Skip to main content

You are here

Toward A Data Aware Cybersecurity Strategy



We are currently living within a network-driven cybersecurity model. This model was designed to secure communications at levels that protect the underlying data, by hardening the perimeter and looking for intruders. The model originated in a simpler time. Most of the enterprise’s data and applications were isolated behind a perimeter. The perimeter could be identified and defended. Few users, and even fewer applications ‘poked their noses’ above the enterprise firewalls. Intruders were relatively easy to spot and interdict.

Document Date: 
Feb 1, 2021
Author (organization): 
ACT-IAC Institute for Innovation
Document type: 
Institute for Innovation