6 Steps to Secure Big Data

Implementing a Data Security Lifecycle Process

By , April 18, 2012.
6 Steps to Secure Big Data

Securing the massive amounts of data swamping organizations, a trend known as big data, can be addressed, in part, by organizations simply getting rid of data no longer needed, Grant Thornton's Danny Miller says.

"If you do not need that information, you need to destroy it because it represents a risk to the organizations everyday that you keep it." says Miller, principal and national practice leader for cybersecurity and privacy at the business and financial services advisory company.

Destroying unneeded data is one of the six components of a data security lifecycle that also includes creating, storing, using, sharing and archiving data.

In an interview with Information Security Media Group, Miller says organizations should:

  • Classify data so they know what to protect. "We're not talking about a very sophisticated or complicated classification schema," he says. "I'm really talking about just a few buckets of, if you will, or categories of data."
  • Understand that not all data are created equal. "E-mails between two colleagues shouldn't be secured same way as financial reports," Miller says.
  • Divvy the responsibilities to manage the lifecycle among technical, security and business organizations. "It's not a difficult thing to educate business data owners ... how to do this," he says.

Miller joined Grant Thornton in 2004, and has served as principal and national practice leader for cybersecurity and privacy for nearly 4½ years. Before joining Grant Thornton, Miller was at partner at a consulting firm where he was responsible for all client delivery operations, quality assurance and information technology.

Follow Eric Chabrow on Twitter: @GovInfoSecurity

  • Print
  • Tweet Like LinkedIn share
Get permission to license our content for reuse in a myriad of ways.
ARTICLE Cybersecurity: Whose Job Is It?

Most organizations are still doing poor jobs of adequately communicating threat information, even...

Latest Tweets and Mentions

ARTICLE Cybersecurity: Whose Job Is It?

Most organizations are still doing poor jobs of adequately communicating threat information, even...

The ISMG Network