HomeDigital MarketingUnderstanding Information Security & Risk Management

Understanding Information Security & Risk Management

This edited extract is from How one can Use Buyer Knowledge by Sachiko Scheuing ©2024 and reproduced with permission from Kogan Web page Ltd.

I’ve an especially confidential piece of knowledge on a selected sheet of paper. This A4-sized paper accommodates an inventory of Christmas presents I plan to offer to my members of the family.

To ensure that nobody will get entry to this data, I’ve hidden it in my residence workplace, within the cabinet subsequent to my desk. There you discover a chunky English dictionary.

While you open the web page the place “Christmas” is listed, you can find my valuable record, fastidiously folded into two.

However what if my youngsters or my different half involves look one thing up in an analogue dictionary? Arguably, the danger is small, however I’m not taking any possibilities. I’ve a secret language known as Japanese.

My household may discover that piece of paper, however all they are going to see shall be タータンチェックの野球帽 and 腕時計, that are principally hieroglyphs to them.

Because of this, my household enjoys great moments exchanging items each Christmas. Simply writing about this makes me grin, imagining the shocked faces and a burst of laughter, surrounded by the inexperienced scent of the Christmas tree and the compulsory mulled wine.

This motivates me to hide this extremely delicate data much more!

We’ll talk about how corporations and their advertising and marketing division can shield their secrets and techniques, and their knowledge, in order that they, too, can carry a smile to their clients’ faces.

Understanding Data Safety

In some video games, you have got this “get out of jail card.” With these playing cards, you’ll be able to keep away from lacking out on a spherical of video games. What if I stated GDPR has one thing related?

It’s known as knowledge safety.

The GDPR provisions for knowledge safety are consistent with the risk-based method embedded in regulation, the place danger is mini­mized, and extra flexibility is given to controllers.

For example, when regulators determine on fines, they have to take safety measures corporations have put in place to guard the information into consideration (see Article 83(2)c of GDPR) (laws.gov.uk, 2016).

Say your laptop computer is stolen.

If it was encrypted, you do not want to tell your clients that there was a knowledge breach. Not having to tell your clients saves the model picture your advertising and marketing division has been constructing for years.

That’s one purpose why knowledge safety is such an vital self-discipline. Many organizations have a separate safety division and a chief data safety officer who heads the useful areas.

These entrepreneurs who had safety incidents printed by information retailers should understand how life-saving safety colleagues might be in occasions of want.

Definition Of Data Technique

The phrase knowledge safety isn’t present in Article 4 of GDPR, the article the place definitions are listed. As a substitute, the phrase “safety” seems in Article 5, the place the essential premises of the information safety regulation are described.

In different phrases, knowledge safety is among the essential ideas of the GDPR, “integrity and confi­dentiality.”

GDPR expects organizations to make sure the prevention of unauthorized or illegal processing, unintentional loss, destruction, or harm of information as one of many beginning factors for shielding private knowledge.

TOMs should be applied to this finish in order that the integrity and confidentiality of the information are protected (Article 5(f) GDPR) (laws.gov.uk, 2016).

Exterior Of GDPR, Data Safety Is Outlined As Follows

Data safety is the safeguarding of knowledge and knowledge programs towards deliberate and unintentional unauthorized entry, disruption, modification, and destruction by exterior or inner actors. (Gartner, Inc., 2023)

Data safety is the applied sciences, insurance policies, and practices you select that can assist you maintain knowledge safe. (gov.uk, 2018)

Data safety: The safety of knowledge and knowledge programs from unauthorized entry, use, disclosure, disruption, modification, or destruction with a view to present confidentiality, integrity, and availability. (NIST, 2023)

Method To Data Safety

Simply as advertising and marketing professionals created strategic frameworks – 4Ps, 7Ps, 4Cs, and so forth – so the college of knowledge safety technique has give you frameworks: the CIA triad and the Parkerian Hexad.

CIA stands for Confidentiality, Integrity, and Availability.

Donn Parker, a safety seek the advice of­ant, later expanded this framework with three extra components, specifically Utility, Authenticity, and Possession.

Beneath is a short description of the six facets of the Parkerian Hexad (Bosworth et al, 2009).


Availability refers back to the skill of the group to entry knowledge. When, for example, there’s a lack of energy and your entrepreneurs can’t entry buyer knowledge, it’s thought-about an availability downside.

The file is there, so it isn’t stolen. Nonetheless, the marketer is briefly unable to entry the actual knowledge.


Utility of the Parkerian Hexad pertains to the issue of shedding the usefulness of the information. For example, if a marketing campaign supervisor loses the encryption key to the information, the information remains to be there, and it may be accessed.

Nonetheless, the information can’t be used as a result of the emails wanted for finishing up an e-mail marketing campaign are encrypted so they’re ineffective.


Sustaining integrity refers to stopping unauthorized modifications to the information.

For example, if an intern of the advertising and marketing division by accident deletes the sector “bought greater than two objects” throughout the dataset, that is an integ­rity-related safety incident.

If the supervisor of the intern can undo the deletion of the sector, then the integrity of the information is undamaged.

Sometimes, integ­rity is maintained by assigning totally different entry rights, akin to read-only entry for interns and read-and-write entry for the advertising and marketing supervisor.


Authenticity pertains to the attribution of information or data to the rightful proprietor or the creator of that knowledge or data.

Think about a state of affairs the place your promoting company, appearing as your knowledge service supplier, receives a pretend e-mail which instructs them to delete all of your buyer knowledge.

The company may suppose that it’s a real instruction out of your firm, and executes the command. That is then an authenticity downside.


When somebody unauthorized will get entry to a selected advertising and marketing analytic file, confidentiality is being breached.


The Parkerian Hexad makes use of the time period possession to explain conditions the place knowledge or data is stolen.

For example, a malevolent worker of the advertising and marketing division downloads all of the gross sales contact data to a cell machine after which deletes them from the community. It is a possession downside.

Danger Administration

Along with understanding the issues you’re going through, utilizing the Parkerian Hexad, your group should know the potential safety dangers for the enterprise.

Andress suggests a helpful and generic five-step danger administration course of, for quite a lot of conditions (Andress, 2019).

Step 1: Determine Property

Earlier than your group can begin managing your advertising and marketing division’s dangers, it’s essential to map out all knowledge belongings belonging to your advertising and marketing division.

In doing so, all knowledge, some distributed in several programs or entrusted to service suppliers, should be accounted for.

As soon as this train is accomplished, your advertising and marketing division can decide which knowledge recordsdata are probably the most essential. RoPA, with all processes of private knowledge mapped out, might be leveraged for this train.

Step 2: Determine Threats

For all knowledge recordsdata and processes recognized within the earlier step, potential threats are decided. This will imply holding a brainstorming session with entrepreneurs and safety and knowledge safety departments to undergo the information and processes one after the other.

The Parkerian Hexad from the earlier part generally is a nice assist in guiding via such periods. It’s going to even be useful to establish probably the most essential knowledge and processes throughout this train.

Step 3: Assess Vulnerabilities

On this step, for every data-use surfaced in Step 2, related threats are recognized.

In doing so, the context of your group’s operation, services offered, vendor relations in addition to the bodily location of the corporate premises are thought-about.

Step 4: Assess Vulnerabilities

On this step, the threats and vulnerabilities for every knowledge and course of are in contrast and assigned danger ranges.

Vulnerabilities with no corresponding threats or threats with no related vulnerabilities shall be seen as not having any danger.

Step 5: Mitigate Dangers

For the dangers that surfaced in Step 4, measures vital to stop them from occurring shall be decided throughout this stage.

Andress identifies three sorts of controls that can be utilized for this goal. The primary kind of management, logical management, protects the IT setting for processing your buyer knowledge, akin to password safety and the putting of firewalls.

The second kind of management is administrative management, which is normally deployed within the type of company safety coverage, which the group can implement. The final kind of management is bodily management.

Because the identify suggests, this kind of management protects the enterprise premises and makes use of instruments akin to CCTV, keycard-operated doorways, fireplace alarms, and backup energy turbines.

With the time, dangers might change.

For example, your advertising and marketing division could also be bodily relocated to a brand new constructing, altering the bodily safety wants, or your organization may determine emigrate from a bodily server to a cloud-based internet hosting service, which implies your buyer knowledge must transfer, too.

Each such conditions necessitate a brand new spherical of the danger administration course of to kick off.

Typically, it’s advisable to revisit the danger administration course of on a daily interval, say yearly, to maintain your organization on high of all dangers your advertising and marketing division, and past, carry.

Approaching Danger Administration With Three Traces Of Defence

Institute of Inner Auditors (IIA) established a danger administration mannequin known as Three Traces of Defence.

The mannequin requires three inner roles: (1) the governing physique, with oversight of the group, (2) senior administration, which takes danger administration actions and studies to the governing physique, and (3) inner audit, which gives impartial assurance, to work collectively and act as sturdy protections to the group (IIA, 2020).

The weather of the Three Traces of Defence are (IIA, 2020):

First Line Of Defence

Handle dangers related to day-to-day operational actions. Senior administration has the first duty, and emphasis is placed on folks and tradition.

Advertising and marketing managers’ process right here is to ensure that their division is conscious of information safety dangers, together with safety dangers, and are following related company insurance policies.

Second Line Of Defence

Determine dangers within the every day enterprise operation of the enterprise. Safety, knowledge safety, and danger administration groups perform monitoring actions.

Senior administration, together with the CMO, is finally accountable for this line of defence. A well-functioning second line of defence requires good cooperation between advertising and marketing and safety, knowledge safety, and danger administration groups.

Virtually, it will imply understanding the significance of operational-level auditing and offering enter to the safety staff, even when there are different urgent deadlines and enterprise points.

Third Line Of Defence

Present impartial assurance on danger administration by assessing the primary and second strains of defence. Unbiased company inner audit groups normally have this position.

Right here, too, the advertising and marketing division shall be requested to cooperate throughout audits. Assurance outcomes reported to the governance physique inform the strategic enterprise actions for the senior administration staff.


  • Andress, J (2019) Foundations of knowledge safety, No Starch Press, October 2019.
  • Bosworth, S, Whyne, E and Kabay, M E (2009) Laptop Safety Handbook, fifth edn, Wiley, chapter 3: Towards a brand new framework for data safety, Donn B Parker
  • Gartner, Inc. (2023) Data expertise: Gartner glossary, www.gartner.com/ en/information-technology/glossary/information-security (archived at https:// perma.cc/JP27-6CAN)
  • IIA (2020) The Institute of Inner Auditors (IIA), The IIA”s Three Traces mannequin, an replace of the Three Traces of Protection, July 2020, www.theiia.org/globalassets/paperwork/sources/the-iias-three-lines-model-an-update-of-the-three-lines-ofdefense-july-2020/three-lines-model-updated-english.pdf (archived at https://perma.cc/9HX7-AU4H)
  • laws.gov.uk (2016) Regulation (EU) 2016/679 of the European Parliament and of the Council, 27 April 2016, www.laws.gov.uk/eur/2016/679/ contents (archived at https://perma.cc/NVG6-PXBQ)
  • NIST (2023) Nationwide Institute of Requirements and Know-how, US Division of Commerce, Laptop Safety Useful resource Centre, Data Know-how Laboratory, Glossary, up to date 28 Might 2023, https://csrc.nist.gov/glossary/time period/ information_security (archived at https://perma.cc/TE3Z-LN94); https://csrc. nist.gov/glossary/time period/non_repudiation (archived at https://perma.cc/DJ4A- 44N2)

To learn the complete ebook, SEJ readers have an unique 25% low cost code and free transport to the US and UK. Use promo code SEJ25 at koganpage.com right here.

Extra sources: 

Featured Picture: Paulo Bobita/Search Engine Journal


Most Popular