Top Execs on Kicking Customer Data Breaches to the Curb


The Gist

  • Collaborative data defense. CMOs, CIOs, and CISOs must unite to protect customer data effectively.
  • SEC compliance essential. New SEC regulations heighten the need for transparent data risk management.
  • Generative AI challenges. Ensuring ethical use of customer data in generative AI is crucial for trust.

In our increasingly interconnected world, the protection of customer data emerges as a critical team effort, especially for chief marketing officers (CMOs), chief information officers (CIOs), and chief information security officers (CISOs). In this article, I will explore the importance of collaboration as I interview three security executives.

In our increasingly interconnected world, the protection of customer data emerges as a critical team effort, especially for chief marketing officers (CMOs), chief information officers (CIOs), and chief information security officers (CISOs). NicoElNino on Adobe Stock Photos

The discussion dives into the ramifications of new Securities and Exchange Commission (SEC) regulations, the pivotal role of educating marketing and service leaders about data security, and the challenges posed in utilizing customer data with generative AI technologies. It also highlights the risks associated with proliferating customer data storage locations. This includes underscoring the importance of safeguarding customer data to ensure sustainable business practices and enhanced customer trust.

Meet our three security executives:

Proliferation of Where Customer Data Is Stored

In an era where data represents the new currency, the burgeoning sprawl of customer data across cloud platforms poses an opportunity and formidable risk. As businesses migrate their customer data storage to the cloud, they must grapple with heightened vulnerabilities for data breaches that could lead to substantial financial losses and severe damage to brand reputation. For this reason, organizations must understand the nature of data connected to their systems — whether it be sensitive or personal—and the jurisdictions involved. Smart companies tailor their security measures to ensure compliance and maintain a customer-first security stance that aligns with their core values.

Related Article: Consumer Data Privacy: Win Trust With Consent-Based Marketing

Matt Mills: Vendors Must Navigate Customer Data Safely

“Vendors need to be aware of the types of data their customers connect to their solutions. For example, is the customer connecting sensitive data or personal data? This could be as simple as a name or work email address, even if publicly available. The sharing of personal data with the vendor can trigger obligations under privacy and data protection laws.  Another consideration is whether to include language in customer contracts that restricts customers from connecting certain types of data to your technology, product or solution. Frankly, this can be for the customers’ and the vendors’ benefit. Additionally, organizations should determine alternatives for how technology, products or solutions can be architected. It’s also important to be mindful of whose personal information is being connected to your technology, products, or solutions. Additionally, be mindful of whether the data being connected or shared with your technology, product or solution is coming from a highly restricted country. Lastly, I’d say, keep the company’s values in mind. Not only is protecting personal information required by 180+ privacy laws around the world and 14+ U.S. privacy laws, it is also about the reputation we have in the market as a customer-first security company.”

Related Article: 5 Ways Transparent Personalization Can Win Over Customers

Balaji Ganesan: Cloud Data Risks Threaten Brand Equity

“The rapid expansion of cloud data, predominantly customer information, presents both opportunities and significant risks for businesses. With the shift towards cloud storage, enterprises are increasingly vulnerable to data breaches that can incur heavy financial penalties and tarnish brand equity — a concept David Aaker equates to a balance sheet in his book on “Brand Equity.” Acknowledging the gravity of these risks, Gartner’s introduction of data security posture management is a crucial development. This framework empowers CIOs and business leaders such as CMOs to proactively identify and mitigate risk exposure, safeguarding sensitive customer data and ultimately protecting their organization’s brand integrity.”

Related Article: Effective AI Data Governance: A Strategic Ally for Success

Raj Rajamani: Secure Cloud Data with Strategic Classification

“First, you need to perform discovery across your cloud providers, this will give you an inventory and catalog of every customer data source/set that exists across the various structured (e.g. database) and unstructured (e.g. flat file on S3 bucket) data services that exist in your clouds. This process should cover data at rest as well as data in transit between different services. Next step is to perform classification on this data inventory. This allows you to identify which customer data is sensitive. For example, personal data such as a name, age, or address can be classified as PII data. Credit card numbers and payment data will be classified as PCI data. Once data is classified and you know what is sensitive, you then need to protect it with runtime policies and rules. This allows you to protect specific customer data flows that exist within your cloud environments. For example, if the data type is PII (personal data) and the network destination is internet facing (public) then create a critical alert for security to investigate.

“Finally, security teams continuously manage and govern the posture (state) of their policies and rules as data volumes, types and flows in the cloud continuously change. Think of posture as real-time visibility into all the customer data risks and policy violations that exist within the cloud.”

SEC Regulation Puts Brand Risk Front and Center

A recent SEC regulation has thrust brand risk into the spotlight by mandating organizations to disclose their data risk management strategies to both the public and their customers. This regulatory shift compels CISOs and CMOs to reassess and publicly articulate their approaches to mitigating data risks, fostering a new era of transparency.

Matt Mills: SEC Rule Changes Cyber Disclosure Dynamics

“The new SEC cyber disclosure rule immensely impacts organizations. CISOs and CIOs now must go out of their way to disclose everything, and it will run the risk of resulting in overreach. For board members, this means it will likely fall back on them, the CEO or CFO to determine how much oversight is too much, what is insufficient, and how much is just right. The reality is, the iceberg effect is all too real, but what’s far worse than having a breach be broader than originally disclosed is this: not being transparent — and extremely timely — from the start. Now, while I can’t speak to others’ attitudes about this change, in the conversations, I’ve had with CISOs — whether customers or prospects — this is absolutely something that is top of mind and, perhaps, in a different way and at a different altitude than it might have been before.”



Source link

We will be happy to hear your thoughts

Leave a reply

HARMY TECHNO
Logo
Shopping cart