Skip to main content

Data & Intelligence

Adopting a Risk-Based Strategy for Data

Istock 1214111410

Ransomware attacks have been in the news lately, possibly because of the 225% increase in total losses from ransomware in the United States alone in 2020. An increase in sophistication by attackers is a major factor, and many of these ransomware attacks were enabled at least in part by insider negligence. As the level of sophistication of attacks grows, your prevention posture needs to escalate as well. Anytime is a good time to consider adopting a Risk-Based approach to data security rather than the traditional checklist pattern.

Risk-Based Approach

The Risk-Based approach is a systematic method for identifying, evaluating, and prioritizing potential threat vectors facing your data assets. There are five phases in the analysis:

  1. Conduct a Business Impact Analysis
  2. Perform a Risk Assessment
  3. Identify and Implement Needed Controls
  4. Test, Validate, and Report
  5. Continuous Monitoring and Governance
Data Intelligence - The Future of Big Data
The Future of Big Data

With some guidance, you can craft a data platform that is right for your organization’s needs and gets the most return from your data capital.

Get the Guide

The last step, continuous monitoring, and governance is part of our DataGovOps practice.

DataGovOps

Modern Data Governance is focused on value creation through promoting the usage of data. DataGovOps enables safe and controlled data usage at scale by automating data quality, management, and protection workflows.

Conclusion

The recent hype around ransomware attacks is a wake-up call for a threat that has always been present. Methodologies like DataGovOps enabled by new practices augmented by AI and machine learning and even blockchain can help make your Risk-Based Data Security journey more effective and easier to implement.

Tags

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

David Callaghan, Solutions Architect

As a solutions architect with Perficient, I bring twenty years of development experience and I'm currently hands-on with Hadoop/Spark, blockchain and cloud, coding in Java, Scala and Go. I'm certified in and work extensively with Hadoop, Cassandra, Spark, AWS, MongoDB and Pentaho. Most recently, I've been bringing integrated blockchain (particularly Hyperledger and Ethereum) and big data solutions to the cloud with an emphasis on integrating Modern Data produces such as HBase, Cassandra and Neo4J as the off-blockchain repository.

More from this Author

Follow Us