SlideShare a Scribd company logo
Cultivate a Stronger
Corporate Culture
to Enhance
Cybersecurity
The fast-changing threat landscape requires a data-centric paradigm shift
FridFriday, September 14, 2018
By David X Martin X Martin
Corporate cultures do not change quickly – they migrate. Most organizational development
experts offer the same recipe for culture change: (1) pick the right leadership, (2) recognize
and reward the behaviors you want to encourage, (3) communicate clear values, and (4)
provide extensive training.
But this recipe won't work for the ever-evolving, shape-shifting, constantly moving target
that is cybersecurity. Most employees aren't interested in their own digital security, much less
their company's. Therefore, changing a company's culture to strengthen security is especially
difficult – requiring a paradigm shift in order to keep pace with the threat landscape.
Most people think of security as the protection of a company's digital environment – a virtual
hardened shell, protected by security guarding the company's networks, servers, and
applications. The problem with this paradigm is that when you focus on the environment, the
security employed becomes an end in itself and is not directly related to the data it's trying to
protect.
Those who create and handle data are best placed to understand its value, David X Martin
says.
For example, suppose a company is trying to defend against data loss or the unauthorized use
of data. Isn't it far better, from a security perspective, if the data itself is not readily readable
– and can be tracked based on those with authorized access and the business context in which
it is being used?
Further, this approach still works through the multiple defensive layers that a company may
implement as part of a defense in depth strategy.
Data-Centric Security
When we shift our focus from the IT infrastructure to the data that needs to be protected, the
first step is defining “what is the crucial data?” Once that is defined, you can use new, proven
solutions to control how the data is handled and distributed.
Encryption, for example, can help ensure that data is secure whether at rest to in motion. But
it is not fail-safe, because once cyber criminals intrude into a network with stolen, valid user
credentials, encryption becomes useless.
Data masking, which is the process of hiding specific data, is another useful tool. Data
masking can be achieved a number of ways: by obscuring the data dynamically as users
perform requests; duplicating data to eliminate the subset of the data that needs to be hidden;
or just masking the data from users or third parties.
Another way to control data is through the use of Data Loss Prevention (DLP) solutions,
which can provide accurate information regarding the movement of sensitive data – and even
block the transfer or delete it when found on unauthorized endpoints. Continuous monitoring
of the data using DLP solutions can help identify breaches in a timely fashion and limit the
damage inflicted.
Achieving Culture Change
The paradigm shift – focusing on the security of the data employing data-centric security –
will change your corporate culture.
Get the users involved. Historically, anything to do with IT security was kept away from
users by IT teams. Little wonder that users show little or no interest in the company's
security.
In reality, users are the front line of data security. They create and handle the data and are
best placed to understand the value of the data. Case in point: Allianz Ireland forced its
users to select a data classification before a document could be shared or an email sent. The
company experienced a rapid culture change within just a few months, resulting in 60%
increase in employee awareness of data security practices and an 89% reduction of breaches.
Engage employees in training applications. Today's cyber risk training focuses on phishing
schemes – not protecting data. Most training programs are not engaging, interesting, or fun.
They try to teach with borderline yes/no questions, and usually 80% of them have “yes” for
an answer. No one fails as long as they answer all the questions. Borrrring!
Now suppose the cybersecurity training is a video game, and you're having fun role-playing a
bad guy who stole valid user credentials and now is trying to steal company data. You
receive points based on how far you succeed in stealing data.
The game is highly engaging, and at the end of the session you obtain a point score that, if
high enough, comes with a reward. Even better, the company now has valid data to determine
employees' cyber awareness – information which could be used to help purchase cyber
insurance.
Make diversity part of the security culture. Self-awareness and consciousness are the first
steps toward changing any undesired behavior or attitude. Employees' decision-making
related to security is influenced by their diversity, their background, openness to discussing
these issues, and attitude about community. But posters, screen savers, and even in-person
group reviews will barely influence your employees' ability to judge threats.
Suppose a data breach occurs, and it is used as a learning experience for everyone. Instead of
just creating a PowerPoint, why not have employees then try to write a phishing email for the
company? This approach takes into account the diversity of your employees and their
varying levels of understanding of the threat.
Further, because employees are on the front line and know the company's vulnerabilities, as
well as their own and their coworkers' vulnerabilities, you might learn of additional
vulnerabilities you had no idea existed.
Create a framework that focuses on what is the right thing for security. Looking at
security from the point of view of data, the security framework needs to address these
questions: What are the crown jewels of our digital assets? What people, processes, and
technology are employed to protect them? What would be the impact of a breach of this data
on the organization, and how would we respond?
Strengthening the corporate culture for cybersecurity is not just about developing an
approach that reaches the right people with the right message at the right time. It's about
focusing on the data – and involving all employees at all levels.
David X Martin (dxm@cybxsecure.com) is a former chief risk officer and was founding chair
of the Investment Company Institute's Risk Committee. He is an adjunct professor, author,
expert witness, and co-managing director of cybX. His previous contributions to GARP Risk
Intelligence include For Corporate Boards, a Cyber Security Top 10; and Risk Management
in the Cloud.

