Intelligent CISO Issue 03 | Page 23

infographic cases where this type of attack has occurred, we have yet to see the real impact. “In the event that the confidentiality or privacy of the data is breached, an organisation must have controls such as encryption, key management and user access management in place to ensure that integrity of the data isn’t tampered with and can still be trusted. “Regardless of any concerns around manipulation, these controls would protect the data in situ and render it useless the moment it’s stolen.” u www.intelligentciso.com | Issue 03 23