SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
Data Leakage
Prevention
               Interop 2010




                  w w w .niiconsulting.com
Agenda

 Introduction
 Data Leakage Scenario
   Cases
   Real-world impacts
   Vulnerabilities
 Building the Business Case
 Demystifying DLP Solutions
 Implementation Challenges




                               w w w .niiconsulting.com
Speaker Introduction

 Founder & Principal Consultant, Network
  Intelligence
 Certified as CISA, CISSP and CISM
 Speaker at Blackhat 2004, Interop 2005, IT
  Underground 2005, OWASP Asia 2008,2009
 Co-author of book on Metasploit Framework
  (Syngress), Linux Security & Controls (ISACA)
 Author of numerous articles on SecurityFocus,
  IT Audit, IS Controls (ISACA)
 Conducted numerous pen-tests, application
  security assessments, forensics, etc.

                                    w w w .niiconsulting.com
THE BIGGEST HACK IN
HISTORY

                 w w w .niiconsulting.com
Gonzalez, TJX and Heart-break-land

 >200 million credit card number stolen
 Heartland Payment Systems, 7-Eleven, and
  2 US national retailers hacked
 Modus operandi
     Visit retail stores to understand workings
     Analyze websites for vulnerabilities
     Hack in using SQL injection
     Inject malware
     Sniff for card numbers and details
     Hide tracks


                                          w w w .niiconsulting.com
The hacker underground

 Albert Gonzalez
      a/k/a “segvec,”
      a/k/a “soupnazi,”
      a/k/a “j4guar17”


 Malware, scripts and hacked data hosted on servers in:
      Latvia                 Ukraine
                              New Jersey
      Netherlands
                              California

 IRC chats
      March 2007: Gonzalez “planning my second phase against
       Hannaford”
      December 2007: Hacker P.T. “that’s how [HACKER 2]
       hacked Hannaford.”


                                               w w w .niiconsulting.com
Where does all this end up?
                                                   IRC Channels
                                                   #cc
                                                   #ccards
                                                   #ccinfo
                                                   #ccpower
                                                   #ccs
                                                   #masterccs
                                                   #thacc
                                                   #thecc
                                                   #virgincc

 Commands used on IRC
     !cardable
     !cc, !cclimit, !chk, !cvv2, !exploit, !order.log,
      !proxychk

                                                          w w w .niiconsulting.com
TJX direct costs               $200 million in
                                  fines/penalties




                 $41 million to
                     Visa
$24 million to
 MasterCard




                                    w w w .niiconsulting.com
Who’s been affected?




                       w w w .niiconsulting.com
BUILDING THE BUSINESS
CASE

                w w w .niiconsulting.com
Profitability in hacking – 2009




                            w w w .niiconsulting.com
Sectors hacked – Q1 2009




                           w w w .niiconsulting.com
Back of the envelope

SECURITY ROI


                       w w w .niiconsulting.com
Cost of an incident

 $6.6 million average cost of a data breach
 From this, cost of lost business is $4.6
  million
 More than $200 per compromised record

On the other hand:
 Fixing a bug costs $400 to $4000
 Cost increases exponentially as time lapses



                                   w w w .niiconsulting.com
Direct Costs

 Fees for legal recourse to address and
  forensics
 Short-term impact to R&D cost
  recuperation
 Long-term impact to profitability/revenue
  projections
 System and process audits
 Fines
 Regulatory audit fees
 Strategy consulting fees

                                  w w w .niiconsulting.com
Numbers on the table




                       w w w .niiconsulting.com
Indirect Cost




 $1 billion business
 20% new customer base lost
 10% of repeat customers lost




                                 w w w .niiconsulting.com
Impact to profit margin




                          w w w .niiconsulting.com
The Legal Angle

   Computer Crimes Act, 1997
   Electronic Commerce Act, 2006
   PCI DSS
   Central Bank of Malaysia Act, 2009
   Personal Data Protection Bill, ??
   Guidelines on Internet Insurance
   Other regulations




                                    w w w .niiconsulting.com
DEMYSTIFYING DLP
SOLUTIONS

                   w w w .niiconsulting.com
What does it stand for?

