SlideShare a Scribd company logo
1 of 35
Download to read offline
Data Leakage
Prevention
               Interop 2010




                  w w w .niiconsulting.com
Agenda

 Introduction
 Data Leakage Scenario
   Cases
   Real-world impacts
   Vulnerabilities
 Building the Business Case
 Demystifying DLP Solutions
 Implementation Challenges




                               w w w .niiconsulting.com
Speaker Introduction

 Founder & Principal Consultant, Network
  Intelligence
 Certified as CISA, CISSP and CISM
 Speaker at Blackhat 2004, Interop 2005, IT
  Underground 2005, OWASP Asia 2008,2009
 Co-author of book on Metasploit Framework
  (Syngress), Linux Security & Controls (ISACA)
 Author of numerous articles on SecurityFocus,
  IT Audit, IS Controls (ISACA)
 Conducted numerous pen-tests, application
  security assessments, forensics, etc.

                                    w w w .niiconsulting.com
THE BIGGEST HACK IN
HISTORY

                 w w w .niiconsulting.com
Gonzalez, TJX and Heart-break-land

 >200 million credit card number stolen
 Heartland Payment Systems, 7-Eleven, and
  2 US national retailers hacked
 Modus operandi
     Visit retail stores to understand workings
     Analyze websites for vulnerabilities
     Hack in using SQL injection
     Inject malware
     Sniff for card numbers and details
     Hide tracks


                                          w w w .niiconsulting.com
The hacker underground

 Albert Gonzalez
      a/k/a “segvec,”
      a/k/a “soupnazi,”
      a/k/a “j4guar17”


 Malware, scripts and hacked data hosted on servers in:
      Latvia                 Ukraine
                              New Jersey
      Netherlands
                              California

 IRC chats
      March 2007: Gonzalez “planning my second phase against
       Hannaford”
      December 2007: Hacker P.T. “that’s how [HACKER 2]
       hacked Hannaford.”


                                               w w w .niiconsulting.com
Where does all this end up?
                                                   IRC Channels
                                                   #cc
                                                   #ccards
                                                   #ccinfo
                                                   #ccpower
                                                   #ccs
                                                   #masterccs
                                                   #thacc
                                                   #thecc
                                                   #virgincc

 Commands used on IRC
     !cardable
     !cc, !cclimit, !chk, !cvv2, !exploit, !order.log,
      !proxychk

                                                          w w w .niiconsulting.com
TJX direct costs               $200 million in
                                  fines/penalties




                 $41 million to
                     Visa
$24 million to
 MasterCard




                                    w w w .niiconsulting.com
Who’s been affected?




                       w w w .niiconsulting.com
BUILDING THE BUSINESS
CASE

                w w w .niiconsulting.com
Profitability in hacking – 2009




                            w w w .niiconsulting.com
Sectors hacked – Q1 2009




                           w w w .niiconsulting.com
Back of the envelope

SECURITY ROI


                       w w w .niiconsulting.com
Cost of an incident

 $6.6 million average cost of a data breach
 From this, cost of lost business is $4.6
  million
 More than $200 per compromised record

On the other hand:
 Fixing a bug costs $400 to $4000
 Cost increases exponentially as time lapses



                                   w w w .niiconsulting.com
Direct Costs

 Fees for legal recourse to address and
  forensics
 Short-term impact to R&D cost
  recuperation
 Long-term impact to profitability/revenue
  projections
 System and process audits
 Fines
 Regulatory audit fees
 Strategy consulting fees

                                  w w w .niiconsulting.com
Numbers on the table




                       w w w .niiconsulting.com
Indirect Cost




 $1 billion business
 20% new customer base lost
 10% of repeat customers lost




                                 w w w .niiconsulting.com
Impact to profit margin




                          w w w .niiconsulting.com
The Legal Angle

   Computer Crimes Act, 1997
   Electronic Commerce Act, 2006
   PCI DSS
   Central Bank of Malaysia Act, 2009
   Personal Data Protection Bill, ??
   Guidelines on Internet Insurance
   Other regulations




                                    w w w .niiconsulting.com
DEMYSTIFYING DLP
SOLUTIONS

                   w w w .niiconsulting.com
What does it stand for?

