How a data-centric approach can lift agencies above the cybersecurity poverty line

Nattakorn Maneerat/Getty Images

 

Connecting state and local government leaders

COMMENTARY | By focusing protection where it’s most needed, agencies can more easily share data and create targeted, efficient and effective cybersecurity.

State and local agencies that don’t have enough IT or security resources to install even minimum controls are said to fall below the cybersecurity poverty line. They are stuck in a seemingly endless cycle of playing catch-up. Agencies do not have the funds necessary to invest in robust cybersecurity frameworks, so they continuously employ stopgap measures or overpay for solutions that do not address their challenges. As a result, they find themselves accruing more technical debt and growing ever more unprepared for a breach.

The COVID-19 pandemic exacerbated the problem, with many vendors overpromising and underdelivering cybersecurity solutions, causing agencies to fall further below the line. Now that the dust from the pandemic response has settled, it’s a good time for agencies to reassess their cybersecurity investments and target their efforts where it makes the most sense: Data itself. 

Data-centric security is a highly cost-effective and value-driven approach that gives agencies more control and visibility over their data landscape and the risk it poses. With this approach, agencies can move from cybersecurity “have nots” to “haves” and gain the leverage they need to successfully defend against threats and enable their work.

Protecting Valuable—and Vulnerable—Assets

Second to its human resources, data is an agency’s most valuable asset. It’s also one of its most vulnerable, particularly when it needs to be shared. While network perimeter security is still vital and necessary, it has become insufficient in a world in which cloud services and remote work have made those perimeters virtually disappear. 

With data more exposed, data-centric security becomes more important. The practice involves placing protective “wrappers” of encryption around data objects, thereby safeguarding those objects wherever they reside. Think of wrappers like bubble wrap that protect a parcel in shipping, except in this case, the wrappers can include predefined security controls and classifications specifying who can access the data, how it can be shared, where it can and cannot go and so forth. 

These attributes can be assigned manually or automatically and easily controlled or adjusted. For instance, employees sending email with proprietary information need not be cybersecurity experts to exchange information securely. They can simply check a box on the email delegating or restricting access to the information contained within the message.

Data-centric security makes secure file sharing much easier. Consider a situation where different agencies must share information to serve a single constituent. Each agency may have its own systems, firewalls and security protocols. Normally, it may be challenging for a representative from one agency to access information from another—impeding each organization’s ability to effectively service the citizen. A data-centric approach, though, allows agencies to share information while protecting and controlling access to data easily, and eventually they can even collapse the data storage silos into one. 

Building On and Enhancing Zero Trust

Data-centric security builds on and enhances zero-trust practices that many agencies have already begun to employ. Like zero trust, a data-centric approach is built around the core tenet of “never trusting, always verifying.” In the case of data-centric security, however, zero trust is extended beyond a single agency’s walls to include partner agencies, constituents and others. Agencies can apply their zero-trust policies to the data and ensure those policies are enforced even outside their network boundaries.

In this way, a data-centric approach provides agencies with a more secure way to approach cybersecurity, which is key to rising above the cybersecurity poverty line. Simultaneously, bringing security down to the data level allows agencies to simplify and focus their cybersecurity programs, making them easier to manage and more efficient without sacrificing strong protection.

Implementing Data-Centric Cybersecurity

Agencies struggling below the cyber poverty line or those simply interested in implementing a data-centric approach to cybersecurity should start small. They can begin by assessing which of their internal groups and workflows contain the most risk or high-value data. After first securing those objects and business processes, they can move on to other datasets and build from there. 

Continuing to assess data workflows and risk as they evolve over time is key. Data-centric security is not a quick fix, but it can have a quick start, so agencies should allow for an ongoing process that can be continually adjusted to organically become a part of their regular cybersecurity hygiene.

Data-centric security, however, is not a replacement for other cybersecurity best practices. Identity access management, network perimeter security and other common strategies and tactics are still necessary.

But a data-centric approach will give agencies the assurance that their data is protected at all times. They’ll also have significant control over who is able to access information while expediting the sharing of that information, leading to better and more secure citizen experiences, even after that data has left the organization. 

In short, by focusing protection where it’s most needed, agencies can create a more targeted, efficient, and effective cybersecurity practice that will help them rise and remain above the cybersecurity poverty line. 

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.