|Get bottom line benefits
Because of the huge volumes of data to be collected and analyzed, automated technologies can simplify and speed up compliance management. Many organizations choose Security Information Event Management (SIEM) technologies over simpler log management, because they can store data and automate both the collection of log files and the remediation of non‐compliant activity. Some SIEM systems even do it all in real-time, with the potential to minimize both damage and cost.
Because of the sensitivity of information held by many industries, compliance processes have become both mandatory and enforced, yet in the first half of 2011, we saw Anonymous and its offshoots break into organizations almost at will (Data Breach Spring; Info Security 30 June 2011). The hackers’ intention was to show how few organizations secure their sensitive data adequately, and clearly, the point was proven. In most cases, a pro-active compliance program combined with effective and closely-monitored SIEM systems could have prevented these companies becoming easy victims.
Verizon Business’s 2011 Data Breach Investigations Report also found that two out of three breaches were discovered by third parties. At the very least this is embarrassing. To avoid such a breach, a compliance system must be able to identify and manage your exposure, and demonstrate good governance to your stakeholders. Pro-active compliance can do more: it can prevent harm, penalties and adverse publicity for your organization. It can also improve the bottom line, and protect your company’s value by:
• Monitoring access and use of valuable information assets;
• Assuring that your personal data is managed as required by law; and
• Securing IP or other sensitive information from prying eyes;
While at the same time:
• Improving the availability, integrity and confidentiality of your IT systems;
• Enabling process and policy improvements, for better IT asset utilization;
• Improving governance and risk management activities; leading to
• Improved transparency, credit rating, cost of funds and insurance premiums.
If you have effective compliance processes in place, you could answer these five vital questions when a enterprise security event occurred: (i) who is accessing your data or systems, (ii) what are they doing with the information, (iii) where are they taking it, (iv)when did the activity or breach occur, and (v) how can it be remediated.