SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
5 Ways to Lockdown Your Sensitive Files
           with DLP and FAM

                         Presented by,
         Ash Devata, Sr. Manager, DLP Products, RSA
     Raphael Reich, Director of Product Marketing, Imperva
Agenda


 Major Trends
 5 Steps to Regain Control
 Conclusion And Q&A
Today’s Presenter
Ash Devata, Sr. Manager, DLP Products, RSA

 Expertise
    + DLP, data security, information
      classification
    + Presented at RSA, ISC2 sessions, EMC
      World, etc.
 Worked at
    + RSA, EMC, Startups
    + Chaired sustainable development
      projects in Boston
 Academics
    + Degrees in MBA and Electronics and
      Instrumentation Engineering
    + Co-author of books/journals on BPO
Today’s Presenter
Raphael Reich, Dir. Product Marketing, Imperva

 Expertise
    + 20+ years in product marketing,
      product management, and software
      engineering
 Professional Experience
    + Cisco, Check Point, Digital Equipment
      Corp.
 Academics
    + Bachelor’s degree in Computer Science
      from UC Santa Cruz
    + MBA from UCLA
 Major Trends
 5 Steps to Regain Control
 Conclusion And Q&A




                              CONFIDENTIAL
Data is Growing & Constantly Changing

                         Enterprise data volume
20%
                                                             Substantial volume
               80%             Unstructured (file data)      IDC: 2009 File-Based Storage Taxonomy, 11/09

                               Structured (DB, Apps)



         500
         400                             60%
Volume




         300
         200                                                 Constant growth
         100                                                 IDC: 11/09
           0
                1    2    3     4    5   6    7   8    9
         Time




                     • As data grows, so does the volume of user access rights
                     • Rights are also very dynamic
                              • Employees, contractors, consultants, etc., join/leave the
                                organization, start/finish projects, change job roles, etc.
Two Types of Sensitive Data




               Data You                    Data You
                 Collect                     Create

         • Credit card data          • Intellectual property
         • Privacy data (PII)        • Financial information
         • Health care information   • Trade secrets
And Companies Are Losing Data


                         Three Main Threat Vectors


         1                             2                        3




 Non-malicious end             IT and Business            Malicious user
user trying to get the          managing data          stealing data using
       job done             without total visibility     authorized tools
And There Are Regulations to Prevent Data Loss

   Regulations: sensitive data must be protected
Regulation           Scope                          Example Requirement                       Control measure
                                     Requirement 7: “Restrict access to cardholder         Audit and review user
PCI-DSS      Credit card data
                                     data by business need to know”                                  rights
                                     Section 164.312(b): “Implement…mechanisms
HIPAA        Healthcare-related PII                                                         Activity monitoring
                                     that record and examine activity…”
FERC-                                Requirement 5.1.2: “…create historical audit trails
             US energy industry                                                             Activity monitoring
NERC                                 of individual user account access activity.”
                                     Section 120.17: Restricts “Disclosing…or              Audit and review user
ITAR         US weapons export
                                     transferring technical data to a foreign person…”               rights
                                     Section 17.04 (1d): “…restrict access to active       Audit and review user
MA 201                               users and active user accounts…"                        rights, plus Activity
             PII of state residents                                     Summary
CMR 17                               Section 17.04 (2a) "restrict access...to those who    monitoring to identify
                                              Requirements                               Controls
                                     need…to perform their job duties"                          dormant users
                                    Business need-to-know               User rights auditing and reviews
                                    access
                                   Historical audit trails            Audit file access activity
                                   Restrict access to active users Correlate file rights with file access
                                                                   activity
Personal Information Breach Notification Laws



                                                   46     States have PII breach
                                                          notification laws




                                                   3214   Number of notified
                                                          incidents since Jan 2006




                                                   75%    PII breaches are a result
                                                          of insider actions




 States with No PII Breach Notification Laws
 Alabama, Kentucky, New Mexico, and South Dakota
Highly Prescriptive Regulations for Managing PII




                                   Proactive




                                  Prescriptive




                                   Auditable
End of The Day, Data Loss is Very Expensive


                                            What does a data breach
                                            cost?  US$7.2 Million
                                                                  or     $214 per record




      Source: 2010, Annual Study: Cost of a Data Breach, Ponemon Institute
The Second Type of Sensitive Data Is Import Too


        Source Code         Financial Results                   Blue Prints             Patent Filings

Road Maps             Contracts               Strategic Plans                M&A Initiatives     Bidding

ns    Partnership Plans     Investment Details               Portfolio Models          Competitive Intel

roduct Docs       Research Results         Un-Published Docs                 Raw R&D Data          Busin


              “Secrets comprise two-thirds of the value
                   of firms’ information portfolios”
                              Forrester 2009: Securing Sensitive IP Survey



            Competitive                      Brand                             Employee
            Advantage                        Equity                             Morale
Taking Data With Them When They Go


 Insiders
                                                    70% of employees plan to
                                                     take something with them
                                                     when they leave the job
                                                            + Intellectual Property: 27%
                                                            + Customer data: 17%


                                                    Over 50% feel they own it




       Source: November 2010 London Street Survey of 1026 people, Imperva
Example breach: $50M+ in automotive designs




                                    Xiang Dong Yu


                         •   Worked at Ford 10 years
                         •   Took 4,000 design documents
                         •   Estimated $50-100 Million in value
                         •   Went to work for Beijing Automotive Co.
 Major Trends
 5 Steps to Regain Control
 Conclusion And Q&A




                              CONFIDENTIAL
5-Steps To Regain Control



                                Discover
                              sensitive data




                                                       Identify data
           Remediate
                                                          owners




                  Implement                    Communicate
                    policy                       with data
                   controls                       owners
Discover Sensitive Data



                                         Attributes & Identity Analysis
SharePoint
             Grid
                                          • File extension
                                          • File type, size, etc.
Databases
             Virtual Grid
                                                Content in File

                             RSA DLP
                                          • General keywords
                            Datacenter
NAS/SAN                                   • Specialized keywords
             Temp Agents
                                          • Patterns and strings
                                          • Proximity analysis
File Servers Agents                       • “negative” rules




Endpoints
Data Discovery Is Part of RSA Data Loss Prevention




                   RSA DLP Enterprise Manager



       RSA DLP                 RSA DLP                      RSA DLP
       Network                Datacenter                    Endpoint




                                                       Connected   Disconnected
     Email   Web    File shares SharePoint Databases      PCs           PCs
When You Find Sensitive Data…

                                      IT decides on remediation
                                • IT does not have business context
                                 • Potential of disruption to business
         Result
         Sensitive files
         discovered by DLP


                                 Involve end-user in remediation

                                 •   Who to contact?
                                 •   What to ask?

                                •
                                 •
                                 •
                                     How to track responses?
                                     How to follow up?
                                     How to orchestrate?
                                 •   How to manage the process?
Step 2 In Regaining Control



                                Discover
                              sensitive data




                                                       Identify data
           Remediate
                                                          owners




                  Implement                    Communicate
                    policy                       with data
                   controls                       owners
How Owners Are Identified Today


    See who created the file/folder
    Examine ACLs
    Mass e-mails
    Phone calls
    Keep notes




                               Finding an owner: 1 hour per folder on average


22
Who Owns It? Ask The People Who Know Best…




     ?




23
Step 3 In Regaining Control



                                Discover
                              sensitive data




                                                       Identify data
           Remediate
                                                          owners




                  Implement                    Communicate
                    policy                       with data
                   controls                       owners
Communicate With Data Owners


SharePoint

               Grid                           Business Users


Databases

                Virtual Grid


                            RSA DLP             RSA DLP
NAS/SAN                    Datacenter   Risk Remediation Manager


               Temp Agents


File Servers                                  Imperva FAM
          Agents



Endpoints

                                          Manage Remediation
     Discover Sensitive Data
                                              Workflow
Step 4 In Regaining Control



                                   Discover
                                 sensitive data




                                                          Identify data
           Protect files
                                                             owners




                     Implement                    Communicate
                       policy                       with data
                      controls                       owners
Real Time Policy Enforcement Through FAM

                          Block and alert when users outside
                             Finance access Finance data

                          See triggered alerts




                         Drill down for details on
                        “who, what , when, where”
Leverage DLP Data Discovery in FAM




                            Click to import CSV
Leverage DLP Data Discovery in FAM




                           View classification in
                            SecureSphere and
                           use in policy building




