Mediaplanet: How to Protect Against Today’s Feeding Frenzy of Cyber Attackers

March 22, 2018

With a keen ability to interpret industry trends and understand enterprise security demands, Robert Herjavec, Founder and CEO of Herjavec Group and Investor on ABC's Shark Tank, shares his expertise on how Canadian enterprises can secure their organizational data in today’s changing digital environment.

Mediaplanet: What kind of changes have you seen in Canadian organizations and their outlook on data security in the past year?

Robert Herjavec: Canadian organizations are maturing when it comes to data security requirements. There’s a clear understanding of the threat landscape and the need to balance multiple layers of technology along with processes and people for a proactive cyber defense. The recent communication around the  Canadian federal budget commitment to cybersecurity is another example of how the Canadian market is reinforcing the value of threat intelligence and the development of talent. We’re used to hearing that Canada lags behind the US in terms of cybersecurity preparedness and technology adoption, but we’re seeing strides in terms of third-party service adoption (including Managed Security Services and Identity Managed Services), emerging technology adoption, and a proactive stance to get ahead of compliance requirements — all of which are very promising.

MP: How should Canadian enterprises manage the security of their data with the upcoming implementation of the General Data Protection Regulation (GDPR) and amendments to PIPEDA in May?

RH: Canadian organizations need to be aware of how these compliance directives impact them and their customers. There are serious implications for non-compliance. Failure to comply with GDPR, for example, results in significant penalties — a $20M GBP fine, or 4 percent of annual turnover, whichever is greater.  It’s common that companies say ‘oh GDPR is a UK policy, it doesn’t apply to me’. That’s not the case. GDPR is a proactive reminder that all enterprises engaging with the data of a UK natural person — no matter their corporate location — should proactively assess their security postures in terms of their visibility, controls, and scope.

MP: The recent media explosion of Bitcoin and cryptocurrency in 2017 has more people understanding blockchain technology and the security benefits it provides to the financial industry. How can enterprises leverage blockchain technology to secure organizational user data?

RH: There’s been a lot of talk among cybersecurity professionals about using blockchain for identity and access management in the coming years. Instead of different institutions controlling different pieces of an individual’s personal data, it will be the individual that controls all that information. This allows us to present the minimum amount of identifying information needed to make a secure transaction. However, blockchain isn’t a complete cure-all solution for enterprises. Executives with security responsibilities should do their homework and engage with firms deep in Blockchain technology.  Deploying and leveraging this new platform will require a major investment and experienced staff from mid-sized to large organizations investing in it.

MP: When it comes to securing user identity and sensitive data, how do you define the difference between identity management and access/authorization management?

RH: Identity management is the program that governs who a user is within an organization. It summarizes the access tied to each user’s identity and controls what they can access, when, and for how long. Some access may be privileged at an admin level or may be non-privileged. Authorization management is the granting of those various permissions.

MP: How can adoption of trusted digital Identity and Access Management (IAM) solutions prevent or eliminate large-scale breaches?

RH: Safeguarding user identities and managing access permissions across the enterprise is one of the biggest challenges faced by security teams. Poor IAM leads to data breaches, causing financial damage and reputational harm.

Organizations require a solution that aligns identity governance with privileged access management to not only meet both policy and regulatory compliance— but more importantly, to avoid falling victim to a devastating cyberattack.

MP: Do you think enterprise executives should be fully knowledgeable on the topic of data security? Why?

RH: It’s a must. Enterprise executives have a responsibility to the protection of their businesses in terms of financial reputation, brand reputation, and overall customer credibility. Cybersecurity is not an IT-specific problem. It’s a business challenge that requires investment, commitment, and training company-wide. There has to be a governance at the executive and board level that monitors each organization’s progression on cyber initiatives. In the event of a cyberattack, it will be unacceptable for C-level executives to blame the IT department. Everyone must report on it and be responsible for it.

Originally posted on industryandbusiness.ca

About Mediaplanet

Mediaplanet specializes in the creation of content marketing campaigns released through multimedia platforms.

We provide our readers with insightful and educational content in the fields of their interest, designed to motivate them to act. Our unique ability to pair the right leaders with the right readers through the right platforms has made Mediaplanet into the global powerhouse that it is today. We continue to expand our network of partners through the shared interest of providing our readers with the best experience possible. 


Take the First Step
In Transforming Your Cybersecurity Program

Enterprise security teams are adapting to meet evolving business needs. With 5 global Security Operations Centers, emerging technology partners and a dedicated team of security specialists, Herjavec Group is well-positioned to be your organization’s trusted advisor in cybersecurity. We’ll help you understand your risk exposure, increase your visibility and ROI, and proactively hunt for the latest threats.

Book a Free Consultation

Stay Informed

Follow us on Twitter
Connect with us on LinkedIn