Tag Archives: interview

Recognizing Third-Party Risks & Addressing the Gaps with Identity-Based Security

Enterprises and businesses are well into their digitization journey. Many have adopted digital strategies and tools that align with their businesses and goals. However, in their swiftness to adopt software and tools that enable them to be agile, many may have overlooked one of the most crucial aspects of their data security – third-party access and control. The issue arises as a result of the adoption of multiple diverse tools and technologies needed for digitization, the acquisition of contract talent, consultants and third-party support. This rings true even for Financial Service Institutions (FSIs). In a recent report, Gartner stated that 59% of organizations experienced a data breach due to third parties and only 16% of them say they are equipped to manage these risks.


Boey’s Headshot 1x1

“Today, organizations can manage up to thousands of identities which means more access points that may present significant risks. In order to mitigate the risks of breach and protect digital identities, data and resources, enterprises need a comprehensive identity security solution for complete visibility into all user types and their related access, including all entitlements, roles, and attributes, to ensure employees receive the right access to the right resources to do their job.”

Chern-Yue Boey, Senior Vice President, Asia-Pacific, SailPoint


While it can seem like a daunting task for IT departments and CIOs to get a handle on the issue, the truth is that it’s a simple task of managing access on a “just-in-time” and/or “as-needed” basis. With an increasing number of such instances, it becomes a conundrum of how to dynamically manage these permissions. One emerging approach is to manage these permissions or instances as “identities”. Using this approach, it’s a matter of mapping these identities and the data they have access to. Essentially, a holistic view of who (identities) can access what data (what), is needed. While it can be a little complicated to administer this on a dynamic level, companies like SailPoint provide turn-key solutions fortified with artificial intelligence (AI) that allow just that.

An Increasing Concern for Financial Service Industries (FSIs)

As banks and other FSIs start embracing digitization and move towards becoming digital services, we’ve seen an increasing emphasis on data security and privacy particularly when it comes to user data. However, like many other enterprises, the digital infrastructure and tools that they have in place may pose a risk when it comes to data security. What’s more, when it comes to FSIs, the consequences of poor security can result in millions of dollars of loss for both the client and the institution itself.

hands holding a smartphone with data on screen
Photo by Tima Miroshnichenko on Pexels.com

In Malaysia alone, we’ve seen an increasing number of scams and data breaches in the past 5 years. This seems to have skyrocketed during the pandemic and is not showing any signs of slowing down. In fact, in the past year alone, we’ve had breaches of large service providers like Telekom Malaysia and Maxis. More worryingly, we’ve had breaches of FSIs like Maybank and iPay88. Of course, under the watchful eye of regulators, these issues are constantly being investigated and fines are dolled out for mismanagement.


Boey’s Headshot 1x1

“The reality is a large majority of cyber security breaches today occur as a result of non-employee identities. According to a research by Ponemon, 59% of respondents confirm that their organizations have experienced a data breach caused by one of their third parties and 54% of these respondents say it was as recent as the past 12 months”

Chern-Yue Boey, Senior Vice President, Asia-Pacific, SailPoint


That said, it’s important that these institutions move from a reactive approach to a more preventative and proactive one. This change has to happen with both policy and adoption of security technologies which give CIOs and data security experts a clear view of who is accessing what data and why.

Creating A Data Secure Environment for Business

FSIs like Maybank and iPay88 may point to their apps with features like SecureKey and their implementation of one-time pins (OTPs) as potent security measures. However, as Chern-Yue Boey, Senior Vice President at SailPoint puts it, “Authentication is like giving someone the keys to your front door, but identity security is where you can control whether this person can have access to your rooms and other aspects in your home.”

What’s needed is a system that can cross-check and verify if access to the information is allowed. Mr. Boey weighs in on this, “A complete identity security strategy involves understanding, controlling, and managing user identities and access to all resources holistically, in line with authentication methods. This means building an identity security foundation to enable authentication and comprehensive identity governance.”.

close up view of system hacking
Photo by Tima Miroshnichenko on Pexels.com

Identity governance will entail creating unique profiles to manage access to data. This also entails structuring data so that it can be accessed on an “as-needed” basis. While many systems for cybersecurity do include options for Zero Trust environments, the implementation of identity management ups the ante and creates an environment where small silos of data can be made available to external users and contractors. This will enable access to data on a restricted basis and allow CIOs and IT Departments to manage data based on job function, role and levels of access.

Mitigating Risk with Identity-based Security

This is where Identity Security can play a huge role for FSIs and even other corporations. The creation of these identities limits the potential exposure even if a breach occurs. That said, in order to mitigate the risk, it falls to the C-suite executives – particularly the CIO or CSO – to understand which job functions should have access to what data. Only with this understanding can they deploy solutions like SailPoint effectively.

