[02-22-24]--Join us tomorrow for “Super Cyber GAME SHOW Friday”

Super Cyber Fridays!
Join us TOMORROW, Friday [02-23-24], for "Super Cyber GAME SHOW Friday"

Join us Friday, February 23, 2024, for “Super Cyber GAME SHOW Friday”, one hour packed with cyber games. We'll be bringing our audience into the show to play some of our favorite games.

It all begins at 1 PM ET/10 AM PT on Friday, February 23, 2024. We'll have fun conversation and games, plus at the end of the hour (2 PM ET/11 AM PT) we'll do our meetup.

Defense in Depth
When Is Data an Asset and When Is It a Liability?

When Is Data an Asset and When Is It a Liability?

We're seeing increasing risks when it comes to organizations holding data. It's not just from cyberattacks either. An increasingly complex patchwork of laws and regulations put additional risk of fines and other penalties on otherwise data hungry organizations. So what framework should organizations use to determine when holding data has an actual benefit to the business or when it becomes a risky liability?

Check out these posts for the discussions that are the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Geoff Belknap, CISO, LinkedIn. Joining us is Mario Trujillo, staff attorney, Electronic Frontier Foundation.

Information as an asset can carry a lot of baggage 

When we characterize information assets, organizations often think of how it benefits the business to hold it. But just like physical assets, holding onto information comes with cost and risks. "CISOs need to share 3 aspects of data collection to business units: financial impact, modern business strategy, and administrative burden. Modern businesses are also considering “asset-light” as a strategy to be more agile and competitive,” said Aldo Febro, PhD, Chief Information Security & Privacy Officer, Continuant. The costs of holding data becomes starkly apparent when a breach occurs. Vaughan Shanks of Cydarm Technologies points out that businesses need to understand these risks before collecting data, saying, "Organizations need to decide where we want to be on the brand trust spectrum between data exploitation and respect for privacy, and what risks we are willing to accept in the event of a breach.”

Connecting the dots for the business

If you want to effectively manage risk that holding data poses, you’ve got to get buy-in from the rest of the business. "I’ve had some success promoting Privacy Impact Assessments. Get a line of business management to buy into reducing the exposure early. It helps when your colleagues already regard the data as having an element of liability," said Duane Gran of Converge Technology Solutions Corp. Another important consideration is that not all data should be treated equally. Shantanu Bhattacharya of Siometrix advocated for clear data categories, saying, "Use four categories: essential for providing services, essential for compliance, desirable to derive interesting insights and others. First two categories need to be captured more often than not. The third category should be captured based on cost benefit analysis."

Push data collection conversations upstream

Changing the thought process around data collection can meet resistance. It can be hard to shake the “data is the new oil” mentality. "Minimizing data collection upfront can be a hard sell. Understanding uses of data is usually a day 2 exercise that generally requires storing the user info somewhere as an interim step,” said Yasir Ali of PolymerHQ DLP. Your business can be so preoccupied with whether or not they can collect data, they don’t stop to think if they should. "Too often, we collect data  because we can. When Cyber programs first integrated SIEM tooling, and we grabbed any data we could because we might have a need later. It wasn't until vendors started charging per GB that we began purpose-driven collection requirements," said Rob Oden of Roblox. 

Humanizing data collection

When we categorize data as an asset, we can forget that it’s often tied back into real people. When it becomes too abstracted, ethical considerations go out the window. "We need to weave data ethics into privacy conversations, and recognize the real humans the data represents. If you can't protect it, don't collect it," said Neal O'Farrell of Brainisphere. Paul Culligan of Data Defense Solutions called for more regulation to give security teams a stronger voice with data handling, saying, “Without restrictions, most orgs will keep more data with the thinking that they can monetize it in the future. That's not a battle that security teams will win internally."

Please listen to the full episode on your favorite podcast app, or over on our blog where you can read the full transcript. If you’re not already subscribed to the Defense in Depth podcast, please go ahead and subscribe now.

Thanks also to our Aldo Febro, Continuant, for being an unwitting contributor to this episode. 

Thanks to our podcast sponsor, Material Security

Material Security

LIVE!
Cyber Security Headlines - Week in Review

Make sure you register on YouTube to join the LIVE "Week In Review" this Friday for Cyber Security Headlines with CISO Series reporter Richard Stroffolino. We do it this and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. Our guest will be Thom Langford, CISO, Velonetic.

Thanks to our Cyber Security Headlines sponsor, Conveyor

Conveyor

OPEN AUDITION! Looking for Next Hosts on CISO Series

OPEN AUDITION! Looking for Next Hosts on CISO Series

Your favorite hosts of CISO Series shows are not going anywhere.

BUT, we’re developing a new show and we’re looking for your NEXT favorite CISO Series hosts.

And we’re looking for a pair of them, possibly two pairs!

Submit a recording to be CISO Series hosts

  • We’re looking for a two-person recording. You and a friend get on the microphone and explain something, anything in cyber.

  • The recording should be 5-10 minutes in length. Audio only.

  • Send your submissions via our contact form or via [email protected]. Label it “PODCAST AUDITION.”

  • DEADLINE: THURSDAY March 7th, 2024

Go to the blog post on details on how to deliver the IDEAL submission.

Cyber chatter from around the web...
Jump in on these conversations

"Has anyone been interrogated by the CIA or FBI for reporting cyber crime, if so what happened?" (More here)

"Is there a demand for endpoint protection tools among non-business users?" (More here)

"Which windows security event ID’s do you closely monitor in your SIEM?" (More here)

Coming Up On Super Cyber Friday...
Coming up in the weeks ahead on Super Cyber Friday we have:

  • [02-23-24] Super Cyber GAME SHOW Friday

  • [03-01-24] Super Cyber GAME SHOW Friday

  • [03-08-24] Hacking Breach Response

  • [03-15-24] Hacking Security Driven Sales

  • [03-22-24] Hacking Effective Third-Party Risk Management

Save your spot and register for them all now!

Thank you!
Thank you for supporting CISO Series and all our programming

We love all kinds of support: listening, watching, contributions, What's Worse?! scenarios, telling your friends, sharing in social media, and most of all we love our sponsors!

Everything is available at cisoseries.com.

Interested in sponsorship, contact me, David Spark.