More Related Content

What's hot

Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
Gabe Akisanmi
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
Gabe Akisanmi
 
White paper-diligent-cybersecurity
White paper-diligent-cybersecurityWhite paper-diligent-cybersecurity
White paper-diligent-cybersecurity
james morris
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
CloudMask inc.
 
How to write your company's it security policy it-toolkits
How to write your company's it security policy   it-toolkitsHow to write your company's it security policy   it-toolkits
How to write your company's it security policy it-toolkits
IT-Toolkits.org
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Booz Allen Hamilton
 
Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Atte...
Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Atte...Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Atte...
Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Atte...
Lerner College of Business and Economics, University of Delaware
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
Ken M. Shaurette
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
CloudMask inc.
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
Haystax Technology
 
Haystax Technology - About Us
Haystax Technology - About UsHaystax Technology - About Us
Haystax Technology - About Us
Haystax Technology
 
Think like a hacker for better security awareness
Think like a hacker for better security awarenessThink like a hacker for better security awareness
Think like a hacker for better security awarenessCOMSATS
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
Ben Rothke
 
User access profiling model
User access profiling modelUser access profiling model
User access profiling model
Jose Guerrero
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
aengelbert
 
Whole Person Risk Modeling
Whole Person Risk ModelingWhole Person Risk Modeling
Whole Person Risk Modeling
Haystax Technology
 

What's hot (20)

Is your infrastructure holding you back?
Is your infrastructure holding you back?Is your infrastructure holding you back?
Is your infrastructure holding you back?
 
Should we fear the cloud?
Should we fear the cloud?Should we fear the cloud?
Should we fear the cloud?
 
White paper-diligent-cybersecurity
White paper-diligent-cybersecurityWhite paper-diligent-cybersecurity
White paper-diligent-cybersecurity
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
How to write your company's it security policy it-toolkits
How to write your company's it security policy   it-toolkitsHow to write your company's it security policy   it-toolkits
How to write your company's it security policy it-toolkits
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
 
Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Atte...
Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Atte...Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Atte...
Opportunity to Peek: A Longitudinal Investigation of Unauthorized Access Atte...
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
 
Haystax Technology - About Us
Haystax Technology - About UsHaystax Technology - About Us
Haystax Technology - About Us
 
Think like a hacker for better security awareness
Think like a hacker for better security awarenessThink like a hacker for better security awareness
Think like a hacker for better security awareness
 
EnterpriseImmuneSystem
EnterpriseImmuneSystemEnterpriseImmuneSystem
EnterpriseImmuneSystem
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
User access profiling model
User access profiling modelUser access profiling model
User access profiling model
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Whole Person Risk Modeling
Whole Person Risk ModelingWhole Person Risk Modeling
Whole Person Risk Modeling
 

