Sydney – 10 November 2014 — Nuix, a technology company that enables people to make fact-based decisions from unstructured data, has published a survey of corporate information security practitioners, conducted by Ari Kaplan Advisors, which shows fundamental changes occurring in the way enterprises protect their data.
“Our goal was to capture a broad range of perspectives to help corporate information security leaders navigate this dynamically shifting landscape,” said Ari Kaplan, the report’s author and principal researcher. “What we found was an effort to balance breach prevention with post-breach remediation. We also noted increasing collaboration between security specialists and data owners, and a growing tension between enhancing productivity and strengthening security.”
The report showed strong consensus among security professionals and experts that “perimeter defense is no longer a sufficient information security strategy.” Nearly three-quarters (73%) of respondents said their cybersecurity needs had changed in the past 12 months and 69% said they expected them to change again in the next year. As a result, 27% of respondents said they formally reassessed their cybersecurity needs quarterly, and a further 31% did so annually.
The report found that information security officers and data custodians would need to share responsibility for “knowing where different pieces of sensitive information were kept and ensuring that they were stored securely.” This required partnering with “eDiscovery, in-house counsel, records management, and information governance.” Such collaboration was a daily event for 23% of survey participants, and at least monthly for 54%.
The increasing use of mobile and personal devices to access corporate systems have “expanded the perimeter beyond what any corporate can control, introducing threats that you cannot fully monitor,” one respondent explained. But while 96% of respondents said their companies allowed remote access to systems, only 69% had formal “bring your own device” policies; the remainder allowing such activity to go unmanaged.
Respondents also reported needing to balance these new security challenges with business needs to “enhance productivity, promote workplace flexibility, and improve the customer experience.”
“This report confirms and clarifies what we’ve been hearing in the marketplace, that information security is undergoing a profound change and entering a new phase,” said Dr. Jim Kent, Nuix’s Global Head of Investigations and Cybersecurity. “We’ll be very interested to see how this transformation works its way through the business community as we repeat this benchmarking survey next year and into the future.”
The report Defending Data: An Inside Look at How Corporate Security Officials Are Navigating a Constantly Shifting Information Landscape was written by Ari Kaplan Advisors and sponsored by Nuix. It involved in-depth interviews of 26 corporate information security practitioners and four experts with experience across thousands of security breach investigations. The report is available from www.nuix.com/defending-data.
Report author Ari Kaplan will discuss the survey findings and their implications for information security professionals with Dr. Kent, Amie Tahl, Vice President of Security and Investigations at Deutsche Bank, Mike Kennemer, Global Security Architect at Celanese, and Nuix’s Chief Technical Officer Stephen Stewart in a webinar to be held on December 3rd at 8:00am PST, 11:00am EST. To register, visit www.nuix.com/defending-data-webinar. -ends-
Nuix (www.nuix.com) enables people to make fact-based decisions from unstructured data. The patented Nuix Engine makes small work of large and complex human-generated data sets. Organizations around the world turn to Nuix software when they need fast, accurate answers for digital investigation, cybersecurity, eDiscovery, information governance, email migration, privacy and more.
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem