SlideShare une entreprise Scribd logo
1  sur  24
FTS-4862 
Protecting Your “Crown Jewels”: 
Do you have what it takes to go from start to finish? 
Erkang Zheng 
October 2014 
© 2014 IBM Corporation
Please Note 
• IBM’s statements regarding its plans, directions, and intent are subject to change or 
withdrawal without notice at IBM’s sole discretion. 
• Information regarding potential future products is intended to outline our general 
product direction and it should not be relied on in making a purchasing decision. 
• The information mentioned regarding potential future products is not a commitment, 
promise, or legal obligation to deliver any material, code or functionality. Information 
about potential future products may not be incorporated into any contract. 
• The development, release, and timing of any future features or functionality described 
for our products remains at our sole discretion. 
Performance is based on measurements and projections using standard IBM benchmarks 
in a controlled environment. The actual throughput or performance that any user will 
experience will vary depending upon many factors, including considerations such as 
the amount of multiprogramming in the user’s job stream, the I/O configuration, the 
storage configuration, and the workload processed. Therefore, no assurance can be 
given that an individual user will achieve results similar to those stated here. 
2
Acknowledgements and Disclaimers 
Availability. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in 
which IBM operates. 
The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views. They are provided for 
informational purposes only, and are neither intended to, nor shall have the effect of being, legal or other guidance or advice to any participant. 
While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided AS-IS without 
warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this 
presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or 
representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use 
of IBM software. 
All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have 
achieved. Actual environmental costs and performance characteristics may vary by customer. Nothing contained in these materials is intended to, 
nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other 
results. 
© Copyright IBM Corporation 2014. All rights reserved. 
— U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract 
with IBM Corp. 
— Please update paragraph below for the particular product or family brand trademarks you mention such as WebSphere, DB2,Maximo, 
Clearcase, Lotus, etc 
IBM, the IBM logo, ibm.com, [IBM Brand, if trademarked], and [IBM Product, if trademarked] are trademarks or registered trademarks of 
International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked 
on their first occurrence in this information with a trademark symbol (® or TM), these symbols indicate U.S. registered or common law 
trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in 
other countries. A current list of IBM trademarks is available on the Web at 
•“Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml 
•If you have mentioned trademarks that are not from IBM, please update and add the following lines:[Insert any special 3rd party trademark 
names/attributions here] 
•Other company, product, or service names may be trademarks or service marks of others. 
3
IBM Security 
Agenda 
• Defining the “Crown Jewels” – the most 
critical data within your enterprise 
• Recognizing threats and the cost of 
losing critical data 
• Overcoming obstacles to effective 
protection of critical data
IBM Security 
Defining the “Crown Jewels” – 
the most critical data within 
your enterprise
Protection of your “Crown Jewels” is a strategic imperative 
• For most organizations, the most critical data – 
the “Crown Jewels” – amount to between 0.01% and 
2.0% of total sensitive data1 
• The theft, misuse or corruption of this critical data can: 
- cripple operations 
- severely damage brand reputation 
- dramatically reduce shareholder value 
1U.S President’s 2006 Economic Report to Congress Or …. 1IBM (name/date of report or study)
Crown Jewel data is usually found in the top 2 or 3 
data categories
Tiny percentage, huge value 
The most valuable data, intellectual property (IP) and trade secrets form the heart of an 
organization’s identity and mission. 
•Strategic product information – including new product designs, formulas and features, 
as well as changes, improvements and other updates to existing products 
