Big Data, Bigger Security Challenges | Dr. Roger Schell
Why It Matters
Without proactive data classification and vendor‑driven security, big‑data projects expose enterprises to amplified attack surfaces, jeopardizing both operational continuity and competitive advantage.
Key Takeaways
- •Big data expands attack surface by adding more platforms and connections.
- •Lack of data classification policies leaves sensitive information exposed in analytics.
- •Security industry remains reactive; proactive solutions are under‑invested.
- •Vendor responsibility is crucial; customers rely on secure hardware/software.
- •Executive awareness of subversion risks and data labeling drives effective mitigation.
Summary
The CIO Talk Radio interview with Dr. Roger Schell focused on how the rapid expansion of big‑data initiatives is creating new security vulnerabilities. Schell argued that every additional server, operating system, or data pipeline becomes a potential entry point, making the overall system only as secure as its weakest link. He highlighted several systemic issues: the proliferation of platforms inflates the attack surface, the lack of formal data‑classification policies leaves sensitive information exposed in analytics, and the security industry continues to react to breaches rather than invest in proactive defenses. Schell noted that while big‑data‑related incidents are not yet widely reported, examples such as NSA’s mass‑surveillance illustrate how aggregating data can amplify risk. Key moments included Schell’s warning that “the system is no more secure than its weakest link,” his criticism that vendors have little incentive to build secure products without a clear market, and the anecdote about hidden “Easter egg” functionalities that could be subverted by attackers. He also emphasized that CISOs often hesitate to raise these concerns because they lack ready solutions. The discussion concluded that organizations must start with robust data‑labeling and classification policies, demand security‑by‑design from vendors, and elevate executive awareness of subversion threats. Without these steps, the promise of big data will be outweighed by escalating security liabilities.
Comments
Want to join the conversation?
Loading comments...