SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
“Cyber anarchists” Living In the Clouds Has Earthly Ramifications
By Eric Cole


Wiki leaks teaches us two important lessons. First, in the electronic age there are no secrets. The
difference between a secret electronic document and a public document is literally a one click
difference. Second, regardless of all of the technology that is developed, an organization’s weakest link
will and always be the human. It only takes one person to do the wrong thing (either intentionally or
accidentally) to have sensitive information compromised. Always remember that no matter what you
do or how hard you try, you cannot stop stupid. However you can limit or control stupid by
implementing proper access controls, checks and balances and reduce the footprint of a system. Does
every system in an organization need to have the ability to plug in USB hard drives? If the answer is no,
than why do we provide that functionality for everyone.

In order to protect sensitive information and minimize data loss, leaders need to better understand their
environment. The first step is to answer three key questions:
    1) What is the critical information
    2) What business processes utilize it
    3) What servers does it reside on
You cannot protect what you do not know about. Once you know what your critical information is, the
next key focus is to make sure proper classification of sensitive data is implemented for all systems.

In the year 2010 most companies push to store as much information in electronic form as they can.
With cloud computing this information can be accessible from anywhere in the world. Has anyone ever
asked if this is a good idea? While pushing functionality is important, extremes are never a good thing.
We always need to achieve a balance between too much and too little information. Today, wiki leaks
shows us that we are clearly putting too much information online. While it sounds simple, if information
is absolutely needed to perform a job function, properly controlled online access is good. However
there is so much information online that is not required for an organization to run. If you look at much
of the information posted to wiki leaks, you start asking why was that information still online and
accessible to people who did not require it to perform their job function. Reducing the problem space
by limiting what information is available, is a critical step organizations need to take to protect
themselves.

Contenu connexe

Plus de Nuuko, Inc. (20)

It's not about jobs jobs jobs
It's not about jobs jobs jobs It's not about jobs jobs jobs
It's not about jobs jobs jobs
 
Social media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalSocial media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.final
 
The death of the company
The death of the companyThe death of the company
The death of the company
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing page
 
Communications cluster ppt 6.01
Communications cluster ppt 6.01Communications cluster ppt 6.01
Communications cluster ppt 6.01
 
Downstream org structure.refining ind
Downstream org structure.refining indDownstream org structure.refining ind
Downstream org structure.refining ind
 
Curtis robinson
Curtis robinsonCurtis robinson
Curtis robinson
 
Understanding pr tsa
Understanding pr  tsaUnderstanding pr  tsa
Understanding pr tsa
 
About us poretz profile-1
About us   poretz profile-1About us   poretz profile-1
About us poretz profile-1
 
Bio for web
Bio for webBio for web
Bio for web
 
Shelbybio for web
Shelbybio for webShelbybio for web
Shelbybio for web
 
John caswell for web
John caswell for webJohn caswell for web
John caswell for web
 
Web profile
Web profileWeb profile
Web profile
 
Robert t snell for web
Robert t snell for webRobert t snell for web
Robert t snell for web
 
Robert j samuelson for web
Robert j samuelson for webRobert j samuelson for web
Robert j samuelson for web
 
Bhaskar chakravorti bio
Bhaskar chakravorti bioBhaskar chakravorti bio
Bhaskar chakravorti bio
 
Bruce finland
Bruce finlandBruce finland
Bruce finland
 
George norsig
George norsigGeorge norsig
George norsig
 
Web profile
Web profileWeb profile
Web profile
 
Silliman bio
Silliman bioSilliman bio
Silliman bio
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

“Cyber anarchists” Living In the Clouds Has Earthly Ramifications

  • 1. “Cyber anarchists” Living In the Clouds Has Earthly Ramifications By Eric Cole Wiki leaks teaches us two important lessons. First, in the electronic age there are no secrets. The difference between a secret electronic document and a public document is literally a one click difference. Second, regardless of all of the technology that is developed, an organization’s weakest link will and always be the human. It only takes one person to do the wrong thing (either intentionally or accidentally) to have sensitive information compromised. Always remember that no matter what you do or how hard you try, you cannot stop stupid. However you can limit or control stupid by implementing proper access controls, checks and balances and reduce the footprint of a system. Does every system in an organization need to have the ability to plug in USB hard drives? If the answer is no, than why do we provide that functionality for everyone. In order to protect sensitive information and minimize data loss, leaders need to better understand their environment. The first step is to answer three key questions: 1) What is the critical information 2) What business processes utilize it 3) What servers does it reside on You cannot protect what you do not know about. Once you know what your critical information is, the next key focus is to make sure proper classification of sensitive data is implemented for all systems. In the year 2010 most companies push to store as much information in electronic form as they can. With cloud computing this information can be accessible from anywhere in the world. Has anyone ever asked if this is a good idea? While pushing functionality is important, extremes are never a good thing. We always need to achieve a balance between too much and too little information. Today, wiki leaks shows us that we are clearly putting too much information online. While it sounds simple, if information is absolutely needed to perform a job function, properly controlled online access is good. However there is so much information online that is not required for an organization to run. If you look at much of the information posted to wiki leaks, you start asking why was that information still online and accessible to people who did not require it to perform their job function. Reducing the problem space by limiting what information is available, is a critical step organizations need to take to protect themselves.