•Research and development (R&D) 
•IT systems and applications, including novel processes, system architecture designs, 
source code and algorithms 
Intellectual property and 
other enterprise-critical data 
represents an estimated 
70% of the value of publicly 
traded corporations2 
2U.S President’s 2006 Economic Report to Congress
IBM Security 
Recognizing threats and the 
cost of losing critical data
Understanding the threat to your critical data 
Your company is not a random victim. 
People have singled you out, have a specific interest 
in your critical data, and have both the desire and the 
means to try to take it from you. 
Chances are, they can get to some of your 
data with relatively little effort. 
But they are also prepared to make multiple attempts 
and use a mix of sophisticated methods to penetrate 
your defenses. 
The real threat could be inside. 
There is a real possibility that they will find someone 
inside your organization to help them. 
If your security is inadequate, a successful 
breach may go unnoticed for months. 
If, and when, it is finally discovered, the odds are better 
than two to one that it will be by someone outside your 
organization. 
1 
2 
3 
4
The threat story in numbers 
25% 
of data breaches were targeted. The victim organization is specifically chosen, then the 
attacker(s) determines what weaknesses exist within the target that can be exploited. 
19% 
78% 
were attributed to state-affiliated actors, suggesting sophisticated organizations 
with clear objectives and deep resources – less likely to be profiteers, more likely 
targeting trade secrets. 
of initial intrusions were rated as “low difficulty.” The perpetrators succeeded 
in penetrating data defenses with routine techniques and skills. 
of breaches were discovered by external parties. Mostly by unrelated third parties 
and fraud detection services, but also by customers, law enforcement and others – or 
actually disclosed by the perpetrators, themselves. 
of breaches involved multiple methods of attack, 
indicating determination and sophistication. 
Verizon 2013 Data Breach Investigations Report 
took months or more to discover, leaving management 
blind to damage as it was occurring. 
of breaches involved multiple parties. Combined ratios for outsiders (87%), insiders 
(46%) and partners (1%) indicate that collusion is common. 
Verizon 2013 DBIR Industry Snapshot, Intellectual Property Theft 
69% 
66% 
34% 
25%
The cost of lost critical data 
R&D serves as a reasonable proxy for the value of trade secret theft 
It is calculated that each dollar invested in R&D yields $2.90 in other economic activity during the same 
year and between $16.00 and $69.00 over 10 years. 
1 
Data breaches involving personally identifiable information (PII) 
Breach disclosure laws subject victim organizations to public scrutiny, so their financial losses tend to be 
measurable – normally calculated in terms of penalties, lost sales, and declines in stock prices. 
Data breaches costs2 are calculated to be as high as: 
1The Center for Responsible Enterprise And Trade (CREATe.org) & PricewaterhouseCoopers LLP (PwC), Economic Analysis of Trade Secret Misappropriation, 2014 
22014 Cost of Data Breach Study: Global Analysis, Ponemon Institute, 2014.
IBM Security 
Overcoming obstacles to 
effective protection of critical 
data
Making protection of critical data a top priority 
Challenge 1: Defining your “Crown Jewels” 
•Is there agreement within your organization on 
what constitutes “Crown Jewels”? 
•How much of it is there? 
•Where is it? 
•Who has access to it? Applications, users? 
•Who are the business owners? 
•What business processes rely on it?
Making protection of critical data a top priority 
Challenge 2: Reassessing your current security strategy by asking: 
• Is it too IT-centric? 
Sure, we have a DLP solution; but are we ignoring how critical data is actually used in the business, 
and by whom? 
• Is it too risk-averse? 
Do we have a “lock-it-all-down” approach that inhibits business growth and opportunities? 
• Is it too inwardly focused? 
What about the role of third parties, such as vendors and partners? What happens when our critical 
data is shared outside the enterprise? 
• Are we mistaking compliance with security? 
Is our strategy too focused on passing audits instead of actually protecting data in a way that is 
comprehensive? 
• Does it assume routine security implementations equate to an evolving strategy? 
Are we simply going through the motions with upgrades and patches, or are we continuously evaluating 
