1. Your Text here Your Text here
Shahar Geiger Maor, CISSP
Senior Analyst at STKI
shahar@stki.info www.shaharmaor.blogspot.com
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 1
2. תודה אישית: למי שדואג לנו לפרנסה
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
3. Presentation’s Agenda
Need for DLP
Flavors of DLP
Your Text here Your Text here
Technology
Challenges
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
4. ...תודה אישית: למי שדואג לנו לפרנסה
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
5. Security
Arena
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
Source: http://securosis.com/research
6. Information Security “Threatscape”
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
7. Underground Economy
Items for sale on underground servers, appearance and price:
Your Text here Your Text here
Source: Symantec
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
8. What’s the Incentive?
Your Text here Your Text here
Source: http://datalossdb.org/statistics?timeframe=all_time
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
9. What’s the Incentive?
2,754 • Data loss incidents
396 (35%) • Credit-card related data loss
Hack (48%)
Your Text here
• How?
Your Text here
297,704,392 • CCN compromised
751,779 • …CCNsIncident
? • Actual $$$ loss…
Source: http://datalossdb.org/statistics?timeframe=all_time (2000-2010)
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
10. Data Loss Analysis –Answering the “How?” Q
Hack
Fraud
LostStolen X
Web
General
Your Text here Your Text here
Unknown CCN
Disposal_Document
Email
Virus
0% 10% 20% 30% 40% 50% 60%
Source: http://datalossdb.org/statistics?timeframe=all_time (2000-2010)
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
11. Social Engineering
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
12. Presentation’s Agenda
Need for DLP
Flavors of DLP
Your Text here Your Text here
Technology
Challenges
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
13. Threats to Information Systems Security
the difference between
threats and vulnerabilities
Your Text here Your Text here
Poor system
design
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
14. Internal vs. External Human Threats
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
15. The Relative Seriousness of IT Security Threats
Your Text here Your Text here
Source: Computer Economics
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
16. Incidents by Vector (2009)
Your Text here Your Text here
http://datalossdb.org/statistics
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
17. Presentation’s Agenda
Need for DLP
Flavors of DLP
Your Text here Your Text here
Technology
Challenges
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
18. Leakage Mitigation in Israel
+ AwarenessMethodology
IRMVaultingMail
-+ Protection
+ GW DLP
Your Text here Your Text here
+ Encryption
+ Device Control
Endpoint
- DLP
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
19. Presentation’s Agenda
Need for DLP
Flavors of DLP
Your Text here Your Text here
Technology
Challenges
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
20. 2011: The Year of DLP???
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
21. No Complete Leakage Prevention
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
22. How to Approach DLP Projects?
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
23. DLP & ROI
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
24. DLP & Privacy
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
25. DLP by Sectors
ServicesOther Telco
Your Text here Your Text here
GlobalHi-
Finance
tech
Government
Defense
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
26. DLP Scenario in Israel
Not a
strategic
project
No Data
Classification
Your Text here Poor Security Your Text here
Policy
Big eyes!
Project is a
failure
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
27. What Should be Done in Order to
Succeed?
Safeguard
employee
Automate policy privacy
enforcement
Monitor all data
usage
Your Text here Discover and Your Text here
protect
Classification and confidential data
labeling wherever it is
Look for your stored or used
assets!
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 27
28. Visit my Blog: www.shaharmaor.blogspot.com
Your Text here Your Text here
Shahar Maor’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 28