Similar to Cultivate a stronger corporate culture to enhance cybersecurity

Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
Danielle Bowers
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
jayceewong1
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
sodhi3
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
TheWalkerGroup1
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Skillmine Technology Consulting
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Skillmine Technology Consulting
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
Caroline Johnson
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
Faisal Yahya
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
aryan532920
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
Mighty Guides, Inc.
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
V2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
V2Infotech1
 
How to Build a Culture of Cyber Security for Your Business
How to Build a Culture of Cyber Security for Your BusinessHow to Build a Culture of Cyber Security for Your Business
How to Build a Culture of Cyber Security for Your Business
NXT IT Solutions
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
Legal Services National Technology Assistance Project (LSNTAP)
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
Enterprise Insider
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
 

Similar to Cultivate a stronger corporate culture to enhance cybersecurity (20)

Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
How to Build a Culture of Cyber Security for Your Business
How to Build a Culture of Cyber Security for Your BusinessHow to Build a Culture of Cyber Security for Your Business
How to Build a Culture of Cyber Security for Your Business
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 

More from David X Martin

Guiding Principles for Cyber Risk Governance
Guiding Principles for Cyber Risk GovernanceGuiding Principles for Cyber Risk Governance
Guiding Principles for Cyber Risk Governance
David X Martin
 
Risk Management in the Cloud
Risk Management in the CloudRisk Management in the Cloud
Risk Management in the Cloud
David X Martin
 
Primer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directorsPrimer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directors
David X Martin
 
Cyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantificationCyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantification
David X Martin
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10
David X Martin
 
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martin
David X Martin
 
New Risk Management Paradigm for Not-For-Profits
New Risk Management Paradigm for Not-For-ProfitsNew Risk Management Paradigm for Not-For-Profits
New Risk Management Paradigm for Not-For-Profits
David X Martin
 

More from David X Martin (7)

Guiding Principles for Cyber Risk Governance
Guiding Principles for Cyber Risk GovernanceGuiding Principles for Cyber Risk Governance
Guiding Principles for Cyber Risk Governance
 
Risk Management in the Cloud
Risk Management in the CloudRisk Management in the Cloud
Risk Management in the Cloud
 
Primer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directorsPrimer on cybersecurity for boards of directors
Primer on cybersecurity for boards of directors
 
Cyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantificationCyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantification
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10
 
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martin
 
New Risk Management Paradigm for Not-For-Profits
New Risk Management Paradigm for Not-For-ProfitsNew Risk Management Paradigm for Not-For-Profits
New Risk Management Paradigm for Not-For-Profits
 

Recently uploaded

April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 

Recently uploaded (20)

