIOs, however, suggested fortress thinking is similar to the “French Maginot Line”. These CIOs say that fortress style security is doomed to fail. They think traditional security models are like eggshells. They are strong when pressed from the ends, but they fall apart from squeezing or stretching. They suggest, for this reason, historically fortresses have proven to be failure.

These CIOs say that we should no longer be concerned with the fortress walls. While they recommend good perimeter hygiene, they say the focus needs to move to pattern and behavior-based security. They suggest that IT leaders move away from current static security methods and evolve towards a more active and continuously evaluated posture. These CIOs think data security is tied to categorization and usage characteristics. They favor “security by design” with the application the data supports.

Leave a comment

Contact Us


    Please use this form to contact us or email us at [email protected]

    Address

    Singapore CBD

    Phone-no

    +65 8714 2780