Page 37 - index
P. 37
To further protect against data loss through an extended network, an organization should deploy
one or more of today’s cross-check techniques and tools, which are designed to monitor data
activity for anomalies in the lateral movement of information across, and outside of, enterprise
channels. This is especially critical if the enemy is believed to be already inside and security
already compromised.
Steps to take
As with any security initiative, the ultimate success of a cybersecurity effort lies in preparation.
Forward-thinking organizations plan and develop a cyberthreat playbook, then stage “tabletop”
or “red team” what-if exercises that simulate an incident.
Enterprise cybersecurity success is not a destination. It is a continuing journey – one that will
become increasingly difficult as the world becomes ever more connected. As the threat of
compromised data becomes more prevalent and pronounced, organizations must view the issue
not as an IT concern, but rather, as a board- and C-level priority that requires an ongoing
dialogue.
The views expressed herein are those of the author and do not necessarily reflect the views of
Ernst & Young LLP.
About the Author
Chip Tsantes
Chip Tsantes is a principal in the Financial Services Office of Ernst & Young
LLP where he leads the information security practice. He has over 20 years
of financial services and consulting experience helping clients assimilate
emerging technologies, computing architectures and development
techniques. Chip is a frequent speaker at industry events including the
FTC’s Proof Positive, Security in Numbers, RSA Security Conference and
The Voice Biometrics Conference. He recently led a discussion on data loss
protection for the global financial services industry at the 10th International
Conference on Information Technology for Financial Services. He is also the host of the
Financial Fortress Leadership Group, a quarterly forum convened and coordinated by Ernst
&Young for information security executives in the financial services industry. Chip is an expert
witness for the Federal Trade Commission in the area of consumer authentication. Chip is
based in McLean, VA. and can be reached at +1 703 747 1309 or [email protected].
37 Cyber Warnings E-Magazine – April 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide