SlideShare une entreprise Scribd logo
1  sur  12
Protecting Clients’ Assets and Brand Reputation

Data exfiltration
Just when we thought we had it
addressed
Protecting Clients’ Assets and Brand Reputation

My Top 5 Worries
•
•
•
•
•

Social Media
Ineffective Patching
Portable Media
Internet Printing Protocol
Email
Protecting Clients’ Assets and Brand Reputation

Tackling Data Security:
Data Management & Control
Data Management & Control

Protecting Clients’ Assets and Brand Reputation

Key Questions
• Where is our data?
• Who is using our data internally?
• Who have they shared our data with externally?
• How is our data being stored?
• Is our data being protected?
• Is our data SAFE?
• What is it we WANT to achieve?
But all I need is DLP right?

Protecting Clients’ Assets and Brand Reputation

DLP is an essential part of any Data Management and Control
program, but there are things it cant do:

• Protect your data when its not on your premises
• Stop 3rd parties forwarding it on
• Prevent the human factor
• Secure the physical
• Stop theft!
Protecting Clients’ Assets and Brand Reputation

Mapping Data Management
Where is your Data?

Protecting Clients’ Assets and Brand Reputation

Think about it, it may not be obvious. We can all guess our file
stores and our systems but;
• Your suppliers?
• Your bins?
• On twitter?
• Your employees websites?
• On your premises?
• In the cloud?
• Behind the fridge?
• Is it safe?
• Cornell Universities Spider
How do you use your data?

Protecting Clients’ Assets and Brand Reputation

We know we use our data to carry out business, but how is it
actually used?
• What do finance do with all those numbers?
• Why do marketing have all those mp3 files?
• How are development maintaining their source code?
• Has payroll embedded data in hidden spreadsheet fields?
• 3rd party processing?
• Is it safe?
We understand our data – lets protect it

Protecting Clients’ Assets and Brand Reputation

Protecting your data can prove harder than you think. 80% of the
challenge is to fix the human element

• User Training, User Training & User Training
• Policy Process & Procedure
• Fostering culture change
• Remember, Accidents Happen!
We understand our data – lets protect it

Protecting Clients’ Assets and Brand Reputation

The technology is easy, isn't it? Remember: if you can think of a
way around your technical controls, your staff will think of 5.

• Encrypt your laptops & devices
• Use strong endpoint technologies
• Have good identity management
• Enforce Data Classification
• Audit the change logs
• Train those above you
• Now train those below you
Take the Holistic View

Protecting Clients’ Assets and Brand Reputation

There is no one product that fits all scenarios, you need to find
what fits in your business.

• Protect at creation – Awareness Training? DLP?
• Protect during transmission – Awareness Training? Encryption?
• Protect in processing – Awareness Training? IRM?
• Protect the physical – Awareness Training?
• Protect at rest – Awareness Training? DLP?
Protecting Clients’ Assets and Brand Reputation

Tackling Data Security - Links:
• Our Website
• Information Security
• Our Skills, Your Team
• Penetration Testing

Contenu connexe

En vedette

Common sense in security
Common sense in securityCommon sense in security
Common sense in securityPeter Bassill
 
Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016sistemasvenecia
 
Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1gpyaniry
 
TransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A PrimerTransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A PrimerLexSage PC
 
Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015Eslam Maksoud
 
2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATEDavid D'hooge
 
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
Cuadro comparativo  de las Reglas Generales de Comercio Exterior.Cuadro comparativo  de las Reglas Generales de Comercio Exterior.
Cuadro comparativo de las Reglas Generales de Comercio Exterior.Paola Salais
 
Proporcionalidad
ProporcionalidadProporcionalidad
Proporcionalidadjcremiro
 
El sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino UnidoEl sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino UnidoJosep Vidal-Alaball
 
Funciones de variable real: definiciones
Funciones de variable real: definicionesFunciones de variable real: definiciones
Funciones de variable real: definicionesjcremiro
 

En vedette (20)

DG Gaudi
DG GaudiDG Gaudi
DG Gaudi
 
Búsqueda en vector
Búsqueda en vectorBúsqueda en vector
Búsqueda en vector
 
Múltiples autorrepresentaciones
Múltiples autorrepresentacionesMúltiples autorrepresentaciones
Múltiples autorrepresentaciones
 
Common sense in security
Common sense in securityCommon sense in security
Common sense in security
 
Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016
 
Estrategias
EstrategiasEstrategias
Estrategias
 
Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1
 
3. presentacion
3. presentacion3. presentacion
3. presentacion
 
Estrategias de guerras
Estrategias de guerrasEstrategias de guerras
Estrategias de guerras
 
Null bachav
Null bachavNull bachav
Null bachav
 
TransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A PrimerTransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A Primer
 
Null meet Code Review
Null meet Code ReviewNull meet Code Review
Null meet Code Review
 
Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015
 
2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE
 
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
Cuadro comparativo  de las Reglas Generales de Comercio Exterior.Cuadro comparativo  de las Reglas Generales de Comercio Exterior.
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
 
Proporcionalidad
ProporcionalidadProporcionalidad
Proporcionalidad
 
El sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino UnidoEl sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino Unido
 
Agnosias
Agnosias Agnosias
Agnosias
 
Alteraciones en la asociacion visual
Alteraciones en la  asociacion visual Alteraciones en la  asociacion visual
Alteraciones en la asociacion visual
 
Funciones de variable real: definiciones
Funciones de variable real: definicionesFunciones de variable real: definiciones
Funciones de variable real: definiciones
 

Similaire à Tackling data security

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techiesBrenton Johnson
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)DavidNicholls52
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeLenin Aboagye
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to ComplianceSecurity Innovation
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance WorldEvan Francen
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Edge Pereira
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsEdge Pereira
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveTargetX
 
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...zoheirop
 
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowRochester Software Associates
 
Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Cloudera, Inc.
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Senseusbcopynotify
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyPaul McQuillan
 

Similaire à Tackling data security (20)

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagye
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance World
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
 
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Sense
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it Easy
 

Dernier

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Dernier (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

Tackling data security

  • 1. Protecting Clients’ Assets and Brand Reputation Data exfiltration Just when we thought we had it addressed
  • 2. Protecting Clients’ Assets and Brand Reputation My Top 5 Worries • • • • • Social Media Ineffective Patching Portable Media Internet Printing Protocol Email
  • 3. Protecting Clients’ Assets and Brand Reputation Tackling Data Security: Data Management & Control
  • 4. Data Management & Control Protecting Clients’ Assets and Brand Reputation Key Questions • Where is our data? • Who is using our data internally? • Who have they shared our data with externally? • How is our data being stored? • Is our data being protected? • Is our data SAFE? • What is it we WANT to achieve?
  • 5. But all I need is DLP right? Protecting Clients’ Assets and Brand Reputation DLP is an essential part of any Data Management and Control program, but there are things it cant do: • Protect your data when its not on your premises • Stop 3rd parties forwarding it on • Prevent the human factor • Secure the physical • Stop theft!
  • 6. Protecting Clients’ Assets and Brand Reputation Mapping Data Management
  • 7. Where is your Data? Protecting Clients’ Assets and Brand Reputation Think about it, it may not be obvious. We can all guess our file stores and our systems but; • Your suppliers? • Your bins? • On twitter? • Your employees websites? • On your premises? • In the cloud? • Behind the fridge? • Is it safe? • Cornell Universities Spider
  • 8. How do you use your data? Protecting Clients’ Assets and Brand Reputation We know we use our data to carry out business, but how is it actually used? • What do finance do with all those numbers? • Why do marketing have all those mp3 files? • How are development maintaining their source code? • Has payroll embedded data in hidden spreadsheet fields? • 3rd party processing? • Is it safe?
  • 9. We understand our data – lets protect it Protecting Clients’ Assets and Brand Reputation Protecting your data can prove harder than you think. 80% of the challenge is to fix the human element • User Training, User Training & User Training • Policy Process & Procedure • Fostering culture change • Remember, Accidents Happen!
  • 10. We understand our data – lets protect it Protecting Clients’ Assets and Brand Reputation The technology is easy, isn't it? Remember: if you can think of a way around your technical controls, your staff will think of 5. • Encrypt your laptops & devices • Use strong endpoint technologies • Have good identity management • Enforce Data Classification • Audit the change logs • Train those above you • Now train those below you
  • 11. Take the Holistic View Protecting Clients’ Assets and Brand Reputation There is no one product that fits all scenarios, you need to find what fits in your business. • Protect at creation – Awareness Training? DLP? • Protect during transmission – Awareness Training? Encryption? • Protect in processing – Awareness Training? IRM? • Protect the physical – Awareness Training? • Protect at rest – Awareness Training? DLP?
  • 12. Protecting Clients’ Assets and Brand Reputation Tackling Data Security - Links: • Our Website • Information Security • Our Skills, Your Team • Penetration Testing