RSA boss Coviello calls for privacy law overhaul
Budget inertia and a skills shortage also hold back the move to a security infrastucture that goes beyond the perimeter
IDG News Service - In order to keep hackers at bay there must be changes in security budgets and privacy regulations, RSA Executive Chairman Art Coviello said on Tuesday.
Coviello opened the RSA Conference Europe 2012 with a keynote that called for a new cybersecurity model that doesn't focus its efforts on an increasingly porous defense of the perimeter.
"In the last year, as I have talked directly to CIOs, boards of directors and so many of you, I get agreement that a new model of cybersecurity makes sense," said Coviello.
Coviello believes enterprises should build what he calls an intelligence-based security system consisting of a number of components, including risk-mitigation strategies and more advanced use of data analysis.
"Intelligence-based security also requires information sharing at scale," said Coviello.
But these changes are held back by a number of things, including current privacy laws.
Coviello recounted a discussion he had with a CIO at a leading European manufacturer. Laws require him to protect personally identifiable information in his company's possession or run the risk of stiff fines and penalties, which is fair enough, the CIO told Coviello.
"However, if he implements the very technologies needed to protect that information, including visibility of traffic on his own network, he can potentially and inadvertently break laws designed to protect workers' privacy. So he can't win, ridiculous but true," said Coviello.
Because privacy activists don't realize that safeguards can be implemented, they think a reasonable danger to protect our freedoms is acceptable, according to Coviello.
"But I say that argument is based on dangerous reasoning, a knee-jerk reaction without understanding the scope of the situation," said Coviello.
Following his speech, Coviello was asked to specify privacy laws that need to be loosened in order for organizations to build better security systems, but he did not go into further detail.
"I am sure this is a matter for extensive debate, but to blindly suggest that we can't alter privacy laws to better protect ourselves I believe is wrong, said Coviello.
Coviello also blamed budgeting practices for holding back change.
"For a long time organizations have spent 70 to 80 percent of their budgets on prevention; 15 to 20 percent on monitoring and detection; and only 5 to 10 percent on response," said Coviello.
In an era where hackers can be expected to penetrate the perimeter, the current allocation must change for organizations to be able to respond quickly and avoid loss of information, he said.
Going forward, the security industry will also have to improve the understanding, as opposed to just awareness, of the problems organizations are facing and the enemies they are fighting, Coviello said.
"Every day there is a story in the papers, but there is never the appropriate context," said Coviello.
The fact that there isn't a comprehensive system to share information in a timely manner only exacerbates the problem, according to Coviello. That there is a growing skills shortage in the security space doesn't help either, he said.
Send news tips and comments to email@example.com
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- The Truth About Virtual Computing for CAD If you're a user of graphics-intensive software such as 3D modeling, simulation and analysis, and visualization, you might be skeptical about moving to...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Simplifying Product Design In A Complex World Product design engineering has moved far beyond the confines of ever-more powerful workstations. Companies can't afford to restrict projects to using only local...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different.... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!