SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
“Cyber anarchists” Living In the Clouds Has Earthly Ramifications
By Eric Cole


Wiki leaks teaches us two important lessons. First, in the electronic age there are no secrets. The
difference between a secret electronic document and a public document is literally a one click
difference. Second, regardless of all of the technology that is developed, an organization’s weakest link
will and always be the human. It only takes one person to do the wrong thing (either intentionally or
accidentally) to have sensitive information compromised. Always remember that no matter what you
do or how hard you try, you cannot stop stupid. However you can limit or control stupid by
implementing proper access controls, checks and balances and reduce the footprint of a system. Does
every system in an organization need to have the ability to plug in USB hard drives? If the answer is no,
than why do we provide that functionality for everyone.

In order to protect sensitive information and minimize data loss, leaders need to better understand their
environment. The first step is to answer three key questions:
    1) What is the critical information
    2) What business processes utilize it
    3) What servers does it reside on
You cannot protect what you do not know about. Once you know what your critical information is, the
next key focus is to make sure proper classification of sensitive data is implemented for all systems.

In the year 2010 most companies push to store as much information in electronic form as they can.
With cloud computing this information can be accessible from anywhere in the world. Has anyone ever
asked if this is a good idea? While pushing functionality is important, extremes are never a good thing.
We always need to achieve a balance between too much and too little information. Today, wiki leaks
shows us that we are clearly putting too much information online. While it sounds simple, if information
is absolutely needed to perform a job function, properly controlled online access is good. However
there is so much information online that is not required for an organization to run. If you look at much
of the information posted to wiki leaks, you start asking why was that information still online and
accessible to people who did not require it to perform their job function. Reducing the problem space
by limiting what information is available, is a critical step organizations need to take to protect
themselves.

Mais conteúdo relacionado

Mais de Nuuko, Inc.

It's not about jobs jobs jobs
It's not about jobs jobs jobs It's not about jobs jobs jobs
It's not about jobs jobs jobs Nuuko, Inc.
 
Social media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalSocial media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalNuuko, Inc.
 
The death of the company
The death of the companyThe death of the company
The death of the companyNuuko, Inc.
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing pageNuuko, Inc.
 
Communications cluster ppt 6.01
Communications cluster ppt 6.01Communications cluster ppt 6.01
Communications cluster ppt 6.01Nuuko, Inc.
 
Downstream org structure.refining ind
Downstream org structure.refining indDownstream org structure.refining ind
Downstream org structure.refining indNuuko, Inc.
 
Understanding pr tsa
Understanding pr  tsaUnderstanding pr  tsa
Understanding pr tsaNuuko, Inc.
 
About us poretz profile-1
About us   poretz profile-1About us   poretz profile-1
About us poretz profile-1Nuuko, Inc.
 
Shelbybio for web
Shelbybio for webShelbybio for web
Shelbybio for webNuuko, Inc.
 
John caswell for web
John caswell for webJohn caswell for web
John caswell for webNuuko, Inc.
 
Robert t snell for web
Robert t snell for webRobert t snell for web
Robert t snell for webNuuko, Inc.
 
Robert j samuelson for web
Robert j samuelson for webRobert j samuelson for web
Robert j samuelson for webNuuko, Inc.
 
Bhaskar chakravorti bio
Bhaskar chakravorti bioBhaskar chakravorti bio
Bhaskar chakravorti bioNuuko, Inc.
 

Mais de Nuuko, Inc. (20)

It's not about jobs jobs jobs
It's not about jobs jobs jobs It's not about jobs jobs jobs
It's not about jobs jobs jobs
 
Social media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.finalSocial media bootcamp presentation 071311.final
Social media bootcamp presentation 071311.final
 
The death of the company
The death of the companyThe death of the company
The death of the company
 
C suite clusters ppt for landing page
C suite clusters ppt for landing pageC suite clusters ppt for landing page
C suite clusters ppt for landing page
 
Communications cluster ppt 6.01
Communications cluster ppt 6.01Communications cluster ppt 6.01
Communications cluster ppt 6.01
 
Downstream org structure.refining ind
Downstream org structure.refining indDownstream org structure.refining ind
Downstream org structure.refining ind
 
Curtis robinson
Curtis robinsonCurtis robinson
Curtis robinson
 
Understanding pr tsa
Understanding pr  tsaUnderstanding pr  tsa
Understanding pr tsa
 
About us poretz profile-1
About us   poretz profile-1About us   poretz profile-1
About us poretz profile-1
 
Bio for web
Bio for webBio for web
Bio for web
 
Shelbybio for web
Shelbybio for webShelbybio for web
Shelbybio for web
 
John caswell for web
John caswell for webJohn caswell for web
John caswell for web
 
Web profile
Web profileWeb profile
Web profile
 
Robert t snell for web
Robert t snell for webRobert t snell for web
Robert t snell for web
 
Robert j samuelson for web
Robert j samuelson for webRobert j samuelson for web
Robert j samuelson for web
 
Bhaskar chakravorti bio
Bhaskar chakravorti bioBhaskar chakravorti bio
Bhaskar chakravorti bio
 
Bruce finland
Bruce finlandBruce finland
Bruce finland
 
George norsig
George norsigGeorge norsig
George norsig
 
Web profile
Web profileWeb profile
Web profile
 
Silliman bio
Silliman bioSilliman bio
Silliman bio
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

“Cyber anarchists” Living In the Clouds Has Earthly Ramifications

  • 1. “Cyber anarchists” Living In the Clouds Has Earthly Ramifications By Eric Cole Wiki leaks teaches us two important lessons. First, in the electronic age there are no secrets. The difference between a secret electronic document and a public document is literally a one click difference. Second, regardless of all of the technology that is developed, an organization’s weakest link will and always be the human. It only takes one person to do the wrong thing (either intentionally or accidentally) to have sensitive information compromised. Always remember that no matter what you do or how hard you try, you cannot stop stupid. However you can limit or control stupid by implementing proper access controls, checks and balances and reduce the footprint of a system. Does every system in an organization need to have the ability to plug in USB hard drives? If the answer is no, than why do we provide that functionality for everyone. In order to protect sensitive information and minimize data loss, leaders need to better understand their environment. The first step is to answer three key questions: 1) What is the critical information 2) What business processes utilize it 3) What servers does it reside on You cannot protect what you do not know about. Once you know what your critical information is, the next key focus is to make sure proper classification of sensitive data is implemented for all systems. In the year 2010 most companies push to store as much information in electronic form as they can. With cloud computing this information can be accessible from anywhere in the world. Has anyone ever asked if this is a good idea? While pushing functionality is important, extremes are never a good thing. We always need to achieve a balance between too much and too little information. Today, wiki leaks shows us that we are clearly putting too much information online. While it sounds simple, if information is absolutely needed to perform a job function, properly controlled online access is good. However there is so much information online that is not required for an organization to run. If you look at much of the information posted to wiki leaks, you start asking why was that information still online and accessible to people who did not require it to perform their job function. Reducing the problem space by limiting what information is available, is a critical step organizations need to take to protect themselves.