SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
O
rganisations are struggling to
cope with two obvious forces:
the need to maintain trust, and
the reality of cyber breaches:
the fact that a serious attack
on the organisation is a daily possibility.
With this as the backdrop, we pose the
fundamental question: do you really know
who has access to your company’s most
important assets, and do you really trust
them?
Trust is a prerequisite of business; it always
has been. For markets and industries
to function, there needs to be a high
level of trust between businesses and
their employees - whether temporary,
permanent or contracted - as well as
partners and suppliers.
However, managing and protecting
information and access continues to be
a thorny issue for many CIOs, who have
to operate in an increasingly exposed
and porous security environment. With
technologies such as BYOD and the
internet of things, businesses are actively
enabling a growing number of people to
access data from a wide variety of devices.
This has created a greater number of
attack vectors for cybercriminals, whilst
making core business systems more
vulnerable than ever before.
The Trust Paradox
Access Management and Trust in an Insecure Age
Nevertheless, the vast majority of CIOs are
certain they are securing their organisations
sufficiently, and have control of their access.
You might be one of them.
In an exclusive CIO UK survey, 122 Senior
IT Decision Makers in organisations
with 500+ employees expressed great
confidence in their organisations’ security.
Most of them (94%) told us they have
an information security strategy in place,
with just 5% of respondents feeling their
organisation is not well protected against
today’s security threats.
However, the business headlines tell
a different story. In 2014, there were
high-profile data breaches in every major
business sector including retail, finance,
technology, communications, entertainment
and health.
The big question is: if leading corporations
can be breached - ones that you would
expect to have the tightest security and
access controls - are we really as secure as
we believe? Furthermore, how can we be
more secure whilst enabling, rather than not
limiting the business?
Other questions we need to ask ourselves
are: if organisations believe they are
protected against cyber crime, which comes
from within and the outside, then why
are so many companies being hacked?
What are organisations missing, and what
controls are needed to have an impact on
People, Process, and Technology?
Many large enterprises struggle to stay
on top of access control, and to meet
the stringent regulatory and industry
compliance demands. It gives rise to a
range of problems: employees might have
access to information without needing
approval; there could be many accounts
still present without active owners;
and users could be keeping hold of
unnecessary access.
Constant personnel moves can pose
other problems: there could be an influx
of users after mergers and acquisitions,
making access control a complex
operation. Alternatively, it could be that
internal and external moves are not
94%have an information
security strategy in
place
60%expect an attack
from inside the
organisation.
being managed effectively, leaving the
organisation vulnerable to compromise
from the inside.
This is the reality of business, and this is
the security landscape in which we now
operate. So, are we really as secure as we
believe?
EMPLOYEE ACCESS
MANAGEMENT AND TRUST
T
rust is a cornerstone of corporate
computing, and this is reflected
in the survey results. The CIOs
surveyed displayed high levels of
confidence regarding their protection,
with 95% saying they are adequately
protected.
94% of UK organisations have an IS
strategy in place, and 93% feel they
are either very effective or effective at
governing employees’ access.
It is also clear that access management is
high on the security agenda, with almost
all the CIOs saying it will be on their agenda
during the next 12 months.
On the surface, these results are excellent.
They exude confidence, and paint a
very encouraging picture of enterprise
security today. But are things really that
straightforward?
We suggest that there is a ‘Trust Paradox’
here. In other words, you need to trust your
employees and business partners in order
to get anything done. (99% of respondents
agree that trust is important – or very
important - when securing organisation
assets, and very few said it was not very
important.)
However, at the same time, 60% of
respondents expect an attack to come from
inside the organisation, with far fewer, 39%,
saying a security breach would come from an
external source.
Together, these results pose an interesting
conundrum: trust is vitally important, but
organisations don’t necessarily trust their
employees when it comes to security.
There are several reasons why this may
be the prevailing perception. Firstly, CIOs
and senior IT and security leaders need to
display high levels of confidence, both in the
organisation’s security and its employees.
They also need to convince business heads
that the organisation is secure. Security
and trust are a matter of perception as well
as reality. We know from recent, high-
profile security breaches that they can rock
consumer confidence, as well as making
employees uneasy, not to mention business
partners and investors.
Secondly, media coverage tends to focus on
big, external hacker attacks and not internal
breaches. Perhaps this helps to play down
the internal threat in peoples’ minds. CIOs
in the survey rightly identify the potential
for an internal security breach, but other
findings in the research suggest they are
not being proactive enough in managing
employee access.
Thirdly, there may be a false sense of
security amongst UK organisations. Just
because your company hasn’t been hit yet,
it doesn’t prove you’re secure: an attack is
always imminent. Security analysts have
noted an almost 100% increase in targeted
internet-based attack campaigns between
2013 and 2014. Furthermore, internet
security breaches rose by almost two thirds
year on year, and a high proportion of
major web sites have been found to contain
critical vulnerabilities.
99%agree that trust is
important.
Regarding the internal threat, consider
this common scenario: a company hires a
contractor for a three-month project, with
HR and IT departments involved. They
need to give them access to information,
and work with the hiring manager to review
their access. So far, so good. But what
happens when the contractor leaves? Who
updates their access? What audit controls
are in place? For many, this can be a point of
weakness in the organisation.
For situations like these, tools are available
to mitigate risk. Malcolm Marshall, KPMG’s
global head of cyber security, says, “These
solutions are often seen as blockers to a
company, restricting access and making
it harder to do a job, but, by combining
software such as RSA IMG with consultancy
services to enhance people and process
changes, you can affect increased security
with improved efficiency and transparency.”
“With this in mind, KPMG work closely with
RSA to provide an offering that drives the
business forward, whilst reducing the risk of
uncontrolled access. The effect is a justifiable
confidence in the systems in place, which
whilst not infallible will reduce the risk and
decrease the required level of trust.”
100%increase in targeted
internet-based attack
campaigns
Another area of the survey that prompted
questions is around how frequently
organisations review their employee’s level of
access. A third of respondents said they did
this annually, 14% bi-annually, and just under
a third quarterly. Surprisingly, 16% review
their access less frequently, with some of
them not reviewing access at all.
It may be worth asking: is it really enough
to review employee access so infrequently?
A lot can happen in a year! Are we at risk of
being more reactive than proactive?
Surely if CIOs are expecting the attack
to come from within, then they need to
continually, or at least more regularly review
things like levels of access?
The survey also revealed a lack of
expectation of a threat from competitors,
with just 2% saying that if they were to have
a security breach, the most likely source
would be the competition.
In reality, IP theft is a hidden and unreported
crime. Estimates have put the cost of IP theft
from US corporations at around £200bn per
year, with a large proportion of the attacks
coming from China.
REGULATION AND COMPLIANCE
C
ontrolling employee access and
achieving governance has grown
more complicated over time, due to
the diverse mix of applications and
access scenarios that have developed to date.
Consequently, identity and access management
can be extremely complex and time-consuming
for IT leaders and their teams.
Although some companies may have
implemented comprehensive and agile tools to
control user identity and access, and thereby
manage their internal risk effectively, many do
not. Access management remains patchy for
many companies, with a lack of linkage between
access controls and governance polices.
Access management and auditing is also a
costly affair for many organisations: both
financially and in terms of hours, because it can
