Chuck Brooks

GET YOURSELF READY

for the DIGITAL ERA

… 5th INDUSTRIAL REVOLUTION


What are Black Swans?


Challenges to Cybersecurity ecosystem in 2020

NAMED BY THOMSON REUTERS “TOP 50 SOCIAL INFLUENCER IN RISK, COMPLIANCE”


NAMED BY IFSEC  #2 GLOBAL CYBERSECURITY INFLUENCER.


TWO-TIME PRESIDENTIAL APPOINTEE.


CORPORATE EXECUTIVE ROLES; GENERAL DYNAMICS, XEROX, SRA, RAPISCAN.


THOUGHT LEADER, INFLUENCER, BRAND AMBASSADOR.


59k LINKEDIN FOLLOWERS, 12k TWITTER, 5k FACEBOOK.


LEADERSHIP IN GOVERNMENT RELATIONS, MARKETING, BUSINESS DEVELOPMENT, AND STRATEGY

CHUCK  BROOKS 

“Real-world AI threats in cybersecurity aren’t science fiction”

Named “Top Tech Person To Follow” by LinkedIn – Technology and Cybersecurity Evangelist – FORBES Contributor – Georgetown University Adjunct Faculty – Corporate Executive, Brand Ambassador, Thought Leader, Influencer

Image result for 5th industrial revolution

2020 Cybersecurity,

Emerging Tech,

Risk Management;

Writings & Media

Chuck BrooksChuck Brooks
Starting off the new year with some blogs, articles for IBM, AT&T, Forbes, and two Webinars for The Cybersecurity Collaborative (where I am serving as their new Brand Ambassador).

Also Serving as Executive Cybersecurity Advisor to PCi Tec.

Also very honored to be selected as a top 50 Global Marketer by my peers, and as one of the Top Cyber Risk Global Communicators by the European Risk Policy Institute.

No alt text provided for this imageA passport to data-centric protection and privacy

By Chuck Brooks | January 8, 2020

https://www.ibm.com/blogs/systems/a-passport-to-data-centric-protection-and-privacy/

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog.

The opinions in these posts are their own, and do not necessarily reflect the views of IBM.

Author Chuck Brooks discussed the emerging data privacy and protection landscape with IBM Z Security Offering Manager Jessica Doherty and Senior Technical Staff Member Anthony Sofia. Over the next two blog posts, we’ll learn what he discovered and what IBM is doing to tackle these new challenges.

Since the global economy increasingly runs on the fuel of data, data security and privacy have become essential priorities for any business wanting to thrive in the marketplace. For a business to be successful, it must be able to keep data private and protected in all forms — no matter where it resides.

Protecting data is a significant challenge. Businesses are facing growing risks in data loss — both in cost and numbers. Breaches are common and the costs associated with them are going up too. The 2019 IBM sponsored Ponemon Cost of a Data Breach Report estimates that the average total cost of a breach is now $3.92 million.[1] More alarming is that 59 percent of companies[2] experienced a data breach caused by a third party and that, according to an IBM-sponsored study by Solitaire Interglobal Ltd., 78 percent of customers surveyed would not automatically return to a business after a data breach.[3]

The new paradigm of data-centric protection

IBM approaches the challenges of the merging digital landscape by using a framework of data-centric audit and protection (DCAP). In its simplest form, DCAP indicates that once protected data is protected regardless of location: whether on- or off-premises, in flight or at rest, as an unauthorized copy or on a memory stick.

The core of IBM’s DCAP approach is evidenced in its new platform, the IBM z15™.

The IBM z15 is data-centric in the design of its architecture. The platform has demonstrated a massive improvement in crypto acceleration. A key factor in performance is its ability to compress data. The IBM z15 can compress data with zlib 42x faster with Integrated Accelerator for zEDC compared to using software compression on its predecessor the IBM z14™.[4] The combination of enhanced encryption and compression capabilities is a real game-changer.

