SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Are you a Beefeater? 
Title Layout 
GET FOCUSED ON 
PROTECTING YOUR 
CROWN JEWELS
Introduction “Solving Problems, is my Passion” 
I defend my companies competitive 
advantage by helping solve business 
problems through technology to 
work faster and safer. 
Who is Jack Nichelson? 
 Global Information Security Manager at large manufacturing company 
 15 years of experience in IT Security & Risk Management 
 Active in the security community (DefCon, ShmooCon, DerbyCon) 
 Teach Network Security and advise the Baldwin Wallace CCDC team
Problem Statement “No More Borders” 
Most security failures can be traced back to failures 
of decision making and not failures of technology. 
Key Challenges: 
 A need for information everywhere and on everything. 
 What is a Crown Jewel, where is it, who needs it, and how is it 
protected? 
 Traditional classification policies and handling guidelines have failed 
and are not consistently applied or used for decision making. 
 The culture inside the organization is not ready to do anything about 
sensitive data. 
 Vendor Management is not part of the Data Classification process. 
“For too long, compliance has tested physical assets and ignored 
the thing that matters most” - Chris Nickerson
Beefeaters 
“Change of the Guard” 
Once you have the basics covered, it time to start 
focusing on protecting your most imported data. 
Who better to protect your Crown Jewels than the Beefeaters? 
Tap into the iconic London Guard’s reputation, to develop an elite 
force to defend your organization’s most valuable assets from 
even trusted insiders. 
Empower the Data Handlers and 
hold the Data Owners responsible 
Data Governance…A Team Effort, 
But An Individual Responsibility!
Solution Approach “Security Spending is out of Balance” 
The Power of Three: 
 FBI – Counterintelligence for Corporate America 
 Establish a new mental model in leadership about the threats 
 PWC – Data Governance 
 Data Classification Criteria, Ranking & Inventory of Data 
Elements 
 SANS – 20 Critical Controls 
 Align Security Controls with Key Threats to Data Elements 
Big increase in IT security 
spending - Gartner 
Time to stop the unfocused spending on security and find 
the right balance of people, process & technology.
Counterintelligence “Lead through Awareness” 
Mission is to protect the company’s classified & proprietary 
technologies from theft & protect its most valuable asset – 
It’s People. 
Essential Elements of a Counterintelligence Program: 
 Create an organization-wide Data Privacy & CI Steering Committee 
 Recognition of the Insider & Foreign threat potential 
 Internal and external partnerships embedded within the company at 
key decision points 
 Integration of CI and Information Technology 
 Security & CI Awareness program & communication channel
Data Governance 
The first step in protecting your data is knowing 
its value, so you have a reason to find it. 
Data Classification Process: 
Gather & Assess Data Elements 
“Can't protect what you don’t understand” 
o Conduct detailed working sessions to identify & define sensitive data 
o Define levels of confidentiality (Public, Internal, Confidential, Restricted) 
o Identify data elements, applications, data flows, and create data inventory 
Weight & Heat Map Data Elements 
o Assign weighting to identified data elements 
o Ensure operational activities are aligned with classification 
o Create heat map across each functional area of data classifications and risks 
o Get management agreement of classification scoring & threats of data loss
Security Framework “Focusing your Resources” 
The 20 Critical Security Controls focus on prioritizing security 
on “What Works” for immediate high-value action. 
Guiding Principles: 
 Start from thinking you have been breached and work backwards 
 Defenses should focus on most common & damaging attacks 
 Ensure consistent controls are applied for the right level of impact 
 Defenses should be automated, measured, and audited 
