海角大神

Modern field guide to security and privacy

2016: The year where identity is everything in cybersecurity

Secure digital identities hold the key to better digital security and will help drive economic growth.

|
The Chertoff Group
Joe Gottlieb, SailPoint senior vice president for corporate development, speaks on a panel about Identity as the Great Enabler at The Chertoff Group's conference on "The Three T's of the Digital Economy" in Palo Alto, Calif. on May 19, 2016.

Do you remember 2013? That was 鈥渢he year of the mega breach,鈥 thanks in large part to the world getting to know one Edward Snowden.

For really the first time, the broad general public came up close and personal with the impacts of a data breach.

While that trend of megascale data breaches continued in 2014, last year saw a slightly different turn: digital attackers targeted more personal, longer lived information than the credit card caches and troves of government documents that had been unearthed before.

Hackers cracked the Office of Personnel Management鈥檚 database, took health records from major American insurance companies, and downloaded intimate data from adults (Ashley Madison) and children (Hello Kitty) alike.

You could say 2015 was the year that data breaches got personal.

The moral of that story? No company or agency is safe from attacks; corporations that we trust with our information, our family鈥檚 information and even our kids鈥 information was, is, or will be targeted. We need to accept that the world has changed.

In 2016, we hope, we鈥檒l solve the problem before we get taught a lesson.

This is the year that we learn digital identity is everything. But why is that?

The ability to determine someone鈥檚 digital identity is proving an enormous economic driver, as industry experts discussed at a recent Chertoff Group event in Palo Alto, California.

Consider how morning driving commutes will be changed when the billboards can read your car鈥檚 IP address and serve advertisements knowing the identity of the person at the wheel, as Chenxi Wang, a vice president of strategy at startup Twistlock put it at the event.

Now consider that more than two thirds of MGM Resorts International revenue now comes from non-gaming elements of the customer experience in its bevy of US and international properties, said Scott Howitt, chief information security officer (CISO) and senior vice president of MGM at the Chertoff Group event.

鈥淚t鈥檚 become an every-day conversation for me and central to everything I do.鈥
Mr. Howitt said.

But as with everything in digital security, these new economic opportunities bring new risks.

Companies have multiple users entering their systems and accessing their data: employees, contractors, vendors, suppliers, partners, and even customers. Considering the sheer volume of users, applications and various levels of data access, it is easy to imagine an enterprise managing over a billion points of access.

But these points of access can easily become a billion points of exposure, too. Behind all those points of access is a person 鈥 an identity.

Securing the identities of those moving in and out of our increasingly complex and economically vital systems means everything.

And that means, in 2016, identity is everything. Identities in an organization are who 鈥渉old the keys to the kingdom鈥 and therefore will be targeted. In 2016 more than ever, securing those identities should be at the core of every enterprises' security program.

As the world evolves, so must our digital security. It used to be that network security was all we needed since intruders had to either come into the physical location or hack from outside the network. Now, hackers have turned to the weakest link in the security infrastructure: us. People. Users. Identities.

It has become clear that the notion of network-centric security is a strategy of the past. A paradigm shift happened in 2015 where a user-centric approach of security emerged as the most robust strategy to secure an organization鈥檚 assets in our distributed information technology world. Only then can we have a common understanding of who should have access, who does have access, and how they are using their access.

鈥淚t鈥檚 now become very clear that we鈥檝e done what we can at the perimeter, we鈥檝e done what we can on individual systems, we鈥檙e doing what we can on monitoring, we just have to get to the heart of the matter,鈥 said Joe Gottlieb, senior vice president of corporate development at SailPoint on a panel at the Chertoff Group event. 鈥淪ecurity is behind. Business wants to go faster. Our growth and our opportunity is helping companies be more thorough about this.鈥

SailPoint delivers solutions for compliance, provisioning, access management, and identity analytics.聽Follow SailPoint on Twitter聽.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
海角大神 was founded in 1908 to lift the standard of journalism and uplift humanity. We aim to 鈥渟peak the truth in love.鈥 Our goal is not to tell you what to think, but to give you the essential knowledge and understanding to come to your own intelligent conclusions. Join us in this mission by subscribing.
QR Code to 2016: The year where identity is everything in cybersecurity
Read this article in
/World/Passcode/2016/0526/2016-The-year-where-identity-is-everything-in-cybersecurity
QR Code to Subscription page
Start your subscription today
/subscribe