our strategy in the face of ever-changing threats and technologies? 
• Do we simply lack a direction or starting point when it comes to critical data?
IBM Critical Data Protection Program 
The Approach: A comprehensive method for safeguarding your Crown Jewels 
and protecting your brand 
• Define Crown Jewels 
• Determine Data Security Objectives 
• Understand Client Data Security Environment and Infrastructure 
• Define and Complete Data Discovery Process 
• Perform Data Analysis and Classify 
• Establish Crown Jewels Baselines 
• Assess and Score Client Data Security Processes and/or Controls 
• Perform Gap Analysis and Develop Hypotheses 
• Determine Risk Remediation Plan 
• Prioritize and Validate Risk Remediation Solutions 
• Plan, Design, and Implement 
• Determine Crown Jewels Governance Metrics and Process 
• Enable Monitoring, Communications and Response 
• Establish Revalidation Criteria and Process
Delivered with structured delivery methodology 
• Determine data 
protection objectives 
• Develop data model 
and define “Crown 
Jewels” 
• Obtain stakeholder 
consensus 
• Understand data 
lifecycle and 
environment 
• Identify critical data 
storage repositories, 
paths, and access 
• Establish baseline 
requirements 
• Access current 
controls to identify 
gaps and propose 
solutions 
• Plan and prioritize 
technical & business 
process 
transformations, 
strategy & roadmap 
• Prepare for detailed 
design & deploy of 
identified solutions 
High level (Macro) and 
detail design (Micro), 
implementation, and 
monitoring of selected 
data protection 
solutions 
• Operationalize the 
solutions and 
processes defined 
previously 
• Continuously improve 
to evolve and adapt 
to changes 
Building a SOC and 
integrating CDPP into 
enterprise security 
operations / MSIEM 
DEFINE: 
What are the “crown 
jewels”? 
DISCOVER: 
Where are they? How are 
they used? 
BASELINE: 
What is required to protect 
critical data? 
SECURE: 
How to plan, design, and 
implement protection 
solutions? 
MONITOR: 
What to consider 
operationally? 
Consulting 
Approach 
- Data collection 
- Interviews & 
workshops 
- Development of data 
taxonomy 
- Risk evaluation & 
prioritization 
Strategic+Technical 
Assessment 
- Iterative tool based 
discovery 
- Data flow mapping 
- Data classification 
- Develop initial 
strategy 
Gap Assessment + 
Strategic Planning 
- Requirements 
gathering 
- Target state 
definitions 
- Gap assessment 
- Roadmap and 
prioritization 
System Integration 
For solutions identified 
in previous phase (e.g. 
DLP, Guardium, etc.), 
develop 
- Client Environment 
- Solution Outline 
Consulting 
Approach 
- Program charter 
- Functional model, org 
structure, and staffing 
- Metrics, processes & 
procedures 
- Governance & comm. 
Service 
Delivery 
Phases 
Main 
Objectives 
Method 
Approach 
Follow up or 
add-on 
services 
Detailed architecture 
development such as 
Database Security 
Reference Architecture 
IBM Confidential
Understanding your data is a key step towards actionable 
security intelligence
Advantages of IBM Critical Data Protection Program
IBM provides unmatched global coverage and 
security awareness 
monitored countries (MSS) 
service delivery experts 
+ 
devices under contract 
+ 
endpoints protected 
+ 
events managed per day 
IBM Security by the Numbers 
+ 
+
Learn more about IBM Security 
IBM Security 
Intelligence. Integration. Expertise. 
Visit our website 
IBM Security Website 
Watch our videos 
IBM Security YouTube Channel 
Read new blog posts 
SecurityIntelligence.com 
Follow us on Twitter 
@ibmsecurity
We Value Your Feedback! 
• Don’t forget to submit your Insight session and speaker feedback! 
Your feedback is very important to us – we use it to continually 
improve the conference. 
• Access the Insight Conference Connect tool to quickly submit your 
surveys from your smartphone, laptop or conference kiosk. 
22
Thank You
WIP 
A financial services firm teams with IBM to protect its “Crown 
Jewels” 
Protect your critical assets 
Identified and blocked 
650+ 
suspicious incidents 
in the first 6 months 
of SOC operations 
Business Challenge 
 The bank did not have the security skills and resources to build its first SOC 
within the aggressive milestones set by their Board 
 Wanted global protection for 16,000,000 accounts across 44 countries 
IBM Security Solution benefits 
 Provides automated, real-time advanced analytics to evaluate 13M+ events per day 
from 400K+ assets and 28K+ active log sources 
 Provides 24x7 SOC management and incident response support at ~$2M lower cost 
than in-house management

