Where are your crown jewels?

June 2019 Commercial (Industry), Information Security, Security Services & Risk Management

We have all heard of the missing sock theories and conspiracies. We know for a fact that it went into the washing machine, but it has suddenly vanished. It has to be somewhere, but where? Such a minor occurrence can be irritating, so imagine extrapolating that scenario into the business world where no one knows the whereabouts and details of huge amounts of personal data.

Craig Rosewarne
Craig Rosewarne

Consider our humble sock (data) being part of a whole bundle of washing delivered to the laundromat. Once delivery has taken place, who assumes accountability for the whole load? Ultimately it has to be the owner of the business, the data owner. Other workers may take care of different parts (pants, shirts, dry cleaning, etc.) and they take on the roles of data stewards.

Understanding what data they store and analyse is gaining increasing urgency for organisations that are now accountable to new(ish) privacy regulations such as the EU’s General Data Privacy Regulation (GDPR) and our country’s Protection of Personal Information Act (PoPIA). Historically, companies have invested in various technologies to create an inventory of their physical assets (servers, PCs, etc.) but fell behind in the latest methods to find, map and inventory their data assets.

In simple terms, the purpose of the PoPI Act is to ensure that all South African institutions conduct themselves in a responsible manner when collecting, processing, storing and sharing another entity’s personal information by holding them accountable should they abuse or compromise your personal information in any way. The PoPIA legislation basically considers your personal information to be ‘precious goods’ (content granularity) and therefore aims to bestow upon you, as the owner of your personal information, certain rights of protection and the ability to exercise control over ownership, processing, consent, reasons, purpose, access, removal, safeguarding and accuracy (See https://www.workpool.co/featured/popi for more information).

What are the basics needed to set-up a data registry?

Create an inclusive list of what data is kept, where and why. Creating an enormous data warehouse will be simply muddying already muddy waters. Continuously backing up huge amounts of duplicated data will severely hurt your storage capabilities and add to costs. It is far more simplistic, realistic and cost effective to create the registry in an index-like map focusing on five functionality and operational characteristics:

1. Content granularity: As discussed above.

2. Usage context: This requires operational, technical and business knowledge, such as who can access this data, what applications are consuming the data, what third-parties have access to the data, what is the purpose for collecting this data and does the organisation have adequate consent to collect and process the data.

3. Data source coverage: Organisations need to create a process that covers both unstructured file shares and structured databases, big data, cloud, NoSQL, logs, mail, messaging, applications and more.

4. Ability to scale: Organisations gather and analyse tens, if not hundreds of petabytes of data. A petabyte of data is the equivalent of one million gigabytes. With increasing pressure to extract more value from data, this number is only increasing. A modern data registry not only needs to deliver an efficient index of data along with associated usage, but it must do so in a way that is scalable for a global enterprise.

Dynamic not static: Once a data registry is established, it is not the time to rest on your laurels. It must be anticipated that it could be moved or changed on a regular basis. The register should also have the ability to self-update and be compatible to any changes in as near-time as possible to provide a clear accurate picture of what data is kept where, when and who it belongs to. (See more at https://www.helpnetsecurity.com/2019/04/19/modern-data-registry/)

Enhancing the above ‘Data Governance 101’ will entail a further feature on its own. In summary, the crucial question is why this issue has become so vital to running a successful business. In the not too recent past, most companies, firms, practices and individuals had major problems in handling clients’ personal information. Remember filing cabinets groaning and bursting at the seams, personal files tattered and torn, document rooms with a rudimentary filing system that only allowed certain people with certain knowledge access?

Libraries on the other hand were (and still are) models of data governance. An experienced librarian could access the reading matter you needed in minutes thanks to the excellent Dewey Decimal Classification System. A brief no brainer would be the following benefits:

• Data sharing: Many people in a company work on the same project and easily finding a file you need and sharing it will be a load off your shoulders.

• Reusing data: Most documents can be sanitised and reused for many different projects with the minimal insertion of personal information and branding. It also helps eliminate unnecessary exchange of different versions of the same document.

• Analysing data: Management decisions rely on the analysis of data at hand to judge the direction a company is heading in. This is particularly the case in fast growing small businesses who can be caught short if the wrong choices are made.

• Backing up data: Speaks for itself. The damage a crashed hard drive can cause can be mitigated by data governance and simplified backups of data.

For more information contact Wolfpack Information Risk, +27 11 794 7322, info@wolfpackrisk.com, www.wolfpackrisk.com<a?



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
Beagle Watch named best security company in Johannesburg
News & Events Security Services & Risk Management
Beagle Watch Armed Response has been named Johannesburg’s Best Security Company in the 2025 Best of Joburg Awards, surpassing about 26 nominated private security firms in the greater Johannesburg region, thanks to overwhelming public support.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.