SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Protecting Clients’ Assets and Brand Reputation

Data exfiltration
Just when we thought we had it
addressed
Protecting Clients’ Assets and Brand Reputation

My Top 5 Worries
•
•
•
•
•

Social Media
Ineffective Patching
Portable Media
Internet Printing Protocol
Email
Protecting Clients’ Assets and Brand Reputation

Tackling Data Security:
Data Management & Control
Data Management & Control

Protecting Clients’ Assets and Brand Reputation

Key Questions
• Where is our data?
• Who is using our data internally?
• Who have they shared our data with externally?
• How is our data being stored?
• Is our data being protected?
• Is our data SAFE?
• What is it we WANT to achieve?
But all I need is DLP right?

Protecting Clients’ Assets and Brand Reputation

DLP is an essential part of any Data Management and Control
program, but there are things it cant do:

• Protect your data when its not on your premises
• Stop 3rd parties forwarding it on
• Prevent the human factor
• Secure the physical
• Stop theft!
Protecting Clients’ Assets and Brand Reputation

Mapping Data Management
Where is your Data?

Protecting Clients’ Assets and Brand Reputation

Think about it, it may not be obvious. We can all guess our file
stores and our systems but;
• Your suppliers?
• Your bins?
• On twitter?
• Your employees websites?
• On your premises?
• In the cloud?
• Behind the fridge?
• Is it safe?
• Cornell Universities Spider
How do you use your data?

Protecting Clients’ Assets and Brand Reputation

We know we use our data to carry out business, but how is it
actually used?
• What do finance do with all those numbers?
• Why do marketing have all those mp3 files?
• How are development maintaining their source code?
• Has payroll embedded data in hidden spreadsheet fields?
• 3rd party processing?
• Is it safe?
We understand our data – lets protect it

Protecting Clients’ Assets and Brand Reputation

Protecting your data can prove harder than you think. 80% of the
challenge is to fix the human element

• User Training, User Training & User Training
• Policy Process & Procedure
• Fostering culture change
• Remember, Accidents Happen!
We understand our data – lets protect it

Protecting Clients’ Assets and Brand Reputation

The technology is easy, isn't it? Remember: if you can think of a
way around your technical controls, your staff will think of 5.

• Encrypt your laptops & devices
• Use strong endpoint technologies
• Have good identity management
• Enforce Data Classification
• Audit the change logs
• Train those above you
• Now train those below you
Take the Holistic View

Protecting Clients’ Assets and Brand Reputation

There is no one product that fits all scenarios, you need to find
what fits in your business.

• Protect at creation – Awareness Training? DLP?
• Protect during transmission – Awareness Training? Encryption?
• Protect in processing – Awareness Training? IRM?
• Protect the physical – Awareness Training?
• Protect at rest – Awareness Training? DLP?
Protecting Clients’ Assets and Brand Reputation

Tackling Data Security - Links:
• Our Website
• Information Security
• Our Skills, Your Team
• Penetration Testing

Weitere ähnliche Inhalte

Andere mochten auch

Common sense in security
Common sense in securityCommon sense in security
Common sense in securityPeter Bassill
 
Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016sistemasvenecia
 
Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1gpyaniry
 
TransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A PrimerTransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A PrimerLexSage PC
 
Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015Eslam Maksoud
 
2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATEDavid D'hooge
 
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
Cuadro comparativo  de las Reglas Generales de Comercio Exterior.Cuadro comparativo  de las Reglas Generales de Comercio Exterior.
Cuadro comparativo de las Reglas Generales de Comercio Exterior.Paola Salais
 
Proporcionalidad
ProporcionalidadProporcionalidad
Proporcionalidadjcremiro
 
El sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino UnidoEl sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino UnidoJosep Vidal-Alaball
 
Funciones de variable real: definiciones
Funciones de variable real: definicionesFunciones de variable real: definiciones
Funciones de variable real: definicionesjcremiro
 

Andere mochten auch (20)

DG Gaudi
DG GaudiDG Gaudi
DG Gaudi
 
Búsqueda en vector
Búsqueda en vectorBúsqueda en vector
Búsqueda en vector
 
Múltiples autorrepresentaciones
Múltiples autorrepresentacionesMúltiples autorrepresentaciones
Múltiples autorrepresentaciones
 
Common sense in security
Common sense in securityCommon sense in security
Common sense in security
 
Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016
 
Estrategias
EstrategiasEstrategias
Estrategias
 
Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1
 
3. presentacion
3. presentacion3. presentacion
3. presentacion
 
Estrategias de guerras
Estrategias de guerrasEstrategias de guerras
Estrategias de guerras
 
Null bachav
Null bachavNull bachav
Null bachav
 
TransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A PrimerTransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A Primer
 
Null meet Code Review
Null meet Code ReviewNull meet Code Review
Null meet Code Review
 
Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015
 
2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE
 
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
Cuadro comparativo  de las Reglas Generales de Comercio Exterior.Cuadro comparativo  de las Reglas Generales de Comercio Exterior.
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
 
Proporcionalidad
ProporcionalidadProporcionalidad
Proporcionalidad
 
El sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino UnidoEl sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino Unido
 
Agnosias
Agnosias Agnosias
Agnosias
 
Alteraciones en la asociacion visual
Alteraciones en la  asociacion visual Alteraciones en la  asociacion visual
Alteraciones en la asociacion visual
 
Funciones de variable real: definiciones
Funciones de variable real: definicionesFunciones de variable real: definiciones
Funciones de variable real: definiciones
 

Ähnlich wie Tackling data security

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techiesBrenton Johnson
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)DavidNicholls52
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeLenin Aboagye
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance WorldEvan Francen
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Edge Pereira
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsEdge Pereira
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveTargetX
 
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...zoheirop
 
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowRochester Software Associates
 
Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Cloudera, Inc.
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Senseusbcopynotify
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyPaul McQuillan
 

Ähnlich wie Tackling data security (20)

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagye
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance World
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
 
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Sense
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it Easy
 

Kürzlich hochgeladen

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Kürzlich hochgeladen (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Tackling data security

  • 1. Protecting Clients’ Assets and Brand Reputation Data exfiltration Just when we thought we had it addressed
  • 2. Protecting Clients’ Assets and Brand Reputation My Top 5 Worries • • • • • Social Media Ineffective Patching Portable Media Internet Printing Protocol Email
  • 3. Protecting Clients’ Assets and Brand Reputation Tackling Data Security: Data Management & Control
  • 4. Data Management & Control Protecting Clients’ Assets and Brand Reputation Key Questions • Where is our data? • Who is using our data internally? • Who have they shared our data with externally? • How is our data being stored? • Is our data being protected? • Is our data SAFE? • What is it we WANT to achieve?
  • 5. But all I need is DLP right? Protecting Clients’ Assets and Brand Reputation DLP is an essential part of any Data Management and Control program, but there are things it cant do: • Protect your data when its not on your premises • Stop 3rd parties forwarding it on • Prevent the human factor • Secure the physical • Stop theft!
  • 6. Protecting Clients’ Assets and Brand Reputation Mapping Data Management
  • 7. Where is your Data? Protecting Clients’ Assets and Brand Reputation Think about it, it may not be obvious. We can all guess our file stores and our systems but; • Your suppliers? • Your bins? • On twitter? • Your employees websites? • On your premises? • In the cloud? • Behind the fridge? • Is it safe? • Cornell Universities Spider
  • 8. How do you use your data? Protecting Clients’ Assets and Brand Reputation We know we use our data to carry out business, but how is it actually used? • What do finance do with all those numbers? • Why do marketing have all those mp3 files? • How are development maintaining their source code? • Has payroll embedded data in hidden spreadsheet fields? • 3rd party processing? • Is it safe?
  • 9. We understand our data – lets protect it Protecting Clients’ Assets and Brand Reputation Protecting your data can prove harder than you think. 80% of the challenge is to fix the human element • User Training, User Training & User Training • Policy Process & Procedure • Fostering culture change • Remember, Accidents Happen!
  • 10. We understand our data – lets protect it Protecting Clients’ Assets and Brand Reputation The technology is easy, isn't it? Remember: if you can think of a way around your technical controls, your staff will think of 5. • Encrypt your laptops & devices • Use strong endpoint technologies • Have good identity management • Enforce Data Classification • Audit the change logs • Train those above you • Now train those below you
  • 11. Take the Holistic View Protecting Clients’ Assets and Brand Reputation There is no one product that fits all scenarios, you need to find what fits in your business. • Protect at creation – Awareness Training? DLP? • Protect during transmission – Awareness Training? Encryption? • Protect in processing – Awareness Training? IRM? • Protect the physical – Awareness Training? • Protect at rest – Awareness Training? DLP?
  • 12. Protecting Clients’ Assets and Brand Reputation Tackling Data Security - Links: • Our Website • Information Security • Our Skills, Your Team • Penetration Testing