Cloud Data Privacy in the WFH era :
Gamma.AI
November 13, 2020
“This event has ended! Please scroll below for a summary of the discussion.”
Summary
In the pursuit of minimizing data loss risks, cloud data privacy has become even more critical in this WFH Era. Gamma hosted its first panel on November 13, 2020 to discuss the same covering a broad range of topics including cloud data risk assessment, cloud data governance, and cloud data access controls.
Agenda
Cloud Data Risk Assessment
Strategies on assessing critical business risk by conducting continuous data discovery
Cloud Data Governance
Frameworks and principles to govern access and sharing of data with people, applications and geographies
Cloud Data Access Controls
Tools to set technology controls to automate data governance principles
Panelists
Abhinav Srivastava
VP and Head of Information Security
Derek Johnson
Director, Security
Richard Barilla
Director of Information Security
Matthew Casperson
Director - InfoSec and Compliance
Vikas Malhotra
Director - M365 Data Platform & Growth
Transcript
Below is a short transcript of the questions asked by the Gamma team and responses by panelists.
Arpit
Welcome everyone to our second panel on the future of cloud data privacy. As I learnt from all of you, the very first step CISOs take even before they decide governance policies or implement technology controls, is assessing where their most critical risk is by conducting a deep audit. In context to data privacy in the cloud, this boils down to assessing risks around data living and being shared across cloud applications. From that lens, what does cloud data risk assessment mean to you - what is the impact of not conducting it, what processes have you followed and what solutions have you built or implemented for the same.
Richard
There's an assumption there that we have a good understanding of where the data lives, and how much of it there actually is. When I think of assessing the risks, first, I have to understand the reality of how much data is there within the company. My experience is that the data usage of a company is independent of the number of employees.
An important part of data risk assessment is to clearly understand the value of each data type within the organization.
An important part of data risk assessment is you need to find the value of each data type. It’s a challenging task for almost every company, and different data might hold different values based on the industry. When you own the operational risk for a company, you end up owning the business risk with every single business function from finance, accounting, operations, marketing, engineering. Data from all those functions have different values. If I were to recommend what to do for data risk assessment, it would be to establish that value. This further comes down to classification of the data. As a CISO, I need full understanding of the value of data, to help me compare the different datasets and invest my limited resources accordingly.
Derek
Part of the challenge is that oftentimes something is thought of as a technology problem when it is clearly a business problem. Since it's a business problem, how do you translate it to the business leaders such that they buy into it. Like Richard was saying, how do you get the different verticals to support you? You have to understand what’s the business model, what’s important to the business that’s going to impact the bottom line. We need to identify operational risks, strategic risks - the aspects that are going to harm the bottom line and any kind of profitability. Once you get that message across, then you start to evaluate what data is important.
I really believe in using technology to find what data is out there. A lot of people don't deploy true data classification mechanisms. When Arpit and I talked, what really sparked me is that Gamma has the capability of finding and automatically classifying all data based on the classifications that are most important to me. Once you are done with the classification, only then you can start to take that data, compartmentalize it and put the right security controls around it.
Understand what your business is about, find out where that critical information is, and then put the right controls around it. I try to link everything to dollars and cents. If the likelihood is high, and impact is dramatic, then we need to focus on that - it’s as simple as that. Based on the impact and likelihood metrics, you can figure out the ROI of that risk e.g. if scenario X happens, $500,000 of a bottom-line impact, but it's only going to cost us $100,000 to deploy something to help resolve this issue - it then becomes a simple conversation.
Vikas
Agree with Derek that this is a business problem - each company essentially has to go through some sort of risk assessment irrespective of whether they are residing on-premise, or using cloud services. From the perspective of customers who try to move toward cloud services from on-premise, they have to rethink the whole security paradigm. When they were on-premise, they had full control over their data and infrastructure, the controls that they had established right from the physical layer up to the application layer. They could literally control everything. But when you move to the cloud, you need to understand the separation of duties (often referred to as a shared responsibility model) between the cloud provider and the customer very well. For example, within SaaS environments, the cloud provider would control more of the stack than in an IaaS environment.