   Data Leakage Prevention
   Data Loss Protection
   Information Loss Protection
   Extrusion Prevention
   Content Monitoring and Filtering
   Content Monitoring and Protection




                                        w w w .niiconsulting.com
DLP Solutions

   Options
   Vendors
   Network
   End-point
   Content-aware
   Context-aware




                    w w w .niiconsulting.com
FEATURES TO LOOK OUT
FOR

                w w w .niiconsulting.com
Comprehensive Coverage




                         w w w .niiconsulting.com
Pre-defined policies




                       w w w .niiconsulting.com
Blocking & Alerting




                      w w w .niiconsulting.com
Management Console & Dashboards




                         w w w .niiconsulting.com
Under the hood

1. Rule-based Regular
   Expressions
2. Database Fingerprinting
3. Exact File Matching
4. Partial Document
   Matching
5. Statistical Analysis
6. Conceptual/Lexicon
7. Categories


                             w w w .niiconsulting.com
Protecting Data

 Data in motion
     Network monitor
     Email integration
     Filtering/blocking and proxy integration
     Internal networks
     Distributed and Hierarchical deployments
 Data at rest
   Content discovery techniques
   Remote scanning / Agent-Based Scanning /
    Memory-Resident Agent Scanning
 Data in use
   Endpoint protection
                                         w w w .niiconsulting.com
Coverage

   Network
   End-point
   Bluetooth
   Blackberry/iPhones/Smartphones
   Operating systems
   Virtualized servers
   Integration with AD/LDAP
   Integration with DRM



                                 w w w .niiconsulting.com
GETTING DOWN TO
BRASS TACKS

                  w w w .niiconsulting.com
Challenges

   User resistance – yet another solution
   Over-optimism – this is it!
   Under-estimation of effort involved
   Lack of trained resources
   Absence of policy and procedure framework
   Ownership resides with IT
   Expensive
   False positives
   Legal & regulatory framework


                                  w w w .niiconsulting.com
Implementation Plan

 What matters to you – listing of assets
 How important is it – classification of assets
 Where does it reside?
 Who should be able to do what with it – access
  rights policy
 Strategy
     Network Focused
     Endpoint Focused
     Storage Focused
 Integration with existing infrastructure
 Monitoring and fine-tuning

                                       w w w .niiconsulting.com
Is it working?

     Number of people/business groups contacted about incidents --
      tie in somehow with user awareness training.
     Remediation metrics to show trend results in reducing
      incidents
     Trend analysis over 3, 6, & 9 month periods to show how the
      number of events has reduced as remediation efforts kick in
     Reduction in the average severity of an event per user,
      business group, etc.
     Trend: number of broken business policies
     Trend: number of incidents related to automated business
      practices (automated emails)
     Trend: number of incidents that generated automatic email
     Trend: number of incidents that were generated from service
      accounts -- (emails, batch files, etc.)
Reference : http://securosis.com/blog/some-dlp-metrics/, Rich Mogull




                                                                       w w w .niiconsulting.com
Questions?
 Thank you!            kkmookhey@niiconsulting.com

Information Security      Information Security
Consulting Services       Training Services




                                      w w w .niiconsulting.com

More Related Content

What's hot

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Symantec APJ
 

What's hot (20)

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
DLP
DLPDLP
DLP
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Data leakage prevention EN Final
Data leakage prevention EN FinalData leakage prevention EN Final
Data leakage prevention EN Final
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 

Similar to Data Leakage Prevention - K. K. Mookhey

Similar to Data Leakage Prevention - K. K. Mookhey (20)

Application security enterprise strategies
Application security enterprise strategiesApplication security enterprise strategies
Application security enterprise strategies
 
Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq
 
So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
cybersecurity-careers.pdf
cybersecurity-careers.pdfcybersecurity-careers.pdf
cybersecurity-careers.pdf
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...Detecting Opportunities and Threats with Complex Event Processing: Case St...
Detecting Opportunities and Threats with Complex Event Processing: Case St...
 
