Your Data is Your New Perimeter

December 3, 2020
data

The digital assets of an enterprise have always been difficult to define, locate, and secure. Often, we are stuck simply trying to protect our “crown jewels”, or critical information infrastructure. The more things changed (and grew), the more they seemed to stay the same: some digital assets are too hard to secure, and too big to fail.

data

Then 2020 happened. The pandemic exacerbated the challenge of finding our network boundaries (and crown jewels), as most of our employees began to work from home, and security administrators were forced to relax or even forego some traditional security measures. The need to expand the reach of online education and telemedicine was overwhelming. Thus, many of our network diagrams are now unique, with an increasingly amorphous boundary between corporate and non-corporate network space.

This was a key theme discussed in a recent cybersecurity leadership webinar, “2020 Has Been the Perfect Storm,” featuring Very Good Security (VGS) CEO Mahmoud Abdelkader, Fidelis Cybersecurity CEO Anup Ghosh, Premise Health CISO Joey Johnson, and [24]7.ai CISO Rebecca Wynn.

Life and technology are constantly evolving. Therefore, our idea of security, privacy, and network monitoring will also change over time. A good way to understand today’s challenges is to see that your data is your new perimeter. For any large organization, this sounds like a daunting task. As you search your premises, your cloud, the Internet, your smart devices, and perhaps even the dark web for proprietary data bits, you may feel like you need to purchase a Martian rover for help.

Any reader of this blog likely already owns numerous security products and tools. You may have mastered XDR and possess a SIEM that collates and visualizes many streams of data. You may tap into machine learning and AI to predict future security incidents. And you may even have on staff talented humans capable of critical thinking, collaboration, narrative development, and decision-making.

But even after all of that, you somehow have discovered that your cyber terrain and threat landscape are bigger than you imagined and extend well outside of your telemetry. At the same time, you know that, with 5G and IoT coming online, the power of some cyberattacks (e.g. DDoS) is rising, as well as their potential impact (in Germany, a hospital patient recently died during a ransomware attack).

Increasingly, information exchange happens in real-time. This raises the specter that a bad actor will hijack or poison your (or the Internet’s) data watering holes in a way that leaves no time for you to avoid bad decisions or even catastrophic failure. Many traditional information security models were simply not built for this kind of strategic challenge.

Therefore, what enterprises really need today is the ability to use sensitive data without the associated risks and costs of protecting it. This is why VGS has built something that the world has never seen before: a digital bank for your data.

You can think of VGS as a secure custodian for any type of digital information: from a credit card number, to financial data, to health records. Our Zero Data™ Platform intercepts sensitive information, secures it in your vault, and gives you a synthetic alias for it that you can use for any kind of business operation. We offer a dramatically different dynamic than any DIY model, which allows you to derive business intelligence from data without being responsible for its possession, security, or liability.

Create a free account here.

Ken Geers Kenneth Geers

External Communications Analyst at VGS

Share

You Might also be interested in...

Bank security

How Today’s Data Security Solutions Are Failing Banks

Channin Gladden December 15, 2020

Holiday Season

Don’t Let a Lack of Data Security Ruin Your Holiday Season.

Hoang Leung November 20, 2020

CPRA (Prop 24)

CPRA (Prop 24), Data Compliance, and Data Security: Here’s What you Need to Know.

Channin Gladden November 9, 2020