 Measurements & metrics that everyone agrees on 
“Don’t prioritize too many priorities” – James Tarala
Defining Your Critical Data 
How to get started: 
Process Framework: 
 DEFINE your critical data assets 
 DISCOVER critical data security environment 
 BASELINE critical data security processes and controls 
 SECURE critical data 
 MONITOR with proper governance and metrics 
Key Steps to Get Started: 
 Define what is your critical data & how to score it 
 Define your Data Classification Criteria & Ranking 
 Create an Inventory of your Data Elements 
 Establish Process & Control’s to protect your data
10 
Information Security Maturity Plan 
Milestone Accomplishments 
Monthly Security Awareness Training 
 Patching most systems within 15 days 
Removed Java from 85% of workstations 
Hard Drive Encryption for Laptops 
Web Security with Egress Filtering 
Network perimeter-Monitored Firewalls 
Minimum Security Baselines 
Achieved basic security compliance 
Achieved basic blocking & tackling security
Data Governance Roadmap
12 
Classification Criteria 
CATEGORY DESCRIPTION 
SAMPLE 
DOCUMENTS/RECORDS 
MARKING REPRODUCTION DISTRIBUTION STORAGE 
DESTRUCTION/ 
DISPOSAL 
Public Information that can 
be publicly disclosed. 
Marketing materials authorized for 
public release such as advertisements, 
brochures, published financial reports, 
Internet Web pages, catalogues, 
external public presentations and 
technical publications 
None, except 
copyright notice if 
applicable 
Unlimited Not restricted Not restricted Recycling/trash 
Internal 
Information whose 
unauthorized 
disclosure outside the 
organization would be 
inappropriate and 
inconvenient. 
Intranet web pages, internal contact 
information, newsletters, certain 
corporate policies and procedures, 
town hall presentations, benefit 
options, postings on internal bulletin 
boards, internal SDS databases 
None required, but 
can be marked "FOR 
INTERNAL 
DISTRIBUTION 
ONLY" if needed 
Unrestricted internally Internal distribution only Not restricted 
Paper: shred, Electronic: erase or 
degauss magnetic media. Send 
CDs, DVDs, dead hard drives, 
laptops, printers etc. to IT for 
appropriate disposal 
Confidential 
Information that will 
have a moderate* 
negative material 
impact on the 
organization. This 
information will 
negatively impact the 
organization if 
disclosed. 
*Less than $** 
million loss 
Best Practices, job manuals, R&D 
technical documents, QA information 
including test data, Idea Records, 
engineering drawings and 
documentation, PLC programs, certain 
agreements, customer lists, cost 
information, personal identifiable 
information, personal health 
information 
Company 
CONFIDENTIAL, ljk 
CONFIDENTIAL, 
;ldkfj;ljd 
CONFIDENTIAL 
(Company 
CONFIDENTIAL is the 
umbrella statement 
for data can be shared 
between companies; 
sdfsdf and sdf 
Confidential is for the 
given businesses). 
Marking is mandatory 
on first page. 
Only for legitimate business 
purposes and to limited 
audience. Secure print only. 
Internal: Distribute to a 
limited audience to those 
who need to know. Link to 
document if possible when 
emailing. Limit printing. 
External: Need appropriate 
agreement in place or by 
manager approval only. 
Encrypted network file share, 
encrypted USB (company 
owned), no local storage on 
hard drive, no storage on 
personal devices or personal 
email. Paper confidential 
documents must be stored 
under lock and key when not 
in use. 
Paper: shred, Electronic: erase or 
degauss magnetic media. Send 
CDs, DVDs, dead hard drives, 
laptops, printers etc. to IT for 
appropriate disposal 
Restricted 
Information that will 
have a significant* 
negative material 
impact on the 
organization and can 
provide significant 
third party personal or 
competitive financial 
gain. 
*Greater than $** 
million loss 
Restricted information includes export 
controlled data, ITAR controlled data, 
lkjhlk Customer Confidential, 
sakjhalskfjh Supplier Confidential 
information, communications marked 
attorney-client priviledge, and M&A 
information. Information deemed as 
"crown jewels" by the business team. 
Company 
RESTRICTED, FMI 
RESTRICTED, 
SEADRIFT 
RESTRICTED. 
Marking is manditory 
on all pages for all 
documents. May 
require additional 
marking (i.e., export 
controlled, Seadrift 
Customer 
Confidential, etc) 
depending on type of 
data. 
None, except with the 
permission of the Business 
Segnment President, the VP 
of R&D, or Business 
Segment Director of 
Intellectual Property and all 
copies are tracked. 
Defined distribution list 
approved by the Business 
Segnment President, the VP 
of R&D, or Business 
Segment Director of 
Intellectual Property. No 
further distribution allowed. 
Encrypted network file share, 
no local storage on hard drive, 
no storage on personal 
devices or personal email. 
Paper restriced documents 
must be stored under lock and 
key when not in use. All 
restricted data must have 
encryption at rest and in 
motion requiring two factor 
authenication. Full audit trail 
required. 
Paper: shred, Electronic: 
physically destroy magnetic 
media. Send CDs, DVDs, dead 
hard drives, laptops, printers etc. 
to IT for appropriate disposal
IMPACT Impact Description Potential loss earnings/cash flow 
5 Catastrophic / Major If this risk were to materialize, Company would find it difficult to recover. Over $25,000,000 
4 Significant The consequences of the risk materializing can be managed to some extent. $5,000,000 - $25,000,000 
3 Moderate The consequences of the risk materializing are not severe and can be managed. $1,000,000 - $5,000,000 
2 Low The consequences of the risk materializing are considered relatively unimportant. $100,000 - $1,000,000 
1 Negligible No consequences of this risk materializing are detectable. less than $100,000 
13 
Classification Scoring 
LIKELIHOOD Description Frequency of events 
5 Expected (occurs often) At least once a month 
4 Probable (known to occur) Once every six months 
3 Possible (known to occur occasionally) Once a year 
2 Unusual (has occurred somewhere) Once every 3-5 years 
1 Remote (could happen, but unlikely) Less than once in 5 yrs 
CONTROLS Description 
5 There is no formal or informal control associated with the risk. This includes uncontrollable risks. 
4 Controls do not provide reasonable assurance that a risk will be detected consistently or timely. Controls of this type are informal and are 
insufficient to prevent or mitigate the risk effectively. 
3 Controls in place provide assurance with a high level of certainty that a risk will be detected or prevented consistently and timely. Controls of this 
type are formal, but highly manual. Risk mitigation is implemented in a “reactionary” manner. 
2 Controls in place provide assurance with a high level of certainty that a risk will be detected or prevented consistently and timely. Controls of this 
type are formalized, and tested on a regular basis. Controls of this type are rated as “best practices”. 
1 Controls in place provide assurance with the highest level of certainty that a risk will be detected or prevented consistently and timely. These 
controls are highly formalized, automated and tested on a regular basis. Controls of this type are rated as “exceeding best practices”.
Inventory of Data Elements 
14
Summary “There's a reason why technology should be the last step” 
Time to stop the unfocused spending on security 
and find the right balance of people, process & 
technology. 
Stop waiting for others and Start today: 
 People – Counterintelligence Awareness Training 
 Empower the Data Handlers and hold the Data Owners responsible 
 Process – Facilitated Discussions 
 Build a consensus of Data Classification Criteria, Ranking & Inventory of 
Data Elements 
Technology – Align Security Controls with Key Threats 
 Implement Security Controls Commensurate with Data Element Scoring 
“Good security is not something you have, it’s something you do” – Wendy Nather
What Questions are there? 
Jack Nichelson 
E-mail: Jack@Nichelson.net 
Twitter: @Jack0Lope