   Data Leakage Prevention
   Data Loss Protection
   Information Loss Protection
   Extrusion Prevention
   Content Monitoring and Filtering
   Content Monitoring and Protection




                                        w w w .niiconsulting.com
DLP Solutions

   Options
   Vendors
   Network
   End-point
   Content-aware
   Context-aware




                    w w w .niiconsulting.com
FEATURES TO LOOK OUT
FOR

                w w w .niiconsulting.com
Comprehensive Coverage




                         w w w .niiconsulting.com
Pre-defined policies




                       w w w .niiconsulting.com
Blocking & Alerting




                      w w w .niiconsulting.com
Management Console & Dashboards




                         w w w .niiconsulting.com
Under the hood

1. Rule-based Regular
   Expressions
2. Database Fingerprinting
3. Exact File Matching
4. Partial Document
   Matching
5. Statistical Analysis
6. Conceptual/Lexicon
7. Categories


                             w w w .niiconsulting.com
Protecting Data

 Data in motion
     Network monitor
     Email integration
     Filtering/blocking and proxy integration
     Internal networks
     Distributed and Hierarchical deployments
 Data at rest
   Content discovery techniques
   Remote scanning / Agent-Based Scanning /
    Memory-Resident Agent Scanning
 Data in use
   Endpoint protection
                                         w w w .niiconsulting.com
Coverage

   Network
   End-point
   Bluetooth
   Blackberry/iPhones/Smartphones
   Operating systems
   Virtualized servers
   Integration with AD/LDAP
   Integration with DRM



                                 w w w .niiconsulting.com
GETTING DOWN TO
BRASS TACKS

                  w w w .niiconsulting.com
Challenges

   User resistance – yet another solution
   Over-optimism – this is it!
   Under-estimation of effort involved
   Lack of trained resources
   Absence of policy and procedure framework
   Ownership resides with IT
   Expensive
   False positives
   Legal & regulatory framework


                                  w w w .niiconsulting.com
Implementation Plan

 What matters to you – listing of assets
 How important is it – classification of assets
 Where does it reside?
 Who should be able to do what with it – access
  rights policy
 Strategy
     Network Focused
     Endpoint Focused
     Storage Focused
 Integration with existing infrastructure
 Monitoring and fine-tuning

                                       w w w .niiconsulting.com
Is it working?

     Number of people/business groups contacted about incidents --
      tie in somehow with user awareness training.
     Remediation metrics to show trend results in reducing
      incidents
     Trend analysis over 3, 6, & 9 month periods to show how the
      number of events has reduced as remediation efforts kick in
     Reduction in the average severity of an event per user,
      business group, etc.
     Trend: number of broken business policies
     Trend: number of incidents related to automated business
      practices (automated emails)
     Trend: number of incidents that generated automatic email
     Trend: number of incidents that were generated from service
      accounts -- (emails, batch files, etc.)
Reference : http://securosis.com/blog/some-dlp-metrics/, Rich Mogull




                                                                       w w w .niiconsulting.com
Questions?
 Thank you!            kkmookhey@niiconsulting.com

Information Security      Information Security
Consulting Services       Training Services




                                      w w w .niiconsulting.com

Weitere ähnliche Inhalte

Was ist angesagt?

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for TabletSymantec
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 DaysDigital Guardian
 

Was ist angesagt? (20)

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
DLP
DLPDLP
DLP
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 

Ähnlich wie Data Leakage Prevention - K. K. Mookhey

Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq OWASP-Qatar Chapter
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in CybersecurityTeri Radichel
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC PerspectivePositive Hack Days
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Property Portal Watch
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Tim Bass
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?Saumil Shah
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...HackIT Ukraine
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data securityUlf Mattsson
 

Ähnlich wie Data Leakage Prevention - K. K. Mookhey (20)

Application security enterprise strategies
Application security enterprise strategiesApplication security enterprise strategies
Application security enterprise strategies
 
Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?
 
