Data-mapping is the next step when it comes to building cyber situational awareness, security leaders said at GovCIO Media & Research’s zero trust conference Thursday.
In order to detect suspicious activity on your network, you first need to understand what regular behavior looks like, said Gerald Caron, CIO for the Office of Inspector General at the Department of Health and Human Services (HHS).
“We are doing data mapping — not network mapping, but data mapping,” he said. “Understanding where our data is, where our data is going. Because if that’s what we’re trying to protect, we’ve got to understand what normal looks like. That will allow us to later do micro-segmentation.” … Read the full article here.




