Strategic Alliance Magazine Q1 2018 - 22

THE C HAN GIN G FACE OF DATA

much lower cost than if you attempt to 'bolt on' security
after the fact," he concludes.

When it comes to designing tools into the model,
"what need to come together are infrastructure, data,
and applications," adds Sivasankaran, who leads CisFor Jawahar Sivasankaran, senior director sales, strateco's security business development with strategic
gic partnerships for security at Cisco Systems, the
partners. "Those are the three technology pillars for
most critical security planning considerations in
multi-party collaborations. You then put the private
multi-party collaboration fall into these categories:
and public cloud underneath that. It's a
big shift from the '90s, where you would
Define the trust boundaries:
set up an extranet. You just can't isolate
How you are setting them up, defining them well ahead,
and do [these] things in the extranet
model. They need to work seamlessly and
and getting agreement.
not in isolation," he states.

Use the least privilege model:
Go with what you want to offer as a starting point, and
stack up as you go. Build over time as you open up a
broader way in a multi-party environment.

Align tech to business requirements:
Don't do tech just for the sake of tech; align it to the
partnership needs.

Agree on common standards:
Not just technology, but how data is being applied and
stored, the kind of breach protocols in place, and even how
to react on the people side when protocols are not followed.

Create data governance models:
These should contain regulatory and compliance
requirements.

Integrate security architectures:
Avoid fragmented security-a disconnected security
model becomes complex and unwieldy to manage in a
multi-party environment.
22
STRATEGIC ALLIANCE MAGAZINE | Q1 * 2018

"Realistically speaking, alliance managers
need to work within the confines of what
already exists today, such as 20- to 30-yearold Internet technology and industrial
systems like railroads that have been digitized-but not with the right security
structure. The reality is, we don't have a
clean slate to start with. The two walls are
different. The short answer is, we've got
existing infrastructure to build upon, and
blockchain will help," he says.

The Blockchain Link
and Evolving Tools
It's a buzzword that has popped up in nearly every interview I conducted on this
topic. Originally used as a platform for bitcoin, blockchain is a ledger technology that
has evolved into multiple business applications (see "How Blockchain Adds Security
to Supply Chains," Page 26). It's used for
"streamlining operations and creating new
opportunities," according to the ZDNet article and video "Blockchain Explained in
Plain English." While it has broad applications for financial data, it can be used for
healthcare, government, food safety networks, shipping, and many other
applications because the blocks of information use cryptography to link transactions
and secure data, increasing efficiency and
reducing costs. The segments or "chains"
are replicated throughout the system; corrupted portions can be restored.