Having this understanding – which can be fostered at every level of management – will help mitigate risks associated with third-party workforces. In fact, it helps with a key risk: unauthorized access to sensitive data. As access becomes limited, so too do the entry points for bad actors.

person paying using her smartwatch
Photo by Ivan Samkov on Pexels.com

That said, understanding is only one part of the equation, FSIs and other organizations will need better oversight over the identities in their system and the data being accessed across the entire distributed IT ecosystem. This includes the ability to grant or restrict access as necessary. Doing this will create a perimeter of security when it comes to pertinent, sensitive data.

Maximizing Security with Informed Access

This transparency and oversight will allow for better-informed decisions as CSOs and CIOs have access to a central repository of all users – third-party or otherwise – and their relationship to the organization. This includes their job functions and the data they have access to. It helps with managing risk when it comes to third-party access. IT Departments are able to assign risk ratings to individual third-party users based on who they work for, location, access level and other parameters as set by the organization.

It also allows them to better manage the onboarding and offboarding of employees and non-employees as they enter and exit the organization. Essentially, the visibility, relationship data and governance will necessarily give rise to a lifecycle for each identity in the organization. While it may seem like a simple matter of managing the current access of users to the data, it goes further than that with identity management. It gives granular control and visibility to a CIO, CSO and IT Departments allowing them to react effectively and in a timely fashion. It also allows them to automate compliance audits with minimal manual intervention.

A Necessary Measure for Dynamism and Agility

As much as it may seem like an added layer of complications and headaches for IT departments, the shift from managing data based on access vs. through identities is the difference between being reactive and proactive. Managing data access with Identity security is a necessary measure for FSIs and organizations to remain agile in operations as well as respond dynamically to a landscape of uncertainties.

Interview: Getting to Know Google’s New My Ads Center

This is an interview transcription. It is intended as a companion piece to our Deep Dive into Google’s My Ad Center editorial.

With the release of Google’s My Ad Center, we had a few questions that we needed to be answered. So, we sat down with a Google Spokesperson who graciously answered them and gave us further insight into the new customizations and how they would impact Google’s products.


Google My Ad Center Feature png

Q: We all know by now that Google abides by a certain code when it comes to handling user data. For the benefit of those of us that may not be aware, what are these rules and how does Google implement it in-house?

Google Spokesperson:

We build privacy that works for everyone. Protecting our users’ privacy and security is a responsibility that comes with creating products and services that are free of cost and accessible for all. This is especially important as technology progresses and safety needs evolve. We look to a set of core principles to guide our products, our processes and our people in keeping our users’ data private, safe and secure.

  • Respect our users, respect their privacy. We believe that these ideas are inseparable. Together, they represent a single, core belief that has influenced everything that we’ve made since day one, and everything that we’ll make moving forward. When people use our products, they trust us with their information, and it’s our job to do right by them. This means always being thoughtful about what data we use, how we use it and how we protect it.
  • Never sell our users’ personal information to anyone. We use data to make Google products such as Search and Maps as useful as possible. We also use data to serve more relevant ads. While these ads help fund our services and make them free of charge for everyone, it’s important to clarify that our users’ personal information is simply not for sale.
  • Make it easy for people to control their privacy. When it comes to privacy, we know that one size doesn’t fit all. Every Google Account is built with on/off data controls, so our users can choose the privacy settings that are right for them. And as technology evolves, our privacy controls evolve as well, ensuring that privacy is always an individual choice that belongs to the user.

Q: With the launch of the My Ad Center, Google is giving a degree of granular control to users when it comes to seeing ads. How will these controls impact user privacy?

Google Spokesperson:

My Ad Center builds on our commitments to privacy by giving you the ability to control what information is used to personalize the ads you see. And if you’re not sure what you’re sharing, it’s easy to quickly see what information we use, and control it based on your preferences.

You can decide what types of your activity are used to make Google products work for you — independent of the ads you’re shown. In the past, if your YouTube History was on, it automatically informed how your ads were personalized. Now, if you don’t want your YouTube History to be used for ads personalization, you can turn it off in My Ad Center, without impacting relevant recommendations in your feed.

You may also see ads meant for certain audiences based on your Google activity – categories such as education, relationship status or the industry you work in. Now you’ll be able to choose and adjust how categories inform your ads, or turn them off completely. This way, you can more easily choose the ad experience that’s right for you. 

In addition, users have the ability to see fewer ads in five sensitive categories, including alcohol, dating, gambling, pregnancy and parenting, and weight loss. Before, this feature affected ads shown on YouTube and Display. Now, it expands to ads shown on Search and Discover.

Q: How does Google My Ad Center impact user experience with Google’s other products like Android, Chrome and Workspaces? Considering on Android, ads pushed via Chrome and Workspace e.g. Gmail are also based on user preferences.

Google Spokesperson:

My Ad Center gives you control over the kinds of ads you see across Google’s surfaces including YouTube, Search and Discover – in fact, when you’re signed into Google, you can access My Ad Center directly from ads appearing on these three platforms, allowing you to manage your ad preferences without interrupting what you’re doing online. 

(Background: My Ad Center will not affect the user experience of Android, Chrome and Workspace. My Ad Center provides control over the ads that user sees on Google’s properties such as Search display ads and YouTube, but does not alter the user experience of those properties itself)

Q: My Ad Center brings in a new dimension of personalisation when it comes to ads. How will this data be used by Google when it comes to serving ads to individuals who utilize the dashboard? Will it impact the ads being served to those that don’t use My Ad Center?

Google Spokesperson:

My Ad Center starts with an entirely new, friendly and clear experience that offers more granular and flexible controls as well as visibility into which ads and categories are used to serve ads. For the first time, users will be able to tell us what they want in addition to what they don’t want when it comes to ads – in the ads themselves. My Ads Center is the complementary Google content experience, where users tune the ads they see by choosing both what types of ads they want to see and what information is used to power them. We’ve also kept the option to turn off ads personalisation and feature it prominently across the product experience.

Q: In My Ad Center, users are able to select ads they wish to see from brands and companies they like. They are also given the ability to remove ads from those they don’t. These personalisations could possibly create a potent echo chamber that can falsely affirm dangerous ideologies. What has Google done to ensure that these personalisations don’t hinder open discourse or cause the spread of misinformation?

Google Spokesperson:

Google have long since prioritised transparency, choice and control when it comes to the ad experience for users. My Ad Center offers more granular and flexible controls as well as visibility into which ads and categories are used to serve ads. 

In this regard, users will be able to choose which topics they want to see more or fewer ads about. Users can only choose to block ads for select sensitive categories such as alcohol, gambling, weight loss, dating and parenting. 

All Google ads must abide by our advertising policies.

Q: In countries like the United States and Canada, it’s common to be inundated with political ads. In other parts of the world, we may see ads from organisations like the UN. How is Google addressing the potential bias that personalisations on My Ad Center can influence the outcomes of grassroots initiatives and potentially a nation’s political landscape?

Google Spokesperson:

See response above

Q: Google My Ad Center also brings up concerns with advertisers when it comes to advertising on Google’s platforms – particularly with distribution, CPM and CTRs. What measures is Google taking to make sure that these personalisations don’t negatively impact advertisers?

Google Spokesperson:

The My Ad Center features are to provide users with more transparency, choice and controls. There is no plan to change how advertisers can target their campaigns in our ad products. However, where we see the advantage for advertisers is their ads being seen and engaged with by users who are genuinely interested in their products and their brand topics.

Q: What should advertisers be aware of in the first few months after the rollout of My Ad Center? How can they factor this major change into their advertising plans?

Google Spokesperson:

The choices users make will be automatically incorporated into the signals we use to personalise ads. There is no action needed from advertisers that want to serve ads to users who are interested in their brand or topic.

Tech & Tonic Episode 2 feat. Vernon Chan – Pre-Order, Cash, or Installment? Oh, Use Protection Everyone!

 

Episode two of Tech & Tonic we have a featured guest who is none other than Vernon Chan! He will be joining us today to talk about a few key aspects of how the local tech market is, to security concerns with all the technologies that we are too dependent on. Also do listen to the end to find out why Vernon decided to delete his Facebook account!

A little more about Vernon, he hails from a creative background that spans over 20 years, and is the founder of boutique creative hotshop – scratchdisk creative. He’s an avid blogger/writer, Twitter-addict, foodie, technology and gadget enthusiast, animal lover, Steve Jobs groupie and petrolhead.

Mentioned in the title, we will be starting the podcast with what we think of pre-orders and how it is used to gauge the market dynamics of what phones or colours that could sell well. What are the pros and cons of getting a phone on pre-orders, getting it in cash and getting it on a installment plan with a telco. 

The second notable topic is data privacy. Why is data privacy important? How does it affect us and what can we do about it? Government policies should also be enforced for the data collecting and selling companies to ensure the citizens are protected. 

Most online services require the user to opt in to use the services. Mostly, it is for the convenience of using the services. How much are we willing to give up? How much is the government doing to protect us?

What can you do to protect yourself and your data online? Some tips and tricks from @vernieman himself on the measures he personally takes to protect himself even when he’s traveling around the world!