Page 219 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 219

While  this  complex  cybersecurity  landscape  has  created  many  challenges  for  businesses  and
            government organizations alike, we are now seeing for the first time a uniform approach to cybersecurity
            being implemented. The current threat landscape also underscored the importance of Executive Order
            14208 and other pending legislation aimed at improving cybersecurity posture. Personal data has evolved
            not just into a commodity, but a means of leverage or even extortion of certain individuals. Data theft can
            mean more than just exposure of sensitive information; it can also seriously impact national security,
            companies or individuals whose reputations and ethics are being exploited. And we must not forget about
            the fatal impact of extortion as a result of data being held hostage.

            All of this indicates that there is an inherent need to update cybersecurity practices toward a method of
            zero-trust, rather than the traditional trust but verify approach. But what does this approach actually look
            like? Companies and government agencies are often sharing upwards of thirty percent of their data with
            third party collaborators – an inevitability of working with other agencies in a digital environment. This
            places the focal point of data security not on the data itself, but rather the governance of ensuring that
            individuals gaining access to this information, are in fact who they say they are. Legitimate figures have
            become increasingly hard to recognize in a digital age, from sources of misinformation, trojan horses and
            rapidly  advancing  ransomware  –  and  in  many  cases,  malicious  sources  have  become  increasingly
            identical in appearance to reputable ones. Solutions like multi-factor authentication have proven effective
            across these areas, many organizations and government agencies have some ground to cover to meet
            the highest security standards through the implementation of advanced identity and access management
            capabilities.

            The Nirvana of these solutions would center around the narrative of: What is my most critical information?
            How is it protected? Who has access to it? And who provides accountability for that access? Individuals
            should be able to tier the potential threat level to their data or security, and strategize how to grant access
            to other users, without compromising sensitive information, and finally, be able to disrupt access to this
            information at their own discretion.

            The next definitive phase in cybersecurity solutions will likely be centered around Identity proofing and
            governance of data access, versus what specific data is accessible. Rather than focusing on specific
            entitlements to data for individuals, the solution instead lies in creating a zero-trust environment with no
            exceptions. In other words, instead of continuing the current landscape of de-facto “trust but verify” before
            setting up protection, the order of operations should be carried out in reverse priority, shifting from a free-
            reign approach to more prescriptive access of data and information.

            The cybersecurity challenges for organizations and government agencies alike have only grown the past
            few months. Now is the time to improve upon cybersecurity posture across the board, taking into account
            the proper cybersecurity strategy and solutions built upon the concept of zero-trust. Only then will today’s
            organizations properly protect themselves from bad actors that thrive in turbulent times.













                                                                                                            219
   214   215   216   217   218   219   220   221   222   223   224