Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Don’t be a “CIS-No,” Regain Control of your Data

Just like all things security, yet another new concept has taken the market by storm, being repeated over and over again. The perimeter is dead. We are living in a world without walls where criminals, employees and devices exist on the inside and outside. Firewalls may or may not stop external bad actors from breaking in, yet in many cases, those bad actors are already inside using stolen credentials to masquerade as legitimate employees.

Just like all things security, yet another new concept has taken the market by storm, being repeated over and over again. The perimeter is dead. We are living in a world without walls where criminals, employees and devices exist on the inside and outside. Firewalls may or may not stop external bad actors from breaking in, yet in many cases, those bad actors are already inside using stolen credentials to masquerade as legitimate employees. Then there are malicious and non-malicious employees and third-party vendors, people who either want to steal data for financial gain, hurt their employer or simply do not understand nor practice good cyber hygiene. Threats are everywhere – in, out, behind, in front, above and below. 

I recently had an interesting discussion about this topic with Symantec Senior Vice President of Information Protection, Nico Popp. Being on the front lines with enterprises, Nico sees firsthand the challenges they are facing navigating this new world. Enterprises want to support collaboration, cloud adoption, remote connectivity, and mobile computing.  However, they also want to make sure they are secure and compliant at all times. I captured my conversation with Nico in a Q&A.

Steven: Nico, thanks for taking the time to chat with me. As we are hearing time and time again, the perimeter has vanished. Is this what you are seeing across the enterprises you meet with?

Nico: Not exactly, Steven. The perimeter is not dead, it just needs to evolve. When data is in the cloud, in unmanaged/BYOD devices and shared with external users, the network as the perimeter is no longer enough. So, ask yourself the question, “In a world where you no longer control the application (SaaS), the data-center (iaaS), the device (BYOD) and the user (external collaboration), where is the perimeter? The answer is simple. The only thing you control in that brave new world, the only thing that really belongs to you is…the data. So, the data MUST become the perimeter because there is NOTHING else.

Steven: In the past when data was primarily on premise, within the confines of the four walls of the organization, it was much easier to make sure bad actors didn’t get in and valuable data didn’t get out.  In this new world, how can enterprises take the reins and regain that control?

Nico: To regain control of their data, cyber leaders should focus on three controls, although each one has their shortcomings. Data loss prevention is the brain of protection. It understands which data is personally identifiable information, source code and other types that make it valuable. However, while data loss prevention is intelligent, it does not actually protect the data. It simply blocks the user. Don’t send that email. Don’t share that file. Data loss prevention is Captain “No.” Encryption is good at protecting the data, however it’s far from intelligent. It cannot decipher what kind of data needs and does not need to be encrypted. So, we encrypt everything, whether it’s a picture of our kids or a highly confidential document. Identity and access management is the third control. It protects access to the data by only allowing certain users to gain access, however once it grants access, it steps out of the way. It doesn’t protect anything anymore. These three controls – data loss prevention, encryption and identity and access management – need to come together. Data loss prevention should be the brain of encryption. It should tell the tool which documents must be encrypted. Encryption should be identity aware. It would only unencrypt data after the user authenticated. 

Steven: What about user and entity behavior analytics (UEBA)? We are seeing a transformation in the UEBA space where the technology is being integrated into existing security tools, like data loss prevention, to optimize their effectiveness. Where does UEBA come into the picture with the scenario you described?

Nico: UEBA is the “eye in the sky” monitoring the telemetry aspect that’s missing today in the enterprise environment. Here’s an example. Let’s say “Tom” who works at Symantec, sent an email to “Amy” who works at a public relations agency, a set of press releases that have not been made public yet.  Data loss prevention drives encryption so since the file was confidential, its contents would be encrypted automatically. When Amy receives the email, she is required to authenticate, which she does, and the file is unencrypted. The UEBA technology is consuming all of the telemetry data so that it understands what’s normal behavior for Tom and Amy, what’s abnormal but okay (i.e Tom sending the file to Amy, which may not be something Tom would typically do), and what’s abnormal but dangerous (i.e. Tom sent not only the press release file but also documents containing sensitive customer information which is not something he would typically send outside Symantec). If the UEBA tool detected abnormal but dangerous activity, it would prioritize the alert and send it to analysts for immediate investigation.

Advertisement. Scroll to continue reading.

The best way for enterprises to embrace BYOD, the cloud and collaboration while also remaining compliant and secure is to enable data to be the perimeter. By automating controls that follow the data, security leaders will have visibility into the security posture of that data no matter where it resides or who’s accessing it. And what’s even more exciting is that they no longer need to be a “CIS-no.” 

Steven: Nico, thank you for your time today.  These are certainly exciting times that also come with added responsibility to protect our employer’s and client’s data.  I look forward to speaking in the future about topics in information protection.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem