Encryption Debate: 8 Things CIOs Should Know - InformationWeek
IoT
IoT
IT Leadership // Security & Risk Strategy
News
1/4/2016
11:06 AM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%
RELATED EVENTS
7 Key Cloud Security Trends Shaping 2017 & Beyond
Dec 15, 2016
Cloud computing is enabling business transformation as organizations accelerate time to market and ...Read More>>

Encryption Debate: 8 Things CIOs Should Know

Governments want access to encrypted communications to prevent terrorist attacks, but IT professionals and tech vendors say any weakening of encryption is a threat to privacy and data security.
Previous
1 of 10
Next

(Image: Electronic Frontier Foundation via Wikimedia Commons)

(Image: Electronic Frontier Foundation via Wikimedia Commons)

Perhaps it's due to the recently televised presidential debates. Or perhaps it's a sign of the times in which we live. Either way, the topic of data encryption is hotter than ever.

On one side we have the pro-encryption camp that insists on maintaining encryption without backdoors or master keys of any kind. Once data is encrypted, only the sender and receiver will know what was sent. On the other side of the debate are those who believe special circumstances dictate when data can and should be decrypted through due process.

There's no doubt that valid points are made on both sides of the issue. Yet, you'll find that the majority of IT security professionals and technology companies are coming out against any method to weaken encryption standards. This obviously includes backdoors and storing encryption keys.

The US government seems to be changing its tune regarding what it is requesting from technology vendors in terms of data decryption capabilities. Until recently, federal law enforcement agencies were demanding complete backdoor access to encrypted applications. This would have given the US government the unfettered ability to decrypt data with little public oversight.

In fall 2015, the US government dropped the "backdoor" verbiage and now is requesting that technology vendors "maintain their ability to comply with state and local judges' warrants" by storing encryption keys for the government. When warrants are served that demand decryption of data on devices such as PCs, smartphones, and tablets, technology vendors would have to comply with these requests.

Many technology companies -- including Apple, Cisco, Google, and Microsoft -- have already made it clear that they don't want to create backdoors. Nor do they want to store encryption keys for the government. Their reason? It significantly decreases the effectiveness of encryption -- a critical component of an IT security posture. Businesses are under pressure to protect customer information, intellectual property, and other sensitive data from getting into the wrong hands. Handicapping encryption weakens their ability to meet that goal.

We break down the encryption debate, as it stands today. By exploring eight key factors influencing the discussion, we aim to reflect the thought processes on both sides of the debate -- and explain why the vast majority of IT professionals and technology vendors oppose altering their encryption protocols at the request of various governments around the world. Once you've reviewed these considerations, tell us what you think in the comments section below.

**Elite 100 2016: DEADLINE EXTENDED TO JAN. 15, 2016** There's still time to be a part of the prestigious InformationWeek Elite 100! Submit your company's application by Jan. 15, 2016. You'll find instructions and a submission form here: InformationWeek's Elite 100 2016.

Andrew has well over a decade of enterprise networking under his belt through his consulting practice, which specializes in enterprise network architectures and datacenter build-outs and prior experience at organizations such as State Farm Insurance, United Airlines and the ... View Full Bio

Previous
1 of 10
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Stratustician
50%
50%
Stratustician,
User Rank: Ninja
1/5/2016 | 9:52:13 AM
Is 2016 the year we see new encryption laws?
While I understand the Government's points about needing the ability to monitor communications from identified targets such as perceived terrorists, painting with a wide brush to say that encryption companies need to have keys available in cases where they want to access data, or worse that all encryption solutions need a back door, well, yes, it's a slippery slope indeed.

Companies and individuals have the right to protect their data and communications from surveillance, and with many liberties around online privacy, this is really one of the biggest gates to keep the right of privacy in the consumers and business' hands.  I'm personally hoping that the governments don't overstep their bounds here and enforce their right to access encrypted data, or at least that security companies providing encryption technologies continue to push back against modifying their solutions.
soozyg
50%
50%
soozyg,
User Rank: Ninja
1/5/2016 | 9:46:26 AM
gov't decryption

The US government seems to be changing its tune regarding what it is requesting from technology vendors in terms of data decryption capabilities. Until recently, federal law enforcement agencies were demanding complete backdoor access to encrypted applications.

--To paraphrase Carly Fiorina during one of the debates, government is woefully behind the private sector with technology. The change of tune--is that a good, proactive, updated move or is the government still behind?

How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll