Cyber Chief Magazine December 2020
Cyber Chief Magazine December 2020
Cyber Chief Magazine December 2020
Ed.12
Chief
to learn
Data Security
Challenges 2021
Cyber
Ed. 12
Chief Magazine
2020 tested organizations for their adaptability, flexibility and stress resis-
tance. In particular, IT and security management teams had to quickly adapt
to new ways of working and implement new technologies with nearly no
time for planning and testing. Many of them were forced to prioritize service
availability over security; in fact, 85% of CISOs admit that they sacrificed cy-
bersecurity to quickly enable working from home.
Now that we are all more comfortable with the new normal, it’s time for cyber-
security leaders to re-examine their earlier decisions with the goal of closing
security gaps and getting ready for intense cyber threats in 2021.
This edition of Cyber Chief Magazine outlines the main focuses, risks and
considerations in the coming year for cybersecurity leaders and shares strat-
egies that will help you prepare for the most important challenges and seize
the opportunities.
300–400%
cyberattacks 31 The importance of data classification
FBI’s Cyber Division report for data loss prevention
630%
external attacks on 35 How to calculate return on security
cloud accounts
McAfee, Cloud Adoption and Risk Report investment
Focus
First-Hand Experience
6 Top seven cyber security
predictions for 2021 40 Flagler Bank mitigates IT risks
and secures sensitive data
10 Common cloud computing security
issues and how to mitigate them
Analysis
Cloud adoption
50 %
use of cloud services
McAfee, Cloud Adoption and Risk Report
300–400% 630%
cyberattacks external attacks on
FBI’s Cyber Division cloud accounts
MonsterCloud,
Ransomware threat
800% 47%
ransomware attacks of ransomware attacks
McAfee, Cloud Adoption and Risk targeted RDP
Kroll
300 % 21 %
in remote work of US information workers
of pre-COVID levels will work from home,
Forrester Predictions 2021 compared to 7% in 2019
35 % 30%
in global public cloud of firms will increase spend
infrastructure market on cloud, security and risk,
Forrester Predictions 2021 networks, and mobility
Top Seven
Cyber Security
Predictions for
2021
Ilia Sotnikov
VP of Product Management at Netwrix,
Official member of Forbes Technology Council
The year of 2020 has definitely shaken up the over security has made misconfigurations
IT pros. The lockdown tested organizations inevitable, resulting in overexposed data.
for their reliance on distributed workforces,
forcing accelerated digital transformation and
broadening the IT threat landscape. Making
3. Hackers will increasingly target
predictions for the future is a tricky business but
service providers.
I can state firmly that ripple effects of this year
won’t let security pros yawn their way through The shortage of cybersecurity experts will lead
2021. In this article, I will outline the key trends more organizations to turn to managed service
that will impact organizations in 2021 and beyond. providers (MSPs). In response, hackers will
conduct targeted attacks on MSPs in order to
get access to not just one organization but all of
the MSP’s customers.
1. Ransomware will do more damage
in order to motivate payments
Next-gen ransomware will be designed to do
4. The rapid digital transformation in
damage that is more difficult to recover from
2020 will have a delayed impact on
in order to force organizations into paying the
cybersecurity in 2021.
ransom. One example is “bricking” devices
by modifying the BIOS or other firmware. In 2020, organizations were forced to quickly
Cybercriminals will also be expanding to new adapt to new ways of working and implement
targets, such as operational technology and IoT new technologies; and through their own
devices, which may have a much more visible admission via the upcoming Netwrix survey
impact on the physical world. with little experience and nearly no time for
planning and testing. In 2021, the security gaps
caused by the inevitable mistakes during this
rapid transition will be exploited, and we will
2. Cloud misconfigurations will be one
see new data breach patterns like the recent
of the top causes of data breaches.
Twitter hacks.
A lack of clear understanding of the shared
responsibility model due to the rapid transition
to the cloud will backfire in 2021. The speed of
transition coupled with prioritizing productivity
7
insurance. However, those policies will come with
5. Proof of value will drive business
their own security standards and requirements,
conversations.
such as regular risk assessment and effective
Executives will be looking for specific metrics detection and response capabilities. As a result,
in order to assess the value delivered by the organizations will focus as much on meeting
products and security measures the company those criteria as much as they do on complying
is using. The practice of justifying the value with the regulatory standards themselves.
of current investments and the necessity of
new investments will become more generally
accepted.
8
ON-DEMAND WEBINAR
9
FOCUS
Common Cloud
Computing
Security Issues
and How to
Mitigate Them
Mike Tierney
VP of Customer Success,
Security and Compliance Expert
Securing your cloud environment effectively is the division of responsibilities. That way, you
no easy task. What cloud security issues should can ensure your business needs are met and
you be prepared for? What are the most serious establish a high level of trust in your providers.
security risks? Which best practices are most
effective at keeping your data safe? Private cloud. Companies have full visibility
and control over their infrastructure and
In this article, we will explore the two primary applications. The flip side of gaining that
cloud models and the principal security concerns full control is that you also have complete
you will face when using each model. responsibility for:
11
Misconfigurations of security Security of access
controls
Applicable to private and public clouds
Applicable to private and public clouds
Proper management of access in the cloud is
In May 2019, the contact information of nearly 50 essential to minimizing the risk of data loss due to
million Instagram users was exposed to anyone external attackers, malicious insiders, and errors
on the internet. The cause? The database simply like accidental sharing of sensitive data. There are
was not password protected. many effective strategies, including the following:
In this case, the database was hosted on an Amazon ▪ Adhering to the least-privilege principle
server, but the problem of misconfiguration is not when assigning access rights to both users
limited to the public cloud. Indeed, in the public and admins
cloud there is less chance of screwing up because ▪ Conducting regular entitlement reviews and
you have access to fewer configurations, while in revoking excessive rights
a private cloud, you need to configure everything ▪ Monitoring for unauthorized changes and access
yourself, including setting up your firewalls, ▪ Classifying your data
controlling encryption of sensitive data and deciding ▪ Establishing & enforcing policies that determine
when to require multi-factor authentication. how different types of data can be shared
▪ Establish baseline configurations. There are many ways to improve data security. It’s
▪ Regularly audit your configurations and essential to identify and mitigate vulnerabilities
correct any drift from your baseline. that could be exploited, as well as to monitor
▪ Enable continuous change monitoring activity around your data, since lack of visibility
so you can detect and revert suspicious enables malicious attackers free rein to steal
changes before they lead to a breach. information or do other damage.
▪ Ensure you can investigate each change quickly
One essential best practice for protecting your
and thoroughly. Be sure you will know exactly
data is to perform data discovery across your IT
which settings were modified, who made the
ecosystem and classify each file by its content.
change, and when and where it happened.
12
Shared responsibilities exercise their data privacy rights under the GDPR,
CCPA and other regulations.
Applicable to private and public clouds
How to strengthen
In the public cloud, responsibility for cloud data
security is shared between the cloud provider
security and
and the customer. You need to lock down all
responsibilities and security guarantees as you
compliance in the
negotiate a contract. While most cloud providers
offer an array of features and configuration
cloud
choices to help keep your data safe, you shouldn’t
rely solely on them. Instead, supplement native
security measures with your own to comply with
legal and business requirements. The Netwrix data security platform delivers the
deep insight and centralized control you need to
strengthen security in your public and private cloud
Compliance concerns environments. In particular, it enables you to:
Applicable to private and public clouds ▪ Accurately classify sensitive information in the
cloud and automatically reduce its exposure
If your organization is subject to any compliance
▪ Enforce least privilege by seeing through the
regulations, you need to be able to demonstrate
tangled permissions structure of cloud-based
to auditors that you have adequate control over
systems and spotting broken inheritance
and insight into the cloud environments you
▪ Know right away about changes to
use. Among other things, that usually involves
configuration and permissions that could
proving that your cloud services are configured
compromise security
properly, that you have appropriate controls in
▪ Detect even the most clever threat actors
place around any regulated data you store in the
with user behavior analytics
cloud, and demonstrating that you have insight
▪ Troubleshoot incidents quickly with Google-
into activity around that data. Naturally, classifying
like search of audit data
your data is an invaluable part of the process, so
▪ Establish required security controls and
you know exactly what regulated data you have
prove compliance to auditors with far less
and where it resides. In addition, you need a way
effort and expense
to accurately and promptly satisfy data subject
• Streamline the process of satisfying DSARs
access requests (DSARs) whenever customers
to avoid penalties
13
Analysis
2020: IT Security
Lessons to Learn
Elena Vodopyan
Content marketing manager and a member of
the Cyber Chief editorial team
14
The year 2020 reshaped business processes that were not prepared to shift to a secure online
and accelerated changes in the way we work, environment. The speed of the transition, coupled
communicate and live. The shift to remote with prioritizing productivity over security, made
work put a lot of strain on business processes, cloud security misconfigurations inevitable. “Those
IT departments and security teams, and organizations that were already modernizing to
cybercriminals used panic and chaos to exploit support a flexible workforce were in good shape for
the situation. the shift to remote working — but from our recent
survey, 50% of organizations still aren’t ready to
Here, we analyze the experiences of the past support and secure the flexible workforce,” says
year and explore the most important challenges Todd Gifford, CTO at Optimising IT.
we should be prepared for in 2021, as well as
share some comments from IT security pros.
hybrid workforce
will continue; insider 60% of organizations found new security gaps as
a result of the transition to remote work.
away
In 2021, businesses will continue learn how to
In 2020, the corporate perimeter went from fluid navigate hybrid work scenarios and adopt more
to non-existent. With the need to quickly meet the technologies to enable workforce connections
demands of a newly remote workforce, companies across physical locations. Companies will be
had to transform the way they operate, even normalizing policies to replace the stop-gap
while they had reduced teams, less investments measures that were quickly deployed when they
in security and more cyberattacks. Cloud security had to quickly pivot to work-from-home. Otherwise,
became a new challenge for the many businesses the security gaps caused by the inevitable mistakes
15
during this rapid transition will be exploited, and
we will see new cloud security breaches linked
The “ransomware-
to reduced security standards.
turned-data-breach”
To combat these threats, companies will
have to accelerate their plans for automation
trend will cause
and security. Torsten George, cybersecurity
evangelist at Centrify, expects that even
more problems than
the most sophisticated solutions might not
be effective until they re-learn how to spot
ever
insider threats. “A lot of attention is paid to
insider threat awareness but not always to the In 2021, ransomware should top the list of concerns
remedies. Fortunately, more tools are relying on for every company. While it used to target specific
AI technology to address this challenge, such as industries, now it is everywhere, targeting big and
data loss prevention (DLP) and user and entity small companies alike. BitDefender’s Mid-Year
behavior analytics (UEBA). However, these tools Threat Landscape Report (2020) revealed a 715%
have to establish a behavioral baseline first, increase in ransomware attack frequency in 2020.
because those baselines basically need to be With ransomware variants continuing to evolve
redone to make those tools effective again.” into more sophisticated threats, organizations
will need a data protection strategy to outsmart
“2021 will be a time to take stock and them. “2021 will be our most challenging year yet
retrospectively apply due diligence to all cloud in combating ransomware in the enterprise. The
applications and services brought online to attacks don't just attempt to execute a lockout or
support remote working in 2020. This means encrypt data anymore, but are increasingly aimed
ensuring that security controls meet at least pre- at extracting or stealing data from organizations.
COVID standards — with visibility, detection and While some cybercriminals may sell the data on
response capabilities across cloud services, the dark web, others may threaten to leak the data
applications and infrastructure — across both for a higher payout on the ransom. We predict that
current and 'old normal' cloud applications this will become hackers’ ransomware end game
and services,” says Sam Humphries, security — though the risk of detection rises along with
strategist, Exabeam. the potential payday,” commented Flint Brenton,
CEO of Centrify.
