Gartner 2020 Market Guide for Insider Risk Management Solutions | Get the report →
  • Partners
    • Technology Partners
    • Reseller Partners
    • Partner Portal
  • Customer Toolkit
  • University
  • Support
Code42 Logo
  • Products
    • Incydr™ Data risk detection and response for insider threat Product Overview right arrow icon
      • Features
      • Detection
      • Investigation
      • Response
      • Use Cases
      • Remote workforce monitoring
      • Departing employee monitoring
      • IP theft detection
      • View All
      • Information
      • Product Plans
      • Deployment
      • Integrations
      • Developer Portal
      • Trust & Security
      • Services
    • CrashPlan Cloud Endpoint data backup & recovery for the enterprise
  • Solutions
    • Insider Risk
    • Data Exfiltration
    • Incident Response
  • Company
    • About
    • News
    • Careers
    • Leadership
  • Resources
    • Resource Center
    • Reports, eBooks, Videos
    • Events & Webinars
    • Customer Stories
    • Product Resources
    • Integrations
    • Developer Portal
    • Trust & Security
    Data Protection: Code42 vs. DLP Leave DLP behind with a better, risk-based approach to protect data. Learn more right arrow icon
  • Blog
  • Get Started
  • Partners
    • Technology Partners
    • Reseller Partners
    • Partner Portal
  • Customer Toolkit
  • University
  • Support

DATA SECURITY STRATEGIES

Relevant Security Trends to Share With Your CISO


4 MIN READ

SHARE

Nathan Hunstad

Principal Security Researcher and Engineer

One serious data security incident or breach can derail a company’s growth, profitability and reputation. As a result, the role of the CISO is growing in importance. In today’s data security era, CISOs are increasingly strategic and have to quickly adapt to changing security priorities and workflows.

The rise in remote work and the dispersion of people and data has introduced new security challenges. Data has moved outside of traditional security perimeters—between computers, clouds, email and web browsers—making it even more difficult for security teams to manage the risk of off-network activity while enabling collaboration. That’s why, now more than ever, CISOs depend on their teams to keep up with relevant cyber security trends and the latest security solutions.

To help your CISO avoid the noise and keep data secure in the cloud, across endpoints and on mobile devices, here are three security trends worth sharing.

To Continue Reading…

Share a few pieces of information and we’ll personalize your experience with us

1. Data security is growing in complexity amidst a cyber security workforce shortage 

With more tools and services in the cloud, a remote and dispersed workforce, and an explosion in IoT devices, the complexity around data security continues to rise amidst a security skills gap. According to a 2019 Cybersecurity Workforce Study from ISC, USA is suffering from a cyber security labor shortage of almost 500,000.

When evaluating cyber security tools, it’s important to look for technologies that are easier for the next generation of security professionals to use right away without having to be experts first. Most security teams are understaffed and are stressed with staffing ratios as low as one security professional supporting 100+ employees. As you look to recommend tools to your CISO, ensure you have security fundamentals covered, then move to addressing insider threat activity and determine if you have response and detection capabilities in place. Ensure the cloud services being used are actually known. Challenge yourself and your team to check if current tools can detect and differentiate between files being uploaded to users’ personal or company-sanctioned apps.

If you don’t have the resources, you can arm users with security information, such as tips on protecting their home networks or avoiding phishing scams as quick wins.

2. Encryption adoption is growing

The increase in encryption adoption in enterprise organizations is largely driven by several factors. You need to protect sensitive data, avoid reputational damage, protect against human error and meet global data protection laws (such as Global Data Protection Regulation and California Consumer Privacy Act).

According to Thales eSecurity and Ponemon Institute, 43% of enterprises have an encryption strategy, but it does not come without challenges. Some of the difficulties with implementing an encryption strategy include understanding what the most sensitive organizational data is and where it lives, what technology should be used and which data should be encrypted. When talking to your CISO about an encryption strategy, you want to ensure you have the basics covered, including the right cyber security skills on your team to tackle implementation. 

3. Increased need for collaboration tools

Though COVID-19 has accelerated remote work, it is not the only factor contributing to this trend. Remote work has grown almost 160% over the last 15 years, according to the U.S. Census and Bureau of Labor Statistics. With increased adoption of collaboration tools such as Zoom, Slack, Google Drive, Microsoft OneDrive, Box and many others, remote work is here to stay.

As security professionals, we understand the security challenges these tools and home networks bring. Yes, they are great to boost productivity, but they also make it easier to exfiltrate data whether it be product ideas, source code or customer lists. We need to help our CISOs, who in some cases are also playing the role of CIOs, recognize that this culture shift requires a technology shift as well. IT teams are being asked to quickly implement collaboration tools without security considerations, and saying “no” is simply not an option for security teams. The last thing that security teams want is to be viewed as obstacles. That said, proper risk management still applies, and there are absolutely times when security needs to draw firm boundaries. 

Knowing that digital transformation is a top initiative for any CEO, today’s progressive CISO is embracing the collaboration culture. Arm your CISO with programs and tools that uncover user behavior patterns, reveal what drives user actions and speed incident response times. This may be a shift for some security teams, as  their CISO expects security to be an enabler rather than a blocker of the collaboration culture.

Nathan Hunstad

As director of security operations at Code42, Nathan leads the team responsible for security tooling, red team exercises and responding to security events. Nathan joined Code42 in 2016, bringing experience from both the private and public sector, and is a graduate of the Masters of Science in Security Technologies (MSST) program at the University of Minnesota.

Code42 logo
Code42 logo

Code42

  • About Code42
  • News + Events
  • Awards
  • Investors
  • Leadership
  • Careers
  • Contact Sales

Learn More

  • Insider Risk Ecosystem
  • Reseller Partners
  • Federal Solutions
  • Higher Education Solutions
  • CrashPlan for Small Business
  • Customer Stories

Support

  • Help Center
  • Code42 University
  • Professional Services
  • Twitter Twitter
  • Facebook Facebook
  • LinkedIn LinkedIn
  • YouTube YouTube
  • Terms of Use
  • Privacy Statement
  • Impressum
© 2021 Code42 Software, Inc. All rights reserved.
Get Started with Incydr™
Contact Salesright arrow icon
We'll have an insider threat expert reach out within 24 hours
Start Free Trialright arrow icon
Try Incydr at no cost for 30 days to quickly uncover your data blindspots
Interactive Demo
Take Incydr for a spin in our free sandbox environment.
Launch the demo right arrow icon
Explore the deeper functionality of Incydr™
Contact Salesright arrow icon
We'll have an insider threat expert reach out within 24 hours
Interactive Demo
Take Incydr for a spin in our free sandbox environment.
Launch the demo right arrow icon

This website uses cookies to improve your user experience and to provide content tailored specifically to your interests. Detailed information on the use of cookies on this website, and how you can manage your preferences, is provided in our Cookie Notice. By clicking I Agree or continuing to use this website, you consent to the use of cookies. Learn more.

Code42
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.