From the risk assessment perspective, the primary motive of any customer should be to make sure that the cloud provider has done their part - they have implemented the required controls within the stack they control. Secondly, customers need to figure out where in the stack they should take responsibility for implementing controls. They must ensure whether those controls are available in the stack or not. A service provider may or may not provide those controls as part of their architecture. Customers must take responsibility for making themselves aware of the available controls and use them to mitigate risks appropriately.
Matthew
Another concept that I've seen just time and again is that cloud data risk assessment is an ongoing activity over the course of a company's evolution. As Derek was saying, you're also constantly just reconciling the required controls against the business bottom line. For a profit company, cash is king. If I have one revenue stream that’s 75% of my company's revenue, most of my efforts are going to have a better ROI there. But, you also need to adapt to scenarios when a new upcoming product line becomes as important. There are going to be a lot of moving parts as you progress and it’s going to be an ongoing exercise.
Once you have established a security problem as a business problem, and your board has bought in, that is when you start thinking about processes and solutions to solve it.
That's where I see a lot of potential in the crazy cloud world that is moving at the speed of light. In a way, you are always chasing in your journey to assess and mitigate risks.
Abhinav
The challenge that I have seen in Frame.IO and in other startups as well is that, as the business grows, you onboard a lot of vendors. As a company, we collect very limited PII because a lot of the functionality concerning PII is outsourced to vendors. Vendor risk becomes a key concern in the whole process. Now, you can perform all kinds of risk assessments on the vendors, but at the end of the day, it comes down to the trust you have in the vendor that they are taking all required security measures that you wanted to take in your company. That vendor might be using other vendors for the business as well. This basically makes it a never-ending chain, and you just don’t know how deep down in the chain the leak could happen, or what exposures do we have. That is a very challenging problem to solve.
Arpit
Thanks for the insightful answers. I will jump to the next topic of discussion although some of you already touched upon it. And that is about setting up governance policies around data collection, storage, access. We learnt that one important goal of cybersecurity investments is to prove ROI. And one clear ROI is earning your customers’ and stakeholders’ trust. And data privacy regulations are an easy forcing vector in that direction. My question is, how do you go about connecting the setting of the governance structures for data privacy to proving to your stakeholders that you are following the same? Especially for newer regulations like GDPR and CCPA that do not yet have any agency that can audit and give you compliance certifications.
Abhinav
In any audit and compliance process, there is cascading at play involving what you do, proving that you are doing it, and finally proving that you are monitoring that it is continuously happening. For example, in GDPR, if a user requests to delete their data, how do you generate the proof that you have actually deleted their data? When you are using a third party, it becomes even more challenging, for instance to fulfil a data deletion request, we need to request external vendors as well to delete data at their end. It has to be baked into the contract, it has to be baked into the assessment process that vendors have these processes in place to delete certain customer data. Again, the challenge also becomes whether you can verify that the customer data was deleted on their end or not. At the end of the day, the challenge is that I have to rely on just trusting external parties that they did what they have been asked to do.
Arpit
Thanks Abhinav. Next, I want to segue a little bit into the end-user awareness component of data governance. In light of the dynamically changing environment of governance policies, how would you go about keeping your organization’s end users well informed and aware about such policies? And what response, remediation or even disciplinary actions need be followed to maintain the organization’s contractual obligations around data security and privacy?
Matthew
One of the very first things I did in BriteCore was to make sure that we had an incident response plan. From a remediation standpoint, it is a business-critical item to make sure the plan is understood and people know how to operate it.
From a behavioral standpoint, if you tell someone, they have to brush their teeth three times a day, they are less likely to do it compared to “I'm just going to brush your teeth for you three times a day.” That mentality has worked both for us and other cloud-native solutions. It is important to find areas/tools where you can get the most ROI from a policy perspective. There's a lot of really interesting and strategic ways to do it. e.g. MDM - taking the onus of device management, antivirus protection, and endpoint detection out of the hands of the end-user, or getting an identity platform like Okta or Microsoft directory where a specific team is working to take the control out of employees’ hands.
