Encryption Can Get Board's Attention - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
IT Leadership // CIO Insights & Innovation
Commentary
11/22/2009
11:07 PM
Chris Murphy
Chris Murphy
Commentary
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Encryption Can Get Board's Attention

There are lots of good reasons for IT leaders to pay attention to even the finest details of encryption policies. One of the more practical is that encryption's a board-level concept. As in, the board of directors will feel no hesitation in second guessing decisions not to encrypt data that ends up exposed.Which makes the findings in this week's cover story on encryption all the more surpr

There are lots of good reasons for IT leaders to pay attention to even the finest details of encryption policies. One of the more practical is that encryption's a board-level concept. As in, the board of directors will feel no hesitation in second guessing decisions not to encrypt data that ends up exposed.Which makes the findings in this week's cover story on encryption all the more surprising.Based on exclusive InformationWeek Analytics research, it finds nearly all companies use some encryption, but only 14% says it's pervasive at their companies. A fourth have database table-level encryption. And about 3 out of 5 companies don't encrypt mobile devices, despite their habit of disappearing loaded with confidential data.

Regulatory compliance seems to be driving what encryption momentum there is, laments InformationWeek contributor Michael A. Davis, in the article. Writes Davis:

Encrypting a subset of data amounts to a "get-out-of-jail-free card" because it may relieve companies from having to notify customers of a breach. But knowingly doing the bare minimum to check a compliance box isn't security; it's a cop-out.
Davis knows there are real obstacles to broader encryption use, and he explores areas such as the difficulty of key management. He examines the viability of tokenization, one of the more promising emerging data security tools. Beyond the cover story, we have a 38-page research report with additional analysis and more research on encryption issues, at informationweek.com/analytics/token.

Feel free to forward a copy to your board of directors, as well.

Download a PDF of the full issue of InformationWeek here.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
News
How to Create a Successful AI Program
Jessica Davis, Senior Editor, Enterprise Apps,  10/14/2020
News
Think Like a Chief Innovation Officer and Get Work Done
Joao-Pierre S. Ruth, Senior Writer,  10/13/2020
Slideshows
10 Trends Accelerating Edge Computing
Cynthia Harvey, Freelance Journalist, InformationWeek,  10/8/2020
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
[Special Report] Edge Computing: An IT Platform for the New Enterprise
Edge computing is poised to make a major splash within the next generation of corporate IT architectures. Here's what you need to know!
Slideshows
Flash Poll