Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

9/27/2018
10:30 AM
Dave Sikora
Dave Sikora
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Managing Data the Way We Manage Money

In the data-driven enterprise, myriad types of data have become a new form and flow of currency. Why, then, hasn't the CISO achieved parity with the CFO?

In perhaps the most comprehensive experiment to study cybersecurity decision-making, MIT's Sloan School of Management last year paired a group of seasoned security executives with a control group of inexperienced graduate students to test who might fare best in a simulated threat environment.

While the two groups performed differently on various aspects of the simulation, overall there was no significant difference in the success rates of the two groups. The study's authors note that their conclusion is not to diminish the importance of expertise, but rather that security executives need better tools and training that provide clear visibility into the state of security on the ground. The disconnect, the MIT researchers observe, is in the "significant gaps between business managers' perceptions, and the actual state of the cybersecurity of their organizations," exhorting the cybersecurity community to design and adopt enhanced educational and training programs that challenge entrenched mindsets and encourage proactive cybersecurity capability development.

The results are not surprising. Hard-to-define "knowledge gaps" abound between IT leadership, the C-suite, and even boards of directors who are ultimately accountable for the security of data. This is the argument made increasingly by CISOs themselves. In a 2017 survey of 300 CISOs by the cloud-based software company ServiceNow, 81% of respondents say they are highly concerned that breaches at their companies are going unaddressed. Some 78% worry about their ability to detect breaches in the first place. Only 19% of security chiefs say their company is highly effective at preventing security breaches.

The situation is hardly hopeless, but it does require a mindset that begins with an acknowledgement of the fraught way IT and data management has evolved within companies. In the past, IT infrastructure was simply a production tool and source of tactical advantage. Data's use as a strategic tool came later.

Enter the Data-Driven Enterprise
Data security was always an issue for IT managers, but the squalls were smaller. Today's emphasis on cloud computing, distributed systems, native mobile apps, and the Internet of Things has created the perfect storm. Customer data, market data, intellectual property, resource consumption data, productivity data, and dozens of other categories are a new form and flow of currency in the data-driven enterprise. However, as data flow has achieved parity with cash flow, the CISO or the CSO has not achieved parity with the CFO.

Consider that companies have had decades to work out the metrics of finance: balance sheet, income statement, and statement of cash flows. These are the standard tools that every CEO has been trained to read. They roll up detailed financial information from every corner of a business into brief, concise reporting that can be quickly consumed and watched over time to aid understanding of the health and progress of a business.

A similar reporting interface can be developed for commercial and business data — and the associated risks. It starts with three guideposts:

1. Establish a common language. Every executive knows what EBITDA is, or the difference between receivables and payables. Data must be characterized into groupings that executives can understand when they approach it from a compliance and risk perspective. Rather than using application names or table or column names, group data at the lowest level into buckets like "high-sensitivity personally identifiable information" or "customer payment information."

2. Draw a direct line between the user and the data. Financial reporting focuses exactly on who is spending what. Too often companies focus on the relationship between users and application access. This is important, but it doesn't take into account which applications have access to what data, and therefore ignores the direct relationship between users and data. Who is accessing what? Understanding that direct relationship and even enforcing policy focused on that relationship brings new clarity to data use.

3. Create digital truth. Financials are audited on an annual basis so that executives and regulators know that they can be trusted. Through new technologies like blockchain, data flows can be recorded directly as they happen, making the resulting audit trail immutable and virtually impossible for the record to be manipulated.

It's time that the business owners and the decision makers who are accountable for the integrity and security of their enterprise data have the tools on hand that correlate with this accountability. Just as financial statements deliver the truth about money, the intelligence on critical flows of data must be structured and organized to deliver concise truth about data.

Related Content:

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Dave Sikora is a technology industry veteran with more than 20 years of experience that spans enterprise software, data intelligence, private equity, mobile applications and supply chain solutions. As CEO at ALTR, he is focused on expanding the ways enterprise companies can ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
colad1930
50%
50%
colad1930,
User Rank: Strategist
9/28/2018 | 9:38:39 PM
Good idea star sports
Just as financial statements deliver the truth about money, the intelligence on critical flows of data must be structured and organized to deliver the concise truth about data.

star sports
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Hunny, I looked every where for the dorritos. 
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8567
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-8568
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
CVE-2020-8569
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...
CVE-2020-8570
PUBLISHED: 2021-01-21
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executi...
CVE-2020-8554
PUBLISHED: 2021-01-21
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typicall...