SlideShare a Scribd company logo
1 of 27
Download to read offline
That Feeling When
Source Code
Walks Out
the Door
Data Loss Protection for
When People Quit.
Odds are you’re suffering a
data loss, leak or theft…
and you don’t even know it.
And it’s right in
front of you.
Employees
are “looking”
The grass is always greener
50%of the labor force is
looking for a new job
HalfOf job seekers have
been at an employer
for less than 1 year
TREND
TREND
More employees
are quitting
Employee quits have risen every
year for the past decade –
totaling 40M in 2018.
1 in 4members of the labor force
quit to go to another job
22.0
23.5
25.1
27.6
30.5
33.7
36.3
38.2
40.0
20
25
30
35
40
2010 2011 2012 2013 2014 2015 2016 2017 2018
Source: U.S. Bureau of Labor statistics
TREND
Quitters
are taking
The brutal truth
60%
70%
66%
of departing employees admit to taking
company data.
of IP theft happens in the 30 days
before an employee announces their
resignation.
of departing employees said they did it
to help them get their next job.
Departing employees are
your single biggest insider
threat to data loss.
24 million people took
data from their previous
employer in 2018.
Why? Because…
Data is more
portable than
ever
Data loss
detection is
lacking
Employee
loyalty is
declining
Employee
quits are
growing
Quitters
are taking
data
We don’t have a departing
employee workflow.
Yet most companies say…
In fact, less than 20% of large
enterprise companies have a
well defined incident response
scenarios for insider threat.
But wait, it gets worse…
It’s a growing
market problem
Correlation or Causation –
it doesn’t really matter
+ Data portability is accelerating
+ Data loss detection is lacking
+ Employee loyalty is declining
+ Employee quits are growing
+ Quitters are taking data
No wonder insider
threat is on the rise
Data Loss Risk
“Surprises”are everywhere!
INSIDE THREATS OUTSIDE THREATS
DEVICE ORGANIZATIONUSER
Tech refresh
Lost/Stolen laptop
Hardware failure
Error / Accidents
Departing employee
High-risk users
Error / Accidents
Departing employee
High-risk users
CYBER
APT
Ransomware
Malware
When it comes to inside
threats, you’re flying blind.
Brutal Truth
DLP can’t stop it.
Just read the headlines.
Brutal Truth
When
Employees
Steal, You're
Trending
prevention will fail.
You’re missing a critical
layer of protection.
Brutal Truth
You don’t know…
data you have whereWhatWhatWhatWhatWhatWhat
WhatWhatWhatWhatWhatWho
WhatWhatWhatWhatWhatWhen
data is leavingWhatWhatWhatWhatWhatWhat
has or had what data
data is leaving
The Root Cause
A data visibility gap
in the security stack.
“Prevention
isn’t enough”
[ the gap ]
Identify Prevent Detect Respond Recover
Data Identification &
Classification
DRM &
Encrypt
Data Loss &
PreventionData
Network Firewall
Next-Gen Firewall
Network DLP
Identity
User
Authentication
Identity & Access Management
(IAM)
Application Cloud Getaways
Cloud Access Security Brokers (CASB)
Integrated DLP (G-mail, O365, etc)
Device
“Legacy Antivirus”
Endpoint AV
“Next-Gen AV”
Endpoint Detection & Response (EDR)
Prevention will fail.
You need fast data loss
detection and response.
Code42 helps make sure
security & IT teams are not
blindsided by data loss when
prevention fails.
We detect insider threats in
near real-time so you can
investigate and respond
before any damage is done. 
Identify Prevent Detect Respond Recover
Data Identification &
Classification
DRM &
Encrypt
Data Loss &
PreventionData
Network Firewall
Next-Gen Firewall
Network DLP
Identity
User
Authentication
Identity & Access Management
(IAM)
Application Cloud Getaways
Cloud Access Security Brokers (CASB)
Integrated DLP (G-mail, O365, etc)
Device
“Legacy Antivirus”
Endpoint AV
“Next-Gen AV”
Endpoint Detection & Response (EDR)
Fills the Gap
Next-Gen
Data Loss Protection
Simple, fast detection
& response to everyday
data loss from
insider threats.
Your departing
employees are
the biggest insider threat.
Brutal Truth
That Feeling When
You Save
the Day-ta
Proudly protect company data.
Fast and simple insider
threat protection.
Departing employees is your single biggest insider threat to data loss.
Last year, 40 Million people changed jobs. 60% of them admit to taking data when they leave and 70% do it 30 days
before they quit. Prevention will fail. Data will get out. 90% of data loss when employees quit goes undetected for
months. By the time you find out about it – the damage is done and you're wrapped up in a lawsuit. Our job is to
make sure you’re not blindsided by it. We provide real time detection and response so you can remediate before
damage is done.
Code42 specializes in next-gen data loss protection. Our Customers know when they are bleeding data when an
employee quits. We help them setup a process to quickly detect employee data theft and take action before it's too
late. Their old employee off boarding process made sure departing employees turned in their badge and laptop. With
Code42, they now make sure employees don’t take company data on the way out.
Learn more about us at www.code42.com

More Related Content

Similar to Data Loss Protection for When People Quit

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-trainingMedia pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
Jay T. Conrad
 

Similar to Data Loss Protection for When People Quit (20)

Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
Addressing insider threats and data leakage
Addressing insider threats and data leakageAddressing insider threats and data leakage
Addressing insider threats and data leakage
 
Data breach
Data breachData breach
Data breach
 
Three tools to reduce employee apathy
Three tools to reduce employee apathyThree tools to reduce employee apathy
Three tools to reduce employee apathy
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Productivity 3.0
Productivity 3.0Productivity 3.0
Productivity 3.0
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
Riverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentationRiverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentation
 
DLP.pptx
DLP.pptxDLP.pptx
DLP.pptx
 
Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?Secure Wall - how should companies protect themselves from cyber crime?
Secure Wall - how should companies protect themselves from cyber crime?
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBs
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
 
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-trainingMedia pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
Media pro observeit-webinar-slides-behavioral-analytics-just-in-time-training
 
Human Factor on Information Security -- Origin of Information Leakage
Human Factor on Information Security  -- Origin of Information LeakageHuman Factor on Information Security  -- Origin of Information Leakage
Human Factor on Information Security -- Origin of Information Leakage
 

Recently uploaded

Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Recently uploaded (20)

WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
WSO2Con2024 - Simplified Integration: Unveiling the Latest Features in WSO2 L...
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
WSO2CON 2024 - IoT Needs CIAM: The Importance of Centralized IAM in a Growing...
 
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
WSO2Con2024 - Navigating the Digital Landscape: Transforming Healthcare with ...
 
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdfAzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
 
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next IntegrationWSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
WSO2CON2024 - Why Should You Consider Ballerina for Your Next Integration
 
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public AdministrationWSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
WSO2CON 2024 - How CSI Piemonte Is Apifying the Public Administration
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
BusinessGPT - Security and Governance for Generative AI
BusinessGPT  - Security and Governance for Generative AIBusinessGPT  - Security and Governance for Generative AI
BusinessGPT - Security and Governance for Generative AI
 
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
[GeeCON2024] How I learned to stop worrying and love the dark silicon apocalypse
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 

Data Loss Protection for When People Quit

  • 1. That Feeling When Source Code Walks Out the Door Data Loss Protection for When People Quit.
  • 2. Odds are you’re suffering a data loss, leak or theft… and you don’t even know it.
  • 3. And it’s right in front of you.
  • 4. Employees are “looking” The grass is always greener 50%of the labor force is looking for a new job HalfOf job seekers have been at an employer for less than 1 year TREND
  • 5. TREND More employees are quitting Employee quits have risen every year for the past decade – totaling 40M in 2018. 1 in 4members of the labor force quit to go to another job 22.0 23.5 25.1 27.6 30.5 33.7 36.3 38.2 40.0 20 25 30 35 40 2010 2011 2012 2013 2014 2015 2016 2017 2018 Source: U.S. Bureau of Labor statistics
  • 6. TREND Quitters are taking The brutal truth 60% 70% 66% of departing employees admit to taking company data. of IP theft happens in the 30 days before an employee announces their resignation. of departing employees said they did it to help them get their next job.
  • 7. Departing employees are your single biggest insider threat to data loss.
  • 8. 24 million people took data from their previous employer in 2018.
  • 9. Why? Because… Data is more portable than ever Data loss detection is lacking Employee loyalty is declining Employee quits are growing Quitters are taking data
  • 10. We don’t have a departing employee workflow. Yet most companies say…
  • 11. In fact, less than 20% of large enterprise companies have a well defined incident response scenarios for insider threat.
  • 12. But wait, it gets worse…
  • 13. It’s a growing market problem Correlation or Causation – it doesn’t really matter + Data portability is accelerating + Data loss detection is lacking + Employee loyalty is declining + Employee quits are growing + Quitters are taking data No wonder insider threat is on the rise
  • 14. Data Loss Risk “Surprises”are everywhere! INSIDE THREATS OUTSIDE THREATS DEVICE ORGANIZATIONUSER Tech refresh Lost/Stolen laptop Hardware failure Error / Accidents Departing employee High-risk users Error / Accidents Departing employee High-risk users CYBER APT Ransomware Malware
  • 15. When it comes to inside threats, you’re flying blind. Brutal Truth
  • 16. DLP can’t stop it. Just read the headlines. Brutal Truth
  • 18. prevention will fail. You’re missing a critical layer of protection. Brutal Truth
  • 19. You don’t know… data you have whereWhatWhatWhatWhatWhatWhat WhatWhatWhatWhatWhatWho WhatWhatWhatWhatWhatWhen data is leavingWhatWhatWhatWhatWhatWhat has or had what data data is leaving
  • 20. The Root Cause A data visibility gap in the security stack. “Prevention isn’t enough” [ the gap ] Identify Prevent Detect Respond Recover Data Identification & Classification DRM & Encrypt Data Loss & PreventionData Network Firewall Next-Gen Firewall Network DLP Identity User Authentication Identity & Access Management (IAM) Application Cloud Getaways Cloud Access Security Brokers (CASB) Integrated DLP (G-mail, O365, etc) Device “Legacy Antivirus” Endpoint AV “Next-Gen AV” Endpoint Detection & Response (EDR)
  • 21. Prevention will fail. You need fast data loss detection and response.
  • 22. Code42 helps make sure security & IT teams are not blindsided by data loss when prevention fails.
  • 23. We detect insider threats in near real-time so you can investigate and respond before any damage is done. 
  • 24. Identify Prevent Detect Respond Recover Data Identification & Classification DRM & Encrypt Data Loss & PreventionData Network Firewall Next-Gen Firewall Network DLP Identity User Authentication Identity & Access Management (IAM) Application Cloud Getaways Cloud Access Security Brokers (CASB) Integrated DLP (G-mail, O365, etc) Device “Legacy Antivirus” Endpoint AV “Next-Gen AV” Endpoint Detection & Response (EDR) Fills the Gap Next-Gen Data Loss Protection Simple, fast detection & response to everyday data loss from insider threats.
  • 25. Your departing employees are the biggest insider threat. Brutal Truth
  • 26. That Feeling When You Save the Day-ta Proudly protect company data. Fast and simple insider threat protection.
  • 27. Departing employees is your single biggest insider threat to data loss. Last year, 40 Million people changed jobs. 60% of them admit to taking data when they leave and 70% do it 30 days before they quit. Prevention will fail. Data will get out. 90% of data loss when employees quit goes undetected for months. By the time you find out about it – the damage is done and you're wrapped up in a lawsuit. Our job is to make sure you’re not blindsided by it. We provide real time detection and response so you can remediate before damage is done. Code42 specializes in next-gen data loss protection. Our Customers know when they are bleeding data when an employee quits. We help them setup a process to quickly detect employee data theft and take action before it's too late. Their old employee off boarding process made sure departing employees turned in their badge and laptop. With Code42, they now make sure employees don’t take company data on the way out. Learn more about us at www.code42.com