• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

PodChats for FutureCIO: Closing the holes in data protection strategies

Allan Tan by Allan Tan
May 31, 2021
PodChats for FutureCIO: Closing the holes in data protection strategies

PodChats for FutureCIO: Closing the holes in data protection strategies

There has always been a need for protecting private data, but long gone are the days when sensitive customer documents were locked on a filing cabinet at the end of the workday.

In our digital world, customers share more information about themselves than ever, across a variety of platforms. We often hear in media and at conferences about advances in technology to catch up with regulations on data protection. Yet we also continue to read about breaches like the Colonial Pipeline breach of 7 May 2021, and AXA Asia a week later.

Dispersed data – a by-product of the digital economy

“Breaches of personal information strike at the heart of the relationship between enterprises and their customers. Encryption is at the foundation of data protection, and when organizations don’t prioritize protecting customer personal information, they raise enterprise risk of lost business and reputation,” said John Grimm, vice president of strategy at Entrust.

Grimm cited “a much more dispersed data” as one of the biggest challenges in the digital economy.

“There have been more locations created for sensitive data to migrate to overtime. We are finding that this is one of the top challenges, many organisations do not have trouble identifying the important data, but they have a lot of trouble figuring out all the different places data is going particularly as we have hit the cloud era, and the multi-cloud era, as well as some of the new platforms that are being introduced,” he added.

Why organizations struggle with data protection

During a 2020 FutureCIO roundtable with CIOs and CISOs, one of the points raised by participants was the challenge of protecting data: “IT security has become a complex and expensive process that appear to escalate each year. Our users and customers want simplicity but that doesn’t seem possible.”

Entrust’s Grimm chimed in on this observation acknowledging that data protection has become complex and partly points to the diversity in the types of tools that organisations use to protect their data.

Data protection – a growing complexity

According to the Ponemon Institute study it commissioned, Grimm noted that on average companies use about eight encryption products. Believing the real number to be higher, he noted that many organisations struggle in part due to limited resources, including deep levels of experience in data protection.

“This leads to a situation where you have so many products, but not have enough people to learn how to use them properly. This can open the door for mistakes to be made,” he opined.

He further commented that the number one threat to data protection is not from external attackers or even malicious insider, but the well-intentioned employee who makes a mistake along the way that ends up exposing sensitive data.

Don’t bet on future technologies today

Grimm praised developments around homomorphic encryption as allowing users to operate on data that is encrypted, without decrypting it – hence, potentially reducing the exposure. He also spoke about multi-party computation, where you break up transactions into small parts and have multiple parties execute them and then bring them together.

Still, he believed that in the current environment practising data protection fundamentals, including separating data from encryption keys, is something that can be done now.

“Paying attention to some of those fundamentals of key protection, protecting them in purpose-built hardware, such as a hardware security module (HSM), is a common strategy when you need to up-level the protection of keys when the encryption processes or a digital signing process needs a higher level of protection because the data is particularly sensitive,” he continued.

He also suggested making sure that an organisation’s encryption strategy is aligned with its identification, authentication, and role-based access control strategy.

“We have talked about centralising and simplifying the number of products and try to get a central, single pane of glass and also a good strong root of trust for your encryption keys and the execution of your encryption policy,” he continued.

He warned against a patchwork approach to data protection, including encryption.

“The real way is to take a step back and look at this (data protection) from where is that data that you care about the most going, and make sure that you can apply protections in all those places it is going,” he concluded.

Click on the PodChats player and listen to Grimm talk about data privacy, data protection and what enterprises are doing right and wrong to comply with regulations and customer expectations.

  1. Where is the holdup when it comes to upholding personal data privacy?
  2. What is data protection? In a typical large enterprise, what does it encompass, and what is its relationship to data encryption?
  3. We continue to hear about high profile cyberattacks like the Colonial Pipeline and more recently AXA Asia. Why do organisations seem to struggle with their data protection strategies?
  4. Speaking of encryption, is there a magic number in terms of how many encryption tools is enough? You spoke of between 8 to 10 as average.
  5. How do you manage and effectively use this growing complexity that is the cloud and protecting it?
  6. Specific to the Ponemon Institute report, can you cite reasons why Southeast Asia ranked lowest globally in terms of encryption adoption (50% global average vs 36% in Southeast Asia)?
  7. How do you see encryption evolving? What can organisations do to better leverage encryption as a foundation for a more holistic data protection strategy?
  8. Given all the breaches that are occurring today, what needs to happen for this prediction to become a reality?
  9. In the digital economy, who owns the data? Is it the CIO, the CDO, the marketing department or the customer?
  10. What must enterprises do to rein back the perceived loss of control in data protection? And what should CIOs be doing to own part of the solution?
  11. Simplification vs the sprawl of solutions – what is Entrust’s USP (standout)?
Related:  PodChats for FutureCIO: CISO tactics to enhance cyber threat readiness
Tags: AXA AsiaColonial Pipeline breachdata encryptiondata protectionEntrustPodchats
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe
OSZAR »