SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
Cost Effective Data Protection

                Ulf Mattsson, CTO
Agenda

   Determining risks
   Risk valuation
   Data Protection options
   Cost effective approach
The Current Situation

                 While the economy is down, cybercrime is up
                 Data breach costs rise to $202 per record1




                                   Booming cybercrime economy sucks
                                   in recruits
                                   By John Leyden • Get more from this author
                                   Posted in Crime, 24th November 2008 13:47 GMT
                                   The underground economy is booming even as the rest
                                   of the economy lurches towards recession, according
                                   to a new study by Symantec.




1Source:   Ponemon Institute
Online Exposure2

            Online Data – largest number of breaches
            Offline data – larger number of records stolen




          87% of breaches could have been avoided through reasonable controls


2Slide   source: Verizon Business 2008 Data Breach Investigations Report
 04
The Goal: Good, Cost Effective Security

       The goal is to deliver a solution that is a balance
       between security, cost, and impact on the current
       business processes and user community

         Security plan - short term, long term, ongoing
         How much is ‘good enough’
         Security versus compliance
            • Good Security = Compliance
            • Compliance ≠ Good Security




05
Risk Adjusted Data Protection

         Assign value to your data
         Assess exposure
         Determine risk
         Understand which Data Protection solutions are
         available to you
         Estimate costs
         Choose most cost effective method




06
Assign Value to Your Data

         Identify sensitive data
            • If available, utilize data classification project
            • Rank what is sensitive on its own (think PCI)
            • Consider what is sensitive in combination (think Privacy)
         How valuable is the data to (1) your company and
         (2) to a thief
            • Corporate IP, Credit Card numbers, Personally
              Identifiable Information
         Assign a numeric value: high=5, low=1




07
Assess Exposure

        Locate the sensitive data
           • Applications, databases, files, data transfers across
             internal and external networks
        Location on network
           • Segmented
           • External or partner facing application
        Access
           • How many users have access to the sensitive data?
           • Who is accessing sensitive data?
           • How much and how frequently data is being accessed?
        Assign a numeric value: high=5, low=1

08
Determine Risk

         Data Security Risk=Data Value * Exposure

        Data Field             Value   Exposure   Risk Level
        Credit Card Number       5        5           25
        Social Security Number   5        4           20
        CVV                      5        4           20
        Customer Name            3        4           12
        Secret Formula           5        2           10
        Employee Name            3        3            9
        Employee Health Record   3        2            6
        Zip Code                 1        3            3



           Enables prioritization
           Groups data for potential solutions


09
Data Protection Approaches

          Data Access Control
            • How the data is presented to the end user and/or
              application


          Data Protection
            • How sensitive data is rendered unreadable




010
Data Protection Options

          Data Stored As
            • Clear – actual value is readable
            • Hash – unreadable, not reversible
            • Encrypted – unreadable, reversible
            • Replacement value (tokens) – unreadable, reversible
            • Partial encryption/replacement – unreadable, reversible




011
Data Protection Options

          Data in the Clear
            • Audit only
            • Masking
            • Access Control Limits
          Advantages
            • Low impact on existing applications
            • Performance
            • Time to deploy
          Considerations
            • Underlying data exposed
            • Discover breach after the fact

012
Data Protection Options

          Hash
            • Non – reversible
            • Strong protection
                 • Keyed hash (HMAC)
                 • Unique value if salt is used
          Advantages
            • None really
          Considerations
            • Key rotation for keyed hash
            • Size and type
            • Transparency

013
Data Protection Options

          Strong Encryption
            • Industry standard (AES CBC …)
            • Highest security level
          Advantages
            • Widely deployed
            • Compatibility
            • Performance
          Considerations
            • Storage and type
            • Transparency to applications
            • Key rotation

014
Data Protection Options

          Format Controlling Encryption
            • Maintains data type, length
          Advantages
            • Reduces changes to downstream systems
            • Storage
            • Partial encryption
          Considerations
            • Performance
            • Security
            • Key rotation
            • Transparency to applications

015
Data Protection Options

          Replacement Value (i.e. tokens, alias)
            • Proxy value created to replace original data
            • Centrally managed, protected
          Advantages
            • No changes to most downstream systems
            • Out of scope for compliance
            • No local key rotation
            • Partial replacement
          Considerations
            • Transparency for applications needing original data
            • Availability and performance for applications needing
              original data
016
Field Level Data Protection Methods vs. Time
         Protection
           Level
                                                   Tokenized Data
 High
                            Key
                          Rotation
                                             AES CBC




