Enhancing Data Integrity: Strategies for Securing Data in Transit and at Rest
In an era of increasing cyber threats, ensuring data integrity both in transit and at rest is crucial for organizations. Keith Filzen, CTO of Cubic Corporation, shares insights on addressing external and internal threats, the importance of a key management strategy, and the CIA Triangle considering data types. He emphasizes the role of security budget allocation and the necessity of a robust framework for access control based on location and identity. By implementing effective measures, businesses can navigate the complexities of data protection and build a trusted security environment.
Enhancing Data Integrity: Strategies for Securing Data in Transit and at Rest
E N D
Presentation Transcript
Data Integrity – In Transit and at Rest Keith Filzen - CTO
Founded in 1951 in San Diego, Calif. Public since 1959 – NYSE: CUB Employs more than 7,400 people worldwide $1.0+ billion annual revenue (FY 2009) $2.2 billion total backlog (FY End 2009) Business Segments: Defense Transportation Cubic Corporation Who We Are
Global Presence Systems and services providedto more than 50nations/territories
Cyber Competencies Cubic Proprietary
Data Integrity • Which is worse (you don’t know what you don’t know) • External Threats • Internal Threats • Where do you spend you security budget • Hard outer shell • Gooey Inside
Data • What type, how critical is it (CIA Triangle) • IP, Short term, Long Term, … • How much money and resources do you want to apply • Do you have a key management strategy • Need-to-Know • Role based access – Do your administrators have the ability to grant but not access data • Structured and Unstructured • Databases, Files, Audi, Video
Data in the Enterprise • Do you have a key management strategy • What Real Estate do you own, lease, outsource Cloud Backups Ever thought about Key management What about Meta Data HSM Global Name Spaces Are we really just talking Need-to-Know Can I recover it Things can get ridiculous
Integrity - Transit • What real estate do you own • Point to point Ipsec • Harder, easily detected, $$$ • SSL • Universal access • Can I recover it • Who do I trust, and is it different based upon where I am and what events are happening
What We do – Trust Boundary • Common Cross Domain Framework • Provides the front end access in / out • Location and Identity based access • Internal vs. External • Inbound vs. Outbound • Differing security connections based up who, what, when, where • Obscurity • Virtualization separation from the client • XD Cross Domain Products • One-Way Transfer Guards • Fips Connections • Virus, Malware, and content filtering • One-Way proxy for data, application and streaming content • Publishing / Subscribing concept, allowing flow vcontrol on need-to-know information
Keith Filzen, CTO Keith.filzen@cubic.com 703-821-1518