Table of Contents for the Digital Edition of Strategic Alliance Magazine Q1 2018

No label
Strategic Alliance Magazine Q1 2018 - No label
Strategic Alliance Magazine Q1 2018 - 2
Strategic Alliance Magazine Q1 2018 - 3
Strategic Alliance Magazine Q1 2018 - 4
Strategic Alliance Magazine Q1 2018 - 5
Strategic Alliance Magazine Q1 2018 - 6
Strategic Alliance Magazine Q1 2018 - 7
Strategic Alliance Magazine Q1 2018 - 8
Strategic Alliance Magazine Q1 2018 - 9
Strategic Alliance Magazine Q1 2018 - 10
Strategic Alliance Magazine Q1 2018 - 11
Strategic Alliance Magazine Q1 2018 - 12
Strategic Alliance Magazine Q1 2018 - 13
Strategic Alliance Magazine Q1 2018 - 14
Strategic Alliance Magazine Q1 2018 - 15
Strategic Alliance Magazine Q1 2018 - 16
Strategic Alliance Magazine Q1 2018 - 17
Strategic Alliance Magazine Q1 2018 - 18
Strategic Alliance Magazine Q1 2018 - 19
Strategic Alliance Magazine Q1 2018 - 20
Strategic Alliance Magazine Q1 2018 - 21
Strategic Alliance Magazine Q1 2018 - 22
Strategic Alliance Magazine Q1 2018 - 23
Strategic Alliance Magazine Q1 2018 - 24
Strategic Alliance Magazine Q1 2018 - 25
Strategic Alliance Magazine Q1 2018 - 26
Strategic Alliance Magazine Q1 2018 - 27
Strategic Alliance Magazine Q1 2018 - 28
Strategic Alliance Magazine Q1 2018 - 29
Strategic Alliance Magazine Q1 2018 - 30
Strategic Alliance Magazine Q1 2018 - 31
Strategic Alliance Magazine Q1 2018 - 32
Strategic Alliance Magazine Q1 2018 - 33
Strategic Alliance Magazine Q1 2018 - 34
Strategic Alliance Magazine Q1 2018 - 35
Strategic Alliance Magazine Q1 2018 - 36
Strategic Alliance Magazine Q1 2018 - 37
Strategic Alliance Magazine Q1 2018 - 38
Strategic Alliance Magazine Q1 2018 - 39
Strategic Alliance Magazine Q1 2018 - 40
Strategic Alliance Magazine Q1 2018 - 41
Strategic Alliance Magazine Q1 2018 - 42
Strategic Alliance Magazine Q1 2018 - 43
Strategic Alliance Magazine Q1 2018 - 44
Strategic Alliance Magazine Q1 2018 - 45
Strategic Alliance Magazine Q1 2018 - 46
Strategic Alliance Magazine Q1 2018 - 47
Strategic Alliance Magazine Q1 2018 - 48
Strategic Alliance Magazine Q1 2018 - 49
Strategic Alliance Magazine Q1 2018 - 50
Strategic Alliance Magazine Q1 2018 - 51
Strategic Alliance Magazine Q1 2018 - 52
Strategic Alliance Magazine Q1 2018 - 53
Strategic Alliance Magazine Q1 2018 - 54
Strategic Alliance Magazine Q1 2018 - 55
Strategic Alliance Magazine Q1 2018 - 56
https://www.nxtbook.com/allen/stam/23-2
https://www.nxtbook.com/allen/stam/23-1
https://www.nxtbook.com/allen/stam/22-4
https://www.nxtbook.com/allen/stam/22-3
https://www.nxtbook.com/allen/stam/22-2
https://www.nxtbook.com/allen/stam/22-1
https://www.nxtbook.com/allen/stam/21-4
http://www.brightcopy.net/allen/stam/21-3
http://www.brightcopy.net/allen/stam/21-2
http://www.brightcopy.net/allen/stam/21-1
http://www.brightcopy.net/allen/stam/20-4
http://www.brightcopy.net/allen/stam/20-3
http://www.brightcopy.net/allen/stam/20-2
http://www.brightcopy.net/allen/stam/20-1
http://www.brightcopy.net/allen/stam/19-4
http://www.brightcopy.net/allen/stam/19-3
http://www.brightcopy.net/allen/stam/19-2
http://www.brightcopy.net/allen/stam/19-1
http://www.brightcopy.net/allen/stam/18-4
http://www.brightcopy.net/allen/stam/18-3
http://www.brightcopy.net/allen/stam/18-2
http://www.brightcopy.net/allen/stam/18-1
http://www.brightcopy.net/allen/stam/17-4
http://www.brightcopy.net/allen/stam/17-3
http://www.brightcopy.net/allen/stam/17-2
http://www.brightcopy.net/allen/stam/17-1
http://www.brightcopy.net/allen/stam/16-3
http://www.brightcopy.net/allen/stam/16-2
http://www.brightcopy.net/allen/stam/16-1
http://www.brightcopy.net/allen/stam/15-4
http://www.brightcopy.net/allen/stam/15-03
http://www.brightcopy.net/allen/stam/15-02
https://www.nxtbook.com/allen/stam/15-1
https://www.nxtbook.com/allen/stam/14-4
https://www.nxtbook.com/allen/stam/14-3
https://www.nxtbook.com/allen/stam/14-2
https://www.nxtbookmedia.com