Saturday, June 3, 2023
AI Home Security
No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
No Result
View All Result
Morning News
No Result
View All Result
Home Cyber Security

CISOs Rethink Data Security with Info-Centric Framework

justmattg by justmattg
April 26, 2023
in Cyber Security
0
Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter



RSA CONFERENCE 2023 – San Francisco – The coalition behind the Data Security Maturity Model has issued a second iteration of the framework, aimed at making it easier for businesses to protect data from leaks.

The coalition, created by Cyberhaven last summer, is led by Sounil Yu, CISO at JupiterOne and includes a range of security leaders from a range of companies, including Boston Scientific, Caterpillar Financial, Fleet, Flexport, Motorola Mobility, Twilio, VillageMD, and others.

During a panel at RSA Conference 2023, entitled Comprehensive Cyber Capabilities Framework: A Tech Tree for Cybersecurity, coalition members laid out a vision for the next generation of data security.

“The ability to protect any type of data across devices, applications, and cloud assets is essential if organizations are to take advantage of the power of modern collaboration and digital transformation without exposing their data to external threats, insider threats, or simple mistakes by well-intentioned users,” the coalition said in a statement.

The DSMM aligns to the NIST Cybersecurity Framework and the Cyber Defense Matrix, and to enable a data-centric view, it defines five key functions:

  • Identify & Classify: Find and classify all data covered by the data security program.
  • Protect: Minimize the exposure of sensitive data by controlling how it is accessed, used, and retained.
  • Detect: Collect and analyze data risk to identify data-related security events or policy violations that were not stopped by the “Protect” function.
  • Respond: Establish immediate, short-term actions to be taken upon detection of a potential incident.
  • Recover & Improve: Determine actions needed to not only restore normal operations (as they pertain specifically to data), but also to build back stronger.

In its second iteration released this week, the maturity model refines each of these pillars to take into account more granular context, such as what server infrastructure is being used, how much is in the cloud, privacy regulations, how employees and others use the data, and how applications, APIs, and non-human endpoints use it, and more – in order to gain a fuller picture of an organization’s data footprint.

The Data & Digital Transformation Problem

Richard Rushing, panelist and CISO of Motorola Mobility, tells Dark Reading
that a new framework approach was needed given that, in the age of digital transformation, getting arms around all of the data being generated at any given point within an organization simply can’t be accomplished by looking at protection in a siloed way. The old concept of seeing data in the context of devices, applications, or the network, needed to be traded for a focus on the data itself, wherever it goes within an organization.

“If you think about what security is enabling, it’s the use of data, and ubiquitous access to it,” he says. “It’s necessary to connect to the network to use the data that’s in the network to make better decisions for the business or make better decisions for your customers. But data is found in different places, sometimes it’s at rest, and sometimes it’s in transit.”

He adds that the problem is – quite literally – growing, also necessitating a rethink of protection architecture.

“Data is on a logarithmic curve; for every amount of data that I have next year, it’s probably 2.5 times more that the amount of data I had this year,” he says. “We’re data hoarders, for lack of a better term; no one wants to get rid of people’s information who have signed up to websites and forums and everything else, so we have this enormous data sprawl. That, in turn, leaves behind security blind spots.”

Further adding to the challenge is the fact that some data is of course more sensitive than other information; and some information doesn’t need protecting at all, Rushing points out. And, there’s dynamism in terms of defining appropriate security levels as data ages.

He uses a product launch to illustrate his point. “With a product release, we start off with a situation where no one knows about it, everything’s embargoed, and you’re protecting this important intellectual property,” he explains. “And the next thing you know, it’s released for public consumption. And it’s suddenly not top secret anymore, in fact, you want the whole world to know about it.”

Rushing says that the framework is meant to tame some of this chaos, and that it can be tailored to large enterprises and small-to-medium-sized businesses alike. It allows organizations to focus in on a number of practice areas, too – including risk-based decision prioritization, collaboration, continuous education, risk management for vendors and third parties, compliance, being transparent, and incident response and how to recover data.

“I don’t want to say it’s one size fits all, but it’s very close to one size fits all,” he explains. “The controls are going to be different depending on the environments, but the approach is meant to be flexible enough to accommodate that.”

He says that the framework is a living architecture that the coalition plans to refine and evolve over time. However, the time to make the switch to thinking about things in a data-centric kind of way should start now.

“If you don’t start you don’t think about this, you’re going to get hit in the next 6, 12, 18 months, in some way shape or form,” he warns. “It’s not like the internet is becoming a safer neighborhood, and data is the new oil that’s going to drive business and attackers alike.”



Source link

READ ALSO

The Importance of Managing Your Data Security Posture

‘PostalFurious’ SMS Attacks Target UAE Citizens for Data Theft

Related Posts

The Importance of Managing Your Data Security Posture
Cyber Security

The Importance of Managing Your Data Security Posture

June 3, 2023
Undetected Attacks Against Middle East Targets Conducted Since 2020
Cyber Security

‘PostalFurious’ SMS Attacks Target UAE Citizens for Data Theft

June 2, 2023
New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
Cyber Security

New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America

June 2, 2023
Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks
Cyber Security

Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks

June 2, 2023
Malicious PyPI Packages Using Compiled Python Code to Bypass Detection
Cyber Security

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection

June 1, 2023
Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining
Cyber Security

Cybercriminals Targeting Apache NiFi Instances for Cryptocurrency Mining

June 1, 2023
Next Post
Charming Kitten’s New BellaCiao Malware Discovered in Multi-Country Attacks

Charming Kitten's New BellaCiao Malware Discovered in Multi-Country Attacks

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

February 13, 2023
Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

February 11, 2023
Do you know who is watching you?

Do you know who is watching you?

January 2, 2023
The New Threats to Cryptocurrency Users

The New Threats to Cryptocurrency Users

February 12, 2023
PopID announces big customer deployment for face biometric payments in UAE

PopID announces big customer deployment for face biometric payments in UAE

February 14, 2023

EDITOR'S PICK

Enterprises Rely on Multicloud Security to Protect Cloud Workloads

Enterprises Rely on Multicloud Security to Protect Cloud Workloads

May 19, 2023
Microsoft Issues Patches for 97 Flaws, Including Active Ransomware Exploit

Microsoft Issues Patches for 97 Flaws, Including Active Ransomware Exploit

April 12, 2023
Chinese Tonto Team Hackers’ Second Attempt to Target Cybersecurity Firm Group-IB Fails

Chinese Tonto Team Hackers’ Second Attempt to Target Cybersecurity Firm Group-IB Fails

February 13, 2023
Tactical Flashlight vs. Everyday Flashlight: What’s the Real Difference?

Tactical Flashlight vs. Everyday Flashlight: What’s the Real Difference?

January 3, 2023

About

We bring you the best news & updates related to Home security, Cyber security and Biometric technology. Keep visiting our website for latest updates.

Follow us

Categories

  • Biometric Technology
  • Cyber Security
  • Home Security

Recent Posts

  • The Importance of Managing Your Data Security Posture
  • ‘PostalFurious’ SMS Attacks Target UAE Citizens for Data Theft
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks
  • Privacy Policy
  • Contact Us

© 2023 AI Home Security - All rights reserved.

No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology

© 2023 AI Home Security - All rights reserved.