29
Step 5 In Regaining Control



                                Discover
                              sensitive data




                                                       Identify data
           Remediate
                                                          owners




                  Implement                    Communicate
                    policy                       with data
                   controls                       owners
Apply Controls to Protect Data


SharePoint

               Grid                           Business Users

                                                                       Apply DRM
Databases

                Virtual Grid                                            Encrypt

                            RSA DLP             RSA DLP              Delete / Shred
NAS/SAN                    Datacenter   Risk Remediation Manager

                                                                   Change Permissions
               Temp Agents

                                                                    Policy Exception
File Servers                                  Imperva FAM
          Agents



Endpoints

                                          Manage Remediation            Apply
     Discover Sensitive Data
                                              Workflow                 Controls
Remediate Excessive Access




Should “Everyone” have access to sensitive data?                        Are there dormant users?
 • “Everyone” group in Active Directory literally means all users        • May want to revoke rights of inactive users




                        What rights are not used?
                          • Users with access they appear not to need
Understand Access Rights And Their Origins



                     See what a user can access




               …and how they got access to data
Traditional Approach – The Old Way

Day 4
Minimal context
for file
ownership.                             Day 150
                                       Spreadsheet consolidation
Let the e-mail                         into an access database -
exchange begin.                        Attempt to deliver metrics




      Day 1
      30K files discovered
      by DLP
                             Day 180
                             No consistent data.

                             Contractor funding extensions have ended.

                             Internal resources left with no repeatable process.
With The Solution: Reduce Time Up To 85%

                                        Day T + 60
                                        90% of files remediated
Day T + 5
1200 Owners
                                        Repeatable and
in 10 Countries
                                        continuously monitored
Identified by RSA
DLP
                                        Analyst work space and
                                        executive metrics in DLP
Imperva identifies                      RRM.
file owners based
on access to files            Day T + 15
                              DLP RRM sends initial
Day T                         questionnaire to data
30K files                     owners
discovered by RSA
DLP                           Data owners and IT
                              agree on remediation
                              controls
 Major Trends
 5 Steps to Regain Control
 Conclusion And Q&A




                              CONFIDENTIAL
To Wrap Up…


                             Discover
                           sensitive data



                                                                    • Data protection is essential
Protect files
                                                    Identify data
                                                       owners
                                                                    • Data protection goes beyond IT
                                                                    • Focus on people & process
                                                                    • Look for more complete solutions
                                                                    • Involve all stake holders in planning
                                            Communicate
          Implement
                                              with data
         policy controls
                                               owners
About RSA, The Security Division of EMC

                                  Network
 SIEM            DLP             Monitoring
                                                  Authentication

Web Fraud
Detection
                eGRC              IT GRC           Encryption




Manage Risk   Prove Compliance    Secure Access         Secure
and Threats                                          Virtualization
                                                        & Cloud
Imperva: Our Story in 60 Seconds




        Attack                       Usage
      Protection                     Audit

        Virtual                      Rights
       Patching                    Management

      Reputation                     Access
       Controls                      Control
Webinar Materials

 Get LinkedIn to
 Imperva Data Security Direct for…

                         Answers to
        Post-Webinar
                          Attendee
         Discussions
                         Questions



          Webinar
                        Much more…
       Recording Link
Questions and Answers
        Questions and Answers

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
Pratiksha Patil
 
криптиране и декриптиране
криптиране и декриптиранекриптиране и декриптиране
криптиране и декриптиране
Georgi Georgiev
 

Was ist angesagt? (20)

Berkenalan dengan ragam penyakit Autoimun
Berkenalan dengan ragam penyakit AutoimunBerkenalan dengan ragam penyakit Autoimun
Berkenalan dengan ragam penyakit Autoimun
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Diferensiasi sosial dan stratifikasi sosial
Diferensiasi sosial dan  stratifikasi sosialDiferensiasi sosial dan  stratifikasi sosial
Diferensiasi sosial dan stratifikasi sosial
 
Sosiologi
SosiologiSosiologi
Sosiologi
 
Unsur intrinsik Perahu Kertas
Unsur intrinsik Perahu KertasUnsur intrinsik Perahu Kertas
Unsur intrinsik Perahu Kertas
 
