New Readers

 
 Home Executive Briefings Security Predictions SM Directory Global Excellence Volunteer as Expert Register Awards About
 
Dr. Guy Bunker: Is more emphasis on securing against the insider threat really necessary?

Clearswift is an information security company, trusted by thousands of clients worldwide, to provide adaptive cyber solutions that enable their organizations to secure business critical data from internal and external threats.

Built on an innovative Deep Content Inspection engine managed and controlled by a fully integrated policy center, Clearswift’s solutions support a comprehensive Information Governance strategy resulting in critical information being managed and protected effortlessly – both inside and outside the organization.

Rake Narang: What are the key challenges CIOs will face in 2014?

Dr. Guy Bunker: The way in which business works is changing and the CIO needs to not only keep up with the changes, but try to stay one step ahead. Cloud computing, for example is now one of the greatest challenges that the CIO has. Critical business information is being created, stored and used in an environment which the CIO may not even know about as *anyone* can buy the service they need with a credit card – whether it is secure there is another matter! The same goes for other new technologies – increasing business agility, but with added business risk, and the CIO is ultimately responsible.

If the CIO doesn’t know where the information that runs the business is, then how can they manage and protect it. Unfortunately it is no longer just the external hacker or even an APT (Advanced Persistent Threat) that the CIO needs to be worried about, a number of studies have shown that it is ‘the enemy within’ which now provides the greatest risk. Mitigating this threat needs yet more technology to be introduced and of course managed.

Processes, procedures and even technology which were adequate even a couple of years ago now need to be re-evaluated and updated. Both written security policies and the technology used to enforce them are moving targets as new threats arise and legislation is enacted. CIOs and their teams need to be up to speed on all matters ’security’ – as well as having to align the needs of the business to IT as well.

Rake Narang: What is the impact of social networking, cloud collaboration and BYOD on enterprise security?

Dr. Guy Bunker: In short, they have increased the risk. The business benefits of social networks, cloud collaboration and BYOD are well known, as are the risks. However mitigating the risks is the constant challenge the CIO faces.

Business today relies upon a collaborative value chain from suppliers through to customers and the new technologies, such as those found with social networking and the cloud, enable this to occur. Unfortunately when collaborating there is a need to ensure that only the correct information is shared otherwise there is risk of financial penalties, brand reputation damage and unfortunate news coverage.

Solutions are available to help the CIO; Data Loss Prevention (DLP) technology can be deployed to cover the threats, but all too often the ‘stop and block’ behavior discourages effective use. New technology should be added to DLP, Adaptive Redaction – which only removes the critical information that breaks policy, while leaving the rest of the information to continue to the recipient therefore relieving the fear of business interruption and data loss.

BYOD has its own set of challenges and the security of corporate data is one of them. Policies need to be both in place and enforced to minimize the information risk. Organizations are now looking to install their corporate security onto BYOD devices to mitigate some of the risks as well as put in place joiner / leaver processes to ensure that BYOD devices contain no unauthorized information.

Rake Narang: In the light of Snowden / Manning cases, will we see more emphasis put on securing against the insider threat?

Dr. Guy Bunker: Absolutely. There are subtle differences to the cases – however both had authorized access to the information. In the Snowden case, it shows the effect of the extended enterprise – where external contractors in this case (but it could have been suppliers, consultants or even the customer) have legitimate access to information, but they then decide to use it for their own nefarious purposes.

We are therefore seeing a change in attitudes from ‘need to know’ to ‘really, really need to know’. This is not only limited to file sharing and collaboration applications where access control lists are enforced, but also to internal email. While email which goes across the boundary of an organization is frequently inspected with Data Loss Prevention solutions, internal email isn’t and this source of risk now needs to be addressed.

Rake Narang: What will be the buzz word for 2014?

Dr. Guy Bunker: Information Governance. As with cloud computing and virtualization, Information Governance (IG) currently can be interpreted in almost any way the speaker wants. However, it is really all about good practice when it comes to information (which sounds a little less ominous than Governance). IG includes all the people, processes and technology that we always hear about, but looks at it more comprehensively. So, it does go across the value chain and the various devices and services that organizations use to create, share and access information.

In essence, there is a need for organizations to really understand the value of their information, where it is held and who has access. In most cases this includes the people outside the organization as well as those inside. Even inside the organization there is an increased need to govern the access to information and while access control lists are great for file servers and collaboration sites, internal email will come under scrutiny as an information risk. Internal Data Loss Prevention (DLP) solutions will need to be deployed to help manage the risk.

Information Governance solutions which can track and trace information, not just files, across the organization and outside will begin to be deployed, enabling the CIO and their team to answer the question ‘where did this information come from, who had access and where did it go’.

Company: Clearswift
1310 Waterside, Arlington business Park, Theale, Reading RG7 4SA, UK.

Founded in: 1996
CEO: Heath Davies
Public or Private: Private
Head Office in Country: United Kingdom
Products and Services: World-class information security solutions for web, email, Exchange & ICAP incorporating innovative Data Loss Prevention, Adaptive Redaction and Information Governance technology.
Company’s Goals: Clearswift’s goal is to deliver innovative solutions to protect the world’s critical information, by delivering 100% visibility, 100% of the time, enabling secure continuous collaboration.
Key Words: Critical Information Protection, Data Loss Prevention, Adaptive Redaction, Secure Continuous Collaboration, Information Governance

JOIN NOW THE CYBER SECURITY WORLDWIDE COMMUNITY ON LINKEDIN

CLICK HERE