This is Just the Beginning for Data

This is Just the Beginning for Data

Note: Opinions expressed in this article are my own and don’t necessarily associate with my current employer or any of my previous employers.

I had the opportunity to be part of a panel sharing my thoughts on Data Security with other industry leaders during the protect 2017. It was my pleasure sharing the stage with Tony Augruso, Senior Director, Data Solution Development, Royal Bank of Canada, Roni Schuling, Enterprise Architect, Principal and Mark Bower, GM of Data Security.

Sincere thanks to all the panelists who shared the stage with me and to all the audience who had been part of this panel. It was definitely an amazing experience for sharing and learning how different companies are implementing data security across multiple industries. No doubt, every organization has unique challenges and everyone is trying their best and committed to protect their customer data at any cost.

Cyber-attacks are inevitable and are constantly on raise. Recent Equifax data breach has compromised nearly half of Americans population data records. Most cyber criminals/attacks are targeting data rich environments; attackers have proven again and again, ways to infiltrate through all the defensive controls and has successfully exfiltrated data from safe zone environments. The impact for most of the data breaches is – Data is not encrypted.

Data is a critical asset for every organization and every organization must put a plan and resources in place, to protect the data no matter where the data is stored and processed.

The data that we see and deal with is just the being. The future technologies are dependent on nothing, BUT DATA. Think of every evolving technology; Everything is driven by data

 #BigData

#MachineLearning

#ArtificialIntelligence

#IOT

#Sensors

#5GNetwork

As we step into the future - I am curious to hear from you what are your growing paint points for not encrypting the data.

Does any of the questions below resonate with you? If so, share your thought!!!

  • Whom should you convince to encrypt the data?
  • Do you hear excuses like, I have a legacy system and I cannot encrypt data?
  • Encryption creates latency; hence, I cannot encrypt data?
  • My business has use cases where they need to have access to clear text data?
  • My data is on premise, I have all the perimeter defensive controls and hence I don’t encrypt my data?

Please share your thoughts experiences which might benefit other readers.

“Treat Data as another form of Digital Currency, protect it as you Protect your money”
Jeremy Ault

Cybersecurity Leadership at Charles Schwab - MBA, CISSP, CISM, AWS Security

7 年

I read an article back in August that starts with the question, "What if companies managed their data like they manage their money?” https://dataconomy.com/2017/08/copanies-manage-data-money/ At first I thought it was going to talk about cybersecurity and how protecting data is like protecting your money because they are both valuable, etc. Losing data equals losing money, etc. But then the article quickly went in to discussing "applying machine learning to data in analytics and applications to accelerate cost savings and revenue growth." The article was a good reminder that often times the primary value of the data is in its availability (and utility) while the confidentiality aspect is an added value - rather than the other way around.

回复
Douglas Freed

Founder at AOS Real Front Desk / President at D A Wolf Security Intelligence - Data Security Technology #Blockchain #C++ #Compression #.Zip #Software #Bitcoin #CryptoMining #Crypto #Mining #Energy

7 年

I agree. Secure all data at the root. My MicroToken Exchange Technology does allow a single Employee like in EquiFax's case cause a Data Breach. There would have been no Data Breach since the hacker would have never access REAL DATA if they had MTE Technology securing their data! I can help!

回复
Joshua Campbell

High Value Data Security | UX | Product Design

7 年

I'd argue data is more valuable than money. For many the true value of data becomes apparent through it's loss.

要查看或添加评论,请登录

Sudharma Thikkavarapu的更多文章

  • Next Phase of Digital Transformation - Are we ready?

    Next Phase of Digital Transformation - Are we ready?

    Digital Transformation is everywhere, no matter where you are… Technology drives every part of our digital lives…

    5 条评论
  • Self-Reflection

    Self-Reflection

    As we wrap up 2018 and step into 2019 it is important we take a moment to pause and self-reflect on our…

  • Security Hygiene in The World of Containerization

    Security Hygiene in The World of Containerization

    The disruption in technological innovation is increasing and expanding exponentially in response to digital…

  • Digital Leadership and Modern Workforce

    Digital Leadership and Modern Workforce

    Note: Opinions expressed in this article are of my own and don't necessarily associate with my current employer or any…

    1 条评论
  • Data Security

    Data Security

    I recently had the pleasure joining two visionary leaders @John Delk , Chief Product Officer and @Mark Bower, Global…

    14 条评论
  • Modernizing IT for Digital Transformation

    Modernizing IT for Digital Transformation

    Note: Opinions expressed in this article are of my own and don’t necessarily associate with my current employer or any…

    4 条评论
  • Digital Transformation - What should you consider?

    Digital Transformation - What should you consider?

    Note: Opinions expressed in this article are my own and don’t necessarily associate with my current employer or…

    2 条评论
  • Transformation of Cybersecurity

    Transformation of Cybersecurity

    "The Future of Cybersecurity in Internet, Cloud & Mobile (ICM) First Strategies." "The future is now" This article is a…

    4 条评论
  • Future of Cloud Computing & Security

    Future of Cloud Computing & Security

    Cloud computing has been a disruptive technological force in this emerging era of technology evolution. undoubtedly…

    14 条评论
  • ReThink: Cyber Security Approach

    ReThink: Cyber Security Approach

    As we wind up on 2016 and move into 2017; I would like to share my thoughts on how we as security professionals and…

    2 条评论

社区洞察

其他会员也浏览了