16
ability to recover is just as critical as all the protection
walls companies are building. Companies need to
The average ransom amount is close to 1
invest in recovery solutions that are very fast and
million USD.
affordable, as this will save money in the long run
Kroll, A Deep Dive Into the Latest Maze as opposed to paying a ransom. Paying ransom
Ransomware TTPs makes you a target, but being able to recover and
avoid downtime following an attack makes you
wasted effort for those who want to profit from
harming companies. After all, ransom doesn’t
Every fourth organization suffered a work if the target doesn’t have to pay it.”
ransomware or other malware attack in the
early months of 2020.
17
businesses are already getting more privacy- “we may see a lot of forward-thinking MSPs
confident by adopting visible accountability for investing in education and attracting talent to
privacy. With a “privacy by design’ approach, it close their cybersecurity skills gap and leverage
might be easier to succeed in 2021. that legislation as a competitive differentiator in
the market.”
Phil Strazzulla, CEO & Founder of Select Software
Reviews, expects that the amount of data getting
passed around will shrink down to a minimum. “It's
one thing to pass around packets of PII when it's
all on your secure corporate network, but as that
network becomes less physical and more virtual,
that data becomes a liability.”
18
RESEARCH
Learn More
19
Extra Security
21
All four elements seem to be good reasons to in professional communities or conferences.
invest. But where does each of these fit in the
conversation, and how do you put it all together? In general, it is true that regulations attempt to set
Let’s look at each element in turn. minimum guidelines for securing certain types
of data or activities. However, no regulation can
give you a universal guidebook for securing your
Operational cost savings specific business against the current threats at a
particular moment in time.
Cost savings is one of the most obvious measures
of ROI, especially when the CIO or head of IT is
Compliance can be an effective way to start
also responsible for security. If a project enables
an ROI conversation and get attention in a less
you to reduce storage space, consolidate
mature organization where the executive team
licenses, or reduce time and effort through
is less aware of the real risks. However, it is
automation, you can calculate the returns with
potentially thin ice: You should never give in to
reasonable certainty.
a false sense of security based on ticking all the
boxes of any compliance checklist.
The caveat here is to understand this should
never be the only reason for the investment.
Another pitfall you want to avoid is creating the
The main goal of IT security is to manage risk,
perception that IT security team is a “necessary
and you’re doing yourself a disservice with any
evil” that executives will tolerate and even fund,
project that does not start there. However, cost
but would happily get rid of if they could.
savings works great as an additional reason
to invest in something that reduces a risk the
I am definitely not arguing you should not bring
company cares about.
up compliance in a budgeting conversation. On
the contrary, you should be aware of the current
and anticipated regulatory requirements for
Compliance
your industry and jurisdiction. However, similar
Organizations know they must comply with to operational cost reduction, I think it would
relevant regulations simply to continue staying be a mistake to over-rely on compliance as the
in business. Many IT security teams leverage this primary way to justify a security investment.
and position new security initiatives as a must for
compliance. It’s not uncommon to hear a tip like
“use compliance to fund your security initiatives”
22
Risk reduction You will have to rely on expert opinion to estimate
the cost or risk and the level of reduction.
The primary goal of any IT security organization
However, this does not mean you need to just
is risk management and mitigation. But
guess. There is a two-way approach to avoiding
understanding risks can be complicated: Is a newly
guesses:
discovered vulnerability a risk for your particular
company? Should you pay attention to the news
▪ Learn from inside. Learn from your business
about state-backed APT groups like Lazarus?
risk management process, and try to be
consistent with it. You’ll need to establish
The key is to match IT security risk management
a connection with the C-suite in order to
to the overall business risk management in your
do this, and you’ll need their input on the
organization. Defense or financial organizations
estimated losses.
usually have a mature and established risk
management strategy, sometimes with a
▪ Learn from the outside. See if there is a
dedicated role of Chief Risk Officer; if your
relevant CISO group or forum you can
organization has someone in that position, that’s
join to learn from the experience of other
who you want to learn from. But every organization
companies. Another good source is industry
is constantly making decisions about risk. Often,
research, such as the "Cost of Data Breach
this responsibility falls to the CFO and the CEO. I
Report" by the Ponemon Institute, sponsored
believe you should seek their advice to build an
by IBM.
aligned and consistent risk management strategy
for the organization. Failing to do so creates
Don’t overcomplicate this — agree on an
additional work and can leave the organization
approach and use it consistently. After a few
exposed to real threats that IT overlooked due to
quarters, you will be able to see (and prove)
lack of business involvement.
trends and be able to adjust if needed.
23
As with other aspects of ROI, communication
approach. Use the tools and data available
is crucial here. You have to build connections
to you.
and stay in touch with the executive team and
business unit leaders. That way, you will have
▪ Learn to speak the business language.
a chance to make security a part of each new
Security is not (only) a technical issue. There’s
project discussion — and an inseparable part
a lot you can learn from the CFO or CRO and
of the implementation plan — from the very
the CEO, and you can use these conversations
beginning.
to help them learn more as well. Building a
comprehensive risk management program
Since you’re not the owner of a new business
that encompasses financial, reputational and
project, you cannot estimate the size of the
security risks will help your business become
returns on the opportunity overall. However, you
stronger on all fronts.
don’t have to. I recommend referring to these
new initiatives in your ROI conversations, but
▪ Keep communication lines open with
without trying to provide specific numbers.
leaders across the business. Security
investment can (and often should) be part of
new projects and new opportunities. Help
business leaders see security not as a cost
24
REPORT
Complimentary Access
25
Extra Security
Goals
What is a
Cybersecurity
A cybersecurity assessment aims to close
vulnerability gaps and remediate weaknesses,
Assessment?
prioritizing issues with the highest potential for
bottom-line impact.
27
strategies are integrated into all company STEP 1.
operations. To make that happen, you need buy-
Define Your Existing Security Posture
in from decision-makers.
Your security posture is the overall strength of
To achieve these goals, a cybersecurity your cybersecurity framework. It incorporates
assessment needs to include the following hardware, software and where the two interact,
information: as well as the policies and processes that move
data along your network. This includes:
▪ The nature and value of the company’s cyber
assets
▪ Taking inventory of the protections built into
▪ The origin of potential threats
your tech stack
▪ The vulnerabilities that could allow cyber
▪ Documenting the procedures you use to
threats to materialize
mitigate risk
▪ The likelihood of harm
▪ The risk or possible impact on operations If you don’t have formal protocols in place, you’ll
and assets need to document that fact.
▪ Level of compliance with privacy and security
regulations
STEP 2.
What Are the Steps one cybersecurity regulation, but not every
business knows which controls apply to them.
28
STEP 3.
Types of
Assess the Maturity of Existing
Security Controls Cybersecurity
This is the meat of your cybersecurity
assessment. It determines how well developed
Assessment
your security strategy is, based on your
company’s goals and industry norms. How you approach your security assessment will
depend on what information is most important.
You’ll start by defining your risk profile and
setting acceptable risk targets. Next, you’ll
evaluate your security maturity against those Assessment of Cyber Infrastructure
targets, measuring any gap between controls Effectiveness
and risks. You want to look at this information not
This type of assessment involves a complete
just in isolation, but against industry standards
inventory of your organization’s security
and required compliance standards.
controls and an evaluation of how well they
work. One effective technique is penetration
testing, in which specially trained cybersecurity
STEP 4.
professionals document their attempts to breach
Develop a Risk Mitigation Roadmap defenses. This can be performed internally or
ordered from a service provider.
This is where you develop a strategy to close
the gaps between your security posture
An effectiveness assessment also assesses the
and your risk targets. Your strategy needs to
resilience of your security posture: how quickly
prioritize action steps and the proper allocation
your security ecosystem could respond to and
of resources. To do that, consider the value and
recover from an attack.
cost of each asset. The prioritized plan will be
what you report to decision-makers, framing
recommendations against organizational Assessment of Operational
priorities. Resilience
Operational resilience measures an
organization’s ability to do two things:
29
▪ Prevent disruptions from happening ▪ Whether your company has a strategy for
▪ Quickly respond to and recover from a external dependencies
disruption in business processes ▪ How the company identifies and manages
risks related to each dependency
To test your operational resilience, you need to
▪ What relationship management systems
evaluate how well your company:
are in place to stay informed about risks
▪ Whether a plan is in place to maintain
• Adapts its management approach and
continuity if a threat materializes
strategy based on prior threats
• Prepares for potential threats and monitors
This is a complex and multifaceted process. It
critical functions of at-risk systems
will involve stakeholders from all departments
• Withstands cyber assaults while maintaining
that have external dependencies.
normal operations
• Recovers operations and restores tech
infrastructures after an assault
30
Extra Security
The Importance of
Data Classification
for Data Loss
Prevention
Mike Tierney
VP of Customer Success,
Security and Compliance Expert
31
What is data loss
Data loss prevention (DLP) tools and processes
help ensure that critical data is not accessed by
prevention (DLP)?
or tampered with by unauthorized users. The
underlying technology that can make or break
your success in data loss prevention is data
classification. Data loss prevention involves protecting
sensitive and critical information against
This article explains how data classification inappropriate access or tampering. Data loss
affects the success of your data loss prevention prevention tools and processes can reduce
measures. data leakage, data loss, data exfiltration, and
other risks to critical data.
33
DLP and Netwrix The success of any DLP strategy depends upon
34
Extra Security
Extra Security
How to
Calculate
Return on
Security
Investment
Matt Middleton-Leal
Cybersecurity expert, CISSP
Ilia Sotnikov
35
During my 20+ year career in IT, I have been
or how a particular investment has performed
involved in projects from many different angles.
to date.
I have been an end user and a consultant; I have
managed technology and I have sold it. But
The simplest way to calculate ROI is to quantify
throughout it all, there has been one constant
some kind of “return” or “benefit” and divide it
challenge: How to assess the return on
by the “investment” or “cost”:
investment for a technology you either provide
or consume.
Classic return on
provides immediate payback; rather, security
investments are about risk management that
investment
results in loss prevention and risk mitigation.
Thus, a ROSI calculation should indicate how
much loss the organization could avoid due to
Return on investment (ROI) is a profitability ratio the security investment, so we need a different
for a specific investment. It helps you determine formula.
whether you should make a purchase or skip it,
36
Choosing the right
formulas, it is based on your assessment of the
specific risks that a given security investment
▪ Easy to gather on a regular basis. If it Quantitative risk analysis formula for calculating ROSI
Calculating ROSI —
(ARO):
The SANS Institute offers a quantitative risk Here are the two components of the ALE
analysis formula for estimating ROSI that has formula:
been widely adopted. Unlike simple ROI
37
▪ Single loss expectancy (SLE) is the amount way will enable you to comparing the relative
of money that will be lost in a single security value of different security investments.
incident. To estimate SLE, you need to
inventory your data and other IT assets
and add up the direct costs (e.g., technical Example
investigations and legal penalties) and
Let’s estimate the ALE and mitigation ratio for a
indirect costs (e.g., business downtime and
fictional scenario and use them to calculate the
increased customer churn rate) of damage
ROSI for a proposed security investment.
to or loss of those assets.
Suppose you know that your file servers have
▪ Annualized rate of occurrence (ARO) is
shared folders containing files with sensitive
the estimated frequency or expectancy
information that are accessible by everyone
of a threat striking within a year. This is a
in your company. You know that this data
straightforward number and you can glean
overexposure increases the risk of data
from historical records. For instance, if a
compromise and loss, but you don’t know the
certain threat has struck your organization
exact number or location of the folders. To
only once in the last 10 years, it has an ARO
reduce this risk, your company is considering
of 0.1; if a threat occurs about 10 times each
investing in a solution for discovering sensitive
year, it has an ARO of 10.
data. To determine whether this investment is
justified, you need to do the math.