Encryption everywhere and cloud native development

The security of data on the IBM z15 platform is characterized by two key aspects: 1) encrypting data everywhere, which enables clients to provision and revoke access to data at any time, across a hybrid multicloud environment; and 2) cloud-native development designed so that developers can more easily modernize apps in place, build new cloud-native apps and integrate important workloads across the secured hybrid cloud.

For me, encrypting everywhere is a dynamic change for addressing breaches transparently and directly. Encrypting data everywhere protects the users from compromised file records, and it gives additional protection to the point of data in use. The IBM z15 encryption enables you to encrypt 100 percent of data at the database, data set and disk level, with no changes to applications. That includes a zero-trust model of comprehensive multiple layers of encryption — from disk and tape up through applications.

Cloud native development is also a critical function to improve cybersecurity functions. The combination of encryption everywhere and cloud-native development allows for operations in a transparent and optimized environment designed to provide security that is data-centric rather than point to point.

Read more about encryption everywhere and cloud native development with z15 here, and stay tuned for part 2 of this blog, which will go deeper into IBM’s data privacy solutions.

You can also watch an on-demand webinar to see how the unparalleled data protection of IBM z15 helps you meet consumer privacy demands and protect against data breach damage while reducing data protection cost and complexity.

[1] “Cost of a Data Breach Report 2019.” IBM and Ponemon Institute, 2019. 

[2] “2018 Data Risk in the Third-Party Ecosystem: Third Annual Study.” Ponemon Institute, 2018. Written permission to use stat received 9 September 2019.

[3]  Solitaire Interglobal Ltd, “Scaling the Digital Mountain.” An IBM-sponsored study.

[4] Claim: Compress data with zlib on z15 with 4 IFLs up to 42x faster with Integrated Accelerator for zEDC compared to using software compression. Substantiation: Performance results based on IBM internal tests running the minigzip benchmark with compression level -1 from the dfl tcc branchof zlib (downloaded from https://github.com/iii-i/zlib/tree/dfltcc-20190708). Source data files were taken from the Large Corpus (downloaded from http://corpus.canterbury.ac.nz/descriptions). Canterbury.tar contained all files from all corpora. Results may vary. z15 configuration: LPAR with 4 dedicated IFLs, 64 GB memory, 40 GB DASD storage, SLES 12 SP4 (SMT mode).



No alt text provided for this imagePART  2

By Chuck Brooks | January 15, 2020

https://www.ibm.com/blogs/systems/a-passport-to-data-centric-protection-and-privacy-pt-2/

From time to time, we invite industry thought leaders to share their opinions and insights on current technology trends to the IBM Systems IT Infrastructure blog.

The opinions in these posts are their own, and do not necessarily reflect the views of IBM.

Despite the challenges associated with breaches and growing hacker threats I discussed in part 1 of this blog series, businesses do have effective options for protecting their prized data. Recently, I discussed the emerging data privacy and protection landscape with two IBM Z security subject matter experts: IBM Z Security Offering Manager Jessica Doherty and Senior Technical Staff Member Anthony Sofia.

IBM Z data privacy and protection solutions support a hybrid cloud environment by enabling more dynamic policies and faster encryption[1], driving down costs[2], providing transparency for access control (reducing insider and elevated privileges threats). A key function from a security administrator perspective is that enhanced security in the cloud, enabled by IBM solutions such as IBM Data Privacy Passports, currently available in beta, and IBM Cloud Hyper Protect Services, mitigates the risk of hackers getting key access to data. With the large amount of data being created and used each day, the ability to securely store, prioritize, analyze and share (and scale) that data is fundamental to security, operations and commerce.

Two other capabilities on IBM Z enable encrypting everywhere. Organizations today are challenged to encrypt all data in-flight by corporate directive while protecting the integrity and confidentiality of this date. IBM Fibre Channel Endpoint Security, an upcoming IBM Z capability, enables FICON® or FCP Links from the IBM z15 to the IBM DS8900F storage family to be encrypted and protected[3]. This promotes a mechanism for all data flowing within and across data centers is traveling between authenticated entities. It also improves your ability to provide auditable information verifying that customer data is only accessed by IBM Z and IBM DS8900F storage devices.