Contenu connexe

Tendances

Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 

Tendances (20)

Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Data security
Data securityData security
Data security
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
What is Differential Privacy?
What is Differential Privacy?What is Differential Privacy?
What is Differential Privacy?
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - Introduction
 

Similaire à Securing Your "Crown Jewels": Do You Have What it Takes?

Enabling Big Data with IBM InfoSphere Optim
Enabling Big Data with IBM InfoSphere OptimEnabling Big Data with IBM InfoSphere Optim
Enabling Big Data with IBM InfoSphere Optim
Vineet
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 

Similaire à Securing Your "Crown Jewels": Do You Have What it Takes? (20)

Enabling Big Data with IBM InfoSphere Optim
Enabling Big Data with IBM InfoSphere OptimEnabling Big Data with IBM InfoSphere Optim
Enabling Big Data with IBM InfoSphere Optim
 
Big Data Requires Big Protection
Big Data Requires Big ProtectionBig Data Requires Big Protection
Big Data Requires Big Protection
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
Brendan Byrne, Security Services Consulting and Systems Integration Leader at...
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response Planning
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko5 steps-to-mobile-risk-management-whitepaper-golden-gekko
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 

Plus de IBM Security

Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 

Plus de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Securing Your "Crown Jewels": Do You Have What it Takes?