Dark Web Forensics
Dark Web Forensics Dark Web Forensics
Dark Web Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Cyberstalking ppt 02.18.19
Cyberstalking ppt   02.18.19Cyberstalking ppt   02.18.19
Cyberstalking ppt 02.18.19
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
Data encryption
Data encryptionData encryption
Data encryption
 
Privacy in private browsing mode
Privacy in private browsing modePrivacy in private browsing mode
Privacy in private browsing mode
 
Secure communication
Secure communicationSecure communication
Secure communication
 
Evästystä evästeiden käyttÜÜn
Evästystä evästeiden käyttÜÜnEvästystä evästeiden käyttÜÜn
Evästystä evästeiden käyttÜÜn
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
Seminário de SD - criptografia
Seminário de SD - criptografiaSeminário de SD - criptografia
Seminário de SD - criptografia
 
криптиране и декриптиране
криптиране и декриптиранекриптиране и декриптиране
криптиране и декриптиране
 
Tracking Emails
Tracking EmailsTracking Emails
Tracking Emails
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 

Andere mochten auch

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 

Andere mochten auch (8)

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Intro to Data Loss Prevention in SharePoint 2016
Intro to Data Loss Prevention in SharePoint 2016Intro to Data Loss Prevention in SharePoint 2016
Intro to Data Loss Prevention in SharePoint 2016
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Insider threat
Insider threatInsider threat
Insider threat
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 

Ähnlich wie How to Secure Your Files with DLP and FAM

Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
DATAVERSITY
 
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012   Wolfgang Nimfuehr - Bringing Big Data to the EnterpriseEDF2012   Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
European Data Forum
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
Ulf Mattsson
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Ulf Mattsson
 
ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012
Ulf Mattsson
 
Sans Tech Paper Hardware Vs Software Encryption
Sans Tech Paper   Hardware Vs Software EncryptionSans Tech Paper   Hardware Vs Software Encryption
Sans Tech Paper Hardware Vs Software Encryption
harshadthakar
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
David Cunningham
 

Ähnlich wie How to Secure Your Files with DLP and FAM (20)

Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare version
 
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012   Wolfgang Nimfuehr - Bringing Big Data to the EnterpriseEDF2012   Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
EDF2012 Wolfgang Nimfuehr - Bringing Big Data to the Enterprise
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Defining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case AssessmentDefining a Legal Strategy ... The Value in Early Case Assessment
Defining a Legal Strategy ... The Value in Early Case Assessment
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012ISACA New York Metro April 30 2012
ISACA New York Metro April 30 2012
 
CISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePointCISO's Guide to Securing SharePoint
CISO's Guide to Securing SharePoint
 
Sans Tech Paper Hardware Vs Software Encryption
Sans Tech Paper   Hardware Vs Software EncryptionSans Tech Paper   Hardware Vs Software Encryption
Sans Tech Paper Hardware Vs Software Encryption
 
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
Big Data Meets Social Analytics - IBM Connect 2012 (CN-CC13)
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 