Richard
For governance, accountability is very important, and so is having the business owners and the data owners opt into the provided frameworks. When I think of governance, I immediately think of RACI (Responsibility assignment matrix). In this framework, if CISO is accountable for governance, then who is responsible for it? The business part of the organization owns the majority of risk. If the risk is owned by the business, and if we have proper data owners established, then the CISO or the Compliance Officer should be governing and providing the framework/tools.
Derek
To add on top of what Richard said, you first need to provide the relevant tools/services, and then get a buy-in from everybody. Once you have the buy in, you assign data owners - you make them accountable for the data. To get governance going, it is important to tie the reports/metrics with some type of financial incentives e.g. performance bonuses. At the end of the day, it boils down to dollars and cents.
Arpit
So automating and taking control away from the users for important security measures, while enforcing governance via accountability and corroboration with performance bonuses - truly simple and insightful models. Now my last and final question to all of you - given the shift to cloud, WFH due to Covid and the realization that your most critical asset in the digital age is data, if you had a magic wand and access to indefinite resources, which one primary use case you'd solve at your organization in regards to data privacy and why?
Richard
If Gamma.AI is doing what it claims to do, Gamma can solve the entire problem for me. The only thing I have to provide it is the data owners. Then Gamma can provide me the location and the classification of all my data while I could easily transfer data ownership to the respective stakeholders. Gradually, I’ll have full accountability of where my data lives, what its classification is, and whether the owners are taking responsibility for keeping it safe. So in short, Gamma could be my magic wand if it works the way you describe it.
Vikas
Due to the COVID pandemic, customers have been shifting towards cloud from on-premise environments. They have struggled because their earlier controls were oriented specifically towards on-premise environments, e.g. they used to depend on firewall boundaries to control data leakage. But now, there is an important need to understand & classify data and then being able to apply policies to that data. Secondly, due to the WFH shift, endpoints used by a user could be anywhere in the world which is a new challenge for organizations who have mostly relied on traditional on-premise controls to secure endpoints. Today, endpoint controls have become more important than ever. For me, having these endpoint controls, and the ability to classify & recognize data are the two important use cases I would solve if I had a magic wand.
Matthew
Due to the shift to cloud and the sudden shift to WFH, they are two important limitations that are surfacing:
1. Supply chain issues are increasingly becoming bottlenecks across the globe - for instance,. there are engineering firms that have had to shut down their whole operation because they couldn’t procure laptops.
2. Organizations relying on on-premise security controls to secure their endpoint devices can no longer do that and need to find ways to achieve their goals in this new WFH era.
There is a need for having compute environments that enforce required control policies, have the necessary DLP controls, can easily be monitored, and can be connected via any endpoint - and that is the use case I would solve if I were granted a magic wish.
Abhinav
As startups, you need to be agile and can’t strictly lock employees down when it comes to MDM. Balancing support, usability, and security from the end user perspective is important and always a big challenge. From the SaaS product perspective, the biggest problem is getting transparency into how your vendors are handling data. What kind of data is each vendor storing? Can you keep track of information cascading from one vendor to another? How do you build visibility into nested dependencies rather than just on the surface? This is extremely important to understand the liabilities and risks associated with sensitive data assets. If given a magic ward, I would solve this use case.
Derek
After you have already classified/determined sensitive data assets, the ability to identify pertinent data on each device on a real-time basis, and then being able to enforce relevant policies would be astounding. Irrespective of the device being used, an AI powered engine that could parse the data on each device, identify & classify relevant sensitive assets, and then enforce policies like locking the data down, or not allowing it to leave the device would be ideal and something that I’d like to solve for.
Gamma automates data classification and data discovery problems across cloud applications. It helps users answer the critical question on what is the most sensitive data, where is it located, who has access to it, who is responsible for sharing it inappropriately so that you can take a bunch of actions on remediation around it.
Interested in becoming a Panelist?
We really value your thought leadership to the broader community. Please share your information and we will get back to you shortly
Name
Message