be a heavily manual process.
Consider your own organisation. Do you
have a clear path to governance, with unified,
enterprise-wide, and policy-based visibility and
control?
Are your access management processes
sufficiently dynamic, and do they cover
applications, unstructured data, privileged
accounts, and access to information by contract
and temporary staff as well as permanent
employees?
According to our survey, 83% of CIOs said they
can prove to the regulators or auditors they
are in control of their employees’ access (11%
weren’t sure and 6% said they could not).
Interestingly, 27% said an audit finding would
trigger a review of their employees’ level of
access, with over a fifth saying they would carry
one out on the back of a regulator request or
“Whereverthethreatcomesfrom,
information and IP is arguably
the most important asset within
an organisation. At a base level,
the IP thefts are following some
form of exploitation of trust, so
reducing the footprint of trust
reduces the likelihood of theft.”
Matt White, Senior Manager at KPMG in
the UK
inquiry. 20% said adoption of new technology
would lead them to review access levels, and
the same proportion would do it after mergers
and acquisition activity.
Considering the high risk of an insider threat
to the organisation, is it sufficient to be this
reactive, rather than proactive in monitoring
and reviewing employees’ level of access?
We suspect that the financial and time costs
of auditing access control and management
can be very high for most organisations,
keeping in mind that many of the respondents
only review their employees’ level of access
annually (32%) or quarterly (29%).
White says, “Reporting for auditors and
regulators often requires the collating
of multiple information sources, usually
across many departments and geographies.
Frequently a manual process, requiring input
from a number senior employees, the end
to end process is both time consuming and
costly.”
“Once more by combining process
improvement with technology you can
increase efficiency and reduce staff overhead.
KPMG Access Manager brings together
industry leading technology from RSA and
the award winning consultancy from KPMG
to simplify the management of access and
subsequently streamline the reporting for
auditors and regulators.”
So, what does it cost your organisation to
provide information to audit or regulatory
authorities? In addition, do you have controls
in place today that allow you to support a
dynamic environment: one that puts you in
charge of employee access and means you
can proactively combat attacks from inside or
outside the enterprise?
If the answer is that the financial and time
costs are higher than they should be, or
the security environment is not sufficiently
dynamic, automated or integrated, then
perhaps it’s time for a change.
CONCLUSION
A
lmost all the CIOs we surveyed
said they think trust is important in
securing their assets. They felt their
business was adequately or very
well protected, but if there were a security
breach, the most likely source would be
inside the organisation.
Regardless, a fifth of respondents are not
confident their employees have the right
level of access to assets, and the majority
chooses to review levels of access annually
or twice a year, rather than continually. This
points to a Trust Paradox: people are, as is
often the case, the weakest link in the chain.
Perhaps we need to focus more closely
on the trusted relationship between the
organisation and its people, rather than
relying on blind trust and false confidence
in current IS systems and strategies.
There is clearly room for improvement, and
eight in 10 senior IT decision-makers we
asked seem to be aware of this: putting
access management on their agenda over
the next 12 months.
The Trust Paradox needs to be mitigated
rather than eliminated with the right blend
of trust, processes and technology.
Enterprises can become more secure if
they implement Processes that are more
proactive, ongoing and analytical, and
Technologies that feature automated, end-
to-end, integrated security. These tools
and methodologies are available today
to mitigate the business risks outlined in
this paper. By improving employee access
management and security, you can raise
trust levels across the organisation.
Moreover, by putting the right tools and
methodologies into place, you will be able
to change culture in your organisation to
keep up with advances in technology and
the changing nature of the workforce, as
you continue to digitise your operations.
This whitepaper is brought to you by CIO UK
in association with KPMG and RSA.