  • 1. FTS-4862 Protecting Your “Crown Jewels”: Do you have what it takes to go from start to finish? Erkang Zheng October 2014 © 2014 IBM Corporation
  • 2. Please Note • IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion. • Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. • The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. • The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user’s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 2
  • 3. Acknowledgements and Disclaimers Availability. References in this presentation to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. The workshops, sessions and materials have been prepared by IBM or the session speakers and reflect their own views. They are provided for informational purposes only, and are neither intended to, nor shall have the effect of being, legal or other guidance or advice to any participant. While efforts were made to verify the completeness and accuracy of the information contained in this presentation, it is provided AS-IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this presentation or any other materials. Nothing contained in this presentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. All customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth or other results. © Copyright IBM Corporation 2014. All rights reserved. — U.S. Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. — Please update paragraph below for the particular product or family brand trademarks you mention such as WebSphere, DB2,Maximo, Clearcase, Lotus, etc IBM, the IBM logo, ibm.com, [IBM Brand, if trademarked], and [IBM Product, if trademarked] are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or TM), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at •“Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml •If you have mentioned trademarks that are not from IBM, please update and add the following lines:[Insert any special 3rd party trademark names/attributions here] •Other company, product, or service names may be trademarks or service marks of others. 3
  • 4. IBM Security Agenda • Defining the “Crown Jewels” – the most critical data within your enterprise • Recognizing threats and the cost of losing critical data • Overcoming obstacles to effective protection of critical data
  • 5. IBM Security Defining the “Crown Jewels” – the most critical data within your enterprise
  • 6. Protection of your “Crown Jewels” is a strategic imperative • For most organizations, the most critical data – the “Crown Jewels” – amount to between 0.01% and 2.0% of total sensitive data1 • The theft, misuse or corruption of this critical data can: - cripple operations - severely damage brand reputation - dramatically reduce shareholder value 1U.S President’s 2006 Economic Report to Congress Or …. 1IBM (name/date of report or study)
  • 7. Crown Jewel data is usually found in the top 2 or 3 data categories
  • 8. Tiny percentage, huge value The most valuable data, intellectual property (IP) and trade secrets form the heart of an organization’s identity and mission. •Strategic product information – including new product designs, formulas and features, as well as changes, improvements and other updates to existing products •Research and development (R&D) •IT systems and applications, including novel processes, system architecture designs, source code and algorithms Intellectual property and other enterprise-critical data represents an estimated 70% of the value of publicly traded corporations2 2U.S President’s 2006 Economic Report to Congress
  • 9. IBM Security Recognizing threats and the cost of losing critical data
  • 10. Understanding the threat to your critical data Your company is not a random victim. People have singled you out, have a specific interest in your critical data, and have both the desire and the means to try to take it from you. Chances are, they can get to some of your data with relatively little effort. But they are also prepared to make multiple attempts and use a mix of sophisticated methods to penetrate your defenses. The real threat could be inside. There is a real possibility that they will find someone inside your organization to help them. If your security is inadequate, a successful breach may go unnoticed for months. If, and when, it is finally discovered, the odds are better than two to one that it will be by someone outside your organization. 1 2 3 4
  • 11. The threat story in numbers 25% of data breaches were targeted. The victim organization is specifically chosen, then the attacker(s) determines what weaknesses exist within the target that can be exploited. 19% 78% were attributed to state-affiliated actors, suggesting sophisticated organizations with clear objectives and deep resources – less likely to be profiteers, more likely targeting trade secrets. of initial intrusions were rated as “low difficulty.” The perpetrators succeeded in penetrating data defenses with routine techniques and skills. of breaches were discovered by external parties. Mostly by unrelated third parties and fraud detection services, but also by customers, law enforcement and others – or actually disclosed by the perpetrators, themselves. of breaches involved multiple methods of attack, indicating determination and sophistication. Verizon 2013 Data Breach Investigations Report took months or more to discover, leaving management blind to damage as it was occurring. of breaches involved multiple parties. Combined ratios for outsiders (87%), insiders (46%) and partners (1%) indicate that collusion is common. Verizon 2013 DBIR Industry Snapshot, Intellectual Property Theft 69% 66% 34% 25%
  • 12. The cost of lost critical data R&D serves as a reasonable proxy for the value of trade secret theft It is calculated that each dollar invested in R&D yields $2.90 in other economic activity during the same year and between $16.00 and $69.00 over 10 years. 1 Data breaches involving personally identifiable information (PII) Breach disclosure laws subject victim organizations to public scrutiny, so their financial losses tend to be measurable – normally calculated in terms of penalties, lost sales, and declines in stock prices. Data breaches costs2 are calculated to be as high as: 1The Center for Responsible Enterprise And Trade (CREATe.org) & PricewaterhouseCoopers LLP (PwC), Economic Analysis of Trade Secret Misappropriation, 2014 22014 Cost of Data Breach Study: Global Analysis, Ponemon Institute, 2014.
  • 13. IBM Security Overcoming obstacles to effective protection of critical data
  • 14. Making protection of critical data a top priority Challenge 1: Defining your “Crown Jewels” •Is there agreement within your organization on what constitutes “Crown Jewels”? •How much of it is there? •Where is it? •Who has access to it? Applications, users? •Who are the business owners? •What business processes rely on it?
