Cybersecurity – a Black Box of Technology with Little to Show for it?

by Jesse Spencer | September 14, 2020

Cybersecurity professionals are often considered wizards of their mysterious art.

But just how important is cybersecurity and how well is it understood in your organization? And is it really protecting your organization and personally identifiable data?

Cybersecurity should be treated as business outcome-driven decision. Let’s talk about why cybersecurity is still largely misunderstood and why there’s increasing push-back from additional spending.

Here’s an Exercise That Proves the Complexity of Our Understanding of Cybersecurity:

Think About A Bank Security's and It's Data

bank-deidentified-dataSecuring a physical bank is really easy to understand. You’ve got cameras, locks, bulletproof glass, and maybe even an armed security guard.

We all understand that from time to time a bank is robbed and we get it. That was one determined bad guy and he’ll probably get caught. We don’t think much more about it.

But when a digital bank is robbed (and the data is hacked) we’re all up in arms and want to know who’s at fault.

We react with all sorts of solutions, including:

  • Government regulation
  • New compliance initiatives
  • Projects for de identified data
  • Firing leadership (think Equifax)
  • And certainly demanding cybersecurity technology changes

Why the double standard? It’s simple. Fear, uncertainty, and doubt encircle what we don’t understand.

But all too often, these technologies are viewed as a mysterious black box. This thinking makes for bad decision-making.

Discover Our Big Data Solutions

How to Prioritize Cybersecurity and Identifiable Data

And in worst-case scenarios, business decisions are being made that are largely disconnected from the realities of cybersecurity risk. Executive decision-making demands a new level of scrutiny. Everything from product development to business strategy must place security front and center.

de-identified data setBy not placing the right priority on cybersecurity, more than reputation and dollars are at risk. A study by Vanderbilt University research used healthcare data to correlate mortality rates with a data breach. They discovered that after a data breach as many as 36 additional deaths per 10,000 heart attacks occurred annually.

“Breach remediation efforts were associated with deterioration in timeliness of care and patient outcomes,” the authors found. “Remediation activity may introduce changes that delay, complicate or disrupt health IT and patient care processes.”

Some of the data security problems that must be addressed include:

  • Aging operating systems
  • Use of open-source tools and platforms
  • Outsourcing work to insecure third-parties
  • Not building security into all core processes

Clearly, there needs to be a new level of conversation and consideration in executive business decision-making.

So How Do We Get to Secured and De-Identified Data?

The best cybersecurity initiative is one that envelops a solid understanding of an organization’s business context. This includes everything from the balance sheet to the people, processes, and technologies that drive business outcomes.

Without this clear understanding, the investments needed to protect the organization will be difficult to define.

Start With Best Practices, for Starters

Follow best practices, at a minimum. ISO 2700x and NIST are popular frameworks for securing an organization. Build tools, processes, and policies around these standards.

secure identifiable dataMeasure levels of protection using security audits that measure the existence and use of controls. What’s needed is a clear picture of how well an organization's data is actually protected rather than what tools are used.

In the 2019 International Consolidated Airlines Group / Marriott International data breach, the main consideration was “Whether or not there was adequate, reasonable, consistent, effective data security to protect people’s identification data.”

Research firm Gartner, Inc. recommends the CARE standard for cybersecurity:

  • C: Consistent – How do your controls perform over time?
  • A: Adequate: Do your controls meet the demands of core business requirements?
  • R: Reasonable: Do you have appropriate, fair, and moderate controls?
  • E: Effective: Are your controls successful in producing desired results?

It Sounds Obvious, But Fully Understand What Data Security Means for Your Organization

data lockClearly, cybersecurity must be better understood at all levels of an organization. Executive leaders must balance the need of running a profitable business with the best possible security program.

Cybersecurity cannot be viewed as a “black box,” and must be part of all business decision making.

Toughening data security policies like the California Consumer Privacy Act and the EU’s General Data Protection Regulation demand increased cybersecurity awareness and proactive action.

Cybersecurity must be baked into all our processes, products, and the way our organizations think.

Discover Our Big Data Solutions

4 Steps to Achieving Wisdom You can Use at Work Today

4 Steps to Achieving Wisdom You can Use at Work Today

How to create an Information as a Second Language program. [Free Guide]

4 Steps to Achieving Wisdom You can Use at Work Today

4 Steps to Achieving Wisdom You can Use at Work Today