Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Are security teams equipped to handle overexposed data?

By Kevin Coppins
security data monitoring
February 2, 2022

Virtually every company with a substantial cloud data environment has some measure of overexposed data. The consequences can range from benign to neutral, annoying or even catastrophic. To make the news, the level and consequences of overexposed data must be spectacular — a word that very few security executives would like to hear used about their operations.

One of the more damaging consequences of overexposed data is a breach that steals, destroys or ransoms sensitive data. A shocking number of breaches start off with cloud storage buckets (e.g. Amazon S3), which for any number of reasons can be full of sensitive data that the information technology (IT) team is unaware of. While there are plenty of solutions for securing sensitive data by location (an individual file server or storage device, for example), that doesn’t account for the tons of sensitive data that is casually shared within an enterprise.

For example, Jessica in Marketing sees an interesting chart in a spreadsheet that her friend, Joe in Accounting, made. He shares the spreadsheet with her, forgetting that the third tab lists the organization’s top 100 customers, complete with their contact and credit card information. Jessica shares it with her team, who then share it a few more times. In such a scenario, that confidential data can travel to many different computers, servers and cloud-based storage locations.

In situations of accidental information sharing, how can IT teams determine whether data is overexposed? 

Trinity of data protection: Identity, access and data 

Understanding the answer to that question can be boiled down to the trinity of data protection: identity, access and data. First, IT and cybersecurity professionals must understand identity. Then, they must understand identity in the context of the access that individuals, groups or roles have to systems and data. And most critically, security teams must understand the data itself—its value, purpose and sensitivity.

data protection trinityImage courtesy of Coppins and Spirion

 

Looking at a bridge with identity on one side and data on the other, access is the conduit between the two. If identity or access are mismanaged, an organization ends up with overexposed data: the proverbial “bridge to nowhere.” Security leaders must also understand the severity, cost and consequences of that exposure. IT teams don't really care if the lunch menu is overexposed, but they must care if customer credit card information or sales forecasts are leaked.

Cybersecurity teams have long focused on access. But in a sense, they have been missing a lot of information that can lead to a reduction in overexposed data. Without good intelligence about the data they are trying to protect, a potentially damaging blind spot may exist that can be exploited.

In the spreadsheet example above, it doesn’t matter if all the accounting spreadsheets are secured in a single location, such as a file server. If that spreadsheet is emailed and then ends up on a server that the whole company has access to, then that customer list is exposed. So, focusing solely on data location is insufficient.

A key piece is missing: data intelligence.

Obviously, not all data is created equal, and different datasets have different value based on the organization, role, authority and other factors. How can identity and access systems distinguish between high- and low-value data? Who defines what high value data and low value data are? 

Understanding the data 

Understanding the value of data is critical for any identity and access system in order to identify, prevent and mitigate overexposed data. Otherwise, identity and access management becomes a container for a giant collection of data without the necessary intelligence to be effective.

To create that intelligence, security teams need to assess the relative value of data at the element, file and location level. At the element level, everybody knows that obtaining personal information like a name, date of birth, address or Social Security number can be useful for a bad actor. Cybersecurity solutions must be engineered to recognize that different data elements can be assembled to create a digital picture that can be damaging, if overexposed.

The second part of that data intelligence is knowing where sensitive elements live — including inside PDFs, as images, in MS Office files, emails, messages and databases — anywhere that data might reside. So, understanding the value of data elements and knowing the file types where they live is part of creating that intelligence.

The third pillar is data location: servers, cloud stores, endpoints, backup drives — anywhere data might be stored. IT teams must assume that there is sensitive data in all those locations until they can prove otherwise. But how do you prove that?

Data teams need a data discovery platform that can search for both common and custom data elements. It must search the places were data lives: within both structured and unstructured file types and across endpoints to the cloud. Having such a data discovery mechanism can help security teams understand an organization’s level of overexposed data risk.

The scope of really understanding sensitive data is somewhat overwhelming because today’s data environments are fluid. Files and data are rabbit-like in their ability to replicate in the cloud. On top of that, cybersecurity professionals have the challenge of associating the data elements back to the individual. This is a dynamic, complex computing problem that must be solved with modern tools such as machine learning and predictive analytics.

It is becoming clear that the scope and scale of the problem has grown beyond individuals peering into dashboards. Data security teams need to be constantly interrogating their data environments to search out sensitive files and data elements wherever they live and either suggest or take action. The security industry is only just starting to apply advanced analytics to the problem, which in the end, will require a combination of tools and techniques that span the enterprise. This is only starting to materialize in SecOps.

Data protection is a journey, not a project or product. Start by defining the value of the types of data in the organization. Understand how that valuable data is created or collected and ensure that the firm has policies and controls in place on how that data can be used and by whom. Then begin the process of discovering, classifying and remediating the organization’s data — location by location.

Starting now will help mitigate the risk of ransomware attacks, data breaches and leaked information reaching the dark web.

KEYWORDS: access management tools cyber security initiatives data analysis data protection enterprise data identity (ID) management information sharing intelligence personal information

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin Coppins is CEO and President of Spirion. A tech industry veteran, Coppins has served in senior executive roles at software and hardware companies both large and small, equipping him with the breadth of skills and experience needed to thrive at Spirion. Prior to serving as CEO at Spirion, Coppins held leadership positions at Novell, Alcatel Lucent, Meru Networks, EasyVista, CyFIR and NEC. His educational background includes a BA in Marketing from Penn State, MBA from Loyola University New Orleans, and a Certificate of Professional Development from The Wharton School of Business.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data-artificial-intelligence-freepik.jpg

    AI pivotal for forensic investigative teams to handle crushing data volumes

    See More
  • SEC0720-5G-Feat-slide1_900px

    Six reasons radios are unable to support today’s security teams

    See More
  • data-security-cloud-freepik1170.jpg

    Transforming data security teams from gatekeepers to enablers

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!