  • 15. Making protection of critical data a top priority Challenge 2: Reassessing your current security strategy by asking: • Is it too IT-centric? Sure, we have a DLP solution; but are we ignoring how critical data is actually used in the business, and by whom? • Is it too risk-averse? Do we have a “lock-it-all-down” approach that inhibits business growth and opportunities? • Is it too inwardly focused? What about the role of third parties, such as vendors and partners? What happens when our critical data is shared outside the enterprise? • Are we mistaking compliance with security? Is our strategy too focused on passing audits instead of actually protecting data in a way that is comprehensive? • Does it assume routine security implementations equate to an evolving strategy? Are we simply going through the motions with upgrades and patches, or are we continuously evaluating our strategy in the face of ever-changing threats and technologies? • Do we simply lack a direction or starting point when it comes to critical data?
  • 16. IBM Critical Data Protection Program The Approach: A comprehensive method for safeguarding your Crown Jewels and protecting your brand • Define Crown Jewels • Determine Data Security Objectives • Understand Client Data Security Environment and Infrastructure • Define and Complete Data Discovery Process • Perform Data Analysis and Classify • Establish Crown Jewels Baselines • Assess and Score Client Data Security Processes and/or Controls • Perform Gap Analysis and Develop Hypotheses • Determine Risk Remediation Plan • Prioritize and Validate Risk Remediation Solutions • Plan, Design, and Implement • Determine Crown Jewels Governance Metrics and Process • Enable Monitoring, Communications and Response • Establish Revalidation Criteria and Process
  • 17. Delivered with structured delivery methodology • Determine data protection objectives • Develop data model and define “Crown Jewels” • Obtain stakeholder consensus • Understand data lifecycle and environment • Identify critical data storage repositories, paths, and access • Establish baseline requirements • Access current controls to identify gaps and propose solutions • Plan and prioritize technical & business process transformations, strategy & roadmap • Prepare for detailed design & deploy of identified solutions High level (Macro) and detail design (Micro), implementation, and monitoring of selected data protection solutions • Operationalize the solutions and processes defined previously • Continuously improve to evolve and adapt to changes Building a SOC and integrating CDPP into enterprise security operations / MSIEM DEFINE: What are the “crown jewels”? DISCOVER: Where are they? How are they used? BASELINE: What is required to protect critical data? SECURE: How to plan, design, and implement protection solutions? MONITOR: What to consider operationally? Consulting Approach - Data collection - Interviews & workshops - Development of data taxonomy - Risk evaluation & prioritization Strategic+Technical Assessment - Iterative tool based discovery - Data flow mapping - Data classification - Develop initial strategy Gap Assessment + Strategic Planning - Requirements gathering - Target state definitions - Gap assessment - Roadmap and prioritization System Integration For solutions identified in previous phase (e.g. DLP, Guardium, etc.), develop - Client Environment - Solution Outline Consulting Approach - Program charter - Functional model, org structure, and staffing - Metrics, processes & procedures - Governance & comm. Service Delivery Phases Main Objectives Method Approach Follow up or add-on services Detailed architecture development such as Database Security Reference Architecture IBM Confidential
  • 18. Understanding your data is a key step towards actionable security intelligence
  • 19. Advantages of IBM Critical Data Protection Program
  • 20. IBM provides unmatched global coverage and security awareness monitored countries (MSS) service delivery experts + devices under contract + endpoints protected + events managed per day IBM Security by the Numbers + +
  • 21. Learn more about IBM Security IBM Security Intelligence. Integration. Expertise. Visit our website IBM Security Website Watch our videos IBM Security YouTube Channel Read new blog posts SecurityIntelligence.com Follow us on Twitter @ibmsecurity
  • 22. We Value Your Feedback! • Don’t forget to submit your Insight session and speaker feedback! Your feedback is very important to us – we use it to continually improve the conference. • Access the Insight Conference Connect tool to quickly submit your surveys from your smartphone, laptop or conference kiosk. 22
  • 24. WIP A financial services firm teams with IBM to protect its “Crown Jewels” Protect your critical assets Identified and blocked 650+ suspicious incidents in the first 6 months of SOC operations Business Challenge  The bank did not have the security skills and resources to build its first SOC within the aggressive milestones set by their Board  Wanted global protection for 16,000,000 accounts across 44 countries IBM Security Solution benefits  Provides automated, real-time advanced analytics to evaluate 13M+ events per day from 400K+ assets and 28K+ active log sources  Provides 24x7 SOC management and incident response support at ~$2M lower cost than in-house management

Notes de l'éditeur

  1. A critical data protection program from IBM can help provide a comprehensive approach to safeguarding your most strategic information. Rather than implementing a technology “fix” that locks down your critical data and limits your business productivity, our approach provides an end-to-end, repeatable program. It helps you determine what data is most important to the organization and find better ways to more securely use it in your day-to-day operations. We also help optimize your level of control by providing both consulting services to establish your data protection strategy, and implementation and integration services using market-leading loss prevention and encryption technologies.
  2. The benefits of a critical data protection program from IBM are considerable. They include supporting your organization’s competitiveness, profitability and brand reputation; centralizing and automating data security while reducing the cost of compliance; helping you more effectively avert costly data breaches; and establishing a security program that can adapt to heightened cyber risks and attacks.
  3. Why choose IBM? First, because we provide unmatched global coverage and security awareness. We have thousands of consultants, analysts and delivery specialists providing security service for clients every day. In addition, we have 10 security research centers, 10 security operations centers, and 14 security development laboratories.
  4. Why choose IBM? First, because we provide unmatched global coverage and security awareness. We have thousands of consultants, analysts and delivery specialists providing security service for clients every day. In addition, we have 10 security research centers, 10 security operations centers, and 14 security development laboratories.