Data Security What is data security? Data security includes the process and associated tools that protect sensitive information assets, be they in transit, at rest or in use (while processing). Core element of Data Security is the CIA (Confidentiality, Integrity, Availability) triad security model, applied to the various phases of the data lifecycle (Create, Store, Use, Share, Archive, Destroy) Data Security encompasses very diverse use cases from classic networks based on perimeter security, to cloud-based environments and IOT. Since there no single-pane-of-glass solution for data security this creates the challenge of orchestrating policies and controls across all tools and consoles for data security, IAM, etc. Why it matters Knowing your data (data mapping, discovery & classification, etc) is the first step to prioritise investments and security controls. Adaptive controls that evolve based on the data lifecycle are key to make all the other parts of your cybersecurity strategy more effective (IAM, cloud security, etc.). When all security barriers have been breached, Data security. Blue ball Green ball Yellow ball Red ball Purple ball Diagonal straight lines curves outlines X-labels-Years 0-2 Years 2-5 Years 5+ Years Y-labels-Areas Data security © Eviden SAS 2024. All rights reserved. Maturity 0-2 years 2-5 years 5+ years 0-2 years 2-5 years 5+ years The landscape You cannot protect what you cannot see Rising changes to identify, discover and track data across the new decentralized and distributed digital environments. Yet, to properly protect sensitive data, organizations will need to adopt emerging technologies that improve discovery and classification of structured and unstructured data. The increased use of public and hybrid Cloud has a significant impact on data security Technologies like CASB, DLP and EDRM can and provide a good control on unstructured data, particularly in a cloud environment and for personal data protection. Adapt to the regulatory landscape Data security and privacy laws, such as GDPR in the EU, continue to impact choices in technologies to implement those legislations. In particular, Privacy by Design is now a must for all new implementations, both for structured and unstructured data. Anticipation Over the long term, it is vital to align data security (and encryption methods in particular) with upcoming technological trends like the rise of quantum technologies, with both the new capabilities (e.g. QKD) and challenges they present (need for quantum safe-encryption). Key figures 48% of those technologies are either already adopted by most organizations or will be in the next two years. 33% of those technologies are expected to be adopted in the next 2 to 5 years cycle. 18% of those technologies are transformational and wide spread adoption will take over 5 years. Explore the top 8 cyber domains’ tech trends Advanced Detection & Response Cyber Incident Response Identity & Access Management Endpoint & Mobile Security Network Security Application Security Cloud Security Data Security