Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber Security Lessons from the NSA

780 views

Published on

In today’s threat landscape, cyber security isn't just an enterprise concern, nor is it entirely a government concern. To learn what that stance is and what security challenges government agencies are facing, we spoke to retired US Air Force Colonel Cedric Leighton.

Published in: Technology
  • Be the first to comment

Cyber Security Lessons from the NSA

  1. 1. Cyber Security Lessons from the NSA
  2. 2. In today’s threat landscape, cyber security isn’t just an enterprise concern, nor is it entirely a government concern. In fact, enterprise and government cyber security go hand in hand: corporate espionage can have ramifications for national economies and foreign relations, and cyber surveillance by national actors can affect the enterprise as well.
  3. 3. To learn what the government stance on cyber security is and what security challenges government agencies are facing, we spoke to retired US Air Force Colonel Cedric Leighton.
  4. 4. CipherCloud Exclusive Interview
  5. 5. The Present State of Cybersecurity
  6. 6. “The state of cybersecurity is a really dangerous area right now…There’s no way that the standard antivirus suites and the standard firewalls can actually keep track of all that and have a meaningful, really deterrent effect on any of these different variants that are out there.” Colonel Cedric Leighton Former Deputy Training Director, NSA
  7. 7. The same holds true for the enterprise. Cloud computing is turning traditional models of infrastructure security on their heads. The enterprise perimeter has all but disappeared, and firewalls and antiviruses are less than adequate to protect enterprise data and resources in public cloud infrastructures, on mobile devices, or in environments compromised by shadow IT.
  8. 8. What does This Mean for Enterprises?
  9. 9. “Every business and even every individual is vulnerable to cyber attacks today. It becomes very important to weave in solutions such as CipherCloud’s, because right now there is no adequate policy from the federal government to address this issue.” Colonel Cedric Leighton Former Deputy Training Director, NSA
  10. 10. In the enterprise, regulatory compliance is often a key cybersecurity priority, with HIPAA, HITECH, GLBA, and PCI-DSS among the most common regulatory burdens organizations must bear. But compliance isn’t everything, as we learned from the Target breach. Most data privacy regulations fall short of providing a truly effective framework for data protection, due to the rapid rate of technological development from both the security and cyber criminal sides.
  11. 11. How Can Enterprises Address These Issues?
  12. 12. “Look at solutions such as CipherCloud, because they are going to be very important to securing data and making sure that the data only goes to the intended recipient and not to anybody else.” Colonel Cedric Leighton Former Deputy Training Director, NSA
  13. 13. Col. Leighton hits on the key point that enterprises must understand when it comes to cloud data security: the fact that it has to revolve around data security. In a world where data is in constant motion and outside the enterprise perimeter more often than not, any security measures that do not directly secure the data itself leave that data vulnerable to theft or exposure. This makes technologies such as cloud encryption and tokenization especially critical.
  14. 14. The Next Challenge for Cyber Security?
  15. 15. “You need to find a way to find a bake in security that can evolve as the threats evolve and that’s going to be the next challenge for the cybersecurity industry.” “I’m very confident that companies like CipherCloud can do something in that regards so that the infrastructure can be protected the way it needs to be protected.” Colonel Cedric Leighton Former Deputy Training Director, NSA
  16. 16. The truly security-minded organization must go beyond the basic requirements outlined by data privacy regulations if it wants to keep its information secure from attackers. In this day and age, protecting your data means securing your data. One backdoor in one router may be all it takes to bypass cloud data security measures, leading to a breach. For true cloud data protection, you must lock your data down no matter where it goes.
  17. 17. Watch Interview Video: Cyber Security Lessons from the NSA For additional information : • Website: www.ciphercloud.com • Email: info@ciphercloud.com • Phone: +1 855-5CIPHER Twitter.com/ciphercloud Youtube.com/user/CipherCloudVideo Linkedin.com/company/ciphercloud Facebook.com/ciphercloud Connect with Us!
  18. 18. 525+ Employees Company 3.8+ Million Active Users 13 Industries 25 Countries 7 Languages P 13 Patents Solutions Cloud Discovery Cloud DLP Strong Encryption Tokenization Activity Monitoring Anomaly Detection Customers 5 out of 10 Top US Banks 3 out of 5 Top Health Providers Top 2 Global Telecomm Company 40% of Global Mail Delivery Largest US Media Company 3 out of 5 Top Pharmaceuticals About CipherCloud

×