A6704d01
A6704d01A6704d01
A6704d01
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 

Mehr von Network Intelligence India

ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationNetwork Intelligence India
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies Network Intelligence India
 
Distributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyDistributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyNetwork Intelligence India
 

Mehr von Network Intelligence India (20)

Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
The Economics of Security
The Economics of SecurityThe Economics of Security
The Economics of Security
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
National Cyber Security Policy 2013
National Cyber Security Policy 2013National Cyber Security Policy 2013
National Cyber Security Policy 2013
 
RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
Understanding Governance
Understanding GovernanceUnderstanding Governance
Understanding Governance
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Spear Phishing Methodology
Spear Phishing MethodologySpear Phishing Methodology
Spear Phishing Methodology
 
Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Distributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyDistributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing Methodology
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
XML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus ScannerXML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus Scanner
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Scada assessment case study
Scada assessment case studyScada assessment case study
Scada assessment case study
 

Kürzlich hochgeladen

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Kürzlich hochgeladen (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Data Leakage Prevention - K. K. Mookhey

  • 1. Data Leakage Prevention Interop 2010 w w w .niiconsulting.com
  • 2. Agenda  Introduction  Data Leakage Scenario  Cases  Real-world impacts  Vulnerabilities  Building the Business Case  Demystifying DLP Solutions  Implementation Challenges w w w .niiconsulting.com
  • 3. Speaker Introduction  Founder & Principal Consultant, Network Intelligence  Certified as CISA, CISSP and CISM  Speaker at Blackhat 2004, Interop 2005, IT Underground 2005, OWASP Asia 2008,2009  Co-author of book on Metasploit Framework (Syngress), Linux Security & Controls (ISACA)  Author of numerous articles on SecurityFocus, IT Audit, IS Controls (ISACA)  Conducted numerous pen-tests, application security assessments, forensics, etc. w w w .niiconsulting.com
  • 4. THE BIGGEST HACK IN HISTORY w w w .niiconsulting.com
  • 5. Gonzalez, TJX and Heart-break-land  >200 million credit card number stolen  Heartland Payment Systems, 7-Eleven, and 2 US national retailers hacked  Modus operandi  Visit retail stores to understand workings  Analyze websites for vulnerabilities  Hack in using SQL injection  Inject malware  Sniff for card numbers and details  Hide tracks w w w .niiconsulting.com
  • 6. The hacker underground  Albert Gonzalez  a/k/a “segvec,”  a/k/a “soupnazi,”  a/k/a “j4guar17”  Malware, scripts and hacked data hosted on servers in:  Latvia Ukraine New Jersey  Netherlands California  IRC chats  March 2007: Gonzalez “planning my second phase against Hannaford”  December 2007: Hacker P.T. “that’s how [HACKER 2] hacked Hannaford.” w w w .niiconsulting.com
  • 7. Where does all this end up? IRC Channels #cc #ccards #ccinfo #ccpower #ccs #masterccs #thacc #thecc #virgincc  Commands used on IRC  !cardable  !cc, !cclimit, !chk, !cvv2, !exploit, !order.log, !proxychk w w w .niiconsulting.com
  • 8. TJX direct costs $200 million in fines/penalties $41 million to Visa $24 million to MasterCard w w w .niiconsulting.com
  • 9. Who’s been affected? w w w .niiconsulting.com
  • 10. BUILDING THE BUSINESS CASE w w w .niiconsulting.com
  • 11. Profitability in hacking – 2009 w w w .niiconsulting.com
  • 12. Sectors hacked – Q1 2009 w w w .niiconsulting.com
  • 13. Back of the envelope SECURITY ROI w w w .niiconsulting.com