April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 

Cultivate a stronger corporate culture to enhance cybersecurity

  • 1. Cultivate a Stronger Corporate Culture to Enhance Cybersecurity The fast-changing threat landscape requires a data-centric paradigm shift FridFriday, September 14, 2018 By David X Martin X Martin
  • 2. Corporate cultures do not change quickly – they migrate. Most organizational development experts offer the same recipe for culture change: (1) pick the right leadership, (2) recognize and reward the behaviors you want to encourage, (3) communicate clear values, and (4) provide extensive training. But this recipe won't work for the ever-evolving, shape-shifting, constantly moving target that is cybersecurity. Most employees aren't interested in their own digital security, much less their company's. Therefore, changing a company's culture to strengthen security is especially difficult – requiring a paradigm shift in order to keep pace with the threat landscape. Most people think of security as the protection of a company's digital environment – a virtual hardened shell, protected by security guarding the company's networks, servers, and applications. The problem with this paradigm is that when you focus on the environment, the security employed becomes an end in itself and is not directly related to the data it's trying to protect. Those who create and handle data are best placed to understand its value, David X Martin says. For example, suppose a company is trying to defend against data loss or the unauthorized use of data. Isn't it far better, from a security perspective, if the data itself is not readily readable – and can be tracked based on those with authorized access and the business context in which it is being used? Further, this approach still works through the multiple defensive layers that a company may implement as part of a defense in depth strategy. Data-Centric Security When we shift our focus from the IT infrastructure to the data that needs to be protected, the first step is defining “what is the crucial data?” Once that is defined, you can use new, proven solutions to control how the data is handled and distributed. Encryption, for example, can help ensure that data is secure whether at rest to in motion. But it is not fail-safe, because once cyber criminals intrude into a network with stolen, valid user credentials, encryption becomes useless. Data masking, which is the process of hiding specific data, is another useful tool. Data masking can be achieved a number of ways: by obscuring the data dynamically as users perform requests; duplicating data to eliminate the subset of the data that needs to be hidden; or just masking the data from users or third parties.
  • 3. Another way to control data is through the use of Data Loss Prevention (DLP) solutions, which can provide accurate information regarding the movement of sensitive data – and even block the transfer or delete it when found on unauthorized endpoints. Continuous monitoring of the data using DLP solutions can help identify breaches in a timely fashion and limit the damage inflicted. Achieving Culture Change The paradigm shift – focusing on the security of the data employing data-centric security – will change your corporate culture. Get the users involved. Historically, anything to do with IT security was kept away from users by IT teams. Little wonder that users show little or no interest in the company's security. In reality, users are the front line of data security. They create and handle the data and are best placed to understand the value of the data. Case in point: Allianz Ireland forced its users to select a data classification before a document could be shared or an email sent. The company experienced a rapid culture change within just a few months, resulting in 60% increase in employee awareness of data security practices and an 89% reduction of breaches. Engage employees in training applications. Today's cyber risk training focuses on phishing schemes – not protecting data. Most training programs are not engaging, interesting, or fun. They try to teach with borderline yes/no questions, and usually 80% of them have “yes” for an answer. No one fails as long as they answer all the questions. Borrrring! Now suppose the cybersecurity training is a video game, and you're having fun role-playing a bad guy who stole valid user credentials and now is trying to steal company data. You receive points based on how far you succeed in stealing data. The game is highly engaging, and at the end of the session you obtain a point score that, if high enough, comes with a reward. Even better, the company now has valid data to determine employees' cyber awareness – information which could be used to help purchase cyber insurance. Make diversity part of the security culture. Self-awareness and consciousness are the first steps toward changing any undesired behavior or attitude. Employees' decision-making related to security is influenced by their diversity, their background, openness to discussing these issues, and attitude about community. But posters, screen savers, and even in-person group reviews will barely influence your employees' ability to judge threats. Suppose a data breach occurs, and it is used as a learning experience for everyone. Instead of just creating a PowerPoint, why not have employees then try to write a phishing email for the company? This approach takes into account the diversity of your employees and their varying levels of understanding of the threat.
  • 4. Further, because employees are on the front line and know the company's vulnerabilities, as well as their own and their coworkers' vulnerabilities, you might learn of additional vulnerabilities you had no idea existed. Create a framework that focuses on what is the right thing for security. Looking at security from the point of view of data, the security framework needs to address these questions: What are the crown jewels of our digital assets? What people, processes, and technology are employed to protect them? What would be the impact of a breach of this data on the organization, and how would we respond? Strengthening the corporate culture for cybersecurity is not just about developing an approach that reaches the right people with the right message at the right time. It's about focusing on the data – and involving all employees at all levels. David X Martin (dxm@cybxsecure.com) is a former chief risk officer and was founding chair of the Investment Company Institute's Risk Committee. He is an adjunct professor, author, expert witness, and co-managing director of cybX. His previous contributions to GARP Risk Intelligence include For Corporate Boards, a Cyber Security Top 10; and Risk Management in the Cloud.