The data must flow (Part 1)

(with apologies to Frank Herbert…)

It may be hard to imagine now, but it wasn’t that long ago that discerning business leaders were able to have thoughtful discussions on the synthesis of technology and business strategy while scarcely ever uttering words about cybersecurity. 

How times have changed. 

Today, cybersecurity concerns touch most every aspect of business operations as companies and governments have deployed substantial digital assets and vulnerabilities abound. In fact, the threat economy now rivals the GDP of advanced countries. By one estimate alone, the World Economic Forum calculates the cost of cybercrime at $10.5 trillion USD in 2023. And it’s rising.

Business leaders are adapting strategies to meet the changing times. For example, the influential Director’s Handbook on Cyber-Risk Oversight, recently released by the National Association of Corporate Directors (NACD), sets its first principle as “Directors need to understand and approach cybersecurity as a strategic, enterprise risk, not just an IT risk.” 

Investments in cyber are also changing: 65% of organizations plan to increase cybersecurity spending in 2023. Gartner projects that spending on information security and risk management products and services will grow 11.3% to reach more than $188.3 billion this year alone.

An Occult View of the Cyber-Enabled Economy

But there’s a deeper level to uncover: the lifeblood of our deeply connected global system is data. At this concealed level, global business is deeply challenged by the complexities of cross-border information flows, cybercrime, data privacy, new frameworks, and increasing or changing cybersecurity regulations

Business leadership today needs to pay particular attention to data and flows. Consider that a recent McKinsey report notes the fastest-growing global flows are now data, services, intellectual property, and international students. Estimates vary on how much data is flowing at any given second (an “intangible”) but there’s no denying its centrality.

It is also clear that ensuring the free flow of data across borders is a paramount concern to business and government. After all, industry derives exceptional value from its use, allowing for rapid innovation such as what we are now seeing with advancements in AI. It also affords the tantalizing possibility of solving some of the world’s most pressing crises. 

But how is data best protected?

Along with technological changes and risks to business operations, it’s critical to understand that it’s the regulatory environment that allows data to flow and businesses to operate at global scale. Regulations also provide an opportunity for businesses and governments to help protect data, whether intellectual property or PII, from cyber-enabled threats. 

Indeed, compliance with data regulations can actually help businesses grow and fight the scourge of cybercrime.

Your organization needs to think deeply about the role of data, privacy, protection, and flows. Consider the following acts and regulations and their implications for your organization:

Lastly, governments have developed free resources for you to identify and manage privacy and data risks. For example, NIST offers a voluntary Privacy Framework tool. And the EU offers a GDPR checklist tool for data controllers.

In our second blog entry on the centrality of data and the challenges of keeping it secure and flowing, my colleague Dr. Rois Ni Thuama and I have the pleasure of talking with one of the world’s foremost experts on the topic, Linda Priebe of Culhane Meadows, PLLC.

PUBLISHED BY

Sean Costigan

9 May. 2023

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Introducing DNS Guardian: Stop impersonation and spam caused by domain takeovers 

Rahul Powar

tl;dr: We’re thrilled to announce DNS Guardian — a new feature in Red Sift OnDMARC that can swiftly identify and stop domain takeovers that lead to malicious mail. Back in February, we shared updates with the community about SubdoMailing – an attack discovered by Guardio Labs. The attack was a form of subdomain takeover,…

Read more
Email

“What’s Next for DMARC”: Red Sift & Inbox Monster Webinar Recap

Red Sift

The recent webinar hosted by Inbox Monster, “What’s Next for DMARC: Data & Predictions for a New Era in Email Authentication,” featured insights from Red Sift and examined the significant changes brought by Yahoo and Google’s bulk sender requirements earlier this year.  It also offered a forward-looking perspective on the future of email authentication.…

Read more
Security

Navigating the Information Security Landscape: ISO 27001 vs. SOC 2

Red Sift

As cyber threats evolve, so do the standards and frameworks designed to combat them. Two of the most recognized standards in information security are ISO 27001 and SOC 2. What sets them apart, and which one is right for your organization? Let’s delve into the key differences. Purpose and Scope: Global Framework vs. Client-Centric…

Read more
News

G2 Summer 2024 Report: Red Sift OnDMARC’s Winning Streak Continues

Francesca Rünger-Field

We’re delighted to announce that Red Sift OnDMARC has again been named a Leader in G2’s DMARC category for Summer 2024. This recognition is based on our high Customer Satisfaction scores and strong market presence. Red Sift appeared in 11 reports – 5 new ones since Spring 2024! – earning 5 badges: A few…

Read more
News

Google will no longer trust Entrust certificates from October 2024

Red Sift

Tl;dr: Google has announced that as of October 31, 2024, Chrome will no longer trust certificates signed by Entrust root certificates. While there is no immediate impact on existing certificates or those issued before 31st October 2024, organizations should start reviewing their estate now. On Thursday 27th June 2024, Google announced that it had…

Read more