Cybersecurity & IP: Steering Hackers Away From Digital Assets
Many companies rarely appreciate the significant value embodied in intellectual property, while others take the time to understand and grow such assets. Even the most sophisticated companies with developed IP portfolios are either ignoring or failing to address this terrifying threat to IP capital. Here are a few realistic tips every company holding valuable IP assets on its hard drives should take into serious consideration.
Identifying and Segmenting IP Data
Most companies think that password protection and file access restrictions are enough. Segmenting sensitive information into other virtual servers and further compartmentalizing it makes it far more difficult for hackers to get to that information in the first place. The side benefit is that organizations also perform a mini due diligence on their IP in the process, leading to stronger IP assets as a result.
Written Information Security Program Addressing the IP Assets
Companies with a significant data footprint must have a written information security program (WISP), at a minimum, for highly sensitive confidential information as well as specific development data related to any products and services that requires IP protection. The WISP must incorporate many more levels of intrusion detection and prevention so as to make the “crown jewels” of IP as difficult to access as possible.
The IP and Cloud Mix
It is not recommended for companies to place highly sensitive intellectual property in the “cloud” unless it is encrypted and the security keys are monitored. Most state data breach notification laws provide for an encryption “safe harbor,” and when it comes to cloud-based services and your IP, encryption is critical. Although many cloud providers are offering increased security and even encryption, precious few of them are willing to shoulder the risk of a breach that results in IP theft. Don’t risk it—and if you have to—make sure you take appropriate steps to encrypt highly sensitive data and limit access to it.
By Chris Tjotjos, VP, Cisco Solutions Practice, Black Box...
By Laura Jackson, Sr. Manager-Risk Management, ABS Consulting
By Jason Cradit, VP of Information Systems, Willbros Group
By Steve Garske, Ph.D., Senior Vice President & Chief...
By Roman Trakhtenberg, CEO, Luxoft
By Renee P Wynn, CIO, NASA
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Andrew Macaulay, CTO, Topgolf Entertainment Group
By Dominic Casserley, President and Deputy CEO, Willis...
By Dave Nelson, SVP-Portfolio Lead, Avanade, Inc.
By Michael Cross, SVP & CIO, CommScope Holding Company Inc.
By Pauly Comtois, VP DevOps, Hearst Business Media
By Dan Adam, CIO, Extreme Networks
By Matt Schlabig, CIO, Worthington Industries
By David Tamayo, CIO, DCS Corporation
By Scott Cardenas, CIO, City and County of Denver
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment