
A lot of conversations centered on the understanding that it’s not a matter of if I get hacked, but when. During one session, the speaker echoed a fairly common notion that our perimeter security is broken. Companies spent $71 billion last year on information security, yet everyone assumes that the bad guys are already inside. With all that spend, how is this possible? Fasoo was showing attendees a multi-layered approach to data security that relies on a data-centric security model with people-centric policies. This allows an organization to protect critical data immediately and adjust access control policy as roles and people change.
As concerns about inevitable data breaches have reached the board level in organizations, talk has turned to mitigating risk. Most people understand that you can’t eliminate risk. You need to minimize it and contain the damage a breach may do to your brand and your bottom line. The Department of Homeland Security (DHS) took government and industry to task saying that most organizations need improvement in managing security risk. One executive I spoke to in the Fasoo booth said that liability rests with the board if they have a data breach. She wanted to make sure that her company was not the next Anthem or Sony.

An attacker typically wants to destroy infrastructure, steal data or affect availability. In the case of dormant malware, data exfiltration is a common goal. This could be stealing intellectual property, patient health information or customer data. I had one conversation with a manufacturing company that is worried about losing their proprietary designs and processes. If a competitor gets that information, they could be undercut by cheap knockoffs and go out of business.
As more attention is focused on protecting critical information, organizations are realizing they have to protect the data itself. It’s important to protect your infrastructure, but if a hacker or trusted insider with malicious intent gets past the perimeter, your data is gone. Visitors to the Fasoo booth saw the best way to protect the data itself, by encrypting it at the time of creation and controlling its access through dynamic security policies. The new Fasoo RiskView will help companies better understand their data risk and allow them to correlate user actions with risk.
Cyber attacks are getting more sophisticated and harder to stop. Based on feedback from attendees and a few reporters I spoke to, more companies are realizing they need to focus on securing the data itself to mitigate their risk. Using a multi-layered security approach with data-centric security at the core is the best way to protect intellectual property and other sensitive data from getting into the wrong hands.