Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
A CISO Guide to Cyber Resilience

You're reading from  A CISO Guide to Cyber Resilience

Product type Book
Published in Apr 2024
Publisher Packt
ISBN-13 9781835466926
Pages 238 pages
Edition 1st Edition
Languages
Author (1):
Debra Baker Debra Baker
Profile icon Debra Baker

Table of Contents (20) Chapters

Preface 1. Part 1: Attack on BigCo
2. Chapter 1: The Attack on BigCo 3. Part 2: Security Resilience: Getting the Basics Down
4. Chapter 2: Identity and Access Management 5. Chapter 3: Security Policies 6. Chapter 4: Security and Risk Management 7. Chapter 5: Securing Your Endpoints 8. Chapter 6: Data Safeguarding 9. Chapter 7: Security Awareness Culture 10. Chapter 8: Vulnerability Management 11. Chapter 9: Asset Inventory 12. Chapter 10: Data Protection 13. Part 3: Security Resilience: Taking Your Security Program to the Next Level
14. Chapter 11: Taking Your Endpoint Security to the Next Level 15. Chapter 12: Secure Configuration Baseline 16. Chapter 13: Classify Your Data and Assets 17. Chapter 14: Cyber Resilience in the Age of Artificial Intelligence (AI) 18. Index 19. Other Books You May Enjoy

Data Protection

This chapter is about data protection. Did you know if an attacker is able to break into your company’s network and steal critical data and the data stolen is encrypted, then it is not a breach? Yes – that is correct even under GDPR; if the data is encrypted, then it’s not considered a breach. Of course, if an attacker hacked their way into your network, they now have knowledge of it and will come back to try to find more data to steal. This is why you want layers of security built into your security program, known as defense in depth (DiD). Encrypting data alone is not enough, but it is an important step.

Understanding where your critical data is located and encrypting data at rest and in transit is critical to protect your organization.

In this chapter, we’re going to cover the following main topics:

  • Encrypt your data!
  • What is PII? It depends…
  • Third-party risk management

Encrypt your data!

I was first trained in cryptography in the United States Air Force where I held a Top- Secret Clearance. My career continued in the cryptography space when I joined Entrust Technologies, which is now Entrust Datacard. Entrust is a public key infrastructure (PKI) development company. I was trained in PKI and encryption. With all of the advances in cryptography, we’re still using algorithms that were developed 30 years ago. Granted, the key sizes are larger, and NIST has begun a quantum-resistant algorithm search. We’ll talk more about quantum computing and encryption later in the chapter.

Introduction to encryption

Even in the cybersecurity space, encryption knowledge is limited. Throughout my career, I’ve been the person on the team that has been the go-to person when it comes to encryption algorithms that should be used. I’ve also realized that the cybersecurity community in general lacks the knowledge and know-how of encryption...

What is PII? It depends…

PII is personally identifiable information. In a nutshell, it is information that identifies a person. This can be information alone that maps back to you, such as your Social Security Number (SSN). This is called direct PII because only one person can have a specific SSN. To make it more confusing, the privacy community now refers to this data as personal information (PI). NIST and the cybersecurity community still use PII to refer to personal information. You need to work very closely with the Legal and Compliance departments. They should be the ones formally defining PII. Before we go on, I need to add a legal disclaimer that when classifying your data, a consultation with a privacy professional is recommended. Depending on the type of data, the location of a company’s headquarters, and where

the data is stored (that is, in which country), the definition of PII may change. For example, if the data is stored in Germany, then the definition...

Third-party risk management

Third-party risk management is critical. If a critical vendor you rely on is compromised, then the breach may also affect your company. We have talked in Chapter 8 about using Snyk’s renovate package to ensure your open source code is up to date and patched. Also, use GitHub’s static application security testing (SAST) code scanning tool to ensure your code doesn’t have vulnerabilities. What if the tool you use has been compromised? This is exactly what happened with the SolarWinds attack. This is why third-party risk management, also known as supply chain management, is so critical.

SolarWinds attack

SolarWinds has a network Monitoring product called Orion. It was used throughout the commercial and federal government. SolarWinds suffered a major cyber-attack in 2020. What makes the SolarWinds attack so devastating is that the attackers were able to gain access to their source code and introduce malware that would allow them to...

Summary

In summary, encrypting your data in transit and while stored is critical in building your security program. In order to ensure that data is encrypted, it should be part of your security baseline. For example, all laptops and servers should be configured to ensure the hard drives are encrypted. Also, disable protocols such as Telnet. Understanding where PII is stored and processed within your network is important to protecting it. Finally, vetting your critical third-party vendors is important to lowering your company’s risk.

In the next chapter, we will be covering security resilience: taking your security program to the next level. We will discuss more advanced security measures that you can take to level up your security program.

lock icon The rest of the chapter is locked
You have been reading a chapter from
A CISO Guide to Cyber Resilience
Published in: Apr 2024 Publisher: Packt ISBN-13: 9781835466926
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}