View stunning SlideShares in full-screen with the new iOS app!Introducing SlideShare for AndroidExplore all your favorite topics in the SlideShare appGet the SlideShare app to Save for Later — even offline
View stunning SlideShares in full-screen with the new Android app!View stunning SlideShares in full-screen with the new iOS app!
SafeNet ‘Secure Breach’ Survey
31% admitted that their
perimeter has been breached
20% were not sure if they’d been
38% believe unauthorized users
currently have access to their
65% think they will suffer a data
breach within 3 years
59% believe if their perimeter is
breached, their data would not be
20% wouldn’t trust their own
company with their personal data….
Applications Databases Storage
Tape Drives Network
PII Data HealthData
Data & Information – Examples
CCTNS Treasury IGRS
•Lost or unauthorized
•Ongoing cases details
•Financial Data in
•State Revenue Details
Are these Data Elements Sensitive?
What will happen if someone steals & misuse?
Likely Misuse Scenario - 1
Query the system to show the Top 10 transactions by
value in last 10-days
Does the information published on
a Website or any other public
media lead to uncomfortable
situation for the parties involved?
Once done, does it facilitate someone
with criminal mindset to make demands
on the parties involved?
Likely Misuse Scenario - 2
Query the system to show list of people
with highest number of properties
Once done, does it facilitate someone with
criminal mindset to misuse the information.
Does the information published on a
Website or any other public media lead to
uncomfortable situation for the parties
Oops, did I spill your data?
Amateur -> Organized
• Cyber Criminals
IT-ACT OF INDIA
Where a body corporate, possessing, dealing or handling any sensitive
personal data or information in a computer resource it owns, controls or
operates, is negligent in implementing and maintaining reasonable
security practices and procedures and thereby causes wrongful loss or
wrongful gain to any person, such body corporate shall be liable to pay
damages by way of compensation to the person to affected
Financial Penalties to the Organization
Loss of Reputation for the Department
But most importantly……..
Is it something to…. “THINK”?
Do we Need to SECURE these Data Elements?
Protection needs to be
on data itself
Security Strategy Objectives
Behind every great encryption
solution stands a key waiting to be
C I N R A
Encryption is an essential process to
protect sensitive data,
provide risk management, and
ease proof of compliance.
“THE ULTIMATE DEFENSE”
ENCRYPTION WITH SECURE
A New Mindset is Needed
Sole Perimeter Security is No Longer Enough
Breaches Will Happen and We Must Prepare Differently
Data is the New Perimeter
Encryption with Secure Key Management