top of page
  • Writer's pictureRajesh Kanungo

Risk Management, Data Loss Prevention and everything around it…

Updated: Sep 19, 2022


Your data is a risk! Today’s organizations deal with a lot of data and are subject to Data Protection regulations across the globe. Any risk to an organization’s data adversely affects its business, market value, public image, and market shares. Any risk management strategy must take data protection under its purview.


We are starting with a blog series where we will discuss the data protection aspects of Risk Management, and how an efficient Data Loss Prevention (DLP) strategy can help you manage and reduce risks.


Let us first begin with understanding what Risk is and the context we are considering the risk in. Risk to an organization is any probable threat that can negatively affect the functioning of the organization. It can be broadly classified as follows:

  1. External Risk

  2. Internal Risk

  3. Physical Risk

  4. Cyber Risk

Note that these classifications are interdependent and not mutually exclusive.


In this blog series, we will be focusing on Cyber Risk.


Cyber Risk or Information Security Risk is defined as any probable threat to the Confidentiality, Integrity, and Accessibility (CIA) triad of an organization’s assets – including but not limited to data, information systems, and processes.

In today’s world, where data is the most valued asset (and weapon), it is crucial to adopt a Risk Management strategy curated for your organization.

Risk management is a process of identifying vectors that could corrupt or damage an organization’s assets, evaluating those vectors by considering asset value and countermeasure cost, and implementing cost-effective solutions for mitigating or reducing risk. The goal of Risk Management is not to eliminate the risk, but to reduce it to an acceptable level.

While Risk Management strategy must be curated for every organization, a few steps are very important and common to all organizations. These steps are:

  1. Asset Discovery and Management.

  2. Asset Valuation

  3. Data Loss Prevention

  4. Vulnerability Management Solutions



Asset Discovery and Management.

We are moving towards distributed, hybrid architectures involving cloud, SaaS, data centers, and peer-to-peer networks. In such environments, Asset management across all the teams and cloud accounts of the organization is nearly impossible. TalaSecure’s Ransomware Defender can help you discover cloud assets across all your cloud accounts and not only provide you with a detailed view of each asset but will also show how each of these assets is linked.

Asset Valuation

Once you have a glimpse of your organization’s landscape, you need to formulate a way to decide the value of the assets. Asset value determines the criticality of an asset. The higher the asset value, the more critical is the asset. It helps us determine:

  1. The priority of remediation/protection is to provide the asset

  2. The acceptable risk for the asset, which helps us determine the risk score

Traditional methods for determining Asset value include Qualitative (high, medium, low) or Quantitative (a $$ value) methodology. While both methods are valid, a factor that must be considered is the data flowing through or controlled by the asset. Determining the data flow through the organization systems can help determine asset value accurately.

Today, if we generalize an IT landscape of an organization, we have:

  1. Developer endpoints – laptops, VMs, remote workstations where code is developed

  2. Code repositories

  3. CI/CD pipelines

  4. Deployed environments (cloud, datacenters, hybrid, peer-to-peer networks)

  5. Web applications

  6. Data stores (databases, cloud storage, data lakes)

  7. SaaS Products (Salesforce, JIRA, Sumologic, Gmail)

Data Loss Prevention

With data flowing through these assets, we need protective measures at key places to ensure data is not exposed, leaked, or corrupted.

Here, an appropriate DLP (Data Loss Prevention) solution will help reduce the risk. Many modern DLPs offer varying levels of coverage in today’s hybrid environments in the form of solution components including, but not limited to endpoint agents, Cloud Access Security Brokers (CASB), network, email, and web protection components. Innovation in the ML-based data fingerprinting approach to detect the data flowing through an asset will give you a clear view of the data's criticality and help you accurately determine the Asset value.


Vulnerability Management Solutions

This information must be supplemented with data from Vulnerability Management solutions – which will provide you with the risks associated with an asset. The probability of a vulnerability being exploited (known as the Exposure Factor) for the given asset will help you calculate the risk score for an asset and determine the countermeasure for the same.


TalaSecure team can build custom connectors, ingest information produced by DLP and VM solutions, and help you determine the risk score for all your cloud assets. Our team of experts can help you build a custom Risk Management Strategy for your organization and help you set up automated governance mechanisms to ensure your risk doesn’t realize. Contact us for more information.

This blog discussed how Risk Management Strategy is linked with Data Loss Prevention Strategy. We determined how asset value can be enhanced based on the data flowing through it and how DLP can help you reduce the risks. In the next blog, we will discuss different types of DLP, use cases for the DLP, and how we can incorporate them into our Risk Management Strategy.

Authors

Saurabh Malpure: linkedin.com/in/saurabhmalpure

14 views0 comments

Recent Posts

See All

Cryptocurrency: the US tries to legitimize it

The latest White House development in cryptocurrencies, Executive Order (EO)on Ensuring Responsible Development of Digital Assets, is geared towards bringing the world of blockchain in general, and c

bottom of page