Advertisment

CIA is just not enough!

According to Gartner, the CIA model is still relevant and applicable in cybersecurity, but it isn't enough

author-image
Sonal Desai
New Update
ID

MUMBAI, INDIA: The traditional model ascribed for decades to IT security has been one of confidentiality, integrity and availability (CIA).

Advertisment

Most organizations in 2015 have not shown a consistent ability to substantially mitigate those risks. The CIA model is still relevant and applicable in cybersecurity, but it isn't enough, according to Gartner.

Why?

Changes in computing fabric, devices and services formed by digital business continue to shape risk and security landscapes, according to Gartner.

By year-end 2017, more than 20 percent of enterprises will have digital risk services devoted to protecting business initiatives using devices and services in the Internet of Things (IoT).

Advertisment

Christian Byrnes, Managing Vice President, Gartner, said, "An inflection point in business and technological innovation has occurred, which we refer to as the digital explosion and the race to the edge."

Challenges:

The digital explosion is moving technologies from core architectures to a highly distributed and fit-for-purpose edge.

The digital explosion disrupts the foundations of services for technology and information and elevates traditional IT services, such as cloud computing and advanced analytics, to a mandatory status to support the scale and functional needs of the edge.

Advertisment

Core describes general-purpose technologies and services for computing, such as servers, laptops and mobile platforms, as well as cloud and mobile services. Edge is a term used to describe devices that aren't servers or laptops and perform specific functions in the business and are positioned at the boundary between the business and its customers, partners and providers. The core and the edge are mixtures of traditional IT as well as IT and components of the IoT.

Who should be responsible?

Byrnes said that protecting information and ensuring CIA of that information alone isn't enough.

Leaders in risk and cybersecurity must now assume the responsibility of providing safety for both people and their environments.

Advertisment

The other continuum in the cybersecurity scenario is one of openness. An organization must decide, as part of its evolution in digital business, on the ultimate transparency of its services to its customers. The degree of openness depends on an organization's approach to data accessibility, infrastructure used, culture, process and adaptation to change. Gartner believes that the demands for transparency in the digital business of 2020 will drive more organizations toward openness as a strategy of priorities.

Skill-sets and strategy:

Requirements for large-scale, real-time adaptive protection, safety and privacy at the digital and physical levels will drive new cybersecurity skills, practices and technologies.

The race to the edge requires that organizations consolidate the prioritization of cybersecurity efforts across broader technology areas that require protection and are interdependent. In addition to a more comprehensive approach to digital risk, organizations must prepare for new cybersecurity skill sets in areas such as vendor portfolio management, safety engineering, machine-to-machine (M2M) communications, embedded software, and systems security and cyberphysical systems.

"Cybersecurity professionals are the new guardians of big changes in the organization. Such professionals must practice business resiliency and adaptability, because they are now so integrated with digital business decisions that leaders cannot tell where business ends and cybersecurity begins," said Byrnes.

"The digital explosion and the race to the edge have achieved what previous waves of technology evolution have failed to do—to integrate cybersecurity professionals and business leaders into effective teams for the protection and safety of the organization."

security must-read iot-hub