SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
WHY CYBERSECURITY IS
A DATA PROBLEM
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
WHY CYBERSECURITY IS A DATA PROBLEM
The SolarWinds hack, first detected in December 2020 and referred to as “the largest and most
sophisticated attack the world has ever seen” by the president of Microsoft, was a watershed
moment in cybersecurity. Hundreds of organizations, including Fortune 500 companies and
government agencies, were affected, with sensitive data compromised. A year on, a major study
conducted by Splunk has found that 78% of companies expect the same thing to happen again.
It’s widely acknowledged that the Covid-19 pandemic has exacerbated the problems of
information security experts. A major factor is the increased surface area that's open to attacks
due to the accelerated rate of digitization that companies are going through. Large workforces
working remotely means more connections that must be secured and a greater need for
authentication. Both factors mean new vulnerabilities for attackers to probe and potentially
exploit.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
Data is at the heart of cybersecurity, being both the prize that malicious actors are
after, as well as a potent tool for those whose job it is to thwart them. For this reason,
security is an essential aspect of any data strategy. This means developing a solid
understanding not just of what data your organization has but how it can use data to
shore up its defences and prevent itself from becoming one of the growing number of
organizations that falls victim to data breaches.
According to Simon Davies, Splunk’s Vice President for the APAC region, cybersecurity
has evolved from an IT concern to a business-wide priority that has to be tackled at
the executive level. This has been driven by three principal factors – complexity,
consistency, and cost.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
Particularly at enterprise and mid-level businesses, the complexity of IT infrastructure has
increased exponentially as more and more functions undergo digitization. At the same time, when
employees increasingly need to connect to a growing number of systems remotely – some of
which may in the past have been entirely manual, such as logging working time or interacting with
HR departments – there's a growing need for consistency of user experience and access. And, of
course, this all has cost implications. For many companies, cost is a motivator when it comes to
migrating infrastructure to the cloud, but this migration creates a need to maintain visibility and
secure points of contact between cloud and on-premises systems, which doesn’t come for free!
Davies tells me, "With the onset of the pandemic, we saw a rapid acceleration of digitization
across industries… but with that came risk. You have a lot less visibility into your security
ecosystem, less control over access points and you’re relying heavily on third parties and external
service providers to support you. All these factors create more surface area and more risk for
security breaches.”
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
All of this has led to a growing realization that security needs to be considered in the
same way as any data initiative. What data do we need to solve the challenge? How
do we collect, store and analyze the data? Finally, how do we put the insights into
action and learn from our experience – with the aim of automating the process so we
can be sure it’s consistently executed in the most effective and least time-consuming
and wasteful manner.
Of the 500-plus respondents to Splunk's survey, 84% said their organization had
suffered a significant security incident in the past two years, with the largest individual
incident type being compromised email security. Data breaches, malware attacks via
mobile apps, distributed denial of service (DDoS) attacks, phishing, and ransomware
were other incidents that frequently caused issues.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
Supply chain vulnerabilities are also seen as a problem; however, just a worryingly low 23%
say they have reassessed their policies around third-party vendor management in the
fallout of the SolarWinds attacks. Undoubtedly this comes down to workloads, which
security professionals have seen grow significantly thanks to the factors already covered
here.
So how is data critical to cybersecurity? In practice, it fills several functions. Behavioral data
– such as the actions and interactions of users on your network – is used to establish levels
of "normal" activity, which can then be used to highlight outliers that could be a sign that
something odd is going on. If a user is accessing systems or data from an IP that seems to
originate in a part of the world where they are not usually operating, it can raise red flags.
But as more of us are working remotely and perhaps from different locations than usual, it
isn’t always that simple to identify.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
Machine learning can be helpful here, as it's able to correlate many different factors
and draw up a more accurate picture of which activity is simply unusual and what
might constitute a serious threat that requires remedy. And, of course, data is the fuel
of machine learning - the more that algorithms know, the more accurate they will be
at understanding and classifying behavior.
Davies tells me, "If you think about the amount of 'digital exhaust' that gets generated
by organizations – every login attempt on a website, every interaction on a mobile
app- data is being generated. Being able to digest all these data and understand what
is going on becomes critical for threat hunters. That’s where machine learning can
really assist.”
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
When companies look to Splunk to help with their data security issues, it employs a
framework it calls the Prescriptive Value Pass. Critically, as well as assessing the
hardware and software infrastructure to identify vulnerabilities, it also involves a
review of the staffing and training infrastructure, which can be just as important.
All of this helps achieve the essential objective of building a comprehensive, 360-
degree view of an organization's data, as well as the touchpoints it moves through as
it’s copied and pasted across an increasing number of business functions by
companies working towards holistic, heterogeneous data strategies.
© 2021 Bernard Marr , Bernard Marr & Co. All rights reserved
Bernard Marr is an internationally best-selling author, popular keynote speaker,
futurist, and a strategic business & technology advisor to governments and
companies. He helps organisations improve their business performance, use data
more intelligently, and understand the implications of new technologies such as
artificial intelligence, big data, blockchains, and the Internet of Things.
LinkedIn has ranked Bernard as one of the world’s top 5 business influencers. He is
a frequent contributor to the World Economic Forum and writes a regular column for
Forbes. Every day Bernard actively engages his 1.5 million social media followers
and shares content that reaches millions of readers.
hello@bernardmarr.com
www.bernardmarr.com

