Data Security State of the Art at the 2018 Cybersecurity Summit in Sept

Respected Contributor.
Respected Contributor.
0 0 2,525

CSS SM4.pngWith the Micro Focus Cybersecurity Summit up next month (September 25-27), it would be a bit cliché to talk about the latest little security breach and what can be learned from it. So I won’t. I’ll instead talk about yet another massive, reputation-destroying data breach back in June that affected virtually every American and why you want to attend this event, rather than be another growing statistic. 

Wired reported on June 27 that Exactis, a Palm Coast, Fla.-based marketing and data-aggregation company, had exposed a database containing almost 2 terabytes of data, containing nearly 340 million individual records, on a public server. That included records of 230 million consumers and 110 million businesses

Let that sink in a bit. Why do we allow this to keep happening? I believe there are three key issues for IT leaders:

  • The perception of data privacy as something that makes data unusable with encryption
  • The lack of understanding of what constitutes sensitive, at-risk, data nowadays, and
  • Apathy, plain and simple. 

Encryption is a trade-off for data usability—or is it?

Let’s talk about the first point. The old perception of encryption is it applies to stored data. You encrypt data into some gobbledygook (technical term) that then makes it unusable for applications, so therefore all bets are off when exposing data in the clear to those applications. Right? Wrong. Cybersecurity Summit Spoiler Alert #1: Solutions that use Voltage SecureData that uses innovative format-preserving encryption (FPE), keeps data usable and transportable for everything from payments transactions and routing to big data analytics applications. Today, we can even protect data used in Vertica and ArcSight analytics transparently without requiring system changes, as an easy add-on. If you’re not familiar with modern data security technologies that offer maximum versatility and protection, you want to attend the Summit! 

Key sessions on this topic will include:

  • Track Keynote: Voltage data-centric security innovations to expand protection—in-use, in-motion, and at-rest
  • Introducing SecureData Sentry! The fastest way to safely accelerate your migration to cloud workloads 

What is sensitive data, anyways?

Going back a decade or more, before the world of IoT, the definition of sensitive data was typically limited to your name, address, ID (e.g., SSN) and a credit card. Bad actors simply wanted to use your account number to buy a taco and a Coke. But today, they want the whole enchilada! Whether data streaming off connected cars, cell phones, smart meters or any number of connected devices, there’s a lot more at stake, even if you aren’t just processing payment cards. Cybersecurity Summit Spoiler Alert #2: You’ve got a lot of data that offers business value and the thieves want it for personal identity theft and more. Privacy regulations which used to only look at payments have now expanded personal privacy to a broad definition, just look at the General Data Protection Regulation or GDPR. It’s important to understand how a wide range of data types and volume can be protected in the modern organization without losing a step. 

Key sessions on this topic will include:

  • Turn big data into big ROI while reducing data risks!
  • Moderated session with product leaders discussing regulatory changes, in GDPR and the US
  • Cloud-based data privacy and protection: Protecting data and privacy across hybrid IT

 Why should I care? Apathy.

It’s unfortunate, but due to many other priorities, including today’s latest IT fire drill, data security isn’t as often the most critical concern, until it’s too late of course. Better to learn from industry experts and your peers where they are at in their journey to reduce privacy risks and to approach the next threat with sobriety vis-à-vis head firmly in sand. Let us help you improve your perspective and reduce risk posture by joining your peers at this once-a-year event. Cybersecurity Summit Spoiler Alert #3: Product team-lead advisory boards, case studies, and customer-focused sessions and more can help you understand the state of the art of data security and current trends when it comes to best practices that work without disrupting business. Join us! 

Key sessions on this topic will include:

  • 2nd Annual Voltage Data Security Technical Advisory Board (TAB) Workshop
  • Global bank case: getting business value from analytics in the cloud, with data protection at scale
  • Improving the customer experience by understanding customer relationships

 For further information, learn more at the Cybersecurity Summit home page and register today! Tell them, “Raiuz Hyiltly sent me,” and when they ask “who is that?,” you can tell them that they’ll have to find the encryption key cause you’re using FPE.

About the Author
Encryption, masking, data privacy, data governance, SIEM, identity management, GRC, messaging security, policy, key management.
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.