Audit functions are not only good for troubleshooting a system but also for analyzing logs that can help uncover malicious activity in the form of insider breaches or outsider intrusions. In an investigation, audit logs help verify whether the security policy was adhered to and how an employee may have been involved in a security violation. All root and administrator activities should also be logged, and the size of all logs kept to a manageable size. Actions that should be logged include user-level events, application-level events, and system-level events.
The common approach to meeting the challenges of managing data is to map the process of creating and using data to a lifecycle. This is sometimes referred to as data lifecycle management (DLM) or information lifecycle management (ILM).
The purpose of such an approach is to allow an organization to identify the distinct phases data goes through, and then within each step or phase, to identify different security controls that should be in place.
This week, Skye Learning is thrilled to spotlight Dr. S. Atyia Martin, an expert for the AEM®/CEM® Prep Course (U.S. version). Martin is a Certified Emergency Manager (CEM®) with nearly 20 years of experience in emergency management, public health, intelligence, resilience, and homeland security. She was worked for the government, the private sector, and the nonprofit sector. Currently, she is CEO & Founder of All Aces, Inc., a consulting company that advances racial equity and builds organizational resilience. Martin is a distinguished senior fellow for the Global Resilience Institute.
Organizations are increasingly concerned about the loss or theft of electronic information, known as a data breach. Data breaches that result from unauthorized access by individuals within an organization have also become more common. These types of breaches, or data leaks, are commonly called insider threats. Insiders pose a unique challenge because they know how systems are configured, how to defeat these systems, and how to cover up any evidence.
Chris Williams is an enterprise cloud consultant at GreenPages Technology Solutions in Kittery, ME. According to his LinkedIn profile, Williams holds “too many certifications.” In fact, he is a certified AWS Solutions Architect Professional, an AWS Community Hero, a VMWare Certified Implementation Experty, a VMware vExpert, and more.
Williams is an expert in digital transformation who assists customers in deploying cloud solutions. He is also a subject matter expert for Skye Learning, appearing in Introduction to Cloud Computing and Cybersecurity.
Many people use the terms "data" and "information" interchangeably; however, there is a slight distinction between data governance and information governance. Information governance has more to do with all the processes and systems that gather and use knowledge, enhance it, and share it through the organization. Data governance is a subset of that, and it specifically focuses on the gathering, storing, and usage of data—especially personal data—concerning customers, employees, and partners. This data includes financial information, PII, phone numbers, emails, etc.
Imagine you arrive at work one day to find everyone in the office standing around and chattering loudly, while row after row of computer screens flash a ransom message. Someone quickly approaches and breathlessly informs you: “We’ve been hacked!”
News headlines constantly remind us of the volume of cyberattacks targeting major retailers, banks, hospitals, and individuals like you and me. Some of these attacks involve a high level of complexity, but until recently most have been fairly basic—recycled from older malware and repurposed by attackers for different goals. That’s all starting to change now.