Contenu connexe

Tendances

10 Business Functions That Are Ready To Use Artificial Intelligence
10 Business Functions That Are Ready To Use Artificial Intelligence10 Business Functions That Are Ready To Use Artificial Intelligence
10 Business Functions That Are Ready To Use Artificial IntelligenceBernard Marr
 
What Is The Next Level Of AI Technology?
What Is The Next Level Of AI Technology?What Is The Next Level Of AI Technology?
What Is The Next Level Of AI Technology?Bernard Marr
 
AI Is The Foundation For The Biggest Business Ideas At Google’s Parent Compan...
AI Is The Foundation For The Biggest Business Ideas At Google’s Parent Compan...AI Is The Foundation For The Biggest Business Ideas At Google’s Parent Compan...
AI Is The Foundation For The Biggest Business Ideas At Google’s Parent Compan...Bernard Marr
 
The New Global AI Arms Race: How Nations Must Compete On Artificial Intelligence
The New Global AI Arms Race: How Nations Must Compete On Artificial IntelligenceThe New Global AI Arms Race: How Nations Must Compete On Artificial Intelligence
The New Global AI Arms Race: How Nations Must Compete On Artificial IntelligenceBernard Marr
 
The 8 Best Examples Of Real-Time Data Analytics
The 8 Best Examples Of Real-Time Data AnalyticsThe 8 Best Examples Of Real-Time Data Analytics
The 8 Best Examples Of Real-Time Data AnalyticsBernard Marr
 
The Top 10 Tech Trends In 2022 Everyone Must Be Ready For Now
The Top 10 Tech Trends In 2022 Everyone Must Be Ready For NowThe Top 10 Tech Trends In 2022 Everyone Must Be Ready For Now
The Top 10 Tech Trends In 2022 Everyone Must Be Ready For NowBernard Marr
 
The Human Side of Artificial Intelligence
The Human Side of Artificial IntelligenceThe Human Side of Artificial Intelligence
The Human Side of Artificial IntelligenceBernard Marr
 
AI in the Cloud Contact Centre
AI in the Cloud Contact Centre AI in the Cloud Contact Centre
AI in the Cloud Contact Centre Bernard Marr
 
Why Should Businesses Adopt Industry 4.0 Technologies?
Why Should Businesses Adopt Industry 4.0 Technologies?Why Should Businesses Adopt Industry 4.0 Technologies?
Why Should Businesses Adopt Industry 4.0 Technologies?Bernard Marr
 
The Future Role Of AI And The UK National AI Strategy – Insights From Profess...
The Future Role Of AI And The UK National AI Strategy – Insights From Profess...The Future Role Of AI And The UK National AI Strategy – Insights From Profess...
The Future Role Of AI And The UK National AI Strategy – Insights From Profess...Bernard Marr
 
The 7 Biggest Ethical Challenges of Artificial Intelligence
The 7 Biggest Ethical Challenges of Artificial IntelligenceThe 7 Biggest Ethical Challenges of Artificial Intelligence
The 7 Biggest Ethical Challenges of Artificial IntelligenceBernard Marr
 
Management of information system survey
Management of information system surveyManagement of information system survey
Management of information system surveyA. K. M. Anwar Hossain
 
Future Trends of AI and Analytics in the Cloud
Future Trends of AI and Analytics in the CloudFuture Trends of AI and Analytics in the Cloud
Future Trends of AI and Analytics in the CloudBernard Marr
 
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time AnalyticsData Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time AnalyticsBernard Marr
 
Overcoming AI Challenges with IBM’s AI Ladder
Overcoming AI Challenges with IBM’s AI LadderOvercoming AI Challenges with IBM’s AI Ladder
Overcoming AI Challenges with IBM’s AI LadderBernard Marr
 
8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World 8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World Bernard Marr
 
The 7 Biggest Artificial Intelligence (AI) Trends In 2022
The 7 Biggest Artificial Intelligence (AI) Trends In 2022The 7 Biggest Artificial Intelligence (AI) Trends In 2022
The 7 Biggest Artificial Intelligence (AI) Trends In 2022Bernard Marr
 
The Augmented Analytics Reset In Retail
The Augmented Analytics Reset In RetailThe Augmented Analytics Reset In Retail
The Augmented Analytics Reset In RetailBernard Marr
 
Cognitive business
Cognitive businessCognitive business
Cognitive businessYann Lecourt
 
How To Solve AI’s Bias Problem, Create Emotional AIs, And Democratize AI With...
How To Solve AI’s Bias Problem, Create Emotional AIs, And Democratize AI With...How To Solve AI’s Bias Problem, Create Emotional AIs, And Democratize AI With...
How To Solve AI’s Bias Problem, Create Emotional AIs, And Democratize AI With...Bernard Marr
 

Tendances (20)

10 Business Functions That Are Ready To Use Artificial Intelligence
10 Business Functions That Are Ready To Use Artificial Intelligence10 Business Functions That Are Ready To Use Artificial Intelligence
10 Business Functions That Are Ready To Use Artificial Intelligence
 
What Is The Next Level Of AI Technology?
What Is The Next Level Of AI Technology?What Is The Next Level Of AI Technology?
What Is The Next Level Of AI Technology?
 
AI Is The Foundation For The Biggest Business Ideas At Google’s Parent Compan...
AI Is The Foundation For The Biggest Business Ideas At Google’s Parent Compan...AI Is The Foundation For The Biggest Business Ideas At Google’s Parent Compan...
AI Is The Foundation For The Biggest Business Ideas At Google’s Parent Compan...
 
The New Global AI Arms Race: How Nations Must Compete On Artificial Intelligence
The New Global AI Arms Race: How Nations Must Compete On Artificial IntelligenceThe New Global AI Arms Race: How Nations Must Compete On Artificial Intelligence
The New Global AI Arms Race: How Nations Must Compete On Artificial Intelligence
 
The 8 Best Examples Of Real-Time Data Analytics
The 8 Best Examples Of Real-Time Data AnalyticsThe 8 Best Examples Of Real-Time Data Analytics
The 8 Best Examples Of Real-Time Data Analytics
 
The Top 10 Tech Trends In 2022 Everyone Must Be Ready For Now
The Top 10 Tech Trends In 2022 Everyone Must Be Ready For NowThe Top 10 Tech Trends In 2022 Everyone Must Be Ready For Now
The Top 10 Tech Trends In 2022 Everyone Must Be Ready For Now
 
The Human Side of Artificial Intelligence
The Human Side of Artificial IntelligenceThe Human Side of Artificial Intelligence
The Human Side of Artificial Intelligence
 
AI in the Cloud Contact Centre
AI in the Cloud Contact Centre AI in the Cloud Contact Centre
AI in the Cloud Contact Centre
 
Why Should Businesses Adopt Industry 4.0 Technologies?
Why Should Businesses Adopt Industry 4.0 Technologies?Why Should Businesses Adopt Industry 4.0 Technologies?
Why Should Businesses Adopt Industry 4.0 Technologies?
 
The Future Role Of AI And The UK National AI Strategy – Insights From Profess...
The Future Role Of AI And The UK National AI Strategy – Insights From Profess...The Future Role Of AI And The UK National AI Strategy – Insights From Profess...
The Future Role Of AI And The UK National AI Strategy – Insights From Profess...
 
The 7 Biggest Ethical Challenges of Artificial Intelligence
The 7 Biggest Ethical Challenges of Artificial IntelligenceThe 7 Biggest Ethical Challenges of Artificial Intelligence
The 7 Biggest Ethical Challenges of Artificial Intelligence
 
Management of information system survey
Management of information system surveyManagement of information system survey
Management of information system survey
 
Future Trends of AI and Analytics in the Cloud
Future Trends of AI and Analytics in the CloudFuture Trends of AI and Analytics in the Cloud
Future Trends of AI and Analytics in the Cloud
 
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time AnalyticsData Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
Data Has A Shelf Life: Why You Should Be Thinking About Real-Time Analytics
 
Overcoming AI Challenges with IBM’s AI Ladder
Overcoming AI Challenges with IBM’s AI LadderOvercoming AI Challenges with IBM’s AI Ladder
Overcoming AI Challenges with IBM’s AI Ladder
 
8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World 8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World
 
The 7 Biggest Artificial Intelligence (AI) Trends In 2022
The 7 Biggest Artificial Intelligence (AI) Trends In 2022The 7 Biggest Artificial Intelligence (AI) Trends In 2022
The 7 Biggest Artificial Intelligence (AI) Trends In 2022
 
The Augmented Analytics Reset In Retail
The Augmented Analytics Reset In RetailThe Augmented Analytics Reset In Retail
The Augmented Analytics Reset In Retail
 
Cognitive business
Cognitive businessCognitive business
Cognitive business
 
How To Solve AI’s Bias Problem, Create Emotional AIs, And Democratize AI With...
How To Solve AI’s Bias Problem, Create Emotional AIs, And Democratize AI With...How To Solve AI’s Bias Problem, Create Emotional AIs, And Democratize AI With...
How To Solve AI’s Bias Problem, Create Emotional AIs, And Democratize AI With...
 

Similaire à Why Cybersecurity is a Data Problem

Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOsIBM Security
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 

Similaire à Why Cybersecurity is a Data Problem (20)

Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 

Plus de Bernard Marr

How To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For BusinessHow To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For BusinessBernard Marr
 
Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?Bernard Marr
 
The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023Bernard Marr
 
12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work 12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work Bernard Marr
 
The Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerThe Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerBernard Marr
 
How AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of HealthcareHow AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of HealthcareBernard Marr
 
Is AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say NoIs AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say NoBernard Marr
 
Cultural Intelligence (CQ) Is An Important Predictor Of Success. Here’s How T...
Cultural Intelligence (CQ) Is An Important Predictor Of Success. Here’s How T...Cultural Intelligence (CQ) Is An Important Predictor Of Success. Here’s How T...
Cultural Intelligence (CQ) Is An Important Predictor Of Success. Here’s How T...Bernard Marr
 
13 Easy Steps To Improve Your Critical Thinking Skills
13 Easy Steps To Improve Your Critical Thinking Skills13 Easy Steps To Improve Your Critical Thinking Skills
13 Easy Steps To Improve Your Critical Thinking SkillsBernard Marr
 
The World of Metaverse Entertainment: Concerts, Theme Parks, And Movies
The World of Metaverse Entertainment: Concerts, Theme Parks, And MoviesThe World of Metaverse Entertainment: Concerts, Theme Parks, And Movies
The World of Metaverse Entertainment: Concerts, Theme Parks, And MoviesBernard Marr
 
The 4 Digital Skills Everyone Will Need For The Future of Work
The 4 Digital Skills Everyone Will Need For The Future of WorkThe 4 Digital Skills Everyone Will Need For The Future of Work
The 4 Digital Skills Everyone Will Need For The Future of WorkBernard Marr
 
9 Practical Ways To Enhance Your Emotional Intelligence
9 Practical Ways To Enhance Your Emotional Intelligence9 Practical Ways To Enhance Your Emotional Intelligence
9 Practical Ways To Enhance Your Emotional IntelligenceBernard Marr
 
The 20 Most Important Skills Everyone Needs To Succeed In A Digital World
The 20 Most Important Skills Everyone Needs To Succeed In A Digital WorldThe 20 Most Important Skills Everyone Needs To Succeed In A Digital World
The 20 Most Important Skills Everyone Needs To Succeed In A Digital WorldBernard Marr
 
How Shell Is Using Web3 And Blockchain For Sustainability And Energy Transition
How Shell Is Using Web3 And Blockchain For Sustainability And Energy TransitionHow Shell Is Using Web3 And Blockchain For Sustainability And Energy Transition
How Shell Is Using Web3 And Blockchain For Sustainability And Energy TransitionBernard Marr
 
Why Every Business Needs To Prepare For The Shifting Talent Pool
Why Every Business Needs To Prepare For The Shifting Talent PoolWhy Every Business Needs To Prepare For The Shifting Talent Pool
Why Every Business Needs To Prepare For The Shifting Talent PoolBernard Marr
 
The Future Of Work: 4-Day Week And Pioneering Ideas At Virgin Money
The Future Of Work: 4-Day Week And Pioneering Ideas At Virgin MoneyThe Future Of Work: 4-Day Week And Pioneering Ideas At Virgin Money
The Future Of Work: 4-Day Week And Pioneering Ideas At Virgin MoneyBernard Marr
 
10 Skills Robots Can’t Replace In The Workplace (Yet)
10 Skills Robots Can’t Replace In The Workplace (Yet)10 Skills Robots Can’t Replace In The Workplace (Yet)
10 Skills Robots Can’t Replace In The Workplace (Yet)Bernard Marr
 
Why Every Business Must Get Ready For The Conscious Consumption Trend
Why Every Business Must Get Ready For The Conscious Consumption TrendWhy Every Business Must Get Ready For The Conscious Consumption Trend
Why Every Business Must Get Ready For The Conscious Consumption TrendBernard Marr
 
How To Make Difficult Decisions?
How To Make Difficult Decisions?How To Make Difficult Decisions?
How To Make Difficult Decisions?Bernard Marr
 
10 Amazing And Innovative Examples Of NFTs Everyone Should Know About
10 Amazing And Innovative Examples Of NFTs Everyone Should Know About10 Amazing And Innovative Examples Of NFTs Everyone Should Know About
10 Amazing And Innovative Examples Of NFTs Everyone Should Know AboutBernard Marr
 

Plus de Bernard Marr (20)

How To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For BusinessHow To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For Business
 
Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?
 
The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023
 
12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work 12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work
 
The Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerThe Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your Career
 
How AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of HealthcareHow AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of Healthcare
 
Is AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say NoIs AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say No
 
Cultural Intelligence (CQ) Is An Important Predictor Of Success. Here’s How T...
Cultural Intelligence (CQ) Is An Important Predictor Of Success. Here’s How T...Cultural Intelligence (CQ) Is An Important Predictor Of Success. Here’s How T...
Cultural Intelligence (CQ) Is An Important Predictor Of Success. Here’s How T...
 
13 Easy Steps To Improve Your Critical Thinking Skills
13 Easy Steps To Improve Your Critical Thinking Skills13 Easy Steps To Improve Your Critical Thinking Skills
13 Easy Steps To Improve Your Critical Thinking Skills
 
The World of Metaverse Entertainment: Concerts, Theme Parks, And Movies
The World of Metaverse Entertainment: Concerts, Theme Parks, And MoviesThe World of Metaverse Entertainment: Concerts, Theme Parks, And Movies
The World of Metaverse Entertainment: Concerts, Theme Parks, And Movies
 
The 4 Digital Skills Everyone Will Need For The Future of Work
The 4 Digital Skills Everyone Will Need For The Future of WorkThe 4 Digital Skills Everyone Will Need For The Future of Work
The 4 Digital Skills Everyone Will Need For The Future of Work
 
9 Practical Ways To Enhance Your Emotional Intelligence
9 Practical Ways To Enhance Your Emotional Intelligence9 Practical Ways To Enhance Your Emotional Intelligence
9 Practical Ways To Enhance Your Emotional Intelligence
 
The 20 Most Important Skills Everyone Needs To Succeed In A Digital World
The 20 Most Important Skills Everyone Needs To Succeed In A Digital WorldThe 20 Most Important Skills Everyone Needs To Succeed In A Digital World
The 20 Most Important Skills Everyone Needs To Succeed In A Digital World
 
How Shell Is Using Web3 And Blockchain For Sustainability And Energy Transition
How Shell Is Using Web3 And Blockchain For Sustainability And Energy TransitionHow Shell Is Using Web3 And Blockchain For Sustainability And Energy Transition
How Shell Is Using Web3 And Blockchain For Sustainability And Energy Transition
 
Why Every Business Needs To Prepare For The Shifting Talent Pool
Why Every Business Needs To Prepare For The Shifting Talent PoolWhy Every Business Needs To Prepare For The Shifting Talent Pool
Why Every Business Needs To Prepare For The Shifting Talent Pool
 
The Future Of Work: 4-Day Week And Pioneering Ideas At Virgin Money
The Future Of Work: 4-Day Week And Pioneering Ideas At Virgin MoneyThe Future Of Work: 4-Day Week And Pioneering Ideas At Virgin Money
The Future Of Work: 4-Day Week And Pioneering Ideas At Virgin Money
 
10 Skills Robots Can’t Replace In The Workplace (Yet)
10 Skills Robots Can’t Replace In The Workplace (Yet)10 Skills Robots Can’t Replace In The Workplace (Yet)
10 Skills Robots Can’t Replace In The Workplace (Yet)
 
Why Every Business Must Get Ready For The Conscious Consumption Trend
Why Every Business Must Get Ready For The Conscious Consumption TrendWhy Every Business Must Get Ready For The Conscious Consumption Trend
Why Every Business Must Get Ready For The Conscious Consumption Trend
 
How To Make Difficult Decisions?
How To Make Difficult Decisions?How To Make Difficult Decisions?
How To Make Difficult Decisions?
 
10 Amazing And Innovative Examples Of NFTs Everyone Should Know About
10 Amazing And Innovative Examples Of NFTs Everyone Should Know About10 Amazing And Innovative Examples Of NFTs Everyone Should Know About
10 Amazing And Innovative Examples Of NFTs Everyone Should Know About
 

Dernier

TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptxTINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptxDwiAyuSitiHartinah
 
Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Vladislav Solodkiy
 
Virtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product IntroductionVirtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product Introductionsanjaymuralee1
 
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024Guido X Jansen
 
ChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics InfrastructureChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics Infrastructuresonikadigital1
 
Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...PrithaVashisht1
 
YourView Panel Book.pptx YourView Panel Book.
YourView Panel Book.pptx YourView Panel Book.YourView Panel Book.pptx YourView Panel Book.
YourView Panel Book.pptx YourView Panel Book.JasonViviers2
 
Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for ClarityStrategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for ClarityAggregage
 
SFBA Splunk Usergroup meeting March 13, 2024
SFBA Splunk Usergroup meeting March 13, 2024SFBA Splunk Usergroup meeting March 13, 2024
SFBA Splunk Usergroup meeting March 13, 2024Becky Burwell
 
CI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual interventionCI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual interventionajayrajaganeshkayala
 
Mapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptxMapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptxVenkatasubramani13
 
MEASURES OF DISPERSION I BSc Botany .ppt
MEASURES OF DISPERSION I BSc Botany .pptMEASURES OF DISPERSION I BSc Botany .ppt
MEASURES OF DISPERSION I BSc Botany .pptaigil2
 
The Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayerThe Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayerPavel Šabatka
 
