SlideShare a Scribd company logo
1 of 21
Information Leakage and Data Loss Prevention Tools By: Matthew Li June 24, 2011
Agenda What is Information Leakage? Why should Executives Care? How do we Defend against it?
Information Leakage Any event, either accidental or malicious, that allows an unauthorized party to access data that is not already public information
Information Leakage How?  Negligence 40%, System glitch 36%, Malicious attack 24% Why? Advances in data storage technology Proliferation of consumer technology in corporate IT environment
Examples of Information Leakage Sony Playstation network data breack As of May 24, 2011: $171 million in costs 1,000 laptops go missing daily; only 3% recovered National Institute of Health lost a laptop with unencrypted patient data
Costs of a Data Breach Regulatory fines Increased government oversight Loss of customer trust Reputational damage Loss of proprietary business intelligence $6.75 million The total data breach cost in the US in 2009
DLP: What should it do? Manage the data Discover sensitive data Monitor the use of sensitive data Protect the sensitive data
Protecting Data: The 3 States Data in Motion Data leaving the organization in a email or other network Data at Rest Data stored in an internal server within the organization Data in use Data being used by users in the laptop, USB storage devices, or CDs
DLP in Action Crawls through the firm’s servers to search for sensitive data as defined by the user Monitors network traffic and blocks transmission of sensitive data Applications that limit a user’s ability to download and save sensitive data on their laptops
DLP and Encryption Last line of defense if DLP fails to prevent sensitive information from leaving the organization However: DLP tools CANNOT locate, monitor, or scan encrypted data  Organization need to allow the DLP tool to have access to the decryption keys
DLP: Beyond the Technology Technology and applications are only as good as the people who operate it Educate users about data leakage consequences Empower employees to take responsibility of data
Implementation: Analyzing Processes and Data Flows Analyzing business processes and data flows Information life cycle Understand the government regulations that governs that data the company owns Classify data into different categories: public, private, sensitive, business intelligence, etc. Recommended to use a DLP application to crawl through the server to locate all sensitive data
Implementation: Risk Assessment Need to prioritize data based on its risk (probability of loss * impact of loss) Allows for priorization Without it, IT department and users will be overloaded by data and data usage warnings Exercise judgment in DLP strategy
Implementation: Applying Controls Training employees about new processes and technologies Use of encryption, traffic monitoring, security over USB ports Testing the controls
Implementation: Monitoring and Improvements Take lessons learned to implement DLP program to other sets of data
DLP Checklist What sensitive data do we own?  Where is this data stored? What is the information life cycle of the data? What are the regulatory requirements regarding the data we own? What is the risk prioritization of each classes of data?
DLP Checklist What controls are currently in place? What additional controls do we need to address each classes of data? Does our staff have the capabilities to operate the new business processes/controls/technologies? How do we apply the DLP program in compliance with the firm's change management policy?
Limitations of DLP Cannot detect/monitor encrypted data without a decryption key Cannot interpret graphic files Employees can “print-screen” and send it out
DLP on a Tight Budget Communicate to employees and raise awareness Move critical files off laptops to an offline desktop Change local shared storage access settings Talk to email host about filtering outbound emails to authorized email addresses only
Conclusion Real issue with real monetary costs Requires co-operation from all business units to identify sensitive data Take action to secure the data with highest risks and impacts Requires the use of technology and people

More Related Content

What's hot

The Increasing Problems Of Controlling Access
The Increasing Problems Of Controlling AccessThe Increasing Problems Of Controlling Access
The Increasing Problems Of Controlling AccessKylie Dunn
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printersscoopnewsgroup
 
Anton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...infoLock Technologies
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protectionAujas Networks Pvt. Ltd.
 
DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09Mike Garland
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteGlobus
 
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016Annie Cute
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016FitCEO, Inc. (FCI)
 
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5umphreym
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseNextLabs, Inc.
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilienceRishi Kant
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity AuditEC-Council
 

What's hot (20)

H R M
H R MH R M
H R M
 
The Increasing Problems Of Controlling Access
The Increasing Problems Of Controlling AccessThe Increasing Problems Of Controlling Access
The Increasing Problems Of Controlling Access
 
Services and Products
Services and ProductsServices and Products
Services and Products
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printers
 
Anton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data CentralizationAnton Chuvakin on Security Data Centralization
Anton Chuvakin on Security Data Centralization
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
Services, Compliance and Innovation
Services, Compliance and InnovationServices, Compliance and Innovation
Services, Compliance and Innovation
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
 
DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
Executive Summary_2016
Executive Summary_2016Executive Summary_2016
Executive Summary_2016
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 

