SlideShare une entreprise Scribd logo
1  sur  26
Do you know where your data is? Kevin Wharram - Guidance Software the Maker of ‘EnCase’
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Welcome ,[object Object],[object Object],[object Object]
Vusi Pikoli Where is my Data?
Industry Headlines Old hard drives still full of sensitive data Hard drives full of confidential data are still turning up on the second-hand market, researchers have reported. T.J. Maxx Breach Costs Hit $17 Million BOSTON - Information from at least 45.7 million credit and debit cards was stolen by hackers who accessed TJX’s customer information in a security breach that the discount retailer disclosed more than two months ago. Thieves setup data supermarkets Web criminals are stepping back from infecting computers themselves and creating "one-stop shops" which offer gigabytes of data for a fixed price. Credit card details are cheap, however, the log files of big companies can go for up to $300
Source : The Ponemon Institute - (PGP Survey) Cause of Data Breaches
[object Object],[object Object],[object Object],Source : The Ponemon Institute Cost of Data Breaches
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What type of Data are at Risk?
[object Object],Understanding Data Movement Where is your Data Stored?  - Data at Rest ,[object Object],[object Object],[object Object],Where is your Data being sent? – Data in Motion ,[object Object],[object Object],[object Object],Where is your Data being copied? ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Challenges facing Companies
Data Theft & Data Leakage
[object Object],[object Object],[object Object],[object Object],Data Theft
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data Leakage
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What leads to Data Theft?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What leads to Data Leakage?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How is Data Taken
My Data is gone! – “what do I do?”
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Incident Response
Countermeasures to Protect Data
Identify & Classify Information 1 Identify & Classify Information ,[object Object],[object Object],[object Object]
Assess Risks 2 ,[object Object],[object Object],[object Object],Assess Risks
Develop and apply Policies,  and Procedures Develop and apply Policies,  Procedures 3 ,[object Object],[object Object]
Audit Data 4 Deploy Technologies that Audit  Data and Enforce Policies ,[object Object],[object Object],EnCase Data Audit & Policy Enforcement
Communicate &  Monitor Communicate &  Monitor to assess use & Compliance 5 ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Summary
k [email_address] Questions?

Contenu connexe

Tendances

FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
Matthew Magner
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
Craig Mullins
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
David Cunningham
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
Gianmarco Ferri
 

Tendances (20)

Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011Best Practices For Information Security Management 2011
Best Practices For Information Security Management 2011
 
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAINCOMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
COMPUTER LAW, INVESTIGATION AND ETHICS DOMAIN
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
Rapid data services limited
Rapid data services limitedRapid data services limited
Rapid data services limited
 
Insider Threat Experiences
Insider Threat ExperiencesInsider Threat Experiences
Insider Threat Experiences
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)The impact of regulatory compliance on DBA(latest)
The impact of regulatory compliance on DBA(latest)
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 

En vedette

Folder Tbv Email01 (2)
Folder Tbv Email01 (2)Folder Tbv Email01 (2)
Folder Tbv Email01 (2)
KoertK
 
Why Have A Digital Investigative Infrastructure
Why Have A Digital Investigative InfrastructureWhy Have A Digital Investigative Infrastructure
Why Have A Digital Investigative Infrastructure
Kevin Wharram
 
Microfix N.V. Bedrijfspresentatie
Microfix N.V. BedrijfspresentatieMicrofix N.V. Bedrijfspresentatie
Microfix N.V. Bedrijfspresentatie
Bart_Koreman
 
8th nizo dairy conference
8th nizo dairy conference8th nizo dairy conference
8th nizo dairy conference
astridkemper
 

En vedette (15)

Now Massachusetts foreclosure can be stopped
Now Massachusetts foreclosure can be stoppedNow Massachusetts foreclosure can be stopped
Now Massachusetts foreclosure can be stopped
 
WHAT SHOULD YOU KNOW AOUT Foreclosure
WHAT SHOULD YOU KNOW AOUT Foreclosure WHAT SHOULD YOU KNOW AOUT Foreclosure
WHAT SHOULD YOU KNOW AOUT Foreclosure
 
About Massachusetts Foreclosure law and lawyers
About Massachusetts Foreclosure law and lawyersAbout Massachusetts Foreclosure law and lawyers
About Massachusetts Foreclosure law and lawyers
 
Masachusetts Foreclosure can be avoided
Masachusetts Foreclosure can be avoidedMasachusetts Foreclosure can be avoided
Masachusetts Foreclosure can be avoided
 
Folder Tbv Email01 (2)
Folder Tbv Email01 (2)Folder Tbv Email01 (2)
Folder Tbv Email01 (2)
 
Scisoare catre locuitorii casei"Terra"
Scisoare catre locuitorii casei"Terra"Scisoare catre locuitorii casei"Terra"
Scisoare catre locuitorii casei"Terra"
 
Why Have A Digital Investigative Infrastructure
Why Have A Digital Investigative InfrastructureWhy Have A Digital Investigative Infrastructure
Why Have A Digital Investigative Infrastructure
 
Microfix N.V. Bedrijfspresentatie
Microfix N.V. BedrijfspresentatieMicrofix N.V. Bedrijfspresentatie
Microfix N.V. Bedrijfspresentatie
 
Kevin wharram
Kevin wharramKevin wharram
Kevin wharram
 
David aaker-managementul-capitalului-unui-brand
David aaker-managementul-capitalului-unui-brandDavid aaker-managementul-capitalului-unui-brand
David aaker-managementul-capitalului-unui-brand
 
2014 - AINS - the Cluster of Nutrition and Health
2014 -  AINS - the Cluster of Nutrition and Health2014 -  AINS - the Cluster of Nutrition and Health
2014 - AINS - the Cluster of Nutrition and Health
 
Foreclosure can be avoided in a legal way
Foreclosure can be avoided in a legal wayForeclosure can be avoided in a legal way
Foreclosure can be avoided in a legal way
 
8th nizo dairy conference
8th nizo dairy conference8th nizo dairy conference
8th nizo dairy conference
 
CTNS-Technological Centre of Nutrition and Health
CTNS-Technological Centre of Nutrition and HealthCTNS-Technological Centre of Nutrition and Health
CTNS-Technological Centre of Nutrition and Health
 
Scrisoare catre locuitorii casei "Terra'
Scrisoare catre locuitorii casei "Terra'Scrisoare catre locuitorii casei "Terra'
Scrisoare catre locuitorii casei "Terra'
 

Similaire à Kevin Wharram Security Summit

Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
PECB
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
Patrick Garrett
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
Donna Koger
 

Similaire à Kevin Wharram Security Summit (20)

Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
CBC GDPR The Physics
CBC GDPR The PhysicsCBC GDPR The Physics
CBC GDPR The Physics
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011Dean carey - data loss-prevention - atlseccon2011
Dean carey - data loss-prevention - atlseccon2011
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01Hr Wcu General Security Awareness Training Ed01
Hr Wcu General Security Awareness Training Ed01
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Kevin Wharram Security Summit

  • 1. Do you know where your data is? Kevin Wharram - Guidance Software the Maker of ‘EnCase’
  • 2.
  • 3.
  • 4. Vusi Pikoli Where is my Data?
  • 5. Industry Headlines Old hard drives still full of sensitive data Hard drives full of confidential data are still turning up on the second-hand market, researchers have reported. T.J. Maxx Breach Costs Hit $17 Million BOSTON - Information from at least 45.7 million credit and debit cards was stolen by hackers who accessed TJX’s customer information in a security breach that the discount retailer disclosed more than two months ago. Thieves setup data supermarkets Web criminals are stepping back from infecting computers themselves and creating "one-stop shops" which offer gigabytes of data for a fixed price. Credit card details are cheap, however, the log files of big companies can go for up to $300
  • 6. Source : The Ponemon Institute - (PGP Survey) Cause of Data Breaches
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Data Theft & Data Leakage
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. My Data is gone! – “what do I do?”
  • 18.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.