SlideShare une entreprise Scribd logo
1  sur  28
Your Text here                                                                            Your Text here




                         Shahar Geiger Maor, CISSP
                           Senior Analyst at STKI
         shahar@stki.info www.shaharmaor.blogspot.com
    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   1
‫תודה אישית: למי שדואג לנו לפרנסה‬




 Your Text here                                                                            Your Text here




     Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   2
Presentation’s Agenda

Need for DLP


Flavors of DLP
    Your Text here                                                                            Your Text here

Technology


Challenges


        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   3
‫...תודה אישית: למי שדואג לנו לפרנסה‬




  Your Text here                                                                            Your Text here




      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   4
Security
                                                Arena
Your Text here                                                                            Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   5
                                 Source: http://securosis.com/research
Information Security “Threatscape”




   Your Text here                                                                            Your Text here




       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   6
Underground Economy
Items for sale on underground servers, appearance and price:




          Your Text here                                                                            Your Text here




                                                         Source: Symantec
              Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   7
What’s the Incentive?




Your Text here                                                                            Your Text here




          Source: http://datalossdb.org/statistics?timeframe=all_time
    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   8
What’s the Incentive?

    2,754                                               • Data loss incidents
  396 (35%)                                    • Credit-card related data loss

Hack (48%)
   Your Text here
                                                                                • How?
                                                                                               Your Text here

297,704,392                                                  • CCN compromised

  751,779                                                        • …CCNsIncident

       ?                                                        • Actual $$$ loss…

           Source: http://datalossdb.org/statistics?timeframe=all_time (2000-2010)
         Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   9
Data Loss Analysis –Answering the “How?” Q

                 Hack

                Fraud

       LostStolen X

                 Web
                                                                                                                               General
     Your Text here                                                                              Your Text here
           Unknown                                                                                                             CCN


  Disposal_Document

                Email

                 Virus

                         0%            10%            20%            30%            40%            50%            60%




            Source: http://datalossdb.org/statistics?timeframe=all_time (2000-2010)
          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic         10
Social Engineering




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   11
Presentation’s Agenda

Need for DLP


Flavors of DLP
    Your Text here                                                                             Your Text here

Technology


Challenges


        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   12
Threats to Information Systems Security
                           the difference between
                          threats and vulnerabilities



    Your Text here                                                                             Your Text here

                                                                                              Poor system
                                                                                                design




        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   13
Internal vs. External Human Threats




   Your Text here                                                                             Your Text here




       Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   14
The Relative Seriousness of IT Security Threats




      Your Text here                                                                             Your Text here




                                          Source: Computer Economics
          Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   15
Incidents by Vector (2009)




Your Text here                                                                             Your Text here




                                      http://datalossdb.org/statistics
    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   16
Presentation’s Agenda

Need for DLP


Flavors of DLP
    Your Text here                                                                             Your Text here

Technology


Challenges


        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   17
Leakage Mitigation in Israel
                            + AwarenessMethodology
                                        IRMVaultingMail
                                -+        Protection


                                           + GW DLP
Your Text here                                                                             Your Text here
                                         + Encryption
                                      + Device Control
                                                 Endpoint
                                             -     DLP



    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   18
Presentation’s Agenda

Need for DLP


Flavors of DLP
    Your Text here                                                                             Your Text here

Technology


Challenges


        Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   19
2011: The Year of DLP???




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   20
No Complete Leakage Prevention




  Your Text here                                                                             Your Text here




      Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   21
How to Approach DLP Projects?




 Your Text here                                                                             Your Text here




     Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   22
DLP & ROI




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   23
DLP & Privacy




Your Text here                                                                             Your Text here




    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   24
DLP by Sectors



                            ServicesOther                           Telco


Your Text here                                                                             Your Text here

                                                                          GlobalHi-
                         Finance
                                                                             tech



                                              Government
                                               Defense



    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   25
DLP Scenario in Israel
                   Not a
                 strategic
                  project


                                    No Data
                                 Classification



Your Text here                                     Poor Security                           Your Text here
                                                      Policy



                                                                          Big eyes!



