CIO Influence
CIO Influence Interviews Data Management

ITechnology Interview with Juan Asenjo, Director of Product Solutions at Entrust

ITechnology Interview with Juan Asenjo, Director of Product Solutions at Entrust

“Data literacy as the recognition that data is an increasingly important business resource that needs to be protected, not only while in use, but also while in transit and in storage.”

Hi, please tell us about the emerging trends in data integration and data transformation that expose vulnerabilities in enterprise Cloud management frameworks?

Some of the trends we are seeing with regards to data integration and transformation include the use of increasingly distributed multi-cloud systems, applications, and privileged access schemes that require growing numbers of access credentials. These scenarios, paired with continuous integration and continuous delivery approaches to software development and deployment can introduce significant risks and vulnerabilities if not properly managed.

Tell us about the various struggles within organization related to data management and fraud. Why do you think CIOs are lagging behind in meeting business goals linked with data management?

We continue to see organizations struggle to maintain control over their critical data. Not only do they often lack the visibility to accurately know where their critical data lives, but more so know how they are securing the keys that protect their critical data.

Read More: ITechnology Interview with Dominik Pilat, Field CTO at Hivecell

We have acquired different definitions for data literacy. As a data scientist, how do you define data literacy and how does it influence the working hard skills required to handle big data, computing and analytics?

In the context of security, we define data literacy as the recognition that data is an increasingly important business resource that needs to be protected, not only while in use, but also while in transit and in storage. Because the insight and business intelligence derived from data aggregation and analysis is only as good as the quality of the data, ensuring its confidentiality and integrity is paramount. With more and more data collected and aggregated for this purpose, protecting the data becomes more challenging, and that is where cryptography and cryptographic key management comes into play. To protect the confidentiality and integrity of data, organizations use encryption and digital signature mechanisms that depend on an increasing volume of cryptographic keys that that must always be available when needed, and protected from compromise. Lose the keys – lose the data, putting organizations in significant predicaments with consequential regulatory, financial, and reputational impact.

What kind of security management skills should a data driven company hire for in 2022? Despite so much supply of data science professionals in the recent, why is there a serious gap in the way security is handled in Cloud industry?

As data becomes more or a competitive asset for organizations, protecting these assets and ensuring that they are handled accordingly becomes more and more important. For this reason, organizations must ensure that they not only have the right talent to collect, aggregate, and analyse data, but also to protect it throughout its lifecycle, no matter where the data actually lives. All too often organizations erroneously think that outsourcing data storage and analytics capabilities to a cloud service provider absolves them from the responsibility to protect their sensitive data. Under the shared responsibility model for cloud security, cloud service providers are responsible for the infrastructure and the service level agreement, but the client organization ultimately remains responsible for the confidentiality and integrity of the data.

Read More: ITechnology Interview with Jonathan Brassington, EVP and Digital Customer Experience at Capgemini

Your take on the emerging trends in AI Machine Learning influencing Cloud data management and security analytics platforms?

An exciting trend in AI or more appropriately machine learning that can have direct benefit for security is in the area of situational awareness and automation. Letting AI engines overlook patterns over data usage and alerting the human elements when specific profiles are flagged can significantly improve data security posture over multi-cloud and hybrid systems.

Your advice to CIOs and data officers on how to prioritize data planning and integration? Which top tools would you recommend for meeting data integration goals?

Our advice for CIOs is not to forget the fundamentals. Behind every data science project are basic security principles and best practices that should be followed. Always protect you cryptographic keys. Ensure that you deploy least privilege (where every process or individual ought to operate with only those permissions necessary to perform the authorised activities and only for as long as necessary), dual controls so no single individual or entity can subvert your security polices, and always manage your critical keys separate from the applications using them, and in a certified hardware security module (HSM). Storing keys in software is soft security – In a servers file system, cryptographic keys have a very distinctive footprint. Cryptographic keys are substantially more random than most other types of data. So anyone with the knowledge, the tools and the access can scan a network, look for the tell-tale footprint of a cryptographic key and steal them. So in a busy data center, undertaking best practise measures to protect cryptographic keys from  threats such as hackers, malevolent insiders or simple innocent employee mistakes.

And because the importance and value associated with the crypto keys, organisations auditors, want to ensure the company is following the highest possible standards to prevent against the theft of the cryptographic keys and meet compliance mandates such as GDPR and PCI.  To check not just for compliance but also to ensure you are protecting the cryptographic keys as well as encrypting your data. And that is where an HSM fits in.

Read More: ITechnology Interview with Eric Best, CEO and Founder at SoundCommerce

Thank you, Juan! That was fun and we hope to see you back on itechnologyseries.com soon.

[To participate in our interview series, please write to us at sghosh@martechseries.com]

Entrust Logo

Today more than ever, people demand seamless, secure experiences, whether they’re crossing borders, making a purchase, accessing e-government services or logging into corporate networks. Entrust offers an unmatched breadth of digital security and credential issuance solutions at the very heart of all these interactions. With more than 2,500 colleagues, a network of global partners, and customers in over 150 countries, it’s no wonder the world’s most entrusted organizations trust us.

Related posts

Datadobi’s Latest StorageMAP Update Enables IT Leaders to Significantly Reduce Liability and Risk

CIO Influence News Desk

Informatica Announces Joint Strategic Cloud Data Management Partnership with Google Cloud

CIO Influence News Desk

CIO Influence Interview with Devin Ertel, CISO at Menlo Security

Sudipto Ghosh

Leave a Comment