Weitere ähnliche Inhalte

Was ist angesagt?

Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksConstantin Cocioaba
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence reportSimon Clements FIRP DipRP
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber riskaakash malhotra
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Bryan Smith
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firmsJake Weaver
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 
Building your-dream-cyber-team
Building your-dream-cyber-teamBuilding your-dream-cyber-team
Building your-dream-cyber-teamKleomenis Symeon
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 

Was ist angesagt? (20)

5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Kaspersky: Global IT Security Risks
Kaspersky: Global IT Security RisksKaspersky: Global IT Security Risks
Kaspersky: Global IT Security Risks
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Networkers cyber security market intelligence report
Networkers cyber security market intelligence reportNetworkers cyber security market intelligence report
Networkers cyber security market intelligence report
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
Building your-dream-cyber-team
Building your-dream-cyber-teamBuilding your-dream-cyber-team
Building your-dream-cyber-team
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 

Andere mochten auch

кино дасгал
кино дасгалкино дасгал
кино дасгалpvsa_8990
 
Swipp Plus Quick Start Guide
Swipp Plus Quick Start GuideSwipp Plus Quick Start Guide
Swipp Plus Quick Start GuideSwipp
 
Battle of the Scales: Examining Respondent Scale Usage across 10 countries
Battle of the Scales: Examining Respondent Scale Usage across 10 countriesBattle of the Scales: Examining Respondent Scale Usage across 10 countries
Battle of the Scales: Examining Respondent Scale Usage across 10 countriesResearch Now
 
Remembering God- Your Future Depends on It
Remembering God- Your Future Depends on ItRemembering God- Your Future Depends on It
Remembering God- Your Future Depends on Itlcvtrainer
 
Informe datos del paciente criterio
Informe datos del paciente criterioInforme datos del paciente criterio
Informe datos del paciente criterioNathalia Sanchez
 
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...EMC
 
2012 july madrebonita
2012 july madrebonita2012 july madrebonita
2012 july madrebonitaMaco Yoshioka
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013EMC
 
Acercamiento a las_ciencias_naturales_lepri
Acercamiento a las_ciencias_naturales_lepriAcercamiento a las_ciencias_naturales_lepri
Acercamiento a las_ciencias_naturales_lepriMaritza Zamudio
 
Frutos da Beneficência Cristã
Frutos da Beneficência CristãFrutos da Beneficência Cristã
Frutos da Beneficência CristãJoão Carlos
 
SME Estudio Marcas que Marcan 2012
SME Estudio Marcas que Marcan 2012SME Estudio Marcas que Marcan 2012
SME Estudio Marcas que Marcan 2012SME Puerto Rico
 
20160326Sat「今ここで学びたい!父母になるために本当に大切な産後のこと」
20160326Sat「今ここで学びたい!父母になるために本当に大切な産後のこと」20160326Sat「今ここで学びたい!父母になるために本当に大切な産後のこと」
20160326Sat「今ここで学びたい!父母になるために本当に大切な産後のこと」Maco Yoshioka
 
IG2 Assignment Brief
IG2 Assignment BriefIG2 Assignment Brief
IG2 Assignment Briefsophiemcavoy1
 
Goderich Hockeyville
Goderich HockeyvilleGoderich Hockeyville
Goderich HockeyvilleStMarysSchool
 

Andere mochten auch (20)

кино дасгал
кино дасгалкино дасгал
кино дасгал
 
Swipp Plus Quick Start Guide
Swipp Plus Quick Start GuideSwipp Plus Quick Start Guide
Swipp Plus Quick Start Guide
 
Hyper-V Dynamic Memory in Depth
Hyper-V Dynamic Memory in Depth Hyper-V Dynamic Memory in Depth
Hyper-V Dynamic Memory in Depth
 
Battle of the Scales: Examining Respondent Scale Usage across 10 countries
Battle of the Scales: Examining Respondent Scale Usage across 10 countriesBattle of the Scales: Examining Respondent Scale Usage across 10 countries
Battle of the Scales: Examining Respondent Scale Usage across 10 countries
 
Wrk
WrkWrk
Wrk
 
Remembering God- Your Future Depends on It
Remembering God- Your Future Depends on ItRemembering God- Your Future Depends on It
Remembering God- Your Future Depends on It
 
Barrokko
BarrokkoBarrokko
Barrokko
 
Informe datos del paciente criterio
Informe datos del paciente criterioInforme datos del paciente criterio
Informe datos del paciente criterio
 
Biren Shah
Biren ShahBiren Shah
Biren Shah
 
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
 
2012 july madrebonita
2012 july madrebonita2012 july madrebonita
2012 july madrebonita
 
Excursiones en Matalascañas
Excursiones en MatalascañasExcursiones en Matalascañas
Excursiones en Matalascañas
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013
 
Acercamiento a las_ciencias_naturales_lepri
Acercamiento a las_ciencias_naturales_lepriAcercamiento a las_ciencias_naturales_lepri
Acercamiento a las_ciencias_naturales_lepri
 
Frutos da Beneficência Cristã
Frutos da Beneficência CristãFrutos da Beneficência Cristã
Frutos da Beneficência Cristã
 
SME Estudio Marcas que Marcan 2012
SME Estudio Marcas que Marcan 2012SME Estudio Marcas que Marcan 2012
SME Estudio Marcas que Marcan 2012
 
03 elasticity
03 elasticity03 elasticity
03 elasticity
 
20160326Sat「今ここで学びたい!父母になるために本当に大切な産後のこと」
20160326Sat「今ここで学びたい!父母になるために本当に大切な産後のこと」20160326Sat「今ここで学びたい!父母になるために本当に大切な産後のこと」
20160326Sat「今ここで学びたい!父母になるために本当に大切な産後のこと」
 
IG2 Assignment Brief
IG2 Assignment BriefIG2 Assignment Brief
IG2 Assignment Brief
 
Goderich Hockeyville
Goderich HockeyvilleGoderich Hockeyville
Goderich Hockeyville
 

Ähnlich wie The Trust Paradox: Access Management and Trust in an Insecure Age

HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023incmagazineseo
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of TrustCognizant
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of TrustCognizant
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen Hamilton
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityRahul Tyagi
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013EY
 

Ähnlich wie The Trust Paradox: Access Management and Trust in an Insecure Age (20)

HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023Why Accountants Can’t Afford to Ignore Cyber Security in 2023
Why Accountants Can’t Afford to Ignore Cyber Security in 2023
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 
The Business Value of Trust
The Business Value of TrustThe Business Value of Trust
The Business Value of Trust
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDF
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe Security
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 

