{"id":6112,"date":"2015-07-22T00:00:00","date_gmt":"2015-07-21T22:00:00","guid":{"rendered":"https:\/\/e3magpmp.greatsolution.dev\/?p=6112"},"modified":"2019-08-01T11:42:15","modified_gmt":"2019-08-01T09:42:15","slug":"honest-watch-longest-even-with-data-flow","status":"publish","type":"post","link":"https:\/\/e3magpmp.greatsolution.dev\/en\/honest-watch-longest-even-with-data-flow\/","title":{"rendered":"Honesty is the best policy - even with data outflows!"},"content":{"rendered":"<p>The outflow of data streams is, of course, not a purely IT problem. But CIOs, because of their position in the company, have the opportunity to ensure that dealing with it honestly is the only possible course of action.<\/p>\n<p>The survey referred to was conducted this year at the RSA conference in the USA. Some conclusions are even more surprising; after all, a large proportion of the more than 1,000 respondents work for US companies.<\/p><div class=\"great-fullsize-content-es\" style=\"margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-626876395\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/es\/kit-de-medios\/\" target=\"_blank\" aria-label=\"nl_werbung_800x100_es\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100_es-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-en\" id=\"great-254393042\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/media-kit\/\" target=\"_blank\" aria-label=\"nl_advertising_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100.jpg 800w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2024\/08\/nl_werbung_800x100-600x75.jpg 600w\" sizes=\"(max-width: 800px) 100vw, 800px\" width=\"1000\" height=\"100\"   \/><\/a><\/div><div class=\"great-fullsize-content-de\" style=\"margin-bottom: 20px;margin-left: auto;margin-right: auto;text-align: center;\" id=\"great-892951495\"><a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/steampunk-summit-2025\/\" target=\"_blank\" aria-label=\"steampunk_2024_1_800x100\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg\" alt=\"\"  srcset=\"https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-scaled.jpg 1920w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-400x50.jpg 400w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1200x150.jpg 1200w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-768x96.jpg 768w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-100x13.jpg 100w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-480x60.jpg 480w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-640x80.jpg 640w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-720x90.jpg 720w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-960x120.jpg 960w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1168x146.jpg 1168w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1440x180.jpg 1440w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-1536x192.jpg 1536w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-18x2.jpg 18w, https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2023\/12\/steampunk_2024_1_800x100-600x75.jpg 600w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" width=\"2560\" height=\"320\"   \/><\/a><\/div>\n<p>In contrast to many countries in Asia and Europe, a reporting obligation in the USA is very strict. This means that covering up data leaks is simply illegal!<\/p>\n<p>Nevertheless, many companies prefer to keep quiet about a data leak: The damage caused by compliance penalties, cleanup costs or negative press is enormous! Customers or investors could also jump ship - not to mention the share price.<\/p>\n<h3>Risky business<\/h3>\n<p>If cybercriminals want to compromise your organization, you must assume that they will succeed! As a CIO or security manager, you should at least foster a culture of openness.<\/p>\n<p>The reporting of security incidents or even \"just\" suspicions should be welcomed and not be negative. Only then is there any chance of discovering possible incidents at an early stage.<\/p>\n<p>This requires a certain framework. The first step is a comprehensive risk analysis. Only then can you sit down with the management.<\/p>\n<p>This is primarily a matter of deciding what risk it is willing to bear. Every organization has different ideas here. Those that are willing to bear a higher risk will invest less in information security than the other way around.<\/p>\n<p>Once this decision has been made, the next step is to invest the corresponding budget in tools for risk management and mitigation. In this way, the IT department has created good conditions to \"watch its back\".<\/p>\n<p>After all, there should now be no reason to conceal data outflows. If this does happen, it is often due to uncertainties, a lack of structures, or the absence of a risk-based decision-making basis.<\/p>\n<p>Unfortunately, very few explicitly train their employees on the desired code of conduct. In large organizations, it's often learning-by-doing. In small and medium-sized ones, even this is hardly the case. As a result, incidents sometimes \"peter out\" in the IT department.<\/p>\n<h3>Code of conduct as a blind spot?<\/h3>\n<p>It is therefore all the more important to explicitly define a code of conduct. This should also contain very clear rules on reporting incidents and suspicious circumstances, but also on how to deal with them.