SlideShare a Scribd company logo
1 of 41
Common Data Protection Pitfalls & How You Can Avoid Them
Common Data Protection Pitfalls – And How You Can Avoid Them  Jim Maloney,  Cyber Risk Strategies, LLC Mark Evertz,  Tripwire, Inc. September 28, 2010
Today ’s Speakers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
The data protection challenge Controls Complex external threats Changing business requirements Growing compliance obligations Increasing data volumes and distribution Systems Data
More data, everywhere ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Increasing scope of data Customer Data Internal Data System Data Personal data Business plans Firewall configurations Financial data Intellectual property Router configurations Health records Customer lists Platform configurations Cardholder details Employee lists Accounts & Permissions Criminal records Contracts Event logs
System data, too? ,[object Object],[object Object],[object Object],2010 Verizon Data Breach Investigations Report
Pitfall No. 1 – Data awareness ,[object Object],[object Object],[object Object]
Many compliance obligations Compliance Item Primary Locale Industry Data Focus UK Data Protection Act United Kingdom All Customer Data Data Protection Directive European Union All Customer Data Privacy and Electronic Communications European Union All Customer Data Federal Information Security Management Act United States US Federal Agencies System Data Privacy Act of 1974 United States US Federal Agencies Customer Data Health Insurance Portability Act United States Health Customer data (Health Care) HITECH Act United States Health Customer Data (Health Care) Identity Theft Red Flags Rule United States Financial Customer Data (Identity Information) Gramm-Leach-Bliley Act United States Financial Customer Data (Financial Information) Payment Card Industry Data Security Standard All Firms that are part of the credit card processing cycle Customer Data (Cardholder and Sensitive Authentication Data)
Breach notification laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Pitfall No. 2 – A compliance nightmare Training Audits Technology Policies BCP IRP Laws and regulations Standard of due care Industry standards Best practices
External threats ,[object Object],[object Object],[object Object],[object Object]
Advanced persistent threats ,[object Object],[object Object],[object Object]
Targeted, adaptive malware ,[object Object],[object Object],[object Object],[object Object]
Social engineering via new channels ,[object Object],[object Object],[object Object],[object Object]
Who is being targeted? 2010 Verizon Data Breach Investigations Report
What data is being targeted? 2010 Verizon Data Breach Investigations Report
Pitfall No. 3 – Lack of situational awareness ,[object Object],[object Object],[object Object],[object Object],[object Object]
The (d)evolution of  information  security 1970 1980 1990 2000 Information Computers Internal Networks External Networks Applications Clouds 2010 User Behavior
Pitfall No. 4 – Loss of focus on information security ,[object Object],[object Object],[object Object]
Data protection objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Enhancing Security & Compliance in a Data Deluge Mark Evertz September 2010
Must Make Better Use Of Existing Data Vulnerability Assessment Switches & Routers Firewalls, IDS & IPS Databases Applications “ We consistently find that nearly 90% of the time logs are available but discovery  [of breaches] via log analysis remains under 5% ” 2010
Events of Interest! change event log event Improved Data Protection: Correlation of Change Events & Log Events Raw Log Data Am I Secure? Is Policy Impacted?
Example:  Correlating Log & Change Events 5 failed logins Logging turned off Host not generating events Windows event log cleared Login successful Policy test fails
Tripwire – Homepages - Dashboards
Attack in Progress? FTP Publishing Enabled…
FTP Publishing Failed Test – Actual Value (Auto 2)
Clicking Node – Allows Log Center View
FTP Publishing – Log Center Query Results Who What When Where
Query Further on  “myUser” – Who is this???
History of myUser Account – Creation to threat!
Raw Event Data – Returned From Log Center
Normalized/Readable Data Returned By Log Center
Tripwire VIA:  IT Security & Compliance Automation Correlate to  Bad Changes Correlate to  Suspicious Events Policy Engine Event Database
V ISIBILITY  Across the entire  IT infrastructure I NTELLIGENCE Enable better,  faster decisions A UTOMATION Reduce manual, repetitive tasks Tripwire VIA
The future of data protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Improved data protection -  today ,[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you ,[object Object],[object Object]
THANK YOU! Mark Evertz  Security Solutions Manager Direct:  503.269. 2639 E-mail :  [email_address]

More Related Content

More from Tripwire

World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportTripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!Tripwire
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsTripwire
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7Tripwire
 
Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Tripwire
 
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure TimelinesMost RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure TimelinesTripwire
 
ICS Security in the Energy Industry
ICS Security in the Energy IndustryICS Security in the Energy Industry
ICS Security in the Energy IndustryTripwire
 
Protecting Your POS Systems from the Next Big Ransomware Threat
Protecting Your POS Systems from the Next Big Ransomware ThreatProtecting Your POS Systems from the Next Big Ransomware Threat
Protecting Your POS Systems from the Next Big Ransomware ThreatTripwire
 
Top 10 Dream Jobs in Information Security
Top 10 Dream Jobs in Information SecurityTop 10 Dream Jobs in Information Security
Top 10 Dream Jobs in Information SecurityTripwire
 
DevOps Security: A New Paradigm
DevOps Security: A New ParadigmDevOps Security: A New Paradigm
DevOps Security: A New ParadigmTripwire
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the YearTripwire
 

More from Tripwire (20)

World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 
Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks
 
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure TimelinesMost RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
 
ICS Security in the Energy Industry
ICS Security in the Energy IndustryICS Security in the Energy Industry
ICS Security in the Energy Industry
 
Protecting Your POS Systems from the Next Big Ransomware Threat
Protecting Your POS Systems from the Next Big Ransomware ThreatProtecting Your POS Systems from the Next Big Ransomware Threat
Protecting Your POS Systems from the Next Big Ransomware Threat
 
Top 10 Dream Jobs in Information Security
Top 10 Dream Jobs in Information SecurityTop 10 Dream Jobs in Information Security
Top 10 Dream Jobs in Information Security
 
DevOps Security: A New Paradigm
DevOps Security: A New ParadigmDevOps Security: A New Paradigm
DevOps Security: A New Paradigm
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Common Data Protection Pitfalls –And How You Can Avoid Them

  • 1. Common Data Protection Pitfalls & How You Can Avoid Them
  • 2. Common Data Protection Pitfalls – And How You Can Avoid Them Jim Maloney, Cyber Risk Strategies, LLC Mark Evertz, Tripwire, Inc. September 28, 2010
  • 3.
  • 4.
  • 5. The data protection challenge Controls Complex external threats Changing business requirements Growing compliance obligations Increasing data volumes and distribution Systems Data
  • 6.
  • 7. Increasing scope of data Customer Data Internal Data System Data Personal data Business plans Firewall configurations Financial data Intellectual property Router configurations Health records Customer lists Platform configurations Cardholder details Employee lists Accounts & Permissions Criminal records Contracts Event logs
  • 8.
  • 9.
  • 10. Many compliance obligations Compliance Item Primary Locale Industry Data Focus UK Data Protection Act United Kingdom All Customer Data Data Protection Directive European Union All Customer Data Privacy and Electronic Communications European Union All Customer Data Federal Information Security Management Act United States US Federal Agencies System Data Privacy Act of 1974 United States US Federal Agencies Customer Data Health Insurance Portability Act United States Health Customer data (Health Care) HITECH Act United States Health Customer Data (Health Care) Identity Theft Red Flags Rule United States Financial Customer Data (Identity Information) Gramm-Leach-Bliley Act United States Financial Customer Data (Financial Information) Payment Card Industry Data Security Standard All Firms that are part of the credit card processing cycle Customer Data (Cardholder and Sensitive Authentication Data)
  • 11.
  • 12. Pitfall No. 2 – A compliance nightmare Training Audits Technology Policies BCP IRP Laws and regulations Standard of due care Industry standards Best practices
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Who is being targeted? 2010 Verizon Data Breach Investigations Report
  • 18. What data is being targeted? 2010 Verizon Data Breach Investigations Report
  • 19.
  • 20. The (d)evolution of information security 1970 1980 1990 2000 Information Computers Internal Networks External Networks Applications Clouds 2010 User Behavior
  • 21.
  • 22.
  • 23. Enhancing Security & Compliance in a Data Deluge Mark Evertz September 2010
  • 24. Must Make Better Use Of Existing Data Vulnerability Assessment Switches & Routers Firewalls, IDS & IPS Databases Applications “ We consistently find that nearly 90% of the time logs are available but discovery [of breaches] via log analysis remains under 5% ” 2010
  • 25. Events of Interest! change event log event Improved Data Protection: Correlation of Change Events & Log Events Raw Log Data Am I Secure? Is Policy Impacted?
  • 26. Example: Correlating Log & Change Events 5 failed logins Logging turned off Host not generating events Windows event log cleared Login successful Policy test fails
  • 27. Tripwire – Homepages - Dashboards
  • 28. Attack in Progress? FTP Publishing Enabled…
  • 29. FTP Publishing Failed Test – Actual Value (Auto 2)
  • 30. Clicking Node – Allows Log Center View
  • 31. FTP Publishing – Log Center Query Results Who What When Where
  • 32. Query Further on “myUser” – Who is this???
  • 33. History of myUser Account – Creation to threat!
  • 34. Raw Event Data – Returned From Log Center
  • 36. Tripwire VIA: IT Security & Compliance Automation Correlate to Bad Changes Correlate to Suspicious Events Policy Engine Event Database
  • 37. V ISIBILITY Across the entire IT infrastructure I NTELLIGENCE Enable better, faster decisions A UTOMATION Reduce manual, repetitive tasks Tripwire VIA
  • 38.
  • 39.
  • 40.
  • 41. THANK YOU! Mark Evertz Security Solutions Manager Direct: 503.269. 2639 E-mail : [email_address]

Editor's Notes

  1. Over the last several years many organizations have put collection systems in place to meet PCI requirements. They put in log management and FIM along with other security tools. And they have been collecting a ton of data ever since. So they have plenty of data to meet compliance requirements. But the problem is they have too much data for it to be useful. And it is almost impossible to quickly know if any of the data is indicating a security issue. It ’s like trying to find a single land-mine in a massive land-fill before it goes off and causes damage.
  2. Scenario—the power of integrating file integrity monitoring, configuration policy management with log and event management: A critical application setting goes from in Compliance to out of compliance (green to red) The investigation reveals who made the change - an unknown user Drilling in to the Event Logs related to the application server reveals that user ID was created by a known Administrator, and then given elevated privileges All of this data was turned in to information - a critical application is about to go down, a type of denial of service All this information was available through the TE Console Bottom line: By correlating Compliance, Change and Event data, individual non-suspect changes are shown to be a high security event
  3. This is really what you want to know. 5 failed logins on its own followed by a successful login is probably a medium to low alert. In fact, this is so common it ’s contributing to SIEM overload. But, getting an unrelated alert for each one of these every step along the way won’t help. We think you need this context to see all of these happening in concert so you can quickly see these complicated patterns that impact security. so what does Tripwire do to help solve this? Let me show you.
  4. Here ’s a snapshot of a high-level dashboard to give you a lay of the land in your IT infrastructure based on policies and standards in place. In this case, based on FISMA compliance. You’ll note, a real-time scoring element, details on a failed test and any associated changes based on those failed tests. But beyond the colors and pie charts, the devil is in the details
  5. As an person watching this all behind the scenes, you are notified when something like "FTP Publishing" service failed the "disabled" test put in place, meaning someone has enabled something against your security or compliance policy.  For you, this is a major RED FLAG, but may not be malicious. You need to know more. 
  6. So you start piecing together what happened or is happening…This start up type indicates that this has happened and the type represents an auto start… after that policy test. Odd…
  7. So you go into the "Log Center Events" tab and step through building the forensics on who enabled it…to get the 4ws Who, What, When and Where of the attack.
  8. As you do you ’ll notice "myuser" enabled it, but as you progress through the log events, a user named "sjohnston" is the one who created "myuser" and then gave "myuser" admin privileges.
  9. From there "myuser" began to wreak havoc.  Point being that through a critical change found in Tripwire Enterprise, as it impacts a compliance regime like PCI, FISMA for govt. SOX or some other prescribed standard or security control, we were able to discover a "breach or potential breach “ through integration with our next-generation Security Information and Event Management solution, Tripwire Log Center.
  10. Here ’s another view of what myUser’s been up to that represent a breach. Successful login; group member added and given admin privileges and then another user account created. You’ve pinpointed who did it, when they did it and what they did…in minutes rather than days, weeks or months…by correlating log events with change data. Now you can take action.
  11. As Verizon pointed out…the precursor to breaches or breaches in progress live in your log data. The question is…do you have the tools to find the culprit before damage is done. If you can find suspicious log behavior and correlate it with suspicious file or system changes in near real time you can maintain a constant state of compliance and improve your ability to protect your most sensitive data.
  12. And it ’s all spelled out for you here. In addition to unified dashboards with compliance and security Red or Green status using easy to understand widgets and reporting tools, Tripwire VIA helps you fight through a deluge of data with real-time visibility, true threat detection and response and that ability to automate remediation procedures to stop or reduce the impact of an attack.
  13. The integration of Tripwire Log Center, Tripwire Enterprise and the dynamic alerting we deliver through that integration elevates seemingly innocuous events by identifying complicated patterns of behavior that represent a potential compromise of sensitive data or critical systems. Tripwire VIA is a product suite that represents the tight integration of Tripwire Enterprise and Tripwire Log Center. It is the only IT Security and Compliance solution available that allows you to correlate changes of interest to events of interest to bring an unprecedented new level of Visibility, Intelligence and Automation across the enterprise to help automate and improve overall IT security and speed IT compliance.