Mehr von Imperva

Mehr von Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

KĂźrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

KĂźrzlich hochgeladen (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

How to Secure Your Files with DLP and FAM

  • 1. 5 Ways to Lockdown Your Sensitive Files with DLP and FAM Presented by, Ash Devata, Sr. Manager, DLP Products, RSA Raphael Reich, Director of Product Marketing, Imperva
  • 2. Agenda  Major Trends  5 Steps to Regain Control  Conclusion And Q&A
  • 3. Today’s Presenter Ash Devata, Sr. Manager, DLP Products, RSA  Expertise + DLP, data security, information classification + Presented at RSA, ISC2 sessions, EMC World, etc.  Worked at + RSA, EMC, Startups + Chaired sustainable development projects in Boston  Academics + Degrees in MBA and Electronics and Instrumentation Engineering + Co-author of books/journals on BPO
  • 4. Today’s Presenter Raphael Reich, Dir. Product Marketing, Imperva  Expertise + 20+ years in product marketing, product management, and software engineering  Professional Experience + Cisco, Check Point, Digital Equipment Corp.  Academics + Bachelor’s degree in Computer Science from UC Santa Cruz + MBA from UCLA
  • 5.  Major Trends  5 Steps to Regain Control  Conclusion And Q&A CONFIDENTIAL
  • 6. Data is Growing & Constantly Changing Enterprise data volume 20% Substantial volume 80% Unstructured (file data) IDC: 2009 File-Based Storage Taxonomy, 11/09 Structured (DB, Apps) 500 400 60% Volume 300 200 Constant growth 100 IDC: 11/09 0 1 2 3 4 5 6 7 8 9 Time • As data grows, so does the volume of user access rights • Rights are also very dynamic • Employees, contractors, consultants, etc., join/leave the organization, start/finish projects, change job roles, etc.
  • 7. Two Types of Sensitive Data Data You Data You Collect Create • Credit card data • Intellectual property • Privacy data (PII) • Financial information • Health care information • Trade secrets
  • 8. And Companies Are Losing Data Three Main Threat Vectors 1 2 3 Non-malicious end IT and Business Malicious user user trying to get the managing data stealing data using job done without total visibility authorized tools
  • 9. And There Are Regulations to Prevent Data Loss  Regulations: sensitive data must be protected Regulation Scope Example Requirement Control measure Requirement 7: “Restrict access to cardholder Audit and review user PCI-DSS Credit card data data by business need to know” rights Section 164.312(b): “Implement…mechanisms HIPAA Healthcare-related PII Activity monitoring that record and examine activity…” FERC- Requirement 5.1.2: “…create historical audit trails US energy industry Activity monitoring NERC of individual user account access activity.” Section 120.17: Restricts “Disclosing…or Audit and review user ITAR US weapons export transferring technical data to a foreign person…” rights Section 17.04 (1d): “…restrict access to active Audit and review user MA 201 users and active user accounts…" rights, plus Activity PII of state residents Summary CMR 17 Section 17.04 (2a) "restrict access...to those who monitoring to identify Requirements Controls need…to perform their job duties" dormant users Business need-to-know User rights auditing and reviews access Historical audit trails Audit file access activity Restrict access to active users Correlate file rights with file access activity
  • 10. Personal Information Breach Notification Laws 46 States have PII breach notification laws 3214 Number of notified incidents since Jan 2006 75% PII breaches are a result of insider actions States with No PII Breach Notification Laws Alabama, Kentucky, New Mexico, and South Dakota
  • 11. Highly Prescriptive Regulations for Managing PII Proactive Prescriptive Auditable
  • 12. End of The Day, Data Loss is Very Expensive What does a data breach cost? US$7.2 Million or $214 per record Source: 2010, Annual Study: Cost of a Data Breach, Ponemon Institute
  • 13. The Second Type of Sensitive Data Is Import Too Source Code Financial Results Blue Prints Patent Filings Road Maps Contracts Strategic Plans M&A Initiatives Bidding ns Partnership Plans Investment Details Portfolio Models Competitive Intel roduct Docs Research Results Un-Published Docs Raw R&D Data Busin “Secrets comprise two-thirds of the value of firms’ information portfolios” Forrester 2009: Securing Sensitive IP Survey Competitive Brand Employee Advantage Equity Morale
  • 14. Taking Data With Them When They Go Insiders  70% of employees plan to take something with them when they leave the job + Intellectual Property: 27% + Customer data: 17%  Over 50% feel they own it Source: November 2010 London Street Survey of 1026 people, Imperva
  • 15. Example breach: $50M+ in automotive designs Xiang Dong Yu • Worked at Ford 10 years • Took 4,000 design documents • Estimated $50-100 Million in value • Went to work for Beijing Automotive Co.
  • 16.  Major Trends  5 Steps to Regain Control  Conclusion And Q&A CONFIDENTIAL
