Defending the data will be a focus for 2007
Regulations, data breaches heighten need for data-level controls, IT managers say
Computerworld - ORLANDO -- Regulatory requirements and increasing consumer concerns about information security breaches are making data-level security controls a top priority for 2007, according to IT managers at the Computer Security Institute trade show held here this week.
After years of implementing technologies such as firewalls and intrusion-detection systems to keep network perimeters safe, companies now must move similar controls down to the data level, they said.
"The data now matters above everything else," said John Ceraolo, director of information security at JM Family Enterprises Inc., a $9.4 billion auto distribution and financing company based in Deerfield Beach, Fla.
Nonpublic information of all sorts needs to be protected, whether it is at rest or in transit, he said. And that requires an increasing focus on measures such as data classification and encryption, stronger user access and authentication and usage monitoring and auditing, Ceraolo said.
Most of the "blocking and tackling" that was needed to handle network threats has, to a large extent, already been accomplished via technologies such as firewalls and intrusion-detection and -prevention systems, said Mark Burnett, director of IT security and compliance at Gaylord Entertainment Co. in Nashville.
The goal now is to put multilayered defenses around the data as well, he said. "We are layering technology controls to make sure we can identify where the information is passing across our network" and protect it.
"The overall driving force behind our [security] program is reputation management. We have worked hard to build the Gaylord brand," he said. "Any one incident could ruin all that work."
Also driving the focus are regulations that Gaylord is required to comply with, such as the Sarbanes-Oxley Act and the Payment Card Industry (PCI) data security standard, which is mandated by the major credit card companies, he said. "We absolutely recognize the need to protect sensitive information and are working hard to fulfill that obligation," he said.
Ann Garrett, the chief information security officer at the North Carolina state office of information technology in Raleigh, said that a new state law governing the use of personally identifiable information has elevated the need for security controls at the data level. The law went into effect for private industry on Oct. 1 and will apply to state agencies on Oct. 1, 2007.
"We have a strong network firewall, intrusion-detection system and intrusion-prevention system," Garrett said. What's lacking are controls for mitigating user errors at the end point, she said. As a result, there's an increased focus on data encryption -- and on ways to log and audit user transactions. "We have to add accountability and auditability" at the end point, she said.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts