One Problem at the Center of it all - Data Cannot Protect Itself
Elliot Lewis
Cybersecurity Executive Leader | CEO | CISO | CTO | Chief Strategy Officer | Chief Security Architect | Expert Witness | Patent Holder
Learn more at Keyavi.com
Cybersecurity is one of the top concerns for all individuals, companies, governments, and organizations today because – despite all of the tools, products and services available today for cyber – data is still being lost at a constant and every increasing rate.?The crisis of data loss is simply non-stop. Every day, we see the headlines of another data breach or identity theft or cryptocurrency loss.?
Something is missing.?Something has to change because continuing to do the same thing and getting all of the wrong results is just not sustainable.?We have to accept that what we are doing is not working and we need to get to the core of the problem – but it seems that we are missing the issue – something is not right.?Why can we not stop the loss of data in our lives?
There is a simple reason: the entire cybersecurity market of tools, products and services are all based on one premise only:?Data cannot protect itself,?and therein lies the problem. We are trying to solve a problem from the inside out.?Our base premise needs to change.
One Single Hole in the Wall – and it was all for nothing
Our data is vulnerable to anyone who can get to it. Once data is out of our realm of control – we have to assume that it is gone, and we are never getting it back.?You cannot retrieve it, control it, even see what is happening to it. Data is the one common denominator across all of IT systems and solutions, yet it is the weakest link.
So herein lies the problem:?data cannot protect itself and this has been an unsolvable problem.?Until now.
In today’s cybermarket, there are really two categories of technology for the protection of data, and they apply – in simple terms – to a) the protection of data itself, and b) the forensics and threat intelligence we use to understand where data goes and what happens to it when it is accessed.?
For the first half – the protection of data itself – we try to rely on a multi-faceted defense-in-depth approach surrounding our data, which may include, but is not limited to, many of the following:
For forensics and threat intelligence, it is also a multi-faceted defense-in-depth approach:
We need all these solutions to try to keep data protected all because data cannot protect itself.?The costs, complexities, intricacies, synchronization, and maintenance of all these defense-in-depth models is overwhelming – and still not as effective as we need it to be.?Data continues to be lost at an exponential rate.?The result is that we are forever in?“pray and react”?mode when protecting our data.?we are hoping for the best, depending on multiple technologies to be tied together, unified on levels that have yet to be successfully achieved in most implementations.
领英推荐
Praying for the Protection of Data – and Reacting to the Results
Praying for Protection:?with all the tech and solutions listed above required to make even the most basic of cybersecurity operations to work, even when we get it all right, too many variables can make it go wrong:
In other words, we are praying we got everything right, praying that we didn’t miss anything, and doing our very best through people and processes to ensure all of this is working to protect data – all because data cannot protect itself.
Reacting to situations – after the fact:?All threat management and intelligence systems need to have all feeds from everything above to be succinct and accurate – and even when this is the case and everything is working optimally, it is still a reactive control and will only catch aberrations or threats after the fact.
The irony of it all – Data cannot – and should not- be contained
The entire model here is for data to be kept in place, or contained in a certain area, or not accessed outside of our control, or kept in our visible landscape – in other words – everything we should not expect data to do.?Data is meant to be “out there”, working for us, collaborating for us, driving new interactions, creating new opportunities.?To try to contain data is anathema to the nature of data usage today.?Yet we still must protect it, because data can contain everything a bad actor needs to take over our lives, our identities, our finances, our health, our businesses.?We need to protect data, but it cannot protect itself,?so we need data to evolve, we need it to understand what we what our intentions are, no matter where it goes, how many copies are made or where it resides or travels to.??Data needs to become smart.
Bringing it all together – data is the common denominator
Instead of trying to build a better “data-mouse trap”, it’s time to reverse the threat model.?We need a fundamental change at the one common level to all of technology and IT – the data itself.?We need a fundamental change in our thinking and capabilities.?
We need data to be able to:
This is the dreamed panacea that the IT industry has wanted for many, many years – for data to be able to be intelligent, self-protecting, self-aware and self-reporting.
The good news – this is not a dream to be achieved –?this is a reality today.?Data can be self-protecting, self-aware, intelligent, and self-reporting in near-real time.?It can control who accesses it, where they can access it, at what times, on which devices.?It can be completely visible to us no matter where it goes, on any device, no matter how far or how many times it is copied.?This kind of a fundamental shift is going to take new thinking, new models, new ways of architecting our technology to work with smart data.
I am going to be writing an ongoing series of blogs around all of the points above – going into how intelligent data can enhance, augment, and possibly replace the pieces of the puzzle above.?By consolidating our security into the one common denominator across all of IT – data itself – we can change the way we do everything.
Elliot Lewis, CEO Keyavi
Motivational Leader | Consulting Practice Builder | AI Risk Management | Cloud Security | Compliance | Identity and Access | Privacy
2 年Looking forward to this series!