  • 17. 5-Steps To Regain Control Discover sensitive data Identify data Remediate owners Implement Communicate policy with data controls owners
  • 18. Discover Sensitive Data Attributes & Identity Analysis SharePoint Grid • File extension • File type, size, etc. Databases Virtual Grid Content in File RSA DLP • General keywords Datacenter NAS/SAN • Specialized keywords Temp Agents • Patterns and strings • Proximity analysis File Servers Agents • “negative” rules Endpoints
  • 19. Data Discovery Is Part of RSA Data Loss Prevention RSA DLP Enterprise Manager RSA DLP RSA DLP RSA DLP Network Datacenter Endpoint Connected Disconnected Email Web File shares SharePoint Databases PCs PCs
  • 20. When You Find Sensitive Data… IT decides on remediation  • IT does not have business context • Potential of disruption to business Result Sensitive files discovered by DLP Involve end-user in remediation • Who to contact? • What to ask?  • • • How to track responses? How to follow up? How to orchestrate? • How to manage the process?
  • 21. Step 2 In Regaining Control Discover sensitive data Identify data Remediate owners Implement Communicate policy with data controls owners
  • 22. How Owners Are Identified Today  See who created the file/folder  Examine ACLs  Mass e-mails  Phone calls  Keep notes Finding an owner: 1 hour per folder on average 22
  • 23. Who Owns It? Ask The People Who Know Best… ? 23
  • 24. Step 3 In Regaining Control Discover sensitive data Identify data Remediate owners Implement Communicate policy with data controls owners
  • 25. Communicate With Data Owners SharePoint Grid Business Users Databases Virtual Grid RSA DLP RSA DLP NAS/SAN Datacenter Risk Remediation Manager Temp Agents File Servers Imperva FAM Agents Endpoints Manage Remediation Discover Sensitive Data Workflow
  • 26. Step 4 In Regaining Control Discover sensitive data Identify data Protect files owners Implement Communicate policy with data controls owners
  • 27. Real Time Policy Enforcement Through FAM Block and alert when users outside Finance access Finance data See triggered alerts Drill down for details on “who, what , when, where”
  • 28. Leverage DLP Data Discovery in FAM Click to import CSV
  • 29. Leverage DLP Data Discovery in FAM View classification in SecureSphere and use in policy building 29
  • 30. Step 5 In Regaining Control Discover sensitive data Identify data Remediate owners Implement Communicate policy with data controls owners
  • 31. Apply Controls to Protect Data SharePoint Grid Business Users Apply DRM Databases Virtual Grid Encrypt RSA DLP RSA DLP Delete / Shred NAS/SAN Datacenter Risk Remediation Manager Change Permissions Temp Agents Policy Exception File Servers Imperva FAM Agents Endpoints Manage Remediation Apply Discover Sensitive Data Workflow Controls
  • 32. Remediate Excessive Access Should “Everyone” have access to sensitive data? Are there dormant users? • “Everyone” group in Active Directory literally means all users • May want to revoke rights of inactive users What rights are not used? • Users with access they appear not to need
  • 33. Understand Access Rights And Their Origins See what a user can access …and how they got access to data
  • 34. Traditional Approach – The Old Way Day 4 Minimal context for file ownership. Day 150 Spreadsheet consolidation Let the e-mail into an access database - exchange begin. Attempt to deliver metrics Day 1 30K files discovered by DLP Day 180 No consistent data. Contractor funding extensions have ended. Internal resources left with no repeatable process.
  • 35. With The Solution: Reduce Time Up To 85% Day T + 60 90% of files remediated Day T + 5 1200 Owners Repeatable and in 10 Countries continuously monitored Identified by RSA DLP Analyst work space and executive metrics in DLP Imperva identifies RRM. file owners based on access to files Day T + 15 DLP RRM sends initial Day T questionnaire to data 30K files owners discovered by RSA DLP Data owners and IT agree on remediation controls
  • 36.  Major Trends  5 Steps to Regain Control  Conclusion And Q&A CONFIDENTIAL
  • 37. To Wrap Up… Discover sensitive data • Data protection is essential Protect files Identify data owners • Data protection goes beyond IT • Focus on people & process • Look for more complete solutions • Involve all stake holders in planning Communicate Implement with data policy controls owners
  • 38. About RSA, The Security Division of EMC Network SIEM DLP Monitoring Authentication Web Fraud Detection eGRC IT GRC Encryption Manage Risk Prove Compliance Secure Access Secure and Threats Virtualization & Cloud
  • 39. Imperva: Our Story in 60 Seconds Attack Usage Protection Audit Virtual Rights Patching Management Reputation Access Controls Control
  • 40. Webinar Materials Get LinkedIn to Imperva Data Security Direct for… Answers to Post-Webinar Attendee Discussions Questions Webinar Much more… Recording Link
  • 41. Questions and Answers Questions and Answers