For most of us, our data is either collected through logs, customers actions, or customer data entry. Our data is then consumed not just by our staff, but also by those outside of our organization. So, why do we focus our information/data protection efforts within the walls that we control? What types of data are we trying to protect? What risks do you face when data leaves our networks? Is it possible to protect our customer data past our walls and all the way to our customer? Is addressing data protection beyond what we can directly control an IT disruptor or the next logical step in data security? Does helping our customers introduce risk?
Andrew Howard, Director of Cyber Security and IT Business Management, Pension Fund of the Christian Church