Mehr von EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS BreachEMC
 

Mehr von EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 

Kürzlich hochgeladen

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

The Trust Paradox: Access Management and Trust in an Insecure Age

  • 1. O rganisations are struggling to cope with two obvious forces: the need to maintain trust, and the reality of cyber breaches: the fact that a serious attack on the organisation is a daily possibility. With this as the backdrop, we pose the fundamental question: do you really know who has access to your company’s most important assets, and do you really trust them? Trust is a prerequisite of business; it always has been. For markets and industries to function, there needs to be a high level of trust between businesses and their employees - whether temporary, permanent or contracted - as well as partners and suppliers. However, managing and protecting information and access continues to be a thorny issue for many CIOs, who have to operate in an increasingly exposed and porous security environment. With technologies such as BYOD and the internet of things, businesses are actively enabling a growing number of people to access data from a wide variety of devices. This has created a greater number of attack vectors for cybercriminals, whilst making core business systems more vulnerable than ever before. The Trust Paradox Access Management and Trust in an Insecure Age Nevertheless, the vast majority of CIOs are certain they are securing their organisations sufficiently, and have control of their access. You might be one of them. In an exclusive CIO UK survey, 122 Senior IT Decision Makers in organisations with 500+ employees expressed great confidence in their organisations’ security. Most of them (94%) told us they have an information security strategy in place, with just 5% of respondents feeling their organisation is not well protected against today’s security threats. However, the business headlines tell a different story. In 2014, there were high-profile data breaches in every major business sector including retail, finance, technology, communications, entertainment and health. The big question is: if leading corporations can be breached - ones that you would expect to have the tightest security and access controls - are we really as secure as we believe? Furthermore, how can we be more secure whilst enabling, rather than not limiting the business? Other questions we need to ask ourselves are: if organisations believe they are protected against cyber crime, which comes from within and the outside, then why are so many companies being hacked? What are organisations missing, and what controls are needed to have an impact on People, Process, and Technology? Many large enterprises struggle to stay on top of access control, and to meet the stringent regulatory and industry compliance demands. It gives rise to a range of problems: employees might have access to information without needing approval; there could be many accounts still present without active owners; and users could be keeping hold of unnecessary access. Constant personnel moves can pose other problems: there could be an influx of users after mergers and acquisitions, making access control a complex operation. Alternatively, it could be that internal and external moves are not 94%have an information security strategy in place
  • 2. 60%expect an attack from inside the organisation. being managed effectively, leaving the organisation vulnerable to compromise from the inside. This is the reality of business, and this is the security landscape in which we now operate. So, are we really as secure as we believe? EMPLOYEE ACCESS MANAGEMENT AND TRUST T rust is a cornerstone of corporate computing, and this is reflected in the survey results. The CIOs surveyed displayed high levels of confidence regarding their protection, with 95% saying they are adequately protected. 94% of UK organisations have an IS strategy in place, and 93% feel they are either very effective or effective at governing employees’ access. It is also clear that access management is high on the security agenda, with almost all the CIOs saying it will be on their agenda during the next 12 months. On the surface, these results are excellent. They exude confidence, and paint a very encouraging picture of enterprise security today. But are things really that straightforward? We suggest that there is a ‘Trust Paradox’ here. In other words, you need to trust your employees and business partners in order to get anything done. (99% of respondents agree that trust is important – or very important - when securing organisation assets, and very few said it was not very important.) However, at the same time, 60% of respondents expect an attack to come from inside the organisation, with far fewer, 39%, saying a security breach would come from an external source. Together, these results pose an interesting conundrum: trust is vitally important, but organisations don’t necessarily trust their employees when it comes to security. There are several reasons why this may be the prevailing perception. Firstly, CIOs and senior IT and security leaders need to display high levels of confidence, both in the organisation’s security and its employees. They also need to convince business heads that the organisation is secure. Security and trust are a matter of perception as well as reality. We know from recent, high- profile security breaches that they can rock consumer confidence, as well as making employees uneasy, not to mention business partners and investors. Secondly, media coverage tends to focus on big, external hacker attacks and not internal breaches. Perhaps this helps to play down the internal threat in peoples’ minds. CIOs in the survey rightly identify the potential for an internal security breach, but other findings in the research suggest they are not being proactive enough in managing employee access. Thirdly, there may be a false sense of security amongst UK organisations. Just because your company hasn’t been hit yet, it doesn’t prove you’re secure: an attack is always imminent. Security analysts have noted an almost 100% increase in targeted internet-based attack campaigns between 2013 and 2014. Furthermore, internet security breaches rose by almost two thirds year on year, and a high proportion of major web sites have been found to contain critical vulnerabilities. 99%agree that trust is important.