  • 14. Cost of an incident  $6.6 million average cost of a data breach  From this, cost of lost business is $4.6 million  More than $200 per compromised record On the other hand:  Fixing a bug costs $400 to $4000  Cost increases exponentially as time lapses w w w .niiconsulting.com
  • 15. Direct Costs  Fees for legal recourse to address and forensics  Short-term impact to R&D cost recuperation  Long-term impact to profitability/revenue projections  System and process audits  Fines  Regulatory audit fees  Strategy consulting fees w w w .niiconsulting.com
  • 16. Numbers on the table w w w .niiconsulting.com
  • 17. Indirect Cost  $1 billion business  20% new customer base lost  10% of repeat customers lost w w w .niiconsulting.com
  • 18. Impact to profit margin w w w .niiconsulting.com
  • 19. The Legal Angle  Computer Crimes Act, 1997  Electronic Commerce Act, 2006  PCI DSS  Central Bank of Malaysia Act, 2009  Personal Data Protection Bill, ??  Guidelines on Internet Insurance  Other regulations w w w .niiconsulting.com
  • 20. DEMYSTIFYING DLP SOLUTIONS w w w .niiconsulting.com
  • 21. What does it stand for?  Data Leakage Prevention  Data Loss Protection  Information Loss Protection  Extrusion Prevention  Content Monitoring and Filtering  Content Monitoring and Protection w w w .niiconsulting.com
  • 22. DLP Solutions  Options  Vendors  Network  End-point  Content-aware  Context-aware w w w .niiconsulting.com
  • 23. FEATURES TO LOOK OUT FOR w w w .niiconsulting.com
  • 24. Comprehensive Coverage w w w .niiconsulting.com
  • 25. Pre-defined policies w w w .niiconsulting.com
  • 26. Blocking & Alerting w w w .niiconsulting.com
  • 27. Management Console & Dashboards w w w .niiconsulting.com
  • 28. Under the hood 1. Rule-based Regular Expressions 2. Database Fingerprinting 3. Exact File Matching 4. Partial Document Matching 5. Statistical Analysis 6. Conceptual/Lexicon 7. Categories w w w .niiconsulting.com
  • 29. Protecting Data  Data in motion  Network monitor  Email integration  Filtering/blocking and proxy integration  Internal networks  Distributed and Hierarchical deployments  Data at rest  Content discovery techniques  Remote scanning / Agent-Based Scanning / Memory-Resident Agent Scanning  Data in use  Endpoint protection w w w .niiconsulting.com
  • 30. Coverage  Network  End-point  Bluetooth  Blackberry/iPhones/Smartphones  Operating systems  Virtualized servers  Integration with AD/LDAP  Integration with DRM w w w .niiconsulting.com
  • 31. GETTING DOWN TO BRASS TACKS w w w .niiconsulting.com
  • 32. Challenges  User resistance – yet another solution  Over-optimism – this is it!  Under-estimation of effort involved  Lack of trained resources  Absence of policy and procedure framework  Ownership resides with IT  Expensive  False positives  Legal & regulatory framework w w w .niiconsulting.com
  • 33. Implementation Plan  What matters to you – listing of assets  How important is it – classification of assets  Where does it reside?  Who should be able to do what with it – access rights policy  Strategy  Network Focused  Endpoint Focused  Storage Focused  Integration with existing infrastructure  Monitoring and fine-tuning w w w .niiconsulting.com
  • 34. Is it working?  Number of people/business groups contacted about incidents -- tie in somehow with user awareness training.  Remediation metrics to show trend results in reducing incidents  Trend analysis over 3, 6, & 9 month periods to show how the number of events has reduced as remediation efforts kick in  Reduction in the average severity of an event per user, business group, etc.  Trend: number of broken business policies  Trend: number of incidents related to automated business practices (automated emails)  Trend: number of incidents that generated automatic email  Trend: number of incidents that were generated from service accounts -- (emails, batch files, etc.) Reference : http://securosis.com/blog/some-dlp-metrics/, Rich Mogull w w w .niiconsulting.com
  • 35. Questions? Thank you! kkmookhey@niiconsulting.com Information Security Information Security Consulting Services Training Services w w w .niiconsulting.com