CISOs Must Take Steps to Protect Data That is Expanding in Volume, Variety and Velocity
Gartner Analysts to Discuss the Outlook for Security at the Gartner Security & Risk Management Summits 2014, June 23-26 in Maryland, August 25-26 in Sydney and September 8-9 in London
Chief Information Security Officers (CISOs) should not treat big data security in isolation, but require policies that encompass all data silos if they are to avoid security chaos, according to Gartner, Inc.
Gartner predicts that, through 2016, more than 80 percent of organizations will fail to develop a consolidated data security policy across silos, leading to potential noncompliance, security breaches and financial liabilities.
"Businesses have traditionally managed data within structured and unstructured silos, driven by inherent requirements to deploy relational database management systems, file storage systems and unstructured file shares," said Brian Lowans, principal research analyst at Gartner. "However, the advent of big data and cloud storage environments is transforming the way in which data is stored, accessed and processed, and CISOs need to develop a data-centric security approach. Unfortunately this is not common practice today, and its planning is critical to avoid uncoordinated data security policies and management."
CISOs need to collaborate with trusted team members to develop and manage an enterprise data security policy that defines data residency requirements, stakeholder responsibilities, business needs, risk appetite, data process needs and security controls.
"Although the ability to apply a data security governance policy across data silos is also becoming paramount, the market has so far failed to offer CISOs the data-centric audit and protection (DCAP) products they need to operate across all silos with consistency," said Earl Perkins, research vice president at Gartner. "Instead, the use of different tools for each silo is complicating the implementation of any businesswide data security plans due to different functionalities, network architectures and data repositories."
Access to public cloud services and infrastructure further complicates this process due to the potential access by cloud service providers and security vendors. Data flows will inevitably result in a growing need to monitor and audit access, and to protect data across silos. Although vendors continue to develop product capabilities that are applicable to different silo repositories on premises and in the cloud, the market is also evolving toward a DCAP set of solutions, but we are not there yet.
"First, CISOs need to evaluate current implementations of DCAP solutions against data security policies that address database, unstructured, cloud storage and big data silos," said Mr. Lowans. "Second, they need to identify gaps in the current implementation of their data security policies and review the risks with business stakeholders against potential DCAP solutions."
While assessment and revisions to data access policy and its implementation through DCAP solutions will help dictate accountability, it will also require a level of ownership from business unit stakeholders.
"Business stakeholders may not be accustomed to having strong relations with security teams, and CISOs will need to build partnerships with them to develop new management structures for data security accountability and to identify cross-functional training needs," said Mr. Lowans.
More detailed analysis is available in the report "Big Data Needs a Data-Centric Security Focus."
Gartner analysts will discuss the outlook for security at the Gartner Security & Risk Management Summits 2014 taking place on:
Information from the Gartner Security & Risk Management Summits 2014 will be shared on Twitter at http://twitter.com/Gartner_inc using #GartnerSEC.
Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. Gartner delivers the technology-related insight necessary for its clients to make the right decisions, every day. From CIOs and senior information technology (IT) leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to supply chain professionals, digital marketing professionals and technology investors, Gartner is the valuable partner to clients in more than 11,000 distinct enterprises. Gartner works with clients to research, analyze and interpret the business of IT within the context of their individual roles. Gartner is headquartered in Stamford, Connecticut, U.S.A., and has almost 9,000 associates, including 1,900 research analysts and consultants, operating in more than 90 countries. For more information, visit www.gartner.com.
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.