The second capability is IBM Z Data Privacy for Diagnostics. This is a z/OS capability exclusive to z15 to control access to data shared with business partners and ecosystems. Organizations are looking to protect from the accidental sharing of sensitive data when sending diagnostic information to vendors. IBM Z Data Privacy for Diagnostics helps them accomplish this by using sensitive data-tagging APIs to detect, and redact all tagged data from diagnostic dumps.

Introducing IBM Data Privacy Passports

I was aware of many of the new IBM platform improvements, but what really excited me in my discussion with Jessica and Anthony was their explanation of IBM Data Privacy Passports. Data Privacy Passports, available now in beta, offers another layer of protection and privacy for data based on a sound stack of infrastructure provided by the new IBM z15. To me this addresses a significant gap in both internal and external supply chain security that is a vulnerability of focus and opportunity for many hackers. Data Privacy Passports brings in a new agility for administrators and users to control their own data, including with third party vendors.

DISCOVER DATA PRIVACY PASSPORTS

Businesses and organizations are very concerned with ensuring that data shared with their own networks, that often includes third-party partners, remains protected, accessible, and private. Data Privacy Passports enables transparent, end-to-end, data-level protection. With Data Privacy Passports you can encrypt your data, grant and revoke access to it, and maintain control of it – even as it is in transit and no matter where it is. This allows for different lines of business in an enterprise to share data from different processes. It minimizes complexity and reduces costs[4].

Data Privacy Passports also allows for policy-based views of data where you can start to enforce the kinds of perimeters so data can be shared where it wasn’t before on a need to know. For example, data can be protected at the field level. This is critical for both enterprises and or ensuring transparency and security in any supply chain.

Data security does require a multilevel approach if we are going to effectively reduce the breach epidemic among businesses. The data-centric IBM z15 and Data Privacy Passports offers security solutions to simultaneously address breaches and provide privacy and ease of operations for any business operating in the connected digital landscape. It is these kind of innovative technology solutions and tools that makes me optimistic as we confront cybersecurity challenges coming in the next decade.

Address data privacy and protection requirements with encryption everywhere

Watch Jessica and Anthony in an on-demand webinar: Address data privacy and protection requirements with encryption everywhere. They’ll cover data privacy in greater depth and you’ll discover how Data Privacy Passports helps protect your data wherever it goes, in and out of your data center. You’ll also see how the unparalleled data protection of IBM z15 helps you meet consumer privacy demands and protect against data breach damage while reducing data protection cost and complexity.

[1] “18.4x faster encryption than other solutions.” Source: Solitaire Interglobal Ltd, Pervasive Encryption: A New Paradigm for Protection: https://www.ibm.com/account/reg/us-en/signup?formid=urx-17749

WATCH WEBINAR

[2] A- Source: IBM Competitive Project Office. IBM z15 Data Privacy Passports: Protecting data wherever it goes and generating a projected 300% ROI. URL: https://www.ibm.com/downloads/cas/B36KQKYD B – Pervasive encryption on z/OS can result in approximate savings of 3-5% in administrative and programming labor costs, based on an IT Economics analysis.” Substantiation: “Pervasive Encryption relieves programmers and system administrators from having to selectively implement encryption for their data and programs. Cost benefits ranging from 3- 5% are estimated based on a labor model of headcount derived from IT Economics assessments for client environments. Results may vary by customer.”

[3] Statement of direction in z15 announcement: To be delivered post-GA

[4] Source: IBM Competitive Project Office. IBM z15 Data Privacy Passports: Protecting data wherever it goes and generating a projected 300% ROI. URL: https://www.ibm.com/downloads/cas/B36KQKYD