Weitere ähnliche Inhalte

Was ist angesagt?

Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
padler01
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
Matthew Rosenquist
 
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHMergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
EQS Group
 

Was ist angesagt? (20)

Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk Management
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2
 
Supply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperSupply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - Whitepaper
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
 
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACHMergers & Acquisitions security - (ISC)2 Secure Summit DACH
Mergers & Acquisitions security - (ISC)2 Secure Summit DACH
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 

Ähnlich wie Protecting the Crown Jewels – Enlist the Beefeaters

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 

Ähnlich wie Protecting the Crown Jewels – Enlist the Beefeaters (20)

BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
trellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdftrellix-dlp-buyers-guide.pdf
trellix-dlp-buyers-guide.pdf
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)Data compliance - get it right the first time (Full color PDF)
Data compliance - get it right the first time (Full color PDF)
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers GDPR solutions (JS Event 28/2/18) | Greenlight Computers
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud10 Tips for CIOS Data Security in the Cloud
10 Tips for CIOS Data Security in the Cloud
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 

Mehr von Jack Nichelson

Mehr von Jack Nichelson (11)

A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdfA Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
A Clear Path to NIST & CMMC Compliance - 2023 Cleveland Security Summit.pdf
 
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptxA Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
 
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
A Clear Path to NIST & CMMC Compliance_ISSA.pptxA Clear Path to NIST & CMMC Compliance_ISSA.pptx
A Clear Path to NIST & CMMC Compliance_ISSA.pptx
 
Office 365 Security - Its 2am do you know whos in your office 365
Office 365 Security - Its 2am do you know whos in your office 365Office 365 Security - Its 2am do you know whos in your office 365
Office 365 Security - Its 2am do you know whos in your office 365
 
Creating a results oriented culture
Creating a results oriented cultureCreating a results oriented culture
Creating a results oriented culture
 
The kickstarter to measuring what matters Evanta CISO 2017
The kickstarter to measuring what matters   Evanta CISO 2017The kickstarter to measuring what matters   Evanta CISO 2017
The kickstarter to measuring what matters Evanta CISO 2017
 
Creating a Results Oriented Culture
Creating a Results Oriented CultureCreating a Results Oriented Culture
Creating a Results Oriented Culture
 
Moving Mountains Through Measurement
Moving Mountains Through MeasurementMoving Mountains Through Measurement
Moving Mountains Through Measurement
 
10 Critical Habits of Effective Security Managers
10 Critical Habits of Effective Security Managers10 Critical Habits of Effective Security Managers
10 Critical Habits of Effective Security Managers
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Protecting the Crown Jewels – Enlist the Beefeaters

  • 1. Are you a Beefeater? Title Layout GET FOCUSED ON PROTECTING YOUR CROWN JEWELS
  • 2. Introduction “Solving Problems, is my Passion” I defend my companies competitive advantage by helping solve business problems through technology to work faster and safer. Who is Jack Nichelson?  Global Information Security Manager at large manufacturing company  15 years of experience in IT Security & Risk Management  Active in the security community (DefCon, ShmooCon, DerbyCon)  Teach Network Security and advise the Baldwin Wallace CCDC team
  • 3. Problem Statement “No More Borders” Most security failures can be traced back to failures of decision making and not failures of technology. Key Challenges:  A need for information everywhere and on everything.  What is a Crown Jewel, where is it, who needs it, and how is it protected?  Traditional classification policies and handling guidelines have failed and are not consistently applied or used for decision making.  The culture inside the organization is not ready to do anything about sensitive data.  Vendor Management is not part of the Data Classification process. “For too long, compliance has tested physical assets and ignored the thing that matters most” - Chris Nickerson
  • 4. Beefeaters “Change of the Guard” Once you have the basics covered, it time to start focusing on protecting your most imported data. Who better to protect your Crown Jewels than the Beefeaters? Tap into the iconic London Guard’s reputation, to develop an elite force to defend your organization’s most valuable assets from even trusted insiders. Empower the Data Handlers and hold the Data Owners responsible Data Governance…A Team Effort, But An Individual Responsibility!
  • 5. Solution Approach “Security Spending is out of Balance” The Power of Three:  FBI – Counterintelligence for Corporate America  Establish a new mental model in leadership about the threats  PWC – Data Governance  Data Classification Criteria, Ranking & Inventory of Data Elements  SANS – 20 Critical Controls  Align Security Controls with Key Threats to Data Elements Big increase in IT security spending - Gartner Time to stop the unfocused spending on security and find the right balance of people, process & technology.
  • 6. Counterintelligence “Lead through Awareness” Mission is to protect the company’s classified & proprietary technologies from theft & protect its most valuable asset – It’s People. Essential Elements of a Counterintelligence Program:  Create an organization-wide Data Privacy & CI Steering Committee  Recognition of the Insider & Foreign threat potential  Internal and external partnerships embedded within the company at key decision points  Integration of CI and Information Technology  Security & CI Awareness program & communication channel
  • 7. Data Governance The first step in protecting your data is knowing its value, so you have a reason to find it. Data Classification Process: Gather & Assess Data Elements “Can't protect what you don’t understand” o Conduct detailed working sessions to identify & define sensitive data o Define levels of confidentiality (Public, Internal, Confidential, Restricted) o Identify data elements, applications, data flows, and create data inventory Weight & Heat Map Data Elements o Assign weighting to identified data elements o Ensure operational activities are aligned with classification o Create heat map across each functional area of data classifications and risks o Get management agreement of classification scoring & threats of data loss
  • 8. Security Framework “Focusing your Resources” The 20 Critical Security Controls focus on prioritizing security on “What Works” for immediate high-value action. Guiding Principles:  Start from thinking you have been breached and work backwards  Defenses should focus on most common & damaging attacks  Ensure consistent controls are applied for the right level of impact  Defenses should be automated, measured, and audited  Measurements & metrics that everyone agrees on “Don’t prioritize too many priorities” – James Tarala
  • 9. Defining Your Critical Data How to get started: Process Framework:  DEFINE your critical data assets  DISCOVER critical data security environment  BASELINE critical data security processes and controls  SECURE critical data  MONITOR with proper governance and metrics Key Steps to Get Started:  Define what is your critical data & how to score it  Define your Data Classification Criteria & Ranking  Create an Inventory of your Data Elements  Establish Process & Control’s to protect your data
  • 10. 10 Information Security Maturity Plan Milestone Accomplishments Monthly Security Awareness Training  Patching most systems within 15 days Removed Java from 85% of workstations Hard Drive Encryption for Laptops Web Security with Egress Filtering Network perimeter-Monitored Firewalls Minimum Security Baselines Achieved basic security compliance Achieved basic blocking & tackling security
  • 12. 12 Classification Criteria CATEGORY DESCRIPTION SAMPLE DOCUMENTS/RECORDS MARKING REPRODUCTION DISTRIBUTION STORAGE DESTRUCTION/ DISPOSAL Public Information that can be publicly disclosed. Marketing materials authorized for public release such as advertisements, brochures, published financial reports, Internet Web pages, catalogues, external public presentations and technical publications None, except copyright notice if applicable Unlimited Not restricted Not restricted Recycling/trash Internal Information whose unauthorized disclosure outside the organization would be inappropriate and inconvenient. Intranet web pages, internal contact information, newsletters, certain corporate policies and procedures, town hall presentations, benefit options, postings on internal bulletin boards, internal SDS databases None required, but can be marked "FOR INTERNAL DISTRIBUTION ONLY" if needed Unrestricted internally Internal distribution only Not restricted Paper: shred, Electronic: erase or degauss magnetic media. Send CDs, DVDs, dead hard drives, laptops, printers etc. to IT for appropriate disposal Confidential Information that will have a moderate* negative material impact on the organization. This information will negatively impact the organization if disclosed. *Less than $** million loss Best Practices, job manuals, R&D technical documents, QA information including test data, Idea Records, engineering drawings and documentation, PLC programs, certain agreements, customer lists, cost information, personal identifiable information, personal health information Company CONFIDENTIAL, ljk CONFIDENTIAL, ;ldkfj;ljd CONFIDENTIAL (Company CONFIDENTIAL is the umbrella statement for data can be shared between companies; sdfsdf and sdf Confidential is for the given businesses). Marking is mandatory on first page. Only for legitimate business purposes and to limited audience. Secure print only. Internal: Distribute to a limited audience to those who need to know. Link to document if possible when emailing. Limit printing. External: Need appropriate agreement in place or by manager approval only. Encrypted network file share, encrypted USB (company owned), no local storage on hard drive, no storage on personal devices or personal email. Paper confidential documents must be stored under lock and key when not in use. Paper: shred, Electronic: erase or degauss magnetic media. Send CDs, DVDs, dead hard drives, laptops, printers etc. to IT for appropriate disposal Restricted Information that will have a significant* negative material impact on the organization and can provide significant third party personal or competitive financial gain. *Greater than $** million loss Restricted information includes export controlled data, ITAR controlled data, lkjhlk Customer Confidential, sakjhalskfjh Supplier Confidential information, communications marked attorney-client priviledge, and M&A information. Information deemed as "crown jewels" by the business team. Company RESTRICTED, FMI RESTRICTED, SEADRIFT RESTRICTED. Marking is manditory on all pages for all documents. May require additional marking (i.e., export controlled, Seadrift Customer Confidential, etc) depending on type of data. None, except with the permission of the Business Segnment President, the VP of R&D, or Business Segment Director of Intellectual Property and all copies are tracked. Defined distribution list approved by the Business Segnment President, the VP of R&D, or Business Segment Director of Intellectual Property. No further distribution allowed. Encrypted network file share, no local storage on hard drive, no storage on personal devices or personal email. Paper restriced documents must be stored under lock and key when not in use. All restricted data must have encryption at rest and in motion requiring two factor authenication. Full audit trail required. Paper: shred, Electronic: physically destroy magnetic media. Send CDs, DVDs, dead hard drives, laptops, printers etc. to IT for appropriate disposal
  • 13. IMPACT Impact Description Potential loss earnings/cash flow 5 Catastrophic / Major If this risk were to materialize, Company would find it difficult to recover. Over $25,000,000 4 Significant The consequences of the risk materializing can be managed to some extent. $5,000,000 - $25,000,000 3 Moderate The consequences of the risk materializing are not severe and can be managed. $1,000,000 - $5,000,000 2 Low The consequences of the risk materializing are considered relatively unimportant. $100,000 - $1,000,000 1 Negligible No consequences of this risk materializing are detectable. less than $100,000 13 Classification Scoring LIKELIHOOD Description Frequency of events 5 Expected (occurs often) At least once a month 4 Probable (known to occur) Once every six months 3 Possible (known to occur occasionally) Once a year 2 Unusual (has occurred somewhere) Once every 3-5 years 1 Remote (could happen, but unlikely) Less than once in 5 yrs CONTROLS Description 5 There is no formal or informal control associated with the risk. This includes uncontrollable risks. 4 Controls do not provide reasonable assurance that a risk will be detected consistently or timely. Controls of this type are informal and are insufficient to prevent or mitigate the risk effectively. 3 Controls in place provide assurance with a high level of certainty that a risk will be detected or prevented consistently and timely. Controls of this type are formal, but highly manual. Risk mitigation is implemented in a “reactionary” manner. 2 Controls in place provide assurance with a high level of certainty that a risk will be detected or prevented consistently and timely. Controls of this type are formalized, and tested on a regular basis. Controls of this type are rated as “best practices”. 1 Controls in place provide assurance with the highest level of certainty that a risk will be detected or prevented consistently and timely. These controls are highly formalized, automated and tested on a regular basis. Controls of this type are rated as “exceeding best practices”.
  • 14. Inventory of Data Elements 14
  • 15. Summary “There's a reason why technology should be the last step” Time to stop the unfocused spending on security and find the right balance of people, process & technology. Stop waiting for others and Start today:  People – Counterintelligence Awareness Training  Empower the Data Handlers and hold the Data Owners responsible  Process – Facilitated Discussions  Build a consensus of Data Classification Criteria, Ranking & Inventory of Data Elements Technology – Align Security Controls with Key Threats  Implement Security Controls Commensurate with Data Element Scoring “Good security is not something you have, it’s something you do” – Wendy Nather
  • 16. What Questions are there? Jack Nichelson E-mail: Jack@Nichelson.net Twitter: @Jack0Lope

Hinweis der Redaktion

  1. What do you do and not your job title? My Value Proposition “What I do and How I do it” statement I defend my companies competitive advantage by helping you solve business problems through technology so you can work faster and safer. OLD: My job is to transform Information Security into a competitive advantage for Company. By solving business problems through technology to boost profits and reduce costs.
  2. Think like you have been hacked and you have to explain to your CEO why this was not protected by basic security. Mobile, social, cloud and big data, each a disruptive force, together change everything related to protecting systems and information. Many organizations are not aware of what their Crown Jewel information is, where it resides, who has access to it, or how it is protected.
  3. Operationalize Data governance, bring it back into the hand of the data handlers
  4. You always hear that the first step in protecting your data is knowing where it is but I would argue that its value.