Edward Snowden's actions have had serious implications across the world – and raised many important questions. One of those questions is how an organization can defend itself against the threat of cybercrime committed by insiders with malicious intent – and Snowden's case is a wonderful example of how complex that insider threat can sometimes be.
This also raises some interesting questions on how organizations can protect themselves from the insider threat. In his talk, Steven Bay suggests several important measures:
1) Separation of Duties
2) Separation of Information
3) Employee Training
4) Locking Down on Technical Gateways to the WWW
5) Effective Internal Processes
While this looks good on paper, how do they fit in the increasingly integrated demands of IoT, Predictive Analytics, and Enterprise Dashboards, in which separation of information poses a severe challenge?
That question is one that I think information logistics addresses very well – allowing organizations to design the way in which information flows, and is accessed, across the organization. Of course, information logistics does more than just protect against the insider threat – it can also significantly improve business performance, when paired to other existing processes, such as those captured in a business process management (BPM) system. And with information being the new gold of our century, I think this sort of system is going to become increasingly important, both for large scale and small scale operations.