  • 3. Regarding the internal threat, consider this common scenario: a company hires a contractor for a three-month project, with HR and IT departments involved. They need to give them access to information, and work with the hiring manager to review their access. So far, so good. But what happens when the contractor leaves? Who updates their access? What audit controls are in place? For many, this can be a point of weakness in the organisation. For situations like these, tools are available to mitigate risk. Malcolm Marshall, KPMG’s global head of cyber security, says, “These solutions are often seen as blockers to a company, restricting access and making it harder to do a job, but, by combining software such as RSA IMG with consultancy services to enhance people and process changes, you can affect increased security with improved efficiency and transparency.” “With this in mind, KPMG work closely with RSA to provide an offering that drives the business forward, whilst reducing the risk of uncontrolled access. The effect is a justifiable confidence in the systems in place, which whilst not infallible will reduce the risk and decrease the required level of trust.” 100%increase in targeted internet-based attack campaigns Another area of the survey that prompted questions is around how frequently organisations review their employee’s level of access. A third of respondents said they did this annually, 14% bi-annually, and just under a third quarterly. Surprisingly, 16% review their access less frequently, with some of them not reviewing access at all. It may be worth asking: is it really enough to review employee access so infrequently? A lot can happen in a year! Are we at risk of being more reactive than proactive? Surely if CIOs are expecting the attack to come from within, then they need to continually, or at least more regularly review things like levels of access? The survey also revealed a lack of expectation of a threat from competitors, with just 2% saying that if they were to have a security breach, the most likely source would be the competition. In reality, IP theft is a hidden and unreported crime. Estimates have put the cost of IP theft from US corporations at around £200bn per year, with a large proportion of the attacks coming from China. REGULATION AND COMPLIANCE C ontrolling employee access and achieving governance has grown more complicated over time, due to the diverse mix of applications and access scenarios that have developed to date. Consequently, identity and access management can be extremely complex and time-consuming for IT leaders and their teams. Although some companies may have implemented comprehensive and agile tools to control user identity and access, and thereby manage their internal risk effectively, many do not. Access management remains patchy for many companies, with a lack of linkage between access controls and governance polices. Access management and auditing is also a costly affair for many organisations: both financially and in terms of hours, because it can be a heavily manual process. Consider your own organisation. Do you have a clear path to governance, with unified, enterprise-wide, and policy-based visibility and control? Are your access management processes sufficiently dynamic, and do they cover applications, unstructured data, privileged accounts, and access to information by contract and temporary staff as well as permanent employees? According to our survey, 83% of CIOs said they can prove to the regulators or auditors they are in control of their employees’ access (11% weren’t sure and 6% said they could not). Interestingly, 27% said an audit finding would trigger a review of their employees’ level of access, with over a fifth saying they would carry one out on the back of a regulator request or “Whereverthethreatcomesfrom, information and IP is arguably the most important asset within an organisation. At a base level, the IP thefts are following some form of exploitation of trust, so reducing the footprint of trust reduces the likelihood of theft.” Matt White, Senior Manager at KPMG in the UK
  • 4. inquiry. 20% said adoption of new technology would lead them to review access levels, and the same proportion would do it after mergers and acquisition activity. Considering the high risk of an insider threat to the organisation, is it sufficient to be this reactive, rather than proactive in monitoring and reviewing employees’ level of access? We suspect that the financial and time costs of auditing access control and management can be very high for most organisations, keeping in mind that many of the respondents only review their employees’ level of access annually (32%) or quarterly (29%). White says, “Reporting for auditors and regulators often requires the collating of multiple information sources, usually across many departments and geographies. Frequently a manual process, requiring input from a number senior employees, the end to end process is both time consuming and costly.” “Once more by combining process improvement with technology you can increase efficiency and reduce staff overhead. KPMG Access Manager brings together industry leading technology from RSA and the award winning consultancy from KPMG to simplify the management of access and subsequently streamline the reporting for auditors and regulators.” So, what does it cost your organisation to provide information to audit or regulatory authorities? In addition, do you have controls in place today that allow you to support a dynamic environment: one that puts you in charge of employee access and means you can proactively combat attacks from inside or outside the enterprise? If the answer is that the financial and time costs are higher than they should be, or the security environment is not sufficiently dynamic, automated or integrated, then perhaps it’s time for a change. CONCLUSION A lmost all the CIOs we surveyed said they think trust is important in securing their assets. They felt their business was adequately or very well protected, but if there were a security breach, the most likely source would be inside the organisation. Regardless, a fifth of respondents are not confident their employees have the right level of access to assets, and the majority chooses to review levels of access annually or twice a year, rather than continually. This points to a Trust Paradox: people are, as is often the case, the weakest link in the chain. Perhaps we need to focus more closely on the trusted relationship between the organisation and its people, rather than relying on blind trust and false confidence in current IS systems and strategies. There is clearly room for improvement, and eight in 10 senior IT decision-makers we asked seem to be aware of this: putting access management on their agenda over the next 12 months. The Trust Paradox needs to be mitigated rather than eliminated with the right blend of trust, processes and technology. Enterprises can become more secure if they implement Processes that are more proactive, ongoing and analytical, and Technologies that feature automated, end- to-end, integrated security. These tools and methodologies are available today to mitigate the business risks outlined in this paper. By improving employee access management and security, you can raise trust levels across the organisation. Moreover, by putting the right tools and methodologies into place, you will be able to change culture in your organisation to keep up with advances in technology and the changing nature of the workforce, as you continue to digitise your operations. This whitepaper is brought to you by CIO UK in association with KPMG and RSA.