SlideShare une entreprise Scribd logo
1  sur  19
Battle Against Sensitive
Data Leakage
Margaret Umphrey
Director IT Security – East Carolina University
streeterm@ecu.edu
(252) 328-9187
Paula Hutcherson
User Account Manager – East Carolina University
hutchersonp@ecu.edu
(252) 328-9186
Sensitive Data Leaks
o What are Sensitive Data Leaks?
o Why Should Data Leaks Concern Us?
o How Can We Slow Data Leaks?
o Discussion of Strategies You Use
Sensitive Data Leaks
Data leakage: Unauthorized transmission of
data (information) to an external source.1
o Electronic
o Physical (paper)
o Human
1© SANS Institute 2007
Sensitive Data Leaks
Sensitive data leaks loom over us like storm
clouds; coming from every direction
Why are Universities More
Susceptible?
Decentralized IT
staff with own
IT policies and
practices
Huge amount of
data handled
Students
accessing with
limited training
and supervision
Why are Universities More
Susceptible?
Open nature of the
university physical
and technical
environment
Early adoption of
mobile devices,
social networking,
cloud computing,
etc.
Numerous
databases
maintained outside
of the centrally
managed databases
Why are Universities More
Susceptible?
Business partners
or research
sponsors failure to
protect data
Non-enforced
data-security
practices
Budget constraints
Why Should we be Concerned?
oUniversity of Hawaii at Manoa suffered a major data
breach that exposed the confidential records of more than
40,000 former students. A faculty member accidentally
uploaded the files that contained personal student records
to an unencrypted Web server2
oEight cabinets full of tax records were stolen from a
residence. The records belonged to a deceased tax
preparer2
2PHIPrivacy.net
Why Should we be Concerned?
oA flash drive containing over 280,000 patient names,
addresses, and personal health information was lost or
stolen by Keystone Mercy Health Plan and AmeriHealth
Mercy Health Plan in Philadelphia, Pennsylvania2
oA portable point of care device was stolen from an
employee of HomeCall Inc. Rockville, Maryland. Client
names, addresses, Social Security Numbers, medical
record numbers, diagnoses and treatment information were
on the unencrypted device2
2PHIPrivacy.net
Why Should we be Concerned?
oThe full names, driver's license numbers and Social Security
Numbers of 2,484 full and part-time employees of Arkansas
State University were accidentally emailed to university emails2
oRite Aid paid one million dollars to settle HIPAA privacy
violations; Rite Aid also agreed to update corporate policies and
procedures so that patient medical information would be properly
disposed, employees would be properly trained in disposal of
patient information, and employees would be held
accountable if they did not dispose of patient information
properly2
2PHIPrivacy.net
Data Breach Costs
Regulatory FERPA
NC
Identity
Theft
GLBA
PCI
Red
Flag
HIPAA
Compliance
Requirements
How Can We Slow the Leaks?
oIdentify Location of all Confidential Data
Conduct External DLP Assessment
Purchase and Implement DLP Solution
Conduct Internal Sensitive Data Scans
 Integrate Data Security into Data Ownership
 Integrate Security Awareness and Training into Culture
oEliminate Duplicate Data
Don’t Download from Centralized Systems
Remove Copies of Confidential Data
De-identify Personally Identifiable Data
Don’t Create Shadow Systems
How Can We Slow the Leaks?
oProtect Confidential Data
Implement Appropriate Security Controls
Encrypt Data at Rest
•Database, Server, Desktop, Laptop, Mobile Device
Encrypt Data in Motion
•Email, File Transfer, Remote Access, Data Entry
Securely Dispose of Data
•Paper, Hard Drives, Video, FAX, Printers, Medical Devices, etc.
oImplement Polices, Standards and Procedures
Data Ownership and Classification
Data Security Standards
Required Security Awareness and Training
Integrate Security into Design Phase
Incorporate Security into Governance
Challenges
oImplementing Encryption Standard
oImplementing DLP Solutions
oImplementing Required Training
oLimited Resources
oIT Security Incorporated into Governance
Challenges
oIntegrating Data Security into Data Ownership
oCentralizing IT Operations and Standards
oIntegrating Security into Research Protocols
oIntegrating Security into Purchase of Medical Devices
oEnforcing Non-compliance Sanctions
Where Do We Go From Here?
oHow Does Your University Manage Sensitive Data Leaks?
oShare Your Success
oWhat have You Found as the Top Challenges?
oWhat Recommendations can You Provide?
Battle Against Sensitive
Data Leakage
Margaret Umphrey
Director IT Security – East Carolina University
streeterm@ecu.edu
(252) 328-9187
Paula Hutcherson
User Account Manager – East Carolina University
hutchersonp@ecu.edu
(252) 328-9186
References
o A Comprehensive Study of Retail Data Security Breaches in the
United States - Kevin Prince - Perimeter eSecurity
o http://www.privacyrights.org/data-breach/new
o http://www.nymity.com/Free_Privacy_Resources
o http://www.sans.org/critical-security-controls/
o http://www.darkreading.com/insiderthreat/index.jhtml
o http://www.educause.edu/CybersecurityInitiative/Resources/1225

