Ciso Best Practices Securing Big Data
28, 2017

Scattered data storage and access patterns have created a scenario where enterprise information is under constant threat from internal and external actors. It’s up to the CISO to design, develop, and implement a solution that secures big data and drives business value across the organization. The CISO must also be able to justify the big data security plan to the Board and obtain critical stakeholder buy-in.

Michael Zanga, former CAO of the Royal Bank of Scotland, understands the big data strategies faced by CISOs. In this article, he shares his best practices for:

Cleaning Big Data

Data needs to be unified, tidied, and cleaned before any thoughtful analysis can begin. More importantly, practicing good data hygiene gives all stakeholders access to the data in a way that can be understood or easily explained.

Addressing Access, Control, and Validation Concerns

After cleaning data, CISOs need to use the data patterns to identify scenarios and situations that constitute a red flag.

Presenting Big Data to the Board

CISOs should present big data findings to the board in the simplest way possible. Board experts need answers and solutions to business problems - not how to become experts in the language and practices of big data.

Leveraging Big Data to Drive Business Value

The problems that big data exposes can also be turned into business opportunities. The more data that enters the system, the more value CISOs can extract.


Get access to the full article by becoming a member of Consortium today.


|