SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Name of presentation
Company name
Data Security:
Why You Need Data Loss Prevention
& How to Justify It
Name of presentation
Company name
Marc Crudgington
Vice President, Information Security
Agenda
Impact of Cyber Crime on our Economy1
Cost Companies are Incurring2
Who are the Threat Actors3
Data Loss Prevention Strategy4
Data Loss Prevention Ecosystem5
Hidden Benefits of Data Loss Prevention6
Justifying a Data Loss Prevention Strategy7
28%
8%
10%
8%
46%
Jobs in US Economy
IP
Int
en
siv
e
US Economy
4*1, 2, 3
Impact on US Industries
• IP: 70% of value of public companies
• Annual losses: estimated over $300B
• China: +$107B sales and +2.1M jobs
IP Intensive
• 2013: 856 reported breaches
• Q1 2014: 98.3% of data exposed
• 37%: Breaches affected the sector
Finance /
Business
• 43%: ITRC account of breaches
• 2013: 8.8M records stolen
• 1.8M: Victims of Identity Theft
Healthcare
5*3, 4, 5
US Economy: Loss Estimates
6
• 1M+ jobs lost and a $200B cost in 2010
• Based on estimate of 5,080 jobs per $1B
• 0.5% ($70B) or 1% ($140B) of National Income
• Globally - $350B or $700B
• Healthcare: $7B for HIPAA 2013 losses
• SMBs: 80% file bankruptcy or suffer significant
financial losses
• S&P 500: $136.5B due to AP Twitter hack
*6, 7, 9
Past Data Breaches
2011 2012 2013 2014
Adobe – 152M
(IDs, pwd, data)
Epsilon - $4B,
names/email
Saudi Aramco –
30,000+ PCs
infected
Target – 110M
affected;
CEO/CIO gone
eBay – 145M
credentials
7*9
Per Record Cost of Breach
2014201320122011
8
$201
$18
8
$194
$214
*6
Per Cyber Incident Cost
Associated Costs
9
Enterprises SMB’s Attack Type
Incident
- Prof Svcs $109k
- Bus. Opp. $457k
Prevention
- New IT Sec $57k
- Training $26k
Total $649k
Incident
- Prof Svcs $13k
- Bus. Opp. $23k
Prevention
- New IT Sec $9k
- Training $5k
Total $50k
Targeted
- Ent. $2.4M
- SMB $92k
Phishing
- Ent. $57k
- SMB $26k
DDoS
- Ent. $57k
- SMB $26k
*8
Malicious Cyber Activity
10
• Loss of IP and Confidential Information
• Cybercrime
• Loss of sensitive business information-stock
market manipulation
• Opportunity costs, including service and
employment disruptions, and reduced trust for
online activities
• The additional cost of securing networks,
insurance, and recovery from cyber attacks
• Reputational damage
Malicious Software
11
• Third-party apps 87% of vulnerabilities 2012
• Per day 315,000 new malicious programs
• 132 million applications at risk recorded in 2012
• Malicious software – 500,000 devices in 100
seconds
though
• 58% report IT Security under-resourced
• 40% under prepared
*8
Probability
Likelihood
Event happens
Your corporation
Impacts
Outcomes + or -
Event creates
Your corporation
What are your
Risks?
Threat vs. Risk
12
Cause
Adversary’s determination
Inflict damage
Accept success or failure
Ability
Adversary’s resources
Breach target
Inflict damage
Who are your
Threats?
Threat Risk
Threat Actors:
Criminals
Nation-
states
Corporation
s
Hacktivist
13
Extremists
Insiders
Animals, ‘Kids’, and the
Guy/Gal sitting next to you
Threat Actors: Animals
14
• Criminals
• Associated with Russian Federation, eastern-Euro
countries, Global as well
• Extort and/or sell data to others
• Strategic Web Compromise, Botnets, Phishing,…
• Nation-states
• Testing war-time capabilities
• Spying, stealing, disrupting
• SWC, DDoS, Malware,…
Threat Actors: ‘Kids’
15
• Extremists
• Fanatics of ideas that create identity
• Create terror or fear
• Al-Qaida, Jihad
• Hacktivists
• Wrong to a group (country, people, ‘under-dog’)
• Brazil World Cup, Sochi, Iranian election
• Anonymous, LulzSec, AntiSec, others
Threat Actors: Guy/Gal…
16
• Insiders
• Greed, hurt by corporation/organization
• Expertise – built, admin, system knowledge
• Accounts for about 15% of breaches
• Corporations
• Economic intelligence, sabotage
• IP theft, copying, infringement, duplicating
• Easier to steal it, not just China (Silicon Valley)
*10, 11
Result People
Processe
s
Tech. Leverage
DLP Strategy
What do
you want to
achieve?
Who are the
resources
we’ll need?
What’s in
place?
What not in
place?
Minimal
disruption
with greatest
coverage
In preparing for battle I have always found that plans are
useless, but planning is indispensable. ~Dwight D.
Eisenhower
17
Utilize others
for what they
know
DLP Strategy
18
• Result
Align DLP to protection Strategy; KPI’s
Evaluate for comprehensive solutions
Buy-in from key stakeholders
• People
Roles – clearly define them
Data Owners/Users – culture and importance of data
Expertise – internal and external
• Processes
Assess controls and business impact (HR issues)
Must have Data Classification program
Supporting Business processes
DLP Strategy
19
• Technology
Take steps, implement methodically
Next-gen products for maximum coverage
Over estimate
Silver Bullets do not exist
• Leverage
Vendors for implementation expertise
Like companies for solutions
Information sharing groups
DLP Strategy
20
Warning Signs
• Implement a workforce reduction
• Employees regularly export data
• Sensitive data resides across enterprise
• Outside vendor/contractor accesses sensitive data
• Unmonitored/controlled mobile devices
• Stock lower, product end, company sale
DLP Ecosystem
Data protection should be…
At rest In motion
On
endpoints
21
Data
Governanc
e
Regulatory
Classificatio
n
PoliciesTools
Discovery
Training
DLP
Program
DLP Ecosystem
22
Benefits of DLP
23
Flexible
Security
Data
Visibility
Limit
Liability
Cloud
and
Mobile
Prepared
for…
Detect
Maliciou
s Events
Compliance
Employee
Monitoring
Justifying DLP
24
• Bottom-up approach
• Discuss with divisions, incremental budget
• Present risks
• Current and Potential
• Utilize security trends
• Breach size, frequency, cost
• Cost of not having
• Quantified vs. Qualified
• Due diligence
• Assets, strategy, vendors, costs
Justifying DLP
25
• What are the regulatory requirements?
• State, federal, industry, customer
• Innovation cost
• Product development
• Present benefits
• Internal and external
• Thought out Project Plan
• Don’t over-sell, over-promise
• Use Truth Tactics
• Stock price, WSJ articles, C-level firings,
Fines, Prison
Do you have
any questions?
??
Thank
You!
Bibliography
1. The State of American Energy 2013 Report, http://www.api.org/~/media/Files/Policy/SOAE-
2013/SOAE-Report-2013.pdf
2. Select USA, Commerce.gov, Industry Snapshots, http://selectusa.commerce.gov/industry-snapshots
3. The IP Commission Report, National Bureau of Asian Research, May 2013
4. Financial Institutions Privacy and Security – 2013 Year in Review, January 7, 2014, Anne Foster and
Gerald Ferguson, Data Privacy Monitor
5. 2014 Data Breach Industry Forecast, Experian
6. 2014 Ponemon Study
7. The Economic Impact of Cybercrime and Cyber Espionage, McAfee, July 2013
8. IT Security by the Numbers: Calculating the Total Cost of Protection, Kaspersky Lab
9. Counting the Cost: A Meta-analysis of the Cost of Ineffective Business Continuity, The Business
Continuity Institute, Patrick Alcantara, 2014 www.bcifiles.com/BCI-CountingtheCost.pdf
10. CrowdStrike Global Threat Report: 2013 Year in Review, CrowdStrike
11. Verizon 2014 Data Breach Investigations Report, Verizon Corp, 2014

Weitere ähnliche Inhalte

Was ist angesagt?

Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for TabletSymantec
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónSymantec LATAM
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 DaysDigital Guardian
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyFidelis Cybersecurity
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 

Was ist angesagt? (20)

Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 

Andere mochten auch

Adapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint SecurityAdapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint SecurityTripwire
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Insider Threat: How Does Your Security Stack Measure Up?
Insider Threat: How Does Your Security Stack Measure Up?Insider Threat: How Does Your Security Stack Measure Up?
Insider Threat: How Does Your Security Stack Measure Up?ThinAir
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesAtif Ghauri
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?Priyanka Aash
 
Mastering The Fourth Industrial Revolution
Mastering The Fourth Industrial Revolution Mastering The Fourth Industrial Revolution
Mastering The Fourth Industrial Revolution Monty C. M. Metzger
 

Andere mochten auch (8)

Adapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint SecurityAdapt or Die: The Evolution of Endpoint Security
Adapt or Die: The Evolution of Endpoint Security
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Insider Threat: How Does Your Security Stack Measure Up?
Insider Threat: How Does Your Security Stack Measure Up?Insider Threat: How Does Your Security Stack Measure Up?
Insider Threat: How Does Your Security Stack Measure Up?
 
NextGen Endpoint Security for Dummies
NextGen Endpoint Security for DummiesNextGen Endpoint Security for Dummies
NextGen Endpoint Security for Dummies
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?
 
Endpoint is not enough
Endpoint is not enoughEndpoint is not enough
Endpoint is not enough
 
Mastering The Fourth Industrial Revolution
Mastering The Fourth Industrial Revolution Mastering The Fourth Industrial Revolution
Mastering The Fourth Industrial Revolution
 

Ähnlich wie Data Loss Prevention Strategy Justification

Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCapri Insurance
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFERMA
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksBlancco
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challengeFERMA
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response ManagementDon Caeiro
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsSolarWinds
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?Lumension
 
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. HawkinsSteel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkinslthawkins
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...SolarWinds
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 

Ähnlich wie Data Loss Prevention Strategy Justification (20)

Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. HawkinsSteel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
Steel Point Solutions IAS Track 3 "Sustaining a Cyber Workforce" by L.T. Hawkins
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 

Kürzlich hochgeladen

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Data Loss Prevention Strategy Justification