Mitigation ratio You predict that if you don’t have the solution,
you’ll have an average of 10 security incidents
The mitigation ratio is the percentage of risks
per year (ARO = 10). Each incident could lead to
that the security investment would address.
a breach costing around $40,000 in data loss,
According to Sonnenreich, Albanese and Stout fines, lost productivity and lost business (SLE =
— some of the first researchers to tackle the 40,000). Therefore, the ALE is 400,000.
problem of quantifying the value of security
The proposed data discovery solution is
controls — it’s ok if your risk mitigation ratio is
expected to mitigate this risk by 94% (mitigation
approximate. The best approach is to assess the
ratio = 94%). The estimated cost of buying and
predicted number of mitigated risks based on a
managing the solution is $60,000.
scoring algorithm you choose yourself. Even if
the data for the ROSI model is inaccurate, using So you can calculate the using the ROSI formula
this algorithm in a repeatable and consistent from above as follows:
38
practices, learn what threats your peers
encounter and how they address them, and
see baselines to orient yourself. I advise
Sample ROSI calculation
starting with research conducted by Gartner.
Using this calculation, you can argue that ▪ Compliance status — If your company
this investment will save the company about is subject to a new compliance standard
$316,000 ($400,000 * 0.94 – $60,000), for a or wants to improve its compliance with
526% payback. an existing one, you should include your
compliance status as a factor when evaluating
You can also use this formula to evaluate the security investments. You can gather this
ROSI of an existing investment. Just be sure data by conducting regular internal audits
to conduct an accurate risk assessment and to check whether your processes align with
understand your company’s risk exposure. the security frameworks mandated by the
standard, checking your grades on recent
audits, and determining what areas you
need to work on.
39
First-Hand Experience
Flagler Bank
Mitigates IT Risks and
Secures Sensitive
Data
Flagler Bank is a locally owned community as well as keep a close eye on everything going
bank headquartered in Palm Beach County, FL, on across the IT infrastructure.
U.S. The company has three full-service branch
offices and provides a full range of banking The IT security solution the bank implemented
services, including personal banking, business fit the bill perfectly. First, it provides valuable
banking, commercial loans and residential insight into the bank’s security posture, including
mortgages. visibility into effective permissions and system
configurations. With this actionable information,
Like any other financial organization, the Flagler the IT department can ensure appropriate
Bank stores a large amount of sensitive and access controls are in place for all files containing
regulated financial data, such as customers’ sensitive data and ensure all systems are properly
income verifications, Social Security numbers configured to reduce IT risk.
and employment history.
Because the bank did not have enough insight In addition, the solution delivers real-time alerting
into its IT vulnerabilities, this customer data was on critical changes, including modifications
at unnecessary risk. Moreover, the IT department to configurations, security settings and critical
was just one person, IT Officer William Cintron, content. This prompt threat detection enables
so manually monitoring activity enterprise-wide the bank to action before suspicious activity
was simply not possible. As a result, critical leads to a security incident. Moreover, the
events that could lead to security incidents or security software has eliminated the need
downtime might be overlooked. for time-consuming and error-prone manual
monitoring of the native system logs, which
makes troubleshooting much faster and easier
Finding the Solution and frees up IT staff time for more strategic
tasks. Mr. Cintron confirms, “I can identify and
How can our organization detect and mitigate IT
mitigate our IT security risks, and I know exactly
risks? How can we ensure the secure storage and
what is going on across the network so I can
proper handling of critical business data? How can
quickly identify a potential problem before it
we improve the efficiency of our IT department?
leads to an incident.”
All these questions led the management team
to one conclusion: They needed an IT security
To read the complete case study, please visit:
solution that would provide the deep visibility
www.netwrix.com/success_story_flagler_bank.html
required to identify and mitigate IT security risks,
41
About Netwrix
Netwrix is a software company that enables information security and governance professionals to
reclaim control over sensitive, regulated and business-critical data, regardless of where it resides.
Over 10,000 organizations worldwide rely on Netwrix solutions to secure sensitive data, realize the
full business value of enterprise content, pass compliance audits with less effort and expense, and
increase the productivity of IT teams and knowledge workers.
Copyright © Netwrix Corporation. All rights reserved. Netwrix is trademark of Netwrix Corporation and/or one or more of its subsidiaries and may be registered in
the U.S. Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are the property of their respective owners.
42