Powerful megatrends like digitalization are changing the way we conduct business. Information assets are growing exponentially while visibility and control over the created information is reduced. Each organization possesses information assets that are vital to continued operations requiring constant assurance over their integrity. Yet, the current focus of cyber security solutions is alarmingly often only on ICT-systems and networks, the mediating technology, instead of the asset itself. This creates a major vulnerability to an emerging security threat, information manipulation, which can significantly harm your operations by making your core operational information unreliable.
Leading experts in cyber security have acknowledged that organizations are facing a challenge in countering this new form of security threat. The inability of current solutions to detect attacks that use legitimate insider accounts allows perpetrators to wreak havoc over long periods of time, leaving the subject with the realization that they can no longer trust their information assets. ”The bomber will always get through” (Baldwin, S., 1932) . When the perpetrator is already inside of the protective barrier of traditional security solutions, it is an imperative to be able to tell if critical information has been altered.
Consequences of undetected information manipulation and the loss of information’s integrity can be devastating. They vary from operational disruptions through regulatory non-compliance to loss of financial assets or – worst case scenario – the business as a whole and resultant legal liability. Being able to verify information’s integrity is as important a core capability as ensuring its confidentiality and availability. Well-implemented situational picturing capabilities over critical information assets are the key to averting information manipulation in the first place.