  • 1. Name of presentation Company name Data Security: Why You Need Data Loss Prevention & How to Justify It
  • 2. Name of presentation Company name Marc Crudgington Vice President, Information Security
  • 3. Agenda Impact of Cyber Crime on our Economy1 Cost Companies are Incurring2 Who are the Threat Actors3 Data Loss Prevention Strategy4 Data Loss Prevention Ecosystem5 Hidden Benefits of Data Loss Prevention6 Justifying a Data Loss Prevention Strategy7
  • 4. 28% 8% 10% 8% 46% Jobs in US Economy IP Int en siv e US Economy 4*1, 2, 3
  • 5. Impact on US Industries • IP: 70% of value of public companies • Annual losses: estimated over $300B • China: +$107B sales and +2.1M jobs IP Intensive • 2013: 856 reported breaches • Q1 2014: 98.3% of data exposed • 37%: Breaches affected the sector Finance / Business • 43%: ITRC account of breaches • 2013: 8.8M records stolen • 1.8M: Victims of Identity Theft Healthcare 5*3, 4, 5
  • 6. US Economy: Loss Estimates 6 • 1M+ jobs lost and a $200B cost in 2010 • Based on estimate of 5,080 jobs per $1B • 0.5% ($70B) or 1% ($140B) of National Income • Globally - $350B or $700B • Healthcare: $7B for HIPAA 2013 losses • SMBs: 80% file bankruptcy or suffer significant financial losses • S&P 500: $136.5B due to AP Twitter hack *6, 7, 9
  • 7. Past Data Breaches 2011 2012 2013 2014 Adobe – 152M (IDs, pwd, data) Epsilon - $4B, names/email Saudi Aramco – 30,000+ PCs infected Target – 110M affected; CEO/CIO gone eBay – 145M credentials 7*9
  • 8. Per Record Cost of Breach 2014201320122011 8 $201 $18 8 $194 $214 *6
  • 9. Per Cyber Incident Cost Associated Costs 9 Enterprises SMB’s Attack Type Incident - Prof Svcs $109k - Bus. Opp. $457k Prevention - New IT Sec $57k - Training $26k Total $649k Incident - Prof Svcs $13k - Bus. Opp. $23k Prevention - New IT Sec $9k - Training $5k Total $50k Targeted - Ent. $2.4M - SMB $92k Phishing - Ent. $57k - SMB $26k DDoS - Ent. $57k - SMB $26k *8
  • 10. Malicious Cyber Activity 10 • Loss of IP and Confidential Information • Cybercrime • Loss of sensitive business information-stock market manipulation • Opportunity costs, including service and employment disruptions, and reduced trust for online activities • The additional cost of securing networks, insurance, and recovery from cyber attacks • Reputational damage
  • 11. Malicious Software 11 • Third-party apps 87% of vulnerabilities 2012 • Per day 315,000 new malicious programs • 132 million applications at risk recorded in 2012 • Malicious software – 500,000 devices in 100 seconds though • 58% report IT Security under-resourced • 40% under prepared *8
  • 12. Probability Likelihood Event happens Your corporation Impacts Outcomes + or - Event creates Your corporation What are your Risks? Threat vs. Risk 12 Cause Adversary’s determination Inflict damage Accept success or failure Ability Adversary’s resources Breach target Inflict damage Who are your Threats? Threat Risk
  • 14. Threat Actors: Animals 14 • Criminals • Associated with Russian Federation, eastern-Euro countries, Global as well • Extort and/or sell data to others • Strategic Web Compromise, Botnets, Phishing,… • Nation-states • Testing war-time capabilities • Spying, stealing, disrupting • SWC, DDoS, Malware,…
  • 15. Threat Actors: ‘Kids’ 15 • Extremists • Fanatics of ideas that create identity • Create terror or fear • Al-Qaida, Jihad • Hacktivists • Wrong to a group (country, people, ‘under-dog’) • Brazil World Cup, Sochi, Iranian election • Anonymous, LulzSec, AntiSec, others
  • 16. Threat Actors: Guy/Gal… 16 • Insiders • Greed, hurt by corporation/organization • Expertise – built, admin, system knowledge • Accounts for about 15% of breaches • Corporations • Economic intelligence, sabotage • IP theft, copying, infringement, duplicating • Easier to steal it, not just China (Silicon Valley) *10, 11
  • 17. Result People Processe s Tech. Leverage DLP Strategy What do you want to achieve? Who are the resources we’ll need? What’s in place? What not in place? Minimal disruption with greatest coverage In preparing for battle I have always found that plans are useless, but planning is indispensable. ~Dwight D. Eisenhower 17 Utilize others for what they know
  • 18. DLP Strategy 18 • Result Align DLP to protection Strategy; KPI’s Evaluate for comprehensive solutions Buy-in from key stakeholders • People Roles – clearly define them Data Owners/Users – culture and importance of data Expertise – internal and external • Processes Assess controls and business impact (HR issues) Must have Data Classification program Supporting Business processes
  • 19. DLP Strategy 19 • Technology Take steps, implement methodically Next-gen products for maximum coverage Over estimate Silver Bullets do not exist • Leverage Vendors for implementation expertise Like companies for solutions Information sharing groups
  • 20. DLP Strategy 20 Warning Signs • Implement a workforce reduction • Employees regularly export data • Sensitive data resides across enterprise • Outside vendor/contractor accesses sensitive data • Unmonitored/controlled mobile devices • Stock lower, product end, company sale
  • 21. DLP Ecosystem Data protection should be… At rest In motion On endpoints 21
  • 24. Justifying DLP 24 • Bottom-up approach • Discuss with divisions, incremental budget • Present risks • Current and Potential • Utilize security trends • Breach size, frequency, cost • Cost of not having • Quantified vs. Qualified • Due diligence • Assets, strategy, vendors, costs
  • 25. Justifying DLP 25 • What are the regulatory requirements? • State, federal, industry, customer • Innovation cost • Product development • Present benefits • Internal and external • Thought out Project Plan • Don’t over-sell, over-promise • Use Truth Tactics • Stock price, WSJ articles, C-level firings, Fines, Prison
  • 26. Do you have any questions? ??
  • 28. Bibliography 1. The State of American Energy 2013 Report, http://www.api.org/~/media/Files/Policy/SOAE- 2013/SOAE-Report-2013.pdf 2. Select USA, Commerce.gov, Industry Snapshots, http://selectusa.commerce.gov/industry-snapshots 3. The IP Commission Report, National Bureau of Asian Research, May 2013 4. Financial Institutions Privacy and Security – 2013 Year in Review, January 7, 2014, Anne Foster and Gerald Ferguson, Data Privacy Monitor 5. 2014 Data Breach Industry Forecast, Experian 6. 2014 Ponemon Study 7. The Economic Impact of Cybercrime and Cyber Espionage, McAfee, July 2013 8. IT Security by the Numbers: Calculating the Total Cost of Protection, Kaspersky Lab 9. Counting the Cost: A Meta-analysis of the Cost of Ineffective Business Continuity, The Business Continuity Institute, Patrick Alcantara, 2014 www.bcifiles.com/BCI-CountingtheCost.pdf 10. CrowdStrike Global Threat Report: 2013 Year in Review, CrowdStrike 11. Verizon 2014 Data Breach Investigations Report, Verizon Corp, 2014