                                                 HMAC




                                                 AES FCE
             Plain Hash

Medium
                                                    Time
Format Controlling Encryption vs. Time
         Protection
           Level
                                             Tokenized Data
 High


                                                AES FCE
                                             (numeric & IV)




                                                 AES FCE
                                           (alphanumeric & fix IV)
Medium
                                                      Time
Field Level Data Protection Methods vs. Time
         Protection
           Level
                                                    Tokenized Data
 High



                                             AES CBC (rotating IV)



                                             AES CBC (fix IV, long data)


                                             AES CBC (fix IV, short data)
                                             AES ECB


Medium
                                                    Time
Data Protection Options & Cost Factors


       Storage              Performance   Storage   Security   Transparency

       Clear

       Strong Encryption

       Format Control
       Encryption
       Token (reversible)

       Hash




                    Highest                                    Lowest




020
Data Protection Capabilities


       Storage              Performance   Storage   Security    Transparency

       Clear

       Strong Encryption

       Format Controlling
       Encryption
       Token

       Hash




                    Highest                                    Lowest




021
Data Protection Implementation Choices

          Data Protection Options are not mutually exclusive
          Data Protection Layers
            • Application
            • Database
            • File System
          Data Protection Topologies
            • Remote services
            • Local service
          Data Security Management
            • Central management of keys, policy and reporting


022
Data Protection Implementation Choices


        System Layer            Performance   Transparency      Security

        Application

        Database

        File System




        Topology                Performance       Scalability   Security

        Local Service

        Remote Service



                      Highest                    Lowest


023
Determine Risk

          Data Security Risk=Data Value * Exposure

         Data Field             Value   Exposure   Risk Level
         Credit Card Number       5        5           25
         Social Security Number   5        4           20
         CVV                      5        4           20
         Customer Name            3        4           12
         Secret Formula           5        2           10
         Employee Name            3        3            9
         Employee Health Record   3        2            6
         Zip Code                 1        3            3



            Enables prioritization
            Groups data for potential solutions


024
Matching Data Protection Solutions with Risk Level

             Risk                      Solutions
         Low Risk                Monitor
           (1-5)

                                 Monitor, mask,
          At Risk
                                 access control
           (6-15)
                                 limits, format control
                                 encryption
                                 Replacement,
         High Risk
                                 strong encryption
          (16-25)




025
Matching Data Protection Solutions with Risk Level
Data Field             Risk Level
Credit Card Number         25
Social Security Number     20
CVV                        20
                                    Risk            Solutions
Customer Name              12
Secret Formula             10
                                    Low Risk
Employee Name              9                    Monitor
                                      (1-5)
Employee Health Record     6
Zip Code                   3
                                                Monitor, mask,
                                     At Risk    access control
                                      (6-15)    limits, format
  Select risk-adjusted                          control
                                                encryption
  solutions for costing
                                                Replacement,
                                    High Risk
                                                strong
                                     (16-25)
                                                encryption


026
Estimate Costs

        Cost = Solution Cost + Operations Cost
          Solution Cost = cost to license or develop, install
          and maintain
          Operations Cost = cost to change applications,
          impact on downstream systems, meeting SLAs,
          user experience




027
Operation Cost Factors

          Performance
            • Impact on operations - end users, data processing
              windows
          Storage
            • Impact on data storage requirements
          Security
            • How secure Is the data at rest
            • Impact on data access – separation of duties
          Transparency
            • Changes to application(s)
            • Impact on supporting utilities and processes

028
Operation Cost Factors

          Solution should be able to change with the
          environment
            • Progress from less to more secure solution, or the
              reverse
            • Add new defenses for future threats
            • Plug into existing infrastructure, integrate with other
              systems




029
The Protegrity Defiance© Suite

         Data Protection System (DPS)
           • Encryption, monitoring, masking
           • Database, file and application level
         Threat Management System (TMS)
           • Web application firewall
         Enterprise Security Administrator
           • Security policy
           • Key management
           • Alerting, reporting, and auditing




30
Data Security Management

         An integral part of technical and business process
         Security Policy
            • Centralized control of security policy
            • Consistent enforcement of protection
            • Separation of duties
         Reporting and Auditing
            • Compliance reports
            • Organization wide security event reporting
            • Alerting
            • Integration with SIM/SEM
         Key Management
031
Cost Effective Data Protection

          Uses Risk as an adjusting factor for determining a
          Data Protection strategy
          Risk=Data Value*Exposure
          Determines solutions that fit the risk level, then
          determines cost
          Cost=Solution Cost + Operational Cost
          Prepare for the future




032
Questions?

If you would like a copy of the slides,
                         please email
        ulf.mattsson@protegrity.com

Weitere ähnliche Inhalte

Ähnlich wie Cost Effective Data Protection

Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf MattssonUlf Mattsson
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionUlf Mattsson
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionUlf Mattsson
 
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...Surety, LLC
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonUlf Mattsson
 
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...MongoDB
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough? Zscaler
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rulesVormetric Inc
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection CompanyASBIS SK
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels PresentationRichard Blech
 
Securing data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCUlf Mattsson
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesUlf Mattsson
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data securityUlf Mattsson
 
Tokenization vs encryption vs masking
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs maskingUlf Mattsson
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA
 

Ähnlich wie Cost Effective Data Protection (20)

Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
 
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
 
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rules
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels Presentation
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Securing data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYC
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and Strategies
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
Tokenization vs encryption vs masking
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs masking
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
 

Mehr von Ulf Mattsson

Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Ulf Mattsson
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...Ulf Mattsson
 
Qubit conference-new-york-2021
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021Ulf Mattsson
 
Secure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesUlf Mattsson
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
 
Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeUlf Mattsson
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchainUlf Mattsson
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protectionUlf Mattsson
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonUlf Mattsson
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAUlf Mattsson
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2bUlf Mattsson
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 

Mehr von Ulf Mattsson (20)

Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Book
BookBook
Book
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
Qubit conference-new-york-2021
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021
 
Secure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use cases
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
 
Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicode
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 

Kürzlich hochgeladen

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Cost Effective Data Protection

  • 1. Cost Effective Data Protection Ulf Mattsson, CTO
  • 2. Agenda Determining risks Risk valuation Data Protection options Cost effective approach
  • 3. The Current Situation While the economy is down, cybercrime is up Data breach costs rise to $202 per record1 Booming cybercrime economy sucks in recruits By John Leyden • Get more from this author Posted in Crime, 24th November 2008 13:47 GMT The underground economy is booming even as the rest of the economy lurches towards recession, according to a new study by Symantec. 1Source: Ponemon Institute
  • 4. Online Exposure2 Online Data – largest number of breaches Offline data – larger number of records stolen 87% of breaches could have been avoided through reasonable controls 2Slide source: Verizon Business 2008 Data Breach Investigations Report 04
  • 5. The Goal: Good, Cost Effective Security The goal is to deliver a solution that is a balance between security, cost, and impact on the current business processes and user community Security plan - short term, long term, ongoing How much is ‘good enough’ Security versus compliance • Good Security = Compliance • Compliance ≠ Good Security 05
  • 6. Risk Adjusted Data Protection Assign value to your data Assess exposure Determine risk Understand which Data Protection solutions are available to you Estimate costs Choose most cost effective method 06
  • 7. Assign Value to Your Data Identify sensitive data • If available, utilize data classification project • Rank what is sensitive on its own (think PCI) • Consider what is sensitive in combination (think Privacy) How valuable is the data to (1) your company and (2) to a thief • Corporate IP, Credit Card numbers, Personally Identifiable Information Assign a numeric value: high=5, low=1 07
  • 8. Assess Exposure Locate the sensitive data • Applications, databases, files, data transfers across internal and external networks Location on network • Segmented • External or partner facing application Access • How many users have access to the sensitive data? • Who is accessing sensitive data? • How much and how frequently data is being accessed? Assign a numeric value: high=5, low=1 08
  • 9. Determine Risk Data Security Risk=Data Value * Exposure Data Field Value Exposure Risk Level Credit Card Number 5 5 25 Social Security Number 5 4 20 CVV 5 4 20 Customer Name 3 4 12 Secret Formula 5 2 10 Employee Name 3 3 9 Employee Health Record 3 2 6 Zip Code 1 3 3 Enables prioritization Groups data for potential solutions 09
  • 10. Data Protection Approaches Data Access Control • How the data is presented to the end user and/or application Data Protection • How sensitive data is rendered unreadable 010
  • 11. Data Protection Options Data Stored As • Clear – actual value is readable • Hash – unreadable, not reversible • Encrypted – unreadable, reversible • Replacement value (tokens) – unreadable, reversible • Partial encryption/replacement – unreadable, reversible 011
  • 12. Data Protection Options Data in the Clear • Audit only • Masking • Access Control Limits Advantages • Low impact on existing applications • Performance • Time to deploy Considerations • Underlying data exposed • Discover breach after the fact 012
  • 13. Data Protection Options Hash • Non – reversible • Strong protection • Keyed hash (HMAC) • Unique value if salt is used Advantages • None really Considerations • Key rotation for keyed hash • Size and type • Transparency 013
  • 14. Data Protection Options Strong Encryption • Industry standard (AES CBC …) • Highest security level Advantages • Widely deployed • Compatibility • Performance Considerations • Storage and type • Transparency to applications • Key rotation 014
  • 15. Data Protection Options Format Controlling Encryption • Maintains data type, length Advantages • Reduces changes to downstream systems • Storage • Partial encryption Considerations • Performance • Security • Key rotation • Transparency to applications 015
  • 16. Data Protection Options Replacement Value (i.e. tokens, alias) • Proxy value created to replace original data • Centrally managed, protected Advantages • No changes to most downstream systems • Out of scope for compliance • No local key rotation • Partial replacement Considerations • Transparency for applications needing original data • Availability and performance for applications needing original data 016
  • 17. Field Level Data Protection Methods vs. Time Protection Level Tokenized Data High Key Rotation AES CBC HMAC AES FCE Plain Hash Medium Time
  • 18. Format Controlling Encryption vs. Time Protection Level Tokenized Data High AES FCE (numeric & IV) AES FCE (alphanumeric & fix IV) Medium Time
  • 19. Field Level Data Protection Methods vs. Time Protection Level Tokenized Data High AES CBC (rotating IV) AES CBC (fix IV, long data) AES CBC (fix IV, short data) AES ECB Medium Time
  • 20. Data Protection Options & Cost Factors Storage Performance Storage Security Transparency Clear Strong Encryption Format Control Encryption Token (reversible) Hash Highest Lowest 020
  • 21. Data Protection Capabilities Storage Performance Storage Security Transparency Clear Strong Encryption Format Controlling Encryption Token Hash Highest Lowest 021
  • 22. Data Protection Implementation Choices Data Protection Options are not mutually exclusive Data Protection Layers • Application • Database • File System Data Protection Topologies • Remote services • Local service Data Security Management • Central management of keys, policy and reporting 022
  • 23. Data Protection Implementation Choices System Layer Performance Transparency Security Application Database File System Topology Performance Scalability Security Local Service Remote Service Highest Lowest 023
  • 24. Determine Risk Data Security Risk=Data Value * Exposure Data Field Value Exposure Risk Level Credit Card Number 5 5 25 Social Security Number 5 4 20 CVV 5 4 20 Customer Name 3 4 12 Secret Formula 5 2 10 Employee Name 3 3 9 Employee Health Record 3 2 6 Zip Code 1 3 3 Enables prioritization Groups data for potential solutions 024
  • 25. Matching Data Protection Solutions with Risk Level Risk Solutions Low Risk Monitor (1-5) Monitor, mask, At Risk access control (6-15) limits, format control encryption Replacement, High Risk strong encryption (16-25) 025
  • 26. Matching Data Protection Solutions with Risk Level Data Field Risk Level Credit Card Number 25 Social Security Number 20 CVV 20 Risk Solutions Customer Name 12 Secret Formula 10 Low Risk Employee Name 9 Monitor (1-5) Employee Health Record 6 Zip Code 3 Monitor, mask, At Risk access control (6-15) limits, format Select risk-adjusted control encryption solutions for costing Replacement, High Risk strong (16-25) encryption 026
  • 27. Estimate Costs Cost = Solution Cost + Operations Cost Solution Cost = cost to license or develop, install and maintain Operations Cost = cost to change applications, impact on downstream systems, meeting SLAs, user experience 027
  • 28. Operation Cost Factors Performance • Impact on operations - end users, data processing windows Storage • Impact on data storage requirements Security • How secure Is the data at rest • Impact on data access – separation of duties Transparency • Changes to application(s) • Impact on supporting utilities and processes 028
  • 29. Operation Cost Factors Solution should be able to change with the environment • Progress from less to more secure solution, or the reverse • Add new defenses for future threats • Plug into existing infrastructure, integrate with other systems 029
  • 30. The Protegrity Defiance© Suite Data Protection System (DPS) • Encryption, monitoring, masking • Database, file and application level Threat Management System (TMS) • Web application firewall Enterprise Security Administrator • Security policy • Key management • Alerting, reporting, and auditing 30
  • 31. Data Security Management An integral part of technical and business process Security Policy • Centralized control of security policy • Consistent enforcement of protection • Separation of duties Reporting and Auditing • Compliance reports • Organization wide security event reporting • Alerting • Integration with SIM/SEM Key Management 031
  • 32. Cost Effective Data Protection Uses Risk as an adjusting factor for determining a Data Protection strategy Risk=Data Value*Exposure Determines solutions that fit the risk level, then determines cost Cost=Solution Cost + Operational Cost Prepare for the future 032
  • 33. Questions? If you would like a copy of the slides, please email ulf.mattsson@protegrity.com