Five Myths Holding Your Security Program Back

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Five Myths Holding Your Security Program Back-2 Next

Level of Control

Myth #1: Security success depends on the level of control you have over your environment.

The Reality: It's not about implementing more stringent controls. What's more important is having better visibility into your organization's data. The primary point of risk is anywhere data is in motion. Just having controls everywhere is insufficient. If your controls fail, chances are you won't even notice. Most organizations victimized by data breaches are discovered by a third party.

Dan's Advice: The shorthand advice here is: "Focus on data visibility, not the controls." Controls can't be effective without real visibility on data movement. This is the primary focal point for any successful security regime. With better visibility into what is happening to the data, the controls you develop will be more intelligent.

One could argue that cybersecurity is the most intellectually demanding profession on the planet. The rate of change is so great that no challenge is ever solved and no problem ever resolved completely. That said, security failures more often result from a lack of direction and focus, not of skills or resources.

The five myths in this slideshow, identified by Dan Geer, were selected because they address pain points common to many organizations, and successfully addressing them will give reasonable assurance of some quick wins. In reviewing this list, continue to ask yourself how to apply the advice to your organization and its unique cybersecurity ecosystem. The myths endeavor to challenge you a bit on how you think about the difficulties we all face.

Dan Geer is the chief information security officer at In-Q-Tel, a not-for-profit investment firm that works to invest in technology that supports the missions of the CIA and the broader U.S. intelligence community. Previously he was chief scientist at Digital Guardian (formerly Verdasys). Geer was a key contributor to the development of the X Window System as well as the Kerberos authentication protocol while a member of the Athena Project at MIT in the 1980s. Shortly after, Geer created the first information security consulting firm on Wall Street in 1992, followed by organizing one of the first academic conferences on electronic commerce in 1995. Geer is also the past president of the USENIX Association where he earned a Lifetime Achievement Award.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.