<\/p>\n<p>Of course, this means a certain amount of effort. However, it makes more sense to put in the effort beforehand. In an emergency, everyone then knows how to act - and the probability that everything will go smoothly is significantly higher than with panicky ad hoc decisions in the heat of the moment.<\/p>\n<p>It also allows each incident to be seen as an opportunity for improvement rather than a failure. It is an opportunity to learn and to sit down with management again with the lessons learned.<\/p>\n<p>Be it to sharpen or strengthen their own profile - or (hopefully) to discuss an increase in the budget. And as if that weren't incentive enough, there's also the European Union's General Data Protection Regulation. When this comes into force shortly, we will have similarly stringent requirements and reporting obligations as in the USA, including very severe penalties for violations.<\/p>\n<p>So this should be another good reason to prepare and introduce a risk-based approach in the company. Because with this legal background, honest really does last longest - and is the best way to improve security.<\/p>","protected":false},"excerpt":{"rendered":"<p>Does honest really last longest? As a child, this question was still easy to answer, but even as a teenager, some people sometimes resorted to white lies. Even at work, the definition of \"right\" can fluctuate: According to a study, one in five IT security managers has already experienced situations in which the companies affected by data leaks covered up the incident.<\/p>","protected":false},"author":38,"featured_media":14340,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"rank_math_lock_modified_date":false,"footnotes":""},"categories":[21,7,1553],"tags":[8477],"coauthors":[19920],"class_list":["post-6112","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-meinung","category-1553","tag-cyberkriminelle"],"featured_image_urls_v2":{"full":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"thumbnail":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-150x150.jpg",150,150,true],"medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",400,155,false],"medium_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-768x297.jpg",768,297,true],"large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"image-100":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-100x39.jpg",100,39,true],"image-480":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-480x186.jpg",480,186,true],"image-640":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-640x248.jpg",640,248,true],"image-720":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-720x279.jpg",720,279,true],"image-960":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-960x372.jpg",960,372,true],"image-1168":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"image-1440":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"image-1920":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"1536x1536":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"2048x2048":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"trp-custom-language-flag":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",18,7,false],"bricks_large_16x9":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"bricks_large":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"bricks_large_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",1000,387,false],"bricks_medium":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",600,232,false],"bricks_medium_square":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015.jpg",600,232,false],"profile_24":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3magpmp.greatsolution.dev\/wp-content\/uploads\/2015\/12\/2015-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>W\u00e4hrt ehrlich wirklich am l\u00e4ngsten? Als Kind war diese Frage noch einfach zu beantworten, aber schon als Jugendlicher griff mancher auch mal zur Notl\u00fcge. Auch im Beruf kann die Definition von \u201erichtig\u201c schwanken: Jeder f\u00fcnfte IT-Sicherheitsverantwortliche hat laut einer Studie schon Situationen erlebt, in denen die von Datenabfl\u00fcssen betroffenen Firmen den Vorfall vertuscht haben.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/opinion\/it-security\/\" rel=\"category tag\">IT-Security Kolumne<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3magpmp.greatsolution.dev\/en\/category\/1507-1509\/\" rel=\"category tag\">MAG 15-07<\/a>","author_info_v2":{"name":"E-3 Magazin","url":"https:\/\/e3magpmp.greatsolution.dev\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","acf":[],"_links":{"self":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/6112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/comments?post=6112"}],"version-history":[{"count":0,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/posts\/6112\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/media\/14340"}],"wp:attachment":[{"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/media?parent=6112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/categories?post=6112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/tags?post=6112"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3magpmp.greatsolution.dev\/en\/wp-json\/wp\/v2\/coauthors?post=6112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}