ADL Big Data Big Security 2024 0
ADL Big Data Big Security 2024 0
2024
B I G DATA? B I G S E C U R I T Y !
Organizations have not yet grasped all aspects claims it stopped 1.5 million attacks over the 90
concerning data, including these important days from March to May 2023, of which 55,000
Arthur D. Little (ADL) shared several strategies Further analysis of the types of attack reveals
for companies to establish cybersecurity the reasons behind a cyberattack fall into two
capabilities. While most data security breaches categories:
(74%, according to Verizon) are generated
1. Economic. Perpetrated by criminal
by internal user error, employing IT systems
organizations, these attacks take advantage
such as privileged access management allows
of a variety of available tools (e.g., ransomware,
organizations to govern user access to information,
distributed denial-of-service [DDoS], malware,
limiting the risk of unauthorized access. At the
phishing) to return a profit. As an example,
same time, it is possible to adopt solutions (e.g.,
consider the case of the UK’s Royal Mail, which,
security information and event management) to
following a ransomware attack in January
control who accesses what and monitor how data is
2023, refused to pay the £67 million (about
changed. Such IT systems enable organizations to
US $85 million) the perpetrators demanded.
detect abnormal behaviors that can be traced back
to malicious access attempts, allowing timely
intervention. Investments like these enable
organizations to respond proactively to the
risks generated by cyberattacks.
- Adopt standards and frameworks and to engage in the data economy. These new
+10%
199
+12% 183 20
in US $ billions
+14% 163 19
17 48
143
44
15
38
33
131
120
108
95
Other
information
Data Cloud security
privacy security software
Data
Identity Infrastructure security
access protection
Network Application
security security management 19%
18%
equipment
Integrated 15% 15%
risk Security 13%
management services
10% 10%
Consumer
security
software
5%
ISO/IEC 27001:2022 or the NIST Cybersecurity providing the ability to identify vulnerabilities,
Framework (CSF). These standards offer assess risks, and implement strategies to
-
and privacy compliance, and establishing
Enhanced reputation — increasing an
consistent measures.
organization’s reputation and providing
Table 1 highlights the main characteristics of greater confidence of an organization’s
the two frameworks, but it is important to specify customers and partners, fostering better
that these frameworks often cover the same relationships and creating additional business
areas, such as identifying risks, implementing opportunities
-
controls to reduce risks, and monitoring
Cost savings — following the initial
performance. An organization can integrate the
investment, prompting medium/long-term
frameworks synergistically to create a holistic
benefits due to increasing information
approach to cybersecurity.
security “culture,” decreased likelihood of
breaches, and subsequent reduction in legal
fees and reputational damage
Table 1. Approaches of different frameworks
Table 1. Approaches of different frameworks
Provides systematic approach to managing Provides a framework that any organization can
sensitive company information, including use to elevate the maturity of its cybersecurity
Brief description data management, access controls & risk risk programs
management
ADL designed a system to monitor the quality, - Web application for viewing geospatial
authorities — on the basis of their responsibilities The system included a segregated network,
and competences — to take the measures protected by a multifactor authentication
necessary for mitigating criticalities and risks, firewall, externally accessible only via VPNs and
promoting appropriate prevention actions. with firewalls installed on individual servers. The
The project’s complexity centered around the architecture was designed to manage information
management of a critical amount of vital data. in compliance with ISO/IEC 27001:2022 standards
In addition, the information management system to ensure maximum security of strategic
needed to ensure that the data could support information, while internal processes were
various authorities’ investigations, particularly formulated to define the correct collection
in the detection of environmental crimes and in and maintenance of information in compliance
allowing for those investigations to be carried out with GDPR. To this purpose, ADL supported
to ensure their nonrepudiation. the implementation of privacy fulfillment
The system, structured to support the customer’s using privacy by design, risk analysis, and data
CONCLUSION
SECURIT Y CONTINUOUS
IMPROVEMENT
O R G A N I Z AT I O N S M U S T M A N A G E
T H E E V O L U T I O N O F R E G U L AT I O N S
A N D T E C H N O L O G Y T R A N S F O R M AT I O N
NOTES