www.darkreading.com Open in urlscan Pro
2606:4700::6811:7863  Public Scan

URL: https://www.darkreading.com/vulnerabilities-threats/why-the-c-suite-doesn-t-need-access-to-all-corporate-data
Submission: On December 07 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >

Subscribe
Login
/
Register

The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches

Cloud

IoT

Physical Security

Perimeter

Analytics
Security Monitoring

Security Monitoring
App Sec
Database Security

Database Security
Risk
Compliance

Compliance
Threat Intelligence

Endpoint
AuthenticationMobile SecurityPrivacy

AuthenticationMobile SecurityPrivacy
Vulnerabilities / Threats
Advanced ThreatsInsider ThreatsVulnerability Management

Advanced ThreatsInsider ThreatsVulnerability Management
Operations
Identity & Access ManagementCareers & People

Identity & Access ManagementCareers & People
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
   
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV
   

Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
   Dec 09, 2021
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
   Dec 07, 2021

Resources
Close
Back
Resources
White Papers >
Reports >
Issues >
Tech Library >
Slideshows >
Videos >

--------------------------------------------------------------------------------

Subscribe
Login
/
Register
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to
perform a search.




Announcements
 1. 
 2. 

Event
Cybersecurity Outlook 2022 | A FREE Dark Reading & Black Hat Virtual Event |
December 8, 2021 <REGISTER NOW>
Alert
Check out our NEW section called "DR Tech" for comprehensive coverage of new &
emerging cybersecurity technology.
PreviousNext

Vulnerabilities/Threats

Commentary


WHY THE C-SUITE DOESN'T NEED ACCESS TO ALL CORPORATE DATA

If zero trust is to work properly, then it must apply to everyone.
Rajesh Ganesan
Vice President of Product at ManageEngine
December 06, 2021
Source: Dmitriy Shironosov via Alamy Stock Photo
PDF


More than 20 months into a global pandemic, it's become an article of faith that
the best way to keep organizations and critical networks safe is to embrace zero
trust. Under that umbrella, it's assumed that all network access requests
originate from an unsafe location, and every single user should be verified
according to their locations, identities, and the health of their devices.
During the ongoing pandemic, the mantra "Never trust and always verify," has
never been more important.



To review, the key to the zero-trust framework is the principle of least
privilege, which is the notion that all users are provided with the minimum
level of access required to complete a task. Likewise, users should only be
granted access to a particular app, system, or network when they need access.

But here's the kicker: Zero-trust policies must apply to everyone — even those
at the top of the organizational chart, every CXO, director, and
line-of-business leader. Many C-level employees may take umbrage with the fact
that they are not always provided with access to all content within a network;
nevertheless, this is the best approach. If C-level users do not need to access
data to complete a task, they should not be granted access.



C-Level Executives Are Prime Targets
Failure to hold C-level users to the same standards as other employees can be a
fatal mistake. After all, bad actors are savvy; they realize that the best entry
point into a network is often through C-level users — because far too often,
these are the users with unbridled access to sensitive data.



Besides often having privileged access to sensitive corporate data, C-level
execs also tend to work long hours, receive a barrage of emails, and have
valuable reputations. If a senior executive's information is compromised, bad
actors can gain leverage. After all, if a C-level executive was the cause of a
data breach, the bad actor can likely do some reputational damage just by
disclosing that fact. So perhaps it is no surprise that it is rare to hear about
the exact causes of a data breach.

As Frank Satterwhite, principal cybersecurity consultant at Frankfurt-based 1600
Cyber, explains, "Every time you hear about a big company being hacked, you see
the CEO get on television and say, 'We're so sorry. We're implementing these new
technologies. We're going to be more protected than ever. But they never address
one thing: Almost 90% of the attacks required someone to do something wrong or
make a mistake." Perhaps the reason CEOs so rarely address this human element is
because a member of the C-suite was the culprit

Given that C-level execs are the most likely to be targeted, it is logical to
assume that some whaling and social engineering attacks on C-level personnel are
successful. Nevertheless, to broadcast this tidbit would cost the company
further reputational damage.



Monitoring, Analytics Are Key
Within the network, all communication should be encrypted, and all anomalous
activity should be flagged. Through a unified endpoint management solution, it's
easy for IT personnel to verify users' identities, as well as the health of
their endpoints. Seeing as many C-level employees feel entitled to have access
to all applications at all times, it's especially important to engage in
privileged session monitoring.

By monitoring all privileged sessions, IT personnel can identify any anomalous
behavior or failed login attempts from C-level users' accounts. These data
points can help disabuse any C-levels of the notion that they should always have
access to sensitive information. Additionally, as dictated by the principle of
least privilege, all privileged sessions should be closed as soon as possible.

Through the use of a good VPN monitoring solution, IT personnel can pull VPN
logs from a firewall, and then generate security reports for all C-level
executives. These privileged user behavior analytics help to create
context-aware correlations. After IT personnel combine privileged access data
points with endpoint event logs, illuminating correlations can arise.

