Cadastre-se agora para um orçamento mais personalizado!

Keeping the "House" in Order: A Look Inside Cisco's Data Protection Program

Jul, 22, 2016 Hi-network.com

When I think of data protection, I think of it like the protection of our homes: We know burglars may be out there "watching" us where we live, picking up on our daily patterns and scouring our home's exterior to find the easiest way "in."

Acknowledging this, we buy door and window locks, alarm systems and perhaps even security cameras. With these safeguards in place, we can then prepare for incidents that require quick, decisive action by assessing all possessions in the house and prioritizing their value -what do you need to save first if your house catches fire?

Enterprise data protection is much like that: We know the bad guys are watching, scheming for a way to compromise our network and systems. We develop a strategy for the implementation of modern cyber defense tools. Then, we inventory our data to prioritize what is most mission-critical and/or potentially valuable for our adversaries to target, and therefore identify that which demands the greatest attention.

A sampling of recent research reveals that enterprises need to focus on putting their data protection "house" in order: There were more than 1.9 million data records lost or stolen every day in 2015 -at an average cost of$158 per record equating to$300 million per day.  Malicious outsiders account for nearly three of five breaches, with the remainder mainly attributed to accidental loss.

With the expected boom in the Internet of Things -an estimated 500 billion devices will be connected by 2030 -hackers will have more attack vectors to exploit. Organizations must respond with data protection programs that take advantage of tools that are easy to deploy. These programs must seamlessly navigate within on-premise and cloud-based environments, providing security teams the insight to make quick connections to potential incidents -and immediately act upon them.

Cisco's Data Protection Program focuses on eight key elements: Policies and Standards; Identification and Classification; Data Risk and Organizational Maturity; Incident Response; Oversight and Enforcement; Privacy by Design and International Privacy Policy; Security by Design and Data Loss Prevention; and Awareness and Education.

Last week I shared case studies on the elements of our Data Protection Program at Cisco Live U.S. in Las Vegas. Here's a recap of a few of those areas -Incident Response, Oversight and Enforcement and Awareness and Education.

Incident Response -Cisco's incident response process is integrated with business continuity plans enterprise-wide. Time is of the essence when corporate or customer data is at risk, so Cisco's Computer Security Incident Response Team (CSIRT) members are monitoring 24

tag-icon Tags quentes : Cisco Live Cisco Security and Trust Organization Data Protection Program

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.