2012: The End of the World?
2012: The End of the World?2012: The End of the World?
2012: The End of the World?
 
A6704d01
A6704d01A6704d01
A6704d01
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 

More from Network Intelligence India

More from Network Intelligence India (20)

Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
The Economics of Security
The Economics of SecurityThe Economics of Security
The Economics of Security
 
Web Application Security Strategy
Web Application Security Strategy Web Application Security Strategy
Web Application Security Strategy
 
ISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics ImplementationISO 27004- Information Security Metrics Implementation
ISO 27004- Information Security Metrics Implementation
 
National Cyber Security Policy 2013
National Cyber Security Policy 2013National Cyber Security Policy 2013
National Cyber Security Policy 2013
 
RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
Understanding Governance
Understanding GovernanceUnderstanding Governance
Understanding Governance
 
Cyber Security in Civil Aviation
Cyber Security in Civil AviationCyber Security in Civil Aviation
Cyber Security in Civil Aviation
 
Spear Phishing Methodology
Spear Phishing MethodologySpear Phishing Methodology
Spear Phishing Methodology
 
Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies IT Act 2000 Penalties, Offences with case studies
IT Act 2000 Penalties, Offences with case studies
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Distributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing MethodologyDistributed Denial of Service (DDos) Testing Methodology
Distributed Denial of Service (DDos) Testing Methodology
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
XML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus ScannerXML Interfaces to the popular Nessus Scanner
XML Interfaces to the popular Nessus Scanner
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Scada assessment case study
Scada assessment case studyScada assessment case study
Scada assessment case study
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

Data Leakage Prevention - K. K. Mookhey

  • 1. Data Leakage Prevention Interop 2010 w w w .niiconsulting.com
  • 2. Agenda  Introduction  Data Leakage Scenario  Cases  Real-world impacts  Vulnerabilities  Building the Business Case  Demystifying DLP Solutions  Implementation Challenges w w w .niiconsulting.com
  • 3. Speaker Introduction  Founder & Principal Consultant, Network Intelligence  Certified as CISA, CISSP and CISM  Speaker at Blackhat 2004, Interop 2005, IT Underground 2005, OWASP Asia 2008,2009  Co-author of book on Metasploit Framework (Syngress), Linux Security & Controls (ISACA)  Author of numerous articles on SecurityFocus, IT Audit, IS Controls (ISACA)  Conducted numerous pen-tests, application security assessments, forensics, etc. w w w .niiconsulting.com
  • 4. THE BIGGEST HACK IN HISTORY w w w .niiconsulting.com
  • 5. Gonzalez, TJX and Heart-break-land  >200 million credit card number stolen  Heartland Payment Systems, 7-Eleven, and 2 US national retailers hacked  Modus operandi  Visit retail stores to understand workings  Analyze websites for vulnerabilities  Hack in using SQL injection  Inject malware  Sniff for card numbers and details  Hide tracks w w w .niiconsulting.com
  • 6. The hacker underground  Albert Gonzalez  a/k/a “segvec,”  a/k/a “soupnazi,”  a/k/a “j4guar17”  Malware, scripts and hacked data hosted on servers in:  Latvia Ukraine New Jersey  Netherlands California  IRC chats  March 2007: Gonzalez “planning my second phase against Hannaford”  December 2007: Hacker P.T. “that’s how [HACKER 2] hacked Hannaford.” w w w .niiconsulting.com
  • 7. Where does all this end up? IRC Channels #cc #ccards #ccinfo #ccpower #ccs #masterccs #thacc #thecc #virgincc  Commands used on IRC  !cardable  !cc, !cclimit, !chk, !cvv2, !exploit, !order.log, !proxychk w w w .niiconsulting.com
  • 8. TJX direct costs $200 million in fines/penalties $41 million to Visa $24 million to MasterCard w w w .niiconsulting.com
  • 9. Who’s been affected? w w w .niiconsulting.com
  • 10. BUILDING THE BUSINESS CASE w w w .niiconsulting.com
  • 11. Profitability in hacking – 2009 w w w .niiconsulting.com
  • 12. Sectors hacked – Q1 2009 w w w .niiconsulting.com
  • 13. Back of the envelope SECURITY ROI w w w .niiconsulting.com
  • 14. Cost of an incident  $6.6 million average cost of a data breach  From this, cost of lost business is $4.6 million  More than $200 per compromised record On the other hand:  Fixing a bug costs $400 to $4000  Cost increases exponentially as time lapses w w w .niiconsulting.com
  • 15. Direct Costs  Fees for legal recourse to address and forensics  Short-term impact to R&D cost recuperation  Long-term impact to profitability/revenue projections  System and process audits  Fines  Regulatory audit fees  Strategy consulting fees w w w .niiconsulting.com
  • 16. Numbers on the table w w w .niiconsulting.com
  • 17. Indirect Cost  $1 billion business  20% new customer base lost  10% of repeat customers lost w w w .niiconsulting.com
  • 18. Impact to profit margin w w w .niiconsulting.com
  • 19. The Legal Angle  Computer Crimes Act, 1997  Electronic Commerce Act, 2006  PCI DSS  Central Bank of Malaysia Act, 2009  Personal Data Protection Bill, ??  Guidelines on Internet Insurance  Other regulations w w w .niiconsulting.com
  • 20. DEMYSTIFYING DLP SOLUTIONS w w w .niiconsulting.com
  • 21. What does it stand for?  Data Leakage Prevention  Data Loss Protection  Information Loss Protection  Extrusion Prevention  Content Monitoring and Filtering  Content Monitoring and Protection w w w .niiconsulting.com
  • 22. DLP Solutions  Options  Vendors  Network  End-point  Content-aware  Context-aware w w w .niiconsulting.com
  • 23. FEATURES TO LOOK OUT FOR w w w .niiconsulting.com
  • 24. Comprehensive Coverage w w w .niiconsulting.com
  • 25. Pre-defined policies w w w .niiconsulting.com
  • 26. Blocking & Alerting w w w .niiconsulting.com
  • 27. Management Console & Dashboards w w w .niiconsulting.com
  • 28. Under the hood 1. Rule-based Regular Expressions 2. Database Fingerprinting 3. Exact File Matching 4. Partial Document Matching 5. Statistical Analysis 6. Conceptual/Lexicon 7. Categories w w w .niiconsulting.com
  • 29. Protecting Data  Data in motion  Network monitor  Email integration  Filtering/blocking and proxy integration  Internal networks  Distributed and Hierarchical deployments  Data at rest  Content discovery techniques  Remote scanning / Agent-Based Scanning / Memory-Resident Agent Scanning  Data in use  Endpoint protection w w w .niiconsulting.com
  • 30. Coverage  Network  End-point  Bluetooth  Blackberry/iPhones/Smartphones  Operating systems  Virtualized servers  Integration with AD/LDAP  Integration with DRM w w w .niiconsulting.com
  • 31. GETTING DOWN TO BRASS TACKS w w w .niiconsulting.com
  • 32. Challenges  User resistance – yet another solution  Over-optimism – this is it!  Under-estimation of effort involved  Lack of trained resources  Absence of policy and procedure framework  Ownership resides with IT  Expensive  False positives  Legal & regulatory framework w w w .niiconsulting.com
  • 33. Implementation Plan  What matters to you – listing of assets  How important is it – classification of assets  Where does it reside?  Who should be able to do what with it – access rights policy  Strategy  Network Focused  Endpoint Focused  Storage Focused  Integration with existing infrastructure  Monitoring and fine-tuning w w w .niiconsulting.com
  • 34. Is it working?  Number of people/business groups contacted about incidents -- tie in somehow with user awareness training.  Remediation metrics to show trend results in reducing incidents  Trend analysis over 3, 6, & 9 month periods to show how the number of events has reduced as remediation efforts kick in  Reduction in the average severity of an event per user, business group, etc.  Trend: number of broken business policies  Trend: number of incidents related to automated business practices (automated emails)  Trend: number of incidents that generated automatic email  Trend: number of incidents that were generated from service accounts -- (emails, batch files, etc.) Reