Buh-Bye. Bye now.

Buh-Bye. Bye now.

By Steve Gold
Posted in Security
On June 21, 2023

Hopefully, you get the reference above from the SNL skit. I thought about manipulating Billy Joel’s amazing song ”Say Goodbye to Hollywood” but decided to go simpler. OK, let’s get into it.

In today's data-driven world, organizations collect and store vast amounts of sensitive information. However, with the growing number of cyber threats and regulatory requirements, securely disposing of data is just as crucial as protecting it. As part of an enterprise's comprehensive data management process, the secure disposal of data plays a pivotal role in mitigating risks and safeguarding sensitive information. In this blog post, we will explore the importance of securely disposing of data, ensuring that the disposal process and method align with the sensitivity of the data at hand.

Data disposal is not simply a matter of deleting files or emptying the recycle bin. It requires a systematic approach that accounts for the sensitivity of the data being discarded. Failing to dispose of data properly can result in significant consequences, including data breaches, regulatory non-compliance, reputational damage, and financial loss.

Securely disposing of data is an integral part of any robust data management process. Organizations must recognize the importance of aligning the disposal process and method with the sensitivity of the data being handled. By assessing data sensitivity, establishing clear policies and procedures, choosing appropriate disposal methods, and implementing secure disposal practices, organizations can significantly reduce the risk of data breaches and regulatory non-compliance.

Remember, data disposal is not a one-time event; it is an ongoing responsibility. Regularly reviewing and updating disposal practices ensures that they remain aligned with the evolving threat landscape and regulatory landscape. By prioritizing secure data disposal, organizations demonstrate their commitment to protecting sensitive information and maintaining the trust of their stakeholders.

Here’s a link to a Data Management Policy Template provided free of charge from the fine folks at Center for Internet Security:

https://www.cisecurity.org/insights/white-papers/data-management-policy-template-for-cis-control-3

Here’s some detail on this specific Control/Safeguard. If you want more detail, DM me.

CIS Control 3 – Data Protection

Develop processes and technical controls to identify, classify, securely handle, retain, and dispose of data.

Implementation Group 1

CIS Safeguard 3.5 - Securely Dispose of Data
Securely dispose of data as outlined in the enterprise’s data management process. Ensure the disposal process and method are commensurate with the data sensitivity.

Steve Gold

Steve Gold

Steve Gold is the Cybersecurity Practice Director at Gotham Technology Group (Gotham). He is responsible for providing the vision and thought leadership to expand Gotham’s legacy of success and build a world-class cybersecurity practice. He works closely with Gotham’s customers, industry partners, and subject matter experts to develop relevant solutions for Gotham’s clients and prospects.

Prior to joining Gotham, Steve worked with the Center for Internet Security (CIS), where he expanded the global reach, revenue, and impact of the CIS Benchmarks, CIS Controls, and CIS Hardened Images. He led the efforts to promote the CIS portfolio of low-cost and no-cost cybersecurity products and services that help private and public organizations stay secure in the connected world. He grew a team of security specialists from 12 to over 40 to assist organizations with implementing security best practices in their continual journey of cybersecurity maturity.

During his more than 20-year career, Steve led teams responsible for developing and implementing technology solutions at some of the industry’s most recognized companies such as Varonis, VMware, Dell & Wyse Technology

Steve is a frequent speaker/moderator at industry conferences and webinars, covering a wide array of information security topics. He resides and works remotely in Baltimore, MD.