CIOs and Securing Data with Analytics

Thursday, April 19, 2012

Bill Gerneglia

44fa7dab2a22dc03b6a1de4a35b7834a

Article by Tom Sloan

Cyber attacks are becoming increasingly common across the globe. Many Fortune 2000 companies as well as government agencies around the world are under frequent cyber attack of their core systems and services.

Cybercrime is a generic term for the illegal incursion and disruption at the national, enterprise and community level, of both cyber and physical assets. 

Cybercrime is a relatively new phenomenon but because of its recent scale and game-changing implications for both government and industry it is rapidly becoming the dominant risk theme of the 21st century.

The opportunity for cyber attacks grows daily as corporations and governments continue to amass information about individuals in complex networks across the Web. At the same time new generations of cyber activists, some motivated purely by money and others by the desire to expose and destabilize corporations and governments, continue to hack into organizational secrets.

No enterprise, no matter how small or benign, will ever be safe from attack in the future, with an estimated 250,000 site breaches reported in the last few years. 

The challenge for the CIO is that larger organizations need to monitor hundreds of millions of events per day, including some activities that are happening around the periphery of their business and outside the data center. 

There is just no way humans can analyze and process that amount of data in search of a potential significant cyber crime event.

This expanding rate of potential threats call for a new way to approach corporate data security. The latest approach is one that is based on intelligence and BI tools. Security intelligence applies advanced analytics and automation technology to the collection of information from hundreds of sources across an organization. 

By sifting through data from global networks, corporate applications, user activity and mobile usage data, business analytics applications can assist organizations in better understanding a baseline of normal behavior. 

Then analytics can assist the CISO more quickly and clearly flag abnormal events to predict, prevent and minimize the impact.

In consideration of their BI initiatives, CIOs consistently speak about five IT trends that are shaping decisions on how, where, and when they can deliver the required analytics for their organizations. 

These include:

 1) The Growth of Big Data Systems.

2) Technologies enabling faster and more secure processing.

3) The declining cost of IT commodities in he cloud.

4) The proliferation of mobile devices.

 5) Leveraging social media outlets for their organizations.

CIOs today in their global organizations are focused on building secure controls around their data centers to protect their assets, information and intellectual property. This is done through a series of initiatives such as implementing a layered security approach to data, or using advanced data encryption techniques ( may be hardware or software based ) to protect data assets from hacking, or constant diligence in monitoring firewalls and building secure access channels to important data assets.

Thinking about information security today means thinking about the world events around your organization and how they interact with organizational data.

Cross-posted from CIOZone

Possibly Related Articles:
9537
Enterprise Security
Information Security
Enterprise Security Cyber Crime Attacks Chief Information Officer Analytics metrics CIO Business Intelligence Network Security Monitoring Big Data
Post Rating I Like this!
Default-avatar
jk Nel im new need some one to train me to hack
1335814533
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.