Contenu connexe

Tendances

International Conference on Cyber Security, Hide and Go Seek
International Conference on Cyber Security, Hide and Go SeekInternational Conference on Cyber Security, Hide and Go Seek
International Conference on Cyber Security, Hide and Go Seek
David Knox
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
Kashif Semple
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
Community IT Innovators
 
RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"
efrid630
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Paul C. Van Slyke
 

Tendances (20)

Don't manage strategic data in email
Don't manage strategic data in emailDon't manage strategic data in email
Don't manage strategic data in email
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
 
International Conference on Cyber Security, Hide and Go Seek
International Conference on Cyber Security, Hide and Go SeekInternational Conference on Cyber Security, Hide and Go Seek
International Conference on Cyber Security, Hide and Go Seek
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Encryption Solutions for Healthcare
Encryption Solutions for HealthcareEncryption Solutions for Healthcare
Encryption Solutions for Healthcare
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 
Enabling Dropbox for Business
Enabling Dropbox for BusinessEnabling Dropbox for Business
Enabling Dropbox for Business
 
Ht t17
Ht t17Ht t17
Ht t17
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic Documents
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
Community IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for NonprofitsCommunity IT Webinar - IT Security for Nonprofits
Community IT Webinar - IT Security for Nonprofits
 
RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"RamData Protect - "When Can't Afford to Lose Your Data"
RamData Protect - "When Can't Afford to Lose Your Data"
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
The Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise SecurityThe Hacking Team Hack: Lessons Learned for Enterprise Security
The Hacking Team Hack: Lessons Learned for Enterprise Security
 

En vedette

HTML5 CSS3 The Future of Web Technologies
HTML5 CSS3 The Future of Web TechnologiesHTML5 CSS3 The Future of Web Technologies
HTML5 CSS3 The Future of Web Technologies
hoctudau
 
Vampire movies
Vampire moviesVampire movies
Vampire movies
Ada15
 
Rotaryclub
RotaryclubRotaryclub
Rotaryclub
Aceppt
 
Nickkeough software.com.pptx...jj.pptxjjo
Nickkeough software.com.pptx...jj.pptxjjoNickkeough software.com.pptx...jj.pptxjjo
Nickkeough software.com.pptx...jj.pptxjjo
Nicholas Keough
 
Controversial films
Controversial filmsControversial films
Controversial films
Ada15
 
HTML CSS Best Practices
HTML CSS Best PracticesHTML CSS Best Practices
HTML CSS Best Practices
hoctudau
 

En vedette (19)

Kasablanca Corporation
Kasablanca Corporation Kasablanca Corporation
Kasablanca Corporation
 
Autonome voertuigen
Autonome voertuigenAutonome voertuigen
Autonome voertuigen
 
HTML5 CSS3 The Future of Web Technologies
HTML5 CSS3 The Future of Web TechnologiesHTML5 CSS3 The Future of Web Technologies
HTML5 CSS3 The Future of Web Technologies
 
Vampire movies
Vampire moviesVampire movies
Vampire movies
 
Computers
ComputersComputers
Computers
 
Practico2,taller cat
Practico2,taller catPractico2,taller cat
Practico2,taller cat
 
Rotaryclub
RotaryclubRotaryclub
Rotaryclub
 
Nickkeough software.com.pptx...jj.pptxjjo
Nickkeough software.com.pptx...jj.pptxjjoNickkeough software.com.pptx...jj.pptxjjo
Nickkeough software.com.pptx...jj.pptxjjo
 
Minu
MinuMinu
Minu
 
Controversial films
Controversial filmsControversial films
Controversial films
 
Play at Work: Applying Agile Methods to Museum Website Development
Play at Work: Applying Agile Methods to Museum Website DevelopmentPlay at Work: Applying Agile Methods to Museum Website Development
Play at Work: Applying Agile Methods to Museum Website Development
 
Comic
ComicComic
Comic
 
Oppi presentation
Oppi presentationOppi presentation
Oppi presentation
 
Instruccions PROVA SELECTIVITAT - Universitat de València
Instruccions PROVA SELECTIVITAT - Universitat de ValènciaInstruccions PROVA SELECTIVITAT - Universitat de València
Instruccions PROVA SELECTIVITAT - Universitat de València
 
Imperialisme.v03
Imperialisme.v03Imperialisme.v03
Imperialisme.v03
 
Sexenni democràtic.v02
Sexenni democràtic.v02Sexenni democràtic.v02
Sexenni democràtic.v02
 
PROVA PAU HISTÒRIA ESPANYA
PROVA PAU HISTÒRIA ESPANYAPROVA PAU HISTÒRIA ESPANYA
PROVA PAU HISTÒRIA ESPANYA
 
Segona revolució industrial
Segona revolució industrialSegona revolució industrial
Segona revolució industrial
 
HTML CSS Best Practices
HTML CSS Best PracticesHTML CSS Best Practices
HTML CSS Best Practices
 

Similaire à Umphrey hutcherson-ecu-cause2010-rev5

626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
Splitty
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
VITNetflix
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
Rodonoghue72
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
musicalworld14
 

Similaire à Umphrey hutcherson-ecu-cause2010-rev5 (20)

626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 
Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Together
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 

Dernier

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Umphrey hutcherson-ecu-cause2010-rev5

  • 1. Battle Against Sensitive Data Leakage Margaret Umphrey Director IT Security – East Carolina University streeterm@ecu.edu (252) 328-9187 Paula Hutcherson User Account Manager – East Carolina University hutchersonp@ecu.edu (252) 328-9186
  • 2. Sensitive Data Leaks o What are Sensitive Data Leaks? o Why Should Data Leaks Concern Us? o How Can We Slow Data Leaks? o Discussion of Strategies You Use
  • 3. Sensitive Data Leaks Data leakage: Unauthorized transmission of data (information) to an external source.1 o Electronic o Physical (paper) o Human 1© SANS Institute 2007
  • 4. Sensitive Data Leaks Sensitive data leaks loom over us like storm clouds; coming from every direction
  • 5. Why are Universities More Susceptible? Decentralized IT staff with own IT policies and practices Huge amount of data handled Students accessing with limited training and supervision
  • 6. Why are Universities More Susceptible? Open nature of the university physical and technical environment Early adoption of mobile devices, social networking, cloud computing, etc. Numerous databases maintained outside of the centrally managed databases
  • 7. Why are Universities More Susceptible? Business partners or research sponsors failure to protect data Non-enforced data-security practices Budget constraints
  • 8. Why Should we be Concerned? oUniversity of Hawaii at Manoa suffered a major data breach that exposed the confidential records of more than 40,000 former students. A faculty member accidentally uploaded the files that contained personal student records to an unencrypted Web server2 oEight cabinets full of tax records were stolen from a residence. The records belonged to a deceased tax preparer2 2PHIPrivacy.net
  • 9. Why Should we be Concerned? oA flash drive containing over 280,000 patient names, addresses, and personal health information was lost or stolen by Keystone Mercy Health Plan and AmeriHealth Mercy Health Plan in Philadelphia, Pennsylvania2 oA portable point of care device was stolen from an employee of HomeCall Inc. Rockville, Maryland. Client names, addresses, Social Security Numbers, medical record numbers, diagnoses and treatment information were on the unencrypted device2 2PHIPrivacy.net
  • 10. Why Should we be Concerned? oThe full names, driver's license numbers and Social Security Numbers of 2,484 full and part-time employees of Arkansas State University were accidentally emailed to university emails2 oRite Aid paid one million dollars to settle HIPAA privacy violations; Rite Aid also agreed to update corporate policies and procedures so that patient medical information would be properly disposed, employees would be properly trained in disposal of patient information, and employees would be held accountable if they did not dispose of patient information properly2 2PHIPrivacy.net
  • 13. How Can We Slow the Leaks? oIdentify Location of all Confidential Data Conduct External DLP Assessment Purchase and Implement DLP Solution Conduct Internal Sensitive Data Scans  Integrate Data Security into Data Ownership  Integrate Security Awareness and Training into Culture oEliminate Duplicate Data Don’t Download from Centralized Systems Remove Copies of Confidential Data De-identify Personally Identifiable Data Don’t Create Shadow Systems
  • 14. How Can We Slow the Leaks? oProtect Confidential Data Implement Appropriate Security Controls Encrypt Data at Rest •Database, Server, Desktop, Laptop, Mobile Device Encrypt Data in Motion •Email, File Transfer, Remote Access, Data Entry Securely Dispose of Data •Paper, Hard Drives, Video, FAX, Printers, Medical Devices, etc. oImplement Polices, Standards and Procedures Data Ownership and Classification Data Security Standards Required Security Awareness and Training Integrate Security into Design Phase Incorporate Security into Governance
  • 15. Challenges oImplementing Encryption Standard oImplementing DLP Solutions oImplementing Required Training oLimited Resources oIT Security Incorporated into Governance
  • 16. Challenges oIntegrating Data Security into Data Ownership oCentralizing IT Operations and Standards oIntegrating Security into Research Protocols oIntegrating Security into Purchase of Medical Devices oEnforcing Non-compliance Sanctions
  • 17. Where Do We Go From Here? oHow Does Your University Manage Sensitive Data Leaks? oShare Your Success oWhat have You Found as the Top Challenges? oWhat Recommendations can You Provide?
  • 18. Battle Against Sensitive Data Leakage Margaret Umphrey Director IT Security – East Carolina University streeterm@ecu.edu (252) 328-9187 Paula Hutcherson User Account Manager – East Carolina University hutchersonp@ecu.edu (252) 328-9186
  • 19. References o A Comprehensive Study of Retail Data Security Breaches in the United States - Kevin Prince - Perimeter eSecurity o http://www.privacyrights.org/data-breach/new o http://www.nymity.com/Free_Privacy_Resources o http://www.sans.org/critical-security-controls/ o http://www.darkreading.com/insiderthreat/index.jhtml o http://www.educause.edu/CybersecurityInitiative/Resources/1225

Notes de l'éditeur

  1. industry comparisons: 01/13/09 breach incidents by industry: business - 311 incidents: includes retail and financial institutions. education - 281 incidents; government - 245 incidents; and healthcare - 108 incidents. records compromised by industry: business - 77% of compromised records; government - 19%; education - 2%; healthcare - 2%.