Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

What Employees Want vs. What IT Wants – The Venn Diagram that Doesn’t Overlap

In 1880, John Venn, a logician and mathematician born in Hull, England, developed what is now known as the Venn diagram. His goal was to visually represent mathematical propositions using inclusive or exclusive circles. But of course, this eventually extended to represent any type of relationship, not just mathematical elements.

In 1880, John Venn, a logician and mathematician born in Hull, England, developed what is now known as the Venn diagram. His goal was to visually represent mathematical propositions using inclusive or exclusive circles. But of course, this eventually extended to represent any type of relationship, not just mathematical elements.

On August 4th 2014, for example, Google celebrated Venn’s 180th birthday with an animated Google Doodle. Users choose two circles and the doodle gives you an object that overlaps between the two circles; choose “mammals” and “has wings”, you’ll get a bat.

If we applied this to the cloud, would a proposition incorporating “what employees want” and “what IT wants” produce an actual output, or is it the Venn diagram that doesn’t overlap? (Bonus points for all the math nerds out there, who deduce that if no intersect happens, it’s actually an Euler diagram.)

Cloud Venn Diagram

Striking A Balance

A large part of what employees want is the ability to do their jobs more efficiently. They want to be able to collaborate internally and externally, and share content. They want to use the devices they need to get their jobs done, and they want to work from Starbucks, from their kid’s soccer field practice and in a hotel room.

The cloud helps them achieve that. A business unit can sign up for a SaaS application, and onboard employees immediately. Users don’t have to wait for the application to be deployed, nor worry about setup or maintenance. The SaaS application inherently enables collaboration and anywhere any device access.

IT, on the other hand is responsible and accountable for the availability and security of the business, and the easiest way to do that is to limit the avenues of risks. But, sometimes, this backfires. Locking down corporate mobile devices encourages employees to use their own mobile devices in search of productivity. Forcing users to access cloud services through a VPN defeats the agility of these services by making them slow and thus also encourages circumvention.

One thing is for sure– turning off the cloud is not an option. IT is a cost center, it cannot impact the productivity of any profit center. So, how do we get these two vastly different propositions to intersect, such that both IT and employees get what they want?

Advertisement. Scroll to continue reading.

Is There A Solution?

First, IT needs to get out of the “jail warden” mentality and shift to a “crossing guard” mentality. Security, mobility and collaboration are not mutually exclusive. Instead of just being the department of “no”, IT must work with employees, in particular those within business units, to understand the reasoning behind why they are doing what they are doing.

For example, if users are now sending corporate data to their personal Dropbox or SugarSync accounts, then IT can sanction the use of Box to enable a common, corporate-approved content management system for collaboration. The transition will not occur overnight, but if the new, sanctioned application addresses employees’ needs, migration will eventually occur.

Sure, there will be laggarts. But, going back to our “crossing guard” analogy, a crossing guard’s job is to ensure people know where the crosswalk is and to keep them safe when they utilize it to cross the street. However, a crossing guard must accept the fact that people will jaywalk and it’s not their job to stop them, but rather encourage them to cross safely at the crosswalk.

Converging What Employees and IT want

Beyond changing the IT mindset, IT should also:

Deploy identity access management (IAM) solutions – These IAM services enable employees to access sanctioned cloud applications using their corporate credentials. They solve two of the biggest problems in cloud adoptions– eliminating the plethora of user credentials, and the de-provisioning of access to terminated employees.

Categorize data in the cloud – Not all information is equal. It is important to categorize data in the cloud to know who the information can be shared with. The key is not to create too many categories that it is overwhelming and practical. One of the simplest ways of course is whether it can be defined as “toxic” (data that could be damaging to you if it leaves your control) or not. Intellectual property, personal healthcare information (PHI), personal credit card information, personal identifiable information (PII) all fall in this bucket.

In some cases, encryption may be required for the privacy of certain data– many service providers already offer end-to-end encryption. But understand that while encryption provides privacy of the data from the cloud providers, it is not a security solution.

Transform the IT skill set – As more and more businesses adopt SaaS applications, IT can now transform into an information economy. Instead of the day to day operations of deploying and managing applications, IT can oversee and ensure the viability of the cloud providers operations. To augment the cloud provider security, there is also a new category of products Gartner calls “Cloud Access Security Brokers” that focus on extending IT purview to enterprise data in the cloud. Cloud Access Security Brokers give you granular visibility and control over enterprise data in cloud applications from within the cloud rather than outside of it. IT should investigate whether a Cloud Access Security Broker is right for the organization instead of just relying on the security offered by the cloud provider.

In summary, cloud adoption should be a collaborative rather than prescriptive process between employees and IT. Ultimately, with the right mindset and strategy, what employees want and what IT wants can become a proper union in a Venn diagram.

Written By

Danelle is CMO at Ordr. She has more than 20 years of experience in bring new cybersecurity technologies to market. Prior to Ordr, she was CMO at Blue Hexagon (acquired by Qualys), a company using deep-learning to detect malware, and CMO at SafeBreach where she helped build the marketing organization and define the Breach and Attack Simulation category. Previously, she led strategy and marketing at Adallom, a cloud security company acquired by Microsoft. She was also Director, Security Solutions at Palo Alto Networks, driving growth in critical IT initiatives like Zero Trust, virtualization and mobility. Danelle was co-founder of a high-speed networking chipset startup, co-author of a Cisco IP communications book and holds 2 US patents. She holds an MSEE from UC Berkeley.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.