Master's Thesis - Data Science - Presentation
Master's Thesis - Data Science - PresentationMaster's Thesis - Data Science - Presentation
Master's Thesis - Data Science - PresentationGiorgio Carbone
 
AI for Sustainable Development Goals (SDGs)
AI for Sustainable Development Goals (SDGs)AI for Sustainable Development Goals (SDGs)
AI for Sustainable Development Goals (SDGs)Data & Analytics Magazin
 
How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?sonikadigital1
 
5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best Practices5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best PracticesDataArchiva
 

Dernier (17)

TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptxTINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
TINJUAN PEMROSESAN TRANSAKSI DAN ERP.pptx
 
Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023
 
Virtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product IntroductionVirtuosoft SmartSync Product Introduction
Virtuosoft SmartSync Product Introduction
 
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
Persuasive E-commerce, Our Biased Brain @ Bikkeldag 2024
 
ChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics InfrastructureChistaDATA Real-Time DATA Analytics Infrastructure
ChistaDATA Real-Time DATA Analytics Infrastructure
 
Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...Elements of language learning - an analysis of how different elements of lang...
Elements of language learning - an analysis of how different elements of lang...
 
YourView Panel Book.pptx YourView Panel Book.
YourView Panel Book.pptx YourView Panel Book.YourView Panel Book.pptx YourView Panel Book.
YourView Panel Book.pptx YourView Panel Book.
 
Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for ClarityStrategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity
 
SFBA Splunk Usergroup meeting March 13, 2024
SFBA Splunk Usergroup meeting March 13, 2024SFBA Splunk Usergroup meeting March 13, 2024
SFBA Splunk Usergroup meeting March 13, 2024
 
CI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual interventionCI, CD -Tools to integrate without manual intervention
CI, CD -Tools to integrate without manual intervention
 
Mapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptxMapping the pubmed data under different suptopics using NLP.pptx
Mapping the pubmed data under different suptopics using NLP.pptx
 
MEASURES OF DISPERSION I BSc Botany .ppt
MEASURES OF DISPERSION I BSc Botany .pptMEASURES OF DISPERSION I BSc Botany .ppt
MEASURES OF DISPERSION I BSc Botany .ppt
 
The Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayerThe Universal GTM - how we design GTM and dataLayer
The Universal GTM - how we design GTM and dataLayer
 
Master's Thesis - Data Science - Presentation
Master's Thesis - Data Science - PresentationMaster's Thesis - Data Science - Presentation
Master's Thesis - Data Science - Presentation
 
AI for Sustainable Development Goals (SDGs)
AI for Sustainable Development Goals (SDGs)AI for Sustainable Development Goals (SDGs)
AI for Sustainable Development Goals (SDGs)
 
How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?How is Real-Time Analytics Different from Traditional OLAP?
How is Real-Time Analytics Different from Traditional OLAP?
 
5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best Practices5 Ds to Define Data Archiving Best Practices
5 Ds to Define Data Archiving Best Practices
 