Given that top execs often have accounts with high privileges, their actions can
lead to bigger consequences; for example, if a CEO inadvertently clicks on a
malware link, the malware will immediately take effect due to the inherent high
privileges on the CEO's account. While monitoring the CEO's access, any actions
that happen due to their behavior will appear in event logs. These data points
are then correlated in order to reconcile the threat and to ascertain that the
malware launch was, indeed, due to the CEO's access. Again, these data points
can help to convince C-level employees that they don't need access to everything
all the time.

Embracing Zero Trust Without Exceptions
According to a survey we conducted, 58% of North American respondents reported a
rise in phishing attacks. Moreover, 46% of North American respondents said
endpoint network attacks were on the rise, and 37% reported an increase in
malware attacks.

The unfortunate reality is that the recent migration to remote work has created
some security challenges, and C-level employees need to be working alongside IT
personnel to keep their networks safe. The last thing organizations need is
C-level users refusing to adopt a zero-trust framework and acting as if the
rules don't apply to them.

Insider Threats
Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.
Subscribe



Recommended Reading:
7 Ways to Reduce Cyber Threats From Remote Workers Reuven Aronashvili 5 April
2021 darkreading.com 7 Ways to Reduce Cyber Threats From Remote Workers The
pandemic's decline won't stop the work-from-home trend nor the im… Software,
Incident Response Among Big Focus Areas in Biden's Cybersecu… Jai Vijayan 13 May
2021 darkreading.com Software, Incident Response Among Big Focus Areas in
Biden's Cybersecurity Executive Order Overall objectives are good, … Attackers
Compromised Code-Checking Vendor's Tool for Two Months Robert Lemos 20 April
2021 darkreading.com Attackers Compromised Code-Checking Vendor's Tool for Two
Months A script used to upload sensitive reports-with access t… How to Build a
Resilient IoT Framework Samuel Greengard 1 April 2021 darkreading.com How to
Build a Resilient IoT Framework For all of their benefits, IoT devices weren't
built with security in mind -- and… How the Biden Administration Can Make
Digital Identity a Reality Hal Granoff 16 April 2021 darkreading.com How the
Biden Administration Can Make Digital Identity a Reality A digital identity
framework is the answer to the US go… Watch Out for These Cyber-Risks Ken Todd
30 March 2021 darkreading.com Watch Out for These Cyber-Risks It's difficult to
predict what will materialize in the months ahead in terms of cyber-ri…
More Insights
White Papers
 * 
   Protecting Your Mainframe Against Relentless Ransomware
 * 
   2021 Ransomware Threat Report

More White Papers
Webinars
 * 
   Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
 * 
   Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code

More Webinars
Reports
 * 
   10 Hot Talks From Black Hat USA 2021
 * 
   Enterprise Cybersecurity Plans in a Post-Pandemic World

More Reports

Editors' Choice
In Appreciation: Dark Reading's Tim Wilson
Dark Reading Staff, Dark Reading
Finding Your Niche in Cybersecurity
Kristina Balaam, Senior Security Intelligence Engineer, Lookout
HP Issues Firmware Updates for Printer Product Vulnerabilities
Jai Vijayan, Contributing Writer
10 Stocking Stuffers for Security Geeks
Ericka Chickowski, Contributing Writer
Webinars
 * Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
 * Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code
 * Cybersecurity Outlook 2022 Virtual Event
 * Getting SASE: What Every Enterprise Should Know
 * Security Alert Fatigue: Tips for Taking Control

More Webinars
White Papers
 * Protecting Your Mainframe Against Relentless Ransomware
 * 2021 Ransomware Threat Report
 * Policy as Code Guide - Design, Build, & Runtime
 * The 2021 Small and Midsize Business Security Outcomes Study
 * Increased Cooperation Between Access Brokers, Ransomware Operators Reviewed

More White Papers
Events
 * Cybersecurity Outlook 2022 - December 8 Virtual Event
 * SupportWorld Live: May 15-20, 2022, MGM Grand, Las Vegas, NV

More Events
More Insights
White Papers
 * 
   Protecting Your Mainframe Against Relentless Ransomware
 * 
   2021 Ransomware Threat Report

More White Papers
Webinars
 * 
   Cybersecurity Forecast 2022: Snowpocalypse or cloudy with a chance of rain?
 * 
   Beyond Patch Management: Next-Generation Approaches to Finding and Fixing
   Vulnerable Code

More Webinars
Reports
 * 
   10 Hot Talks From Black Hat USA 2021
 * 
   Enterprise Cybersecurity Plans in a Post-Pandemic World

More Reports

DISCOVER MORE FROM INFORMA TECH

 * Interop
 * InformationWeek
 * Network Computing
 * ITPro Today

 * Data Center Knowledge
 * Black Hat
 * Omdia

WORKING WITH US

 * About Us
 * Advertise
 * Reprints

FOLLOW DARK READING ON SOCIAL

 * 
 * 
 * 
 * 


 * Home
 * Cookies
 * Privacy
 * Terms



Copyright © 2021 Informa PLC Informa UK Limited is a company registered in
England and Wales with company number 1072954 whose registered office is 5
Howick Place, London, SW1P 1WG.

This site uses cookies to provide you with the best user experience possible. By
using Dark Reading, you accept our use of cookies.

Accept