123ArticleOnline Logo
Welcome to 123ArticleOnline.com!

ALL >> Computers >> View Article

Don’t Get Snowdened: 5 Questions Every Ceo Should Ask Their Cio / Ciso

By Author: Skyhighnetworks
Total Articles: 54

Today is the 1-year anniversary of the historic Snowden disclosure. In the year since the first stories about Edward Snowden appeared, one of the lasting affects of the scandal is a heightened awareness of the risk posed by rogue insiders. This increased focus on rogue insiders has spread beyond the government to the private sector, and from security circles to corporate executives.

From product designs, formulas, and customer information, all companies have data that could harm their business in the hands of a competitor, making insider threats like Snowden an executive-level concern due to the potential negative impact on the company’s business operations and value. And with the ubiquity of cloud services, insiders are increasing exploiting the cloud to exfiltrate data.

We’ve distilled lessons learned from Snowden scandal and created 5 questions every CEO should be asking their CIO / CISO in order to avoid a catastrophic rogue insider event in the private sector both in using cloud as a vector of exfiltration as well as protecting their data stored in the cloud.

Can we identify unusual user or network activity to cloud services?
Many companies already archive log data from firewalls and proxies and use basic search capabilities to look for specific behavior. Unfortunately, basic search capabilities are ineffective at analyzing petabytes of data to proactively identify different forms of anomalous behavior. Today, there are machine learning techniques algorithms that establish baseline behavior for every user and every cloud service and immediately identify any anomalous activity indicative of security breach or insider threat.

Can we track who accesses what cloud-hosted data and when?

Snowden was able to steal roughly 1.7 million files and to this day the NSA doesn’t know exactly what he took. With the rapid adoption of cloud security services, companies need to make sure that their cloud services provide the basic logging of all access to cloud services, including those by admins and via application APIs. Furthermore, companies need to make sure that cloud services provide historical log data of all accesses in order to support forensic investigations when an event does occur.

How are we protecting against insider attacks at the cloud service providers?

Encrypting data using enterprise-managed keys will enable employees to access information while stopping unauthorized third parties from reading the same data. Experts recommend encrypting sensitive information stored on premises and also in the cloud. By encrypting data in this manner, companies add an additional layer of protection over and above authentication and authorization that protects against insider attacks at the cloud service provider end.

How do we know unprotected sensitive data is not leaving the corporate network?

Many companies enforce data loss prevention policies for outbound traffic. With the increasing use of cloud services (the average company uses 759 cloud services), companies should also extend their access control and DLP policy enforcement to data stored in the cloud. And as they do so, they should make sure that they are not reinventing the wheel and rather leverage their existing infrastructure. Companies should consider augmenting on-premise DLP systems and their existing processes to extend DLP to the cloud, with reconnaissance services that look for sensitive data in cloud services in use by the enterprise.

Can we reduce surface area of attack by limiting access based on device and geography?

The ability to access sensitive information should be dependent on context. For example, a salesperson in Indianapolis viewing customer contacts stored in Salesforce for customers in her territory using a secure device is appropriate access. Using an unsecure or unapproved device from another location may not be appropriate and could expose the company to risk. Limiting access to appropriate devices and appropriate locations will help prevent exposure.

Author :
Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com/ or follow us on Twitter@skyhighnetworks.

Total Views: 76Word Count: 703See All articles From Author

Computers Articles

1. Give A Good Kick Start To Your Busy Day With 3d Printers Machine
Author: Lingan

2. Codefire Coming Up With Beneficial Mobile App Development Services
Author: Amitesh Kumar

3. Microsoft Products Are Compatible With Windows Operating Systems As Well Mac
Author: Robin Ponting

4. Laptop Screen Repair Centre Glasgow – Laptop Repairer
Author: laptop screen repair glasgow,

5. Manage Project Efficiently With Online Project Management Tools
Author: christianbrooken

6. Create Your Smart Address On Map Directions Google To Simply Finding Your Address
Author: sophiahebreew

7. Improving Cyber Security: Are You Going For The Best?
Author: Megan Darcy

8. Data, Data Everywhere: How Machine Learning Tools Capture The Most Valuable Insights From Your Massi
Author: Bob Kramich

9. Reshape Your Beauty With Online Portrait Retouch Services
Author: romyfernandis12

10. Take Care Of Your Teeth - It Is More Valuable Than A Diamond
Author: romyfernandis12

11. Follow Pink Mirror For A Better Version Of Yourself
Author: romyfernandis12

12. Some Of The Effective Ways How To Make Whiten Teeth Naturally
Author: romyfernandis12

13. Use Retouch Apps To Reduce Face Size And Look Flawless
Author: romyfernandis12

14. Get Best Online Photo Editor Tool For Retouching
Author: romyfernandis12

15. Types Of Lips And What They Reveal About Your Personality
Author: romyfernandis12

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: