Obscurity is not a good strategy in today’s cybersecurity landscape, where every company in any given ecosystem, down to the smallest contractor, is under threat of attack. Because it takes just one security weakness to expose the whole business supply chain, making maps of how corporate data moves inside and outside the company is critical, said participants at a New York cyber event Wednesday.

Technology and law executives must create data-flow maps to show where hand-offs to outside partners occur, said Ed McAndrew.