BreachExchange mailing list archives
A five-pillar survival guide for an insecure cyber world
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Thu, 17 Oct 2013 00:19:12 -0600
http://www.networkworld.com/news/tech/2013/101113-rethinking-cyber-security-274784.html Edward Snowden’s action demonstrated that an ordinary insider with a U.S. security clearance can intercept and distribute highly confidential information, even in an age of complex technology designed to prevent such action. What further risks are there? Here are five pillars to consider in rethinking your approach to data security in a cyber-environment in which both values and risks increase daily: 1. Rely Not On Compliance Policy Alone. Compliance with legislative and regulatory requirements and internal company policies is mandatory in today’s organizations. Failures can lead to significant career and financial penalties. However, even compliance with legislation and policies designed to improve security may not be sufficient if the policies are not current with respect to growing cyber threats. Organizations need a risk-based approach to security, in addition to compliance. They should also work to ensure compliance requirements receive regular reviews for currency. This is the approach, for example, the US federal government agencies are developing to move from a compliance-driven approach for their security operations to “continuous monitoring” in modernizing the Federal Information Security Management Act (FISMA). 2. Focus on Protecting Data vs. Infrastructure. Infrastructure in an age of BYOD is highly vulnerable. The American Society of Civil Engineers recently gave US infrastructure a grade of D+ in this area, citing many critical deficiencies. A new paradigm is in order: protect data before infrastructure. Data and information is at the core of invasion risk from such challenges as the Advanced Persistent Threat. Protect your information first. Companies where sensitive and secure data is at stake desire a user interface that is highly functional, yet intuitive and easy to learn. It should provide utmost control and in managing sensitive data for insiders and collaborating organizations. Major organizations are developing data classification standards to improve the protection of sensitive information. For example, EDUCAUSE, the association of IT leaders in higher education, has published extensively on these policy developments in leading research universities. 3. Security is Ubiquitous. Knowledge workers are everywhere; therefore, their eyes and ears represent a high value of security protection. Organizations must ensure that these knowledge workers are aware of current threats and are able to recognize risky situations quickly. End-users are also partners and providers, particularly in an emergent age of cloud computing. This calls for provider shielding; the provider has no capability to access the information located within customer data once encryption is set for their application and use. A provider can still add the value of helping their clients build a private cloud without being privy to its content. 4. "He Who Guards Everything, Guards Nothing." Frederick the Great of Prussia said it, but the expression is relevant here. Leadership must think effectively about what needs the most protection. Focus on highest risk areas first and take action upon them, rather than safeguard everything. This is the approach for the above risk-driven approaches to security and a key part of the above data protection policies. External stakeholders pose risk, but internal stakeholders can pose more risk. Focus on areas such as access and privacy controls and instill security policy and compliance from the inside out. Guard with targeted precision, and your protection will be stronger. 5. Security should be made as simple as possible, but not any simpler. Einstein said, “Things should be made as simple as possible, but not any simpler.” Security should be as simple and user friendly as possible, but still adequate to meet the needs of the organization. Easy-to-execute security training and qualification is necessary to ensure compliance and improve security. Remember, most of the time employees will choose to address the pressures of their job over the drudgery of reading a security policy. Thus, the quality of the training is essential. Some leading organizations are using game technology for security training to help engage their staff members with security policies and practices. Similarly, security product and service firms are focusing on effective interfaces and performance levels in their designs. Select the best systems and services to enable your company’s policies. In some cases, it is actually as easy to be secure as it is to send a file. It costs one click.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: # OWASP http://www.appsecusa.org # Builders, Breakers and Defenders # Time Square, NYC 20-21 Nov o()xxxx[{::::::::::::::::::::::::::::::::::::::::> Risk Based Security (http://www.riskbasedsecurity.com/) Risk Based Security offers security intelligence, risk management services and customized security solutions. The YourCISO portal gives decision makers access to tools for evaluating their security posture and prioritizing risk mitigation strategies. Cyber Risk Analytics offers actionable threat information and breach analysis.
Current thread:
- A five-pillar survival guide for an insecure cyber world Audrey McNeil (Oct 21)