Viewers also liked

Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesAutomated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesYuji Kosuga
 
Intrusion detection system with GA
Intrusion detection system with GAIntrusion detection system with GA
Intrusion detection system with GAChungHsiangHsueh
 
Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detectionPiyu Karande
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Masquerader Detection
Masquerader DetectionMasquerader Detection
Masquerader DetectionArquam Md
 
Dr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiDr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiAyurvetAks
 

Viewers also liked (6)

Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesAutomated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation Vulnerabilities
 
Intrusion detection system with GA
Intrusion detection system with GAIntrusion detection system with GA
Intrusion detection system with GA
 
Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detection
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Masquerader Detection
Masquerader DetectionMasquerader Detection
Masquerader Detection
 
Dr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiDr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhi
 

Similar to 626 Information leakage and Data Loss Prevention Tools

IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-preventionanuepcet
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfAgusto Sipahutar
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 

Similar to 626 Information leakage and Data Loss Prevention Tools (20)

Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-prevention
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdf
 
Search Inform DLP
Search Inform DLPSearch Inform DLP
Search Inform DLP
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

626 Information leakage and Data Loss Prevention Tools

  • 1. Information Leakage and Data Loss Prevention Tools By: Matthew Li June 24, 2011
  • 2. Agenda What is Information Leakage? Why should Executives Care? How do we Defend against it?
  • 3. Information Leakage Any event, either accidental or malicious, that allows an unauthorized party to access data that is not already public information
  • 4. Information Leakage How? Negligence 40%, System glitch 36%, Malicious attack 24% Why? Advances in data storage technology Proliferation of consumer technology in corporate IT environment
  • 5. Examples of Information Leakage Sony Playstation network data breack As of May 24, 2011: $171 million in costs 1,000 laptops go missing daily; only 3% recovered National Institute of Health lost a laptop with unencrypted patient data
  • 6. Costs of a Data Breach Regulatory fines Increased government oversight Loss of customer trust Reputational damage Loss of proprietary business intelligence $6.75 million The total data breach cost in the US in 2009
  • 7. DLP: What should it do? Manage the data Discover sensitive data Monitor the use of sensitive data Protect the sensitive data
  • 8. Protecting Data: The 3 States Data in Motion Data leaving the organization in a email or other network Data at Rest Data stored in an internal server within the organization Data in use Data being used by users in the laptop, USB storage devices, or CDs
  • 9. DLP in Action Crawls through the firm’s servers to search for sensitive data as defined by the user Monitors network traffic and blocks transmission of sensitive data Applications that limit a user’s ability to download and save sensitive data on their laptops
  • 10. DLP and Encryption Last line of defense if DLP fails to prevent sensitive information from leaving the organization However: DLP tools CANNOT locate, monitor, or scan encrypted data Organization need to allow the DLP tool to have access to the decryption keys
  • 11. DLP: Beyond the Technology Technology and applications are only as good as the people who operate it Educate users about data leakage consequences Empower employees to take responsibility of data
  • 12. Implementation: Analyzing Processes and Data Flows Analyzing business processes and data flows Information life cycle Understand the government regulations that governs that data the company owns Classify data into different categories: public, private, sensitive, business intelligence, etc. Recommended to use a DLP application to crawl through the server to locate all sensitive data
  • 13. Implementation: Risk Assessment Need to prioritize data based on its risk (probability of loss * impact of loss) Allows for priorization Without it, IT department and users will be overloaded by data and data usage warnings Exercise judgment in DLP strategy
  • 14. Implementation: Applying Controls Training employees about new processes and technologies Use of encryption, traffic monitoring, security over USB ports Testing the controls
  • 15.
  • 16. Implementation: Monitoring and Improvements Take lessons learned to implement DLP program to other sets of data
  • 17. DLP Checklist What sensitive data do we own? Where is this data stored? What is the information life cycle of the data? What are the regulatory requirements regarding the data we own? What is the risk prioritization of each classes of data?
  • 18. DLP Checklist What controls are currently in place? What additional controls do we need to address each classes of data? Does our staff have the capabilities to operate the new business processes/controls/technologies? How do we apply the DLP program in compliance with the firm's change management policy?
  • 19. Limitations of DLP Cannot detect/monitor encrypted data without a decryption key Cannot interpret graphic files Employees can “print-screen” and send it out
  • 20. DLP on a Tight Budget Communicate to employees and raise awareness Move critical files off laptops to an offline desktop Change local shared storage access settings Talk to email host about filtering outbound emails to authorized email addresses only
  • 21. Conclusion Real issue with real monetary costs Requires co-operation from all business units to identify sensitive data Take action to secure the data with highest risks and impacts Requires the use of technology and people