Why Cybersecurity is a Data Problem

  • 1. WHY CYBERSECURITY IS A DATA PROBLEM
  • 2. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved WHY CYBERSECURITY IS A DATA PROBLEM The SolarWinds hack, first detected in December 2020 and referred to as “the largest and most sophisticated attack the world has ever seen” by the president of Microsoft, was a watershed moment in cybersecurity. Hundreds of organizations, including Fortune 500 companies and government agencies, were affected, with sensitive data compromised. A year on, a major study conducted by Splunk has found that 78% of companies expect the same thing to happen again. It’s widely acknowledged that the Covid-19 pandemic has exacerbated the problems of information security experts. A major factor is the increased surface area that's open to attacks due to the accelerated rate of digitization that companies are going through. Large workforces working remotely means more connections that must be secured and a greater need for authentication. Both factors mean new vulnerabilities for attackers to probe and potentially exploit.
  • 3. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved Data is at the heart of cybersecurity, being both the prize that malicious actors are after, as well as a potent tool for those whose job it is to thwart them. For this reason, security is an essential aspect of any data strategy. This means developing a solid understanding not just of what data your organization has but how it can use data to shore up its defences and prevent itself from becoming one of the growing number of organizations that falls victim to data breaches. According to Simon Davies, Splunk’s Vice President for the APAC region, cybersecurity has evolved from an IT concern to a business-wide priority that has to be tackled at the executive level. This has been driven by three principal factors – complexity, consistency, and cost.
  • 4. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved Particularly at enterprise and mid-level businesses, the complexity of IT infrastructure has increased exponentially as more and more functions undergo digitization. At the same time, when employees increasingly need to connect to a growing number of systems remotely – some of which may in the past have been entirely manual, such as logging working time or interacting with HR departments – there's a growing need for consistency of user experience and access. And, of course, this all has cost implications. For many companies, cost is a motivator when it comes to migrating infrastructure to the cloud, but this migration creates a need to maintain visibility and secure points of contact between cloud and on-premises systems, which doesn’t come for free! Davies tells me, "With the onset of the pandemic, we saw a rapid acceleration of digitization across industries… but with that came risk. You have a lot less visibility into your security ecosystem, less control over access points and you’re relying heavily on third parties and external service providers to support you. All these factors create more surface area and more risk for security breaches.”
  • 5. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved All of this has led to a growing realization that security needs to be considered in the same way as any data initiative. What data do we need to solve the challenge? How do we collect, store and analyze the data? Finally, how do we put the insights into action and learn from our experience – with the aim of automating the process so we can be sure it’s consistently executed in the most effective and least time-consuming and wasteful manner. Of the 500-plus respondents to Splunk's survey, 84% said their organization had suffered a significant security incident in the past two years, with the largest individual incident type being compromised email security. Data breaches, malware attacks via mobile apps, distributed denial of service (DDoS) attacks, phishing, and ransomware were other incidents that frequently caused issues.
  • 6. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved Supply chain vulnerabilities are also seen as a problem; however, just a worryingly low 23% say they have reassessed their policies around third-party vendor management in the fallout of the SolarWinds attacks. Undoubtedly this comes down to workloads, which security professionals have seen grow significantly thanks to the factors already covered here. So how is data critical to cybersecurity? In practice, it fills several functions. Behavioral data – such as the actions and interactions of users on your network – is used to establish levels of "normal" activity, which can then be used to highlight outliers that could be a sign that something odd is going on. If a user is accessing systems or data from an IP that seems to originate in a part of the world where they are not usually operating, it can raise red flags. But as more of us are working remotely and perhaps from different locations than usual, it isn’t always that simple to identify.
  • 7. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved Machine learning can be helpful here, as it's able to correlate many different factors and draw up a more accurate picture of which activity is simply unusual and what might constitute a serious threat that requires remedy. And, of course, data is the fuel of machine learning - the more that algorithms know, the more accurate they will be at understanding and classifying behavior. Davies tells me, "If you think about the amount of 'digital exhaust' that gets generated by organizations – every login attempt on a website, every interaction on a mobile app- data is being generated. Being able to digest all these data and understand what is going on becomes critical for threat hunters. That’s where machine learning can really assist.”
  • 8. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved When companies look to Splunk to help with their data security issues, it employs a framework it calls the Prescriptive Value Pass. Critically, as well as assessing the hardware and software infrastructure to identify vulnerabilities, it also involves a review of the staffing and training infrastructure, which can be just as important. All of this helps achieve the essential objective of building a comprehensive, 360- degree view of an organization's data, as well as the touchpoints it moves through as it’s copied and pasted across an increasing number of business functions by companies working towards holistic, heterogeneous data strategies.
  • 9. © 2021 Bernard Marr , Bernard Marr & Co. All rights reserved Bernard Marr is an internationally best-selling author, popular keynote speaker, futurist, and a strategic business & technology advisor to governments and companies. He helps organisations improve their business performance, use data more intelligently, and understand the implications of new technologies such as artificial intelligence, big data, blockchains, and the Internet of Things. LinkedIn has ranked Bernard as one of the world’s top 5 business influencers. He is a frequent contributor to the World Economic Forum and writes a regular column for Forbes. Every day Bernard actively engages his 1.5 million social media followers and shares content that reaches millions of readers.