Innovations in cloud and mobile technologies have created more opportunities than ever for employees to work remotely, using devices of their choosing. But the flexibility of technology heterogeneity in the workplace isn’t without risk. As data becomes more accessible across a growing range of devices, the attack surface area also grows wider, raising the possibility of a potential data breach.
Taking advantage of technology and digitization involves more than business strategy. It requires strong data governance principles which, among other things, must align the functional demands of an organization’s cybersecurity, privacy and information management teams.
There have been volumes written about the role of the CSO and how to gain a seat at the table in the C-suite. A relatively small number of CSOs have been able to convince their management that the CISO should be under their purview, citing the inherent mission conflicts that exist when the CISO reports to the CIO.
Remember Stuxnet? In 2010, an ambitious covert operation was discovered and exposed: in Iran, a computer virus was causing hardware used to enrich uranium gas to fail.
There are myriad security risks in giving third-party vendors access to your network and data. If a third party gets hacked, your company can lose vital business data, and confidential employee information can be compromised.