Why Security Teams Plan to Fail
Why must we accept that breaches are inevitable ? While traditional data protection does provide visibility into an organization ’ s data activity , it lacks the context behind user interactions .
The result : The system struggles to distinguish between legitimate and risky data usage , triggering excessive alerts that overwhelm IT Security .
So you ’ re left with two choices – neither are very palatable
A Err on the side of caution and apply restrictive policies to mitigate risk , which dampens productivity and encourages employees to try bypassing security , or . . .
B Allow minimal policy enforcement to enable productivity , enable passive monitoring data security and act as a forensic tool if , and when , a breach occurs .
For many , option B is the lesser of two evils . Itʼs easier and less damaging to the business to clean up after the event than to try to stop it . Adding a distributed workforce on top of this scenario ratchets up the security challenges .
The Breakthrough : Putting Behavior at the Center of Cybersecurity
The answer is to both protect and free the enterprise by being able to identify , quantify and proactively respond to data risk . The solution is behavior-based cybersecurity that focuses on your people and how they interact with your data . p
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 21