Strategies to Implement Effective Security for Corporate Data
Data is the lifeline of businesses today as the success of business strategies depend majorly on the efficient use of data. Acknowledging the significance of data, many data privacy regulations have been enacted like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).
Enterprise data consists of customer information that can contain financial information and other personal details. Any breach to the data can inflict irreparable damage to the customer as well as to the organization’s financial standing and brand reputation. Many companies are not sufficiently motivated to secure sensitive information as the repercussions are not severe enough to encourage organizations to prioritize data protection adequately. Data compliance regulations can provide a baseline level of visibility and control over sensitive data, ensuring data privacy to a large extent. A few steps that can ensure a comprehensive approach to cybersecurity and regulatory compliance:
Observation of currently regulated industries: many industries like healthcare and finance have strong data protection programs, which help them to achieve regulatory compliance. Companies operating in these industries use contextual access control and data loss prevention tools to control access to data. However, according to a report by Bitglass, 103 financial services breaches were recorded in the year 2018. Unregulated companies should learn from the successes and failures of regulated industries before implementing data protection strategies. In addition to the compliance regulation, companies should also opt for comprehensive policies according to their risk tolerance and security needs.
Data protection beyond the firewall: Traditional information security teams used to create a secure parameter to protect their data against any threats. These security services managed to keep threat out with various layers of security, enabling companies to have full control over their data. However, the proliferation of cloud services applications and bring your own device (BYOD) has resulted in reduced data control for enterprises. Companies should shift their security strategies from network-centric to data-centric approach to provide ample security for the corporate data.
By James Seevers, CIO & GM, Toyoda Gosei
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Bruce. D. Smith, SVP & CIO, Information Systems, Advocate...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Graham Welch, Director-Cisco Security, Cisco
By Michael Watkins, Senior Product Director, Global Knowledge
By Bernd Schlotter, President of Services, Unify
By Patrick Hale, CIO, VITAS Healthcare
By Steve Bein, VP-GIS, Michael Baker International
By Jason Alan Snyder, CTO, Momentum Worldwide
By Mike Morris, CIO, Legends
By Louis Carr, Jr., CIO, Clark County
By Bill Dow, SVP and General Manager of Business Solutions,...
By Jim Whitehurst, CEO, Red Hat
By Darren Cockrel, CIO, Coyote Logistics, a UPS Company...
By Nathan Johnson, SVP and CIO, Werner Enterprises [NASDAQ:...
By David Tamayo, CIO, DCS Corporation
By Neil Hampshire, CIO, ModusLink Global Solutions, Inc....