• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology

Enterprise-grade security and privacy strategies

Allan Tan by Allan Tan
August 14, 2019
Photo by Pixabay from Pexels: https://www.pexels.com/photo/black-android-smartphone-on-top-of-white-book-39584/

Photo by Pixabay from Pexels: https://www.pexels.com/photo/black-android-smartphone-on-top-of-white-book-39584/

Cindy Ng is the host of the Inside Out Security podcast. On one blog post, she defined data privacy or information privacy as a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations.

Data security is the application of steps to prevent unauthorized access to information in whatever form it exists.

Perhaps the careless swapping of the two has led to confusion in some quarters of the enterprise.

Different but same

Very different and yet so easily confused for the other, the two – security and privacy – are nonetheless connected.

Rob Hinson, a privacy expert at OneTrust, believed that you can’t have one without the other. He described a situation in which a person stores someone’s else is money at his location – without consent.

Top security issues 2019: privacy vs security

“No matter how secure a person’s money is while stored at someone else’s location, the very fact that someone else is holding on to that money is already wrong. This state is what you’d call privacy! Your data should be protected both in terms of it being kept private and private. What belongs to you should stay with you unless you deem otherwise,” he explained.

This is the challenge that many organisations face today.  

The Deloitte Insights paper, Reimagining customer privacy for the digital age, noted that progress in the evolution of the digital economy has had one unexpected outcome – it has exposed the considerable challenges businesses and regulators must address towards the protection of customer data – both in terms of privacy and security.

Deloitte noted that large financial institutions’ privacy policies, for example, often fail to address the complexities of privacy that have emerged, partly putting the blame of technology.

They also don’t account for different types of privacy concerns beyond the protection of personal financial data—from location to thoughts and feelings, to biometric information.

Myths and bad practices

During a CXOCIETY roundtable discussion on digital transformation, several delegates acknowledged the unexpected rise of security budgets alongside the digitalization efforts. Still, one executive asked whether enough was being done given the increased incidents in hacking incidents occurring worldwide.

This may well have to do with the success [sort-off] of some security vendors in terms of marketing their security offerings as the be-all and end-all of security needs.

Hinson conceded that some quarters of enterprises, mainly end-users, may actually think that security is sufficiently accorded to them as long as they have an endpoint solution in place.

“In Asia, some view security and cybersecurity strategies as largely being endpoint management and how you need to make sure that all of your systems are encrypted. However, sometimes cybersecurity also has to take into account the individuals who are involved and the possibility for human error and breaches from that aspect,” he cautioned.

Top security issues 2019 bad practice

Hinson does, however, make it clear that at some point a breach or a hack will occur. What is important is that the organisation has taken steps to minimise [or mitigate] the risks.

“It is not necessarily what you did wrong but the number of things you did right. So that when the auditor or regulator does come, you can confidently point out what happened, the steps the organisation took, and are able to prove with confidence that you did everything you could to prevent it,” he concluded.

The right strategy begins with…

top security issues 2019: define strategy

Hinson acknowledges that organisations are spending considerable resources on the protection and privacy of customer data. However, he believes that an effective strategy should begin with the recognition of the “value” of the customer’s data.

He conceded that enterprises, including financial services institutions, are spending millions towards the protection of customer data, and understands the concern raised by some quarters within the organisation with respect to how much it will cost to protect this data.

“To me, it not so much the way it's being secured but looking at it from the value of what's being held and what measures you should take from a security perspective to ensure that the data is not compromised,” he suggested.

Related:  Pros and cons of automating manufacturing process under Industry 4.0
Tags: data privacyDeloitte InsightsGatrnerOneTrustprivacyrisk managementRob HinsonSecurity and risk management
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • APAC CIOs rethink cybersecurity investments amid expanding threat landscape
  • Study finds almost half of businesses bank on AI-enabled cybersecurity for EDR and XDR
  • AI drives cloud market growth in Q1
  • ARTHALAND chooses OutSystems to advance real estate sustainability
  • Experts warn against AI-powered deepfake impersonation scams

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe