A new scoring methodology used by City of London Police helps officers see whether the risks involved with sharing data are worth the benefits. Some of the most sensitive digital data in London resides on the servers of the City of London Police–and a great deal of effort goes into making sure that it isn’t downloaded onto portable devices and then lost or stolen.Some of the precautions are technical, says Gary Brailsford, CIO and head of information management at the City of London Police, which is tasked with policing London’s financial district, the so-called “Square Mile.” (The Metropolitan police force handles the general policing of London.) Officers’ desktop computers, for example, are configured so that data must be stored on secure, centrally-managed network drives, rather than local C: drives. The use of e-mail for file sharing is actively discouraged, and is monitored. Software from security vendor DeviceLock prevents data being downloaded onto floppy drives or USB “thumb” drives. And when it is necessary to use portable media–for instance, so that data can be shared with external agencies such as the Crown Prosecution Service and the Serious Fraud Office–the department has a preferred device: MXI Security’s Stealth MXP biometric USB drive.Rather than just leaving it up to officers to decide when they can use the biometric USB drive, however, the department has created a detailed risk-assessment policy–one that not only establishes a framework for making decisions, but also allows officers insight into the process.Here’s how it works. Before an officer can download any data onto removable media, he or she must file a formal application to do so, and explain what information is involved, how sensitive it is, its security classification, why downloading is required, what steps will be taken to protect it, and what the consequences of loss might be. Based on the answers, officers themselves can then apply two scoring methodologies used by decision-makers–one for risks involved in sharing the data, the other for benefits accruing. In doing so, they can see the likelihood of their request being granted, and at what security level the decision will be made. This part of the form isn’t mandatory, explains Brailsford, but is included for informational purposes and to demonstrate transparency into the process. (Read on to see an excerpt from the risk assessment, including the scoring mechanism.)Completed applications that show excessive risk without the necessary benefit are turned down, Brailsford says. Alternatively, officers requesting permission to, say, download data onto CD-ROMs might be directed to use more secure means, such as the biometric USB device. As a final backstop, the downloading of information with the very highest security classifications is simply prohibited. “The intention is to encourage the officer to make a judgment call about the desirability of downloading the data in question,” Brailsford says. “It’s not about blindly asking permission, and filling in the questions. Officers need to think about the fuller implications of what they are asking for, and weighing the risks and the benefits.”See an excerpt of the City of London’s:Risk assessment scoring methodologyBenefits assessment scoring methodologyRisk/benefit comparison, with details about who can grant or deny approval* * * Malcolm Wheatley is a freelance writer based in England. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe