Big Data, Bigger Security Challenges | Dr. Roger Schell

CIO Talk Network
CIO Talk NetworkMay 6, 2026

Why It Matters

Without proactive data classification and vendor‑driven security, big‑data projects expose enterprises to amplified attack surfaces, jeopardizing both operational continuity and competitive advantage.

Key Takeaways

  • Big data expands attack surface by adding more platforms and connections.
  • Lack of data classification policies leaves sensitive information exposed in analytics.
  • Security industry remains reactive; proactive solutions are under‑invested.
  • Vendor responsibility is crucial; customers rely on secure hardware/software.
  • Executive awareness of subversion risks and data labeling drives effective mitigation.

Summary

The CIO Talk Radio interview with Dr. Roger Schell focused on how the rapid expansion of big‑data initiatives is creating new security vulnerabilities. Schell argued that every additional server, operating system, or data pipeline becomes a potential entry point, making the overall system only as secure as its weakest link. He highlighted several systemic issues: the proliferation of platforms inflates the attack surface, the lack of formal data‑classification policies leaves sensitive information exposed in analytics, and the security industry continues to react to breaches rather than invest in proactive defenses. Schell noted that while big‑data‑related incidents are not yet widely reported, examples such as NSA’s mass‑surveillance illustrate how aggregating data can amplify risk. Key moments included Schell’s warning that “the system is no more secure than its weakest link,” his criticism that vendors have little incentive to build secure products without a clear market, and the anecdote about hidden “Easter egg” functionalities that could be subverted by attackers. He also emphasized that CISOs often hesitate to raise these concerns because they lack ready solutions. The discussion concluded that organizations must start with robust data‑labeling and classification policies, demand security‑by‑design from vendors, and elevate executive awareness of subversion threats. Without these steps, the promise of big data will be outweighed by escalating security liabilities.

Original Description

In this episode of CIO Talk Radio, Sanjog Aul is joined by Dr. Roger Schell, Professor at the University of Southern California, as they explore the intersection of big data and security. With big data becoming a strategic asset, the conversation delves into how it can inadvertently open organizations to greater security risks. Dr. Schell discusses the vulnerabilities introduced by big data, the challenges of proactively addressing security flaws, and the critical need for robust data policies to safeguard sensitive information.
Topics Covered:
The security vulnerabilities introduced by big data
Proactive vs. reactive approaches in cybersecurity
Importance of categorizing and labeling data
The role of CISOs in addressing data security
Insights into securing big data environments
Time Stamps:
00:00 - Introduction to the topic and guest
00:29 - Big data's impact on organizational security
01:44 - Security flaws introduced by big data platforms
02:54 - The business risk of big data and its vulnerabilities
04:34 - Reactive vs. proactive security solutions
06:08 - Addressing security with big data from a vendor perspective
09:03 - Categorizing data and identifying sensitive information
13:18 - The role of policy and architecture in securing data
22:10 - Vulnerabilities during the data collection and analysis stages
25:23 - Creating an ideal environment for secure big data operations
29:54 - Defining actions for organizations to safeguard big data
33:37 - Why strong security solutions must be implemented
36:52 - The future of big data security
Links:
About CIO Talk Network:
CIO Talk Network is a leading platform that brings insights into key topics around technology, innovation, and leadership for C-suite executives. Hosted by Sanjog Aul, this show offers an executive-level discussion of how technology influences business and organizational strategies. Tune in every week for inspiring conversations with industry experts.
Connect with us on:
Don’t forget to like, share, and subscribe for more insightful discussions.

Comments

Want to join the conversation?

Loading comments...