                                                                                           Project is a
                                                                                             failure



    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   26
What Should be Done in Order to
                      Succeed?


                                                                                                                                         Safeguard
                                                                                                                                         employee
                                                                                                          Automate policy                privacy
                                                                                                          enforcement
                                                                             Monitor all data
                                                                             usage
                Your Text here                   Discover and                                              Your Text here
                                                 protect
                    Classification and           confidential data
                    labeling                     wherever it is
Look for your                                    stored or used
assets!




                    Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic         27
Visit my Blog: www.shaharmaor.blogspot.com




     Your Text here                                                                             Your Text here




         Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic   28

Contenu connexe

Similaire à DLP Trends -Dec 2010

כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2Shahar Geiger Maor
 
Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure ServicesAriel Evans
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maorShahar Geiger Maor
 
Stki Summit 2010 Infra Services V8
Stki Summit 2010  Infra Services  V8Stki Summit 2010  Infra Services  V8
Stki Summit 2010 Infra Services V8Shahar Geiger Maor
 
STKI Summit 2010 Infra Pini
STKI Summit 2010 Infra PiniSTKI Summit 2010 Infra Pini
STKI Summit 2010 Infra PiniPini Cohen
 
STKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsSTKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsShahar Geiger Maor
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013 Ariel Evans
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maorShahar Geiger Maor
 

Similaire à DLP Trends -Dec 2010 (10)

כנס אבטחת מידע מוטו תקשורת V2
כנס אבטחת מידע  מוטו תקשורת V2כנס אבטחת מידע  מוטו תקשורת V2
כנס אבטחת מידע מוטו תקשורת V2
 
Security Summit July 2009
Security Summit  July 2009Security Summit  July 2009
Security Summit July 2009
 
Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure Services
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maor
 
Stki Summit 2010 Infra Services V8
Stki Summit 2010  Infra Services  V8Stki Summit 2010  Infra Services  V8
Stki Summit 2010 Infra Services V8
 
IPv6
IPv6IPv6
IPv6
 
STKI Summit 2010 Infra Pini
STKI Summit 2010 Infra PiniSTKI Summit 2010 Infra Pini
STKI Summit 2010 Infra Pini
 
STKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services TrendsSTKI Summit 2009 -Infrastructure Services Trends
STKI Summit 2009 -Infrastructure Services Trends
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
 

Plus de Shahar Geiger Maor

Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maorShahar Geiger Maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protectionShahar Geiger Maor
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelShahar Geiger Maor
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Shahar Geiger Maor
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information securityShahar Geiger Maor
 
Info Sec C T O Forum Nov 2009 V1
Info Sec   C T O Forum   Nov 2009   V1Info Sec   C T O Forum   Nov 2009   V1
Info Sec C T O Forum Nov 2009 V1Shahar Geiger Maor
 
Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)Shahar Geiger Maor
 
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008Shahar Geiger Maor
 
Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008Shahar Geiger Maor
 

Plus de Shahar Geiger Maor (14)

From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 
Mobile payment v3
Mobile payment v3Mobile payment v3
Mobile payment v3
 
Endpoints stki summit 2012-shahar geiger maor
Endpoints  stki summit 2012-shahar geiger maorEndpoints  stki summit 2012-shahar geiger maor
Endpoints stki summit 2012-shahar geiger maor
 
Risk, regulation and data protection
Risk, regulation and data protectionRisk, regulation and data protection
Risk, regulation and data protection
 
STKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM PanelSTKI Mobile brainstorming -MDM Panel
STKI Mobile brainstorming -MDM Panel
 
Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2Cloud Security CISO club -April 2011 v2
Cloud Security CISO club -April 2011 v2
 
Summit 2011 trends in information security
Summit 2011  trends in information securitySummit 2011  trends in information security
Summit 2011 trends in information security
 
Info Sec C T O Forum Nov 2009 V1
Info Sec   C T O Forum   Nov 2009   V1Info Sec   C T O Forum   Nov 2009   V1
Info Sec C T O Forum Nov 2009 V1
 
Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)Trends in the World and Israeli Green Data Centers (2008)
Trends in the World and Israeli Green Data Centers (2008)
 
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008Trends in the Israeli Infrastructure Services/STKI Summit  -Update June 2008
Trends in the Israeli Infrastructure Services/STKI Summit -Update June 2008
 
Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008Green IT Trends in Israel July 2008
Green IT Trends in Israel July 2008
 
Round Tables Summary
Round Tables SummaryRound Tables Summary
Round Tables Summary
 
Green IT Trends in Israel
Green IT Trends in IsraelGreen IT Trends in Israel
Green IT Trends in Israel
 
Round Tables: Summary
Round Tables: SummaryRound Tables: Summary
Round Tables: Summary
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

DLP Trends -Dec 2010

  • 1. Your Text here Your Text here Shahar Geiger Maor, CISSP Senior Analyst at STKI shahar@stki.info www.shaharmaor.blogspot.com Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 1
  • 2. ‫תודה אישית: למי שדואג לנו לפרנסה‬ Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  • 3. Presentation’s Agenda Need for DLP Flavors of DLP Your Text here Your Text here Technology Challenges Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
  • 4. ‫...תודה אישית: למי שדואג לנו לפרנסה‬ Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
  • 5. Security Arena Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 5 Source: http://securosis.com/research
  • 6. Information Security “Threatscape” Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  • 7. Underground Economy Items for sale on underground servers, appearance and price: Your Text here Your Text here Source: Symantec Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
  • 8. What’s the Incentive? Your Text here Your Text here Source: http://datalossdb.org/statistics?timeframe=all_time Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  • 9. What’s the Incentive? 2,754 • Data loss incidents 396 (35%) • Credit-card related data loss Hack (48%) Your Text here • How? Your Text here 297,704,392 • CCN compromised 751,779 • …CCNsIncident ? • Actual $$$ loss… Source: http://datalossdb.org/statistics?timeframe=all_time (2000-2010) Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
  • 10. Data Loss Analysis –Answering the “How?” Q Hack Fraud LostStolen X Web General Your Text here Your Text here Unknown CCN Disposal_Document Email Virus 0% 10% 20% 30% 40% 50% 60% Source: http://datalossdb.org/statistics?timeframe=all_time (2000-2010) Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  • 11. Social Engineering Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  • 12. Presentation’s Agenda Need for DLP Flavors of DLP Your Text here Your Text here Technology Challenges Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  • 13. Threats to Information Systems Security the difference between threats and vulnerabilities Your Text here Your Text here Poor system design Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  • 14. Internal vs. External Human Threats Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
  • 15. The Relative Seriousness of IT Security Threats Your Text here Your Text here Source: Computer Economics Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  • 16. Incidents by Vector (2009) Your Text here Your Text here http://datalossdb.org/statistics Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  • 17. Presentation’s Agenda Need for DLP Flavors of DLP Your Text here Your Text here Technology Challenges Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  • 18. Leakage Mitigation in Israel + AwarenessMethodology IRMVaultingMail -+ Protection + GW DLP Your Text here Your Text here + Encryption + Device Control Endpoint - DLP Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
  • 19. Presentation’s Agenda Need for DLP Flavors of DLP Your Text here Your Text here Technology Challenges Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  • 20. 2011: The Year of DLP??? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
  • 21. No Complete Leakage Prevention Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
  • 22. How to Approach DLP Projects? Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
  • 23. DLP & ROI Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
  • 24. DLP & Privacy Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
  • 25. DLP by Sectors ServicesOther Telco Your Text here Your Text here GlobalHi- Finance tech Government Defense Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
  • 26. DLP Scenario in Israel Not a strategic project No Data Classification Your Text here Poor Security Your Text here Policy Big eyes! Project is a failure Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
  • 27. What Should be Done in Order to Succeed? Safeguard employee Automate policy privacy enforcement Monitor all data usage Your Text here Discover and Your Text here protect Classification and confidential data labeling wherever it is Look for your stored or used assets! Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
  • 28. Visit my Blog: www.shaharmaor.blogspot.com Your Text here Your Text here Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 28