Data Protection and Privacy: A Strategic Priority for Board Members

MIke Kell
MIke Kell

MIke Kell

Mike Kell is a seasoned IT professional with 35 years in the industry, including significant experience with the US Army and Department of Defense, focusing on strategic planning, cybersecurity, and IT service management. He has led large teams, managed substantial budgets, and been pivotal in transitioning military communications to modern standards. Hiss roles have spanned commanding signal units, overseeing complex network engineering projects, and serving as a Chief Information Security Officer in Europe. His work has been critical in enhancing the tactical and strategic IT capabilities of the US Army, showcasing his expertise in solution architecting and deploying advanced technological solutions across global networks. He holds both ITIL and CISSP certifications.

Recent Posts

Follow me

Let’s talk about why data protection and privacy are critical for the success and resilience of the organizations you oversee. You’ve probably heard the phrase “data is the new oil”—and it’s true. Data drives business decisions, innovation, and competitiveness. But with great value comes significant risk. Cyberattacks can bring devastating financial losses, regulatory penalties, and reputational harm.

Think about the consequences of a customer data breach. Fines under laws like GDPR or CCPA can climb into the millions. Intellectual property theft? That could erase years of research and development and hand competitors a free advantage. And let’s not forget ransomware attacks that can halt operations, leaving stakeholders questioning your preparedness.

This isn’t just about compliance but business continuity and competitive advantage.

Understanding the Stakes

Your role begins with knowing the organization’s key data assets. What sensitive information are you managing—customer data, intellectual property, financial records? How is this data classified by sensitivity level? Knowing the answers helps ensure the right security measures are in place.

Regulatory compliance is another critical area. Are you meeting the requirements of GDPR, CCPA, or HIPAA? For example, do you have privacy-by-design principles baked into your processes? These are questions you must ask to avoid penalties and protect your reputation.

Equally important is governance. Is there a transparent chain of accountability, including a designated Data Protection Officer? Do you have a strong risk management strategy to address threats to data assets and third-party vulnerabilities?

Finally, are you prepared for incidents? An incident response plan is only as good as the drills that test it. If you don’t practice, you’re not prepared.

Examples That Bring This to Life

  • Data Encryption and Backup: Picture a healthcare company safeguarding sensitive patient records with AES-256 encryption. Each piece of data is protected both at rest and in transit. On top of that, they’ve adopted the 3-2-1 backup strategy: three copies of data stored on two different media
    A digital padlock securing streams of binary code, symbolizing the protection of sensitive data through encryption.

    Illustration of data encryption: safeguarding sensitive information with a digital lock to prevent unauthorized access during storage and transit.

    types, with one copy kept off-site. To ensure these measures are effective, they regularly run disaster recovery drills—simulating ransomware attacks to confirm they can recover data without missing a beat. These practices ensure compliance with healthcare data regulations and the confidence of patients and partners.

  • Lifecycle Management: Imagine a financial firm handling vast customer and transaction data. They enforce strict role-based access control (RBAC) to prevent unnecessary risk, ensuring that employees can only access the data required for their roles. Data minimization is a cornerstone of their operations—they collect only what’s necessary, and data no longer needed is securely destroyed. For instance, they’ve implemented physical shredding for old hard drives and degaussing to erase magnetic data storage permanently. These actions reduce their liability and optimize their data storage costs.
  • Preventing Insider Threats: Consider a tech company with a highly mobile workforce. They’ve deployed user activity monitoring and data loss prevention (DLP) tools that flag suspicious behaviors, such as attempts to email large datasets outside the network. Additionally, they conduct quarterly training sessions to keep employees sharp against phishing schemes and social engineering. One recent success involved an employee recognizing a cleverly disguised
    A dual-screen image showing an employee interacting with a phishing email on one side and monitoring software detecting unusual activity on the other.

    Illustration of insider threat prevention: highlighting employee vigilance and monitoring tools to identify and mitigate risks from within the organization.

    phishing attempt and reporting it before any harm occurred. This kind of vigilance, combined with robust tools, keeps insider threats—intentional and accidental—in check.

  • Vendor Risk Management: Picture a retail organization with a network of third-party suppliers and service providers. Before signing contracts, they thoroughly vet vendors, ensuring they adhere to stringent cybersecurity standards. Once partnerships are established, they implement real-time monitoring of vendor access. Recently, this approach helped them catch and respond to an unauthorized attempt by a subcontractor to access sensitive customer data. This proactive stance on vendor risk management secures their data and demonstrates to customers and regulators their commitment to robust security practices.

Building a Security Culture

You set the tone for the organization. Advocating for regular training, allocating resources for advanced tools,  and leading by example reinforce a culture where security isn’t just a checklist but a shared value. Employees should feel empowered to recognize and report threats.

A handshake overlaid with cybersecurity shields, symbolizing secure partnerships and proactive vendor risk management practices.

Illustration of vendor risk management: emphasizing secure partnerships through rigorous vetting, real-time monitoring, and cybersecurity safeguards.

Closing Thoughts

Data protection and privacy are not just technical issues but strategic priorities. By understanding the stakes, implementing best practices, and fostering a security culture, you safeguard more than just data. You protect your organization’s reputation, build stakeholder trust, and ensure resilience in an ever-changing, data-driven world.

Let’s use these insights to assess where you stand and take actionable steps to improve. Together, you can lead the charge in building a secure and trusted organization.

Some sites that provide listings of data and privacy protection best practices:

For Small Businesses:  NIST Small Business Cybersecurity Corner

Retail Sector: Retail Cybersecurity: Threats, Statistics and Best Practices

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.