Cybersecurity & IP: Steering Hackers Away From Digital Assets
Many companies rarely appreciate the significant value embodied in intellectual property, while others take the time to understand and grow such assets. Even the most sophisticated companies with developed IP portfolios are either ignoring or failing to address this terrifying threat to IP capital. Here are a few realistic tips every company holding valuable IP assets on its hard drives should take into serious consideration.
Identifying and Segmenting IP Data
Most companies think that password protection and file access restrictions are enough. Segmenting sensitive information into other virtual servers and further compartmentalizing it makes it far more difficult for hackers to get to that information in the first place. The side benefit is that organizations also perform a mini due diligence on their IP in the process, leading to stronger IP assets as a result.
Written Information Security Program Addressing the IP Assets
Companies with a significant data footprint must have a written information security program (WISP), at a minimum, for highly sensitive confidential information as well as specific development data related to any products and services that requires IP protection. The WISP must incorporate many more levels of intrusion detection and prevention so as to make the “crown jewels” of IP as difficult to access as possible.
The IP and Cloud Mix
It is not recommended for companies to place highly sensitive intellectual property in the “cloud” unless it is encrypted and the security keys are monitored. Most state data breach notification laws provide for an encryption “safe harbor,” and when it comes to cloud-based services and your IP, encryption is critical. Although many cloud providers are offering increased security and even encryption, precious few of them are willing to shoulder the risk of a breach that results in IP theft. Don’t risk it—and if you have to—make sure you take appropriate steps to encrypt highly sensitive data and limit access to it.
By Michael Cockrill, CIO, State of Washington
By Brett Shockley, SVP & CIO, Avaya
By Sven Gerjets, SVP-IT, DIRECTV
By Steve Moyer, VP of Storage Software Engineering, Micron...
By Michelle R. McKenna-Doyle, SVP and CIO, National Football...
By Patrick Hale, CIO, VITAS Healthcare
By Roman Trakhtenberg, CEO, Luxoft
By Julia Davis, SVP, CIO, Aflac
By Chris Westlake, VP & GM of Service,RK
By Pauly Comtois, VP DevOps, Hearst Business Media
By Yanni Charalambous, VP & CIO, Occidental Petroleum...
By Bob Brown, VP-Production & Operations, ONE World Sports
By Arthur Hu, SVP & CIO, Lenovo
By Ron Guerrier, CIO, Farmers Insurance Group, Inc.
By Scott Cardenas, CIO, City and County of Denver
By Kevin McCarron, Vice President Collaboration, Carousel...
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Christopher Frenz, AVP of Information Security,...
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment