Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

9/27/2018
10:30 AM
Dave Sikora
Dave Sikora
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

Managing Data the Way We Manage Money

In the data-driven enterprise, myriad types of data have become a new form and flow of currency. Why, then, hasn't the CISO achieved parity with the CFO?

In perhaps the most comprehensive experiment to study cybersecurity decision-making, MIT's Sloan School of Management last year paired a group of seasoned security executives with a control group of inexperienced graduate students to test who might fare best in a simulated threat environment.

While the two groups performed differently on various aspects of the simulation, overall there was no significant difference in the success rates of the two groups. The study's authors note that their conclusion is not to diminish the importance of expertise, but rather that security executives need better tools and training that provide clear visibility into the state of security on the ground. The disconnect, the MIT researchers observe, is in the "significant gaps between business managers' perceptions, and the actual state of the cybersecurity of their organizations," exhorting the cybersecurity community to design and adopt enhanced educational and training programs that challenge entrenched mindsets and encourage proactive cybersecurity capability development.

The results are not surprising. Hard-to-define "knowledge gaps" abound between IT leadership, the C-suite, and even boards of directors who are ultimately accountable for the security of data. This is the argument made increasingly by CISOs themselves. In a 2017 survey of 300 CISOs by the cloud-based software company ServiceNow, 81% of respondents say they are highly concerned that breaches at their companies are going unaddressed. Some 78% worry about their ability to detect breaches in the first place. Only 19% of security chiefs say their company is highly effective at preventing security breaches.

The situation is hardly hopeless, but it does require a mindset that begins with an acknowledgement of the fraught way IT and data management has evolved within companies. In the past, IT infrastructure was simply a production tool and source of tactical advantage. Data's use as a strategic tool came later.

Enter the Data-Driven Enterprise
Data security was always an issue for IT managers, but the squalls were smaller. Today's emphasis on cloud computing, distributed systems, native mobile apps, and the Internet of Things has created the perfect storm. Customer data, market data, intellectual property, resource consumption data, productivity data, and dozens of other categories are a new form and flow of currency in the data-driven enterprise. However, as data flow has achieved parity with cash flow, the CISO or the CSO has not achieved parity with the CFO.

Consider that companies have had decades to work out the metrics of finance: balance sheet, income statement, and statement of cash flows. These are the standard tools that every CEO has been trained to read. They roll up detailed financial information from every corner of a business into brief, concise reporting that can be quickly consumed and watched over time to aid understanding of the health and progress of a business.

A similar reporting interface can be developed for commercial and business data — and the associated risks. It starts with three guideposts:

1. Establish a common language. Every executive knows what EBITDA is, or the difference between receivables and payables. Data must be characterized into groupings that executives can understand when they approach it from a compliance and risk perspective. Rather than using application names or table or column names, group data at the lowest level into buckets like "high-sensitivity personally identifiable information" or "customer payment information."

2. Draw a direct line between the user and the data. Financial reporting focuses exactly on who is spending what. Too often companies focus on the relationship between users and application access. This is important, but it doesn't take into account which applications have access to what data, and therefore ignores the direct relationship between users and data. Who is accessing what? Understanding that direct relationship and even enforcing policy focused on that relationship brings new clarity to data use.

3. Create digital truth. Financials are audited on an annual basis so that executives and regulators know that they can be trusted. Through new technologies like blockchain, data flows can be recorded directly as they happen, making the resulting audit trail immutable and virtually impossible for the record to be manipulated.

It's time that the business owners and the decision makers who are accountable for the integrity and security of their enterprise data have the tools on hand that correlate with this accountability. Just as financial statements deliver the truth about money, the intelligence on critical flows of data must be structured and organized to deliver concise truth about data.

Related Content:

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Dave Sikora is a technology industry veteran with more than 20 years of experience that spans enterprise software, data intelligence, private equity, mobile applications and supply chain solutions. As CEO at ALTR, he is focused on expanding the ways enterprise companies can ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
colad1930
50%
50%
colad1930,
User Rank: Strategist
9/28/2018 | 9:38:39 PM
Good idea star sports
Just as financial statements deliver the truth about money, the intelligence on critical flows of data must be structured and organized to deliver the concise truth about data.
Microsoft Patches Wormable RCE Vulns in Remote Desktop Services
Kelly Sheridan, Staff Editor, Dark Reading,  8/13/2019
The Mainframe Is Seeing a Resurgence. Is Security Keeping Pace?
Ray Overby, Co-Founder & President at Key Resources, Inc.,  8/15/2019
GitHub Named in Capital One Breach Lawsuit
Dark Reading Staff 8/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15132
PUBLISHED: 2019-08-17
Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the "Login name or password is incorrect" and "No permissions for system access" messages, or just blocki...
CVE-2019-15133
PUBLISHED: 2019-08-17
In GIFLIB before 2019-02-16, a malformed GIF file triggers a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero.
CVE-2019-15134
PUBLISHED: 2019-08-17
RIOT through 2019.07 contains a memory leak in the TCP implementation (gnrc_tcp), allowing an attacker to consume all memory available for network packets and thus effectively stopping all network threads from working. This is related to _receive in sys/net/gnrc/transport_layer/tcp/gnrc_tcp_eventloo...
CVE-2019-14937
PUBLISHED: 2019-08-17
REDCap before 9.3.0 allows time-based SQL injection in the edit calendar event via the cal_id parameter, such as cal_id=55 and sleep(3) to Calendar/calendar_popup_ajax.php. The attacker can obtain a user's login sessionid from the database, and then re-login into REDCap to compromise all data.
CVE-2019-13069
PUBLISHED: 2019-08-17
extenua SilverSHielD 6.x fails to secure its ProgramData folder, leading to a Local Privilege Escalation to SYSTEM. The attacker must replace SilverShield.config.sqlite with a version containing an additional user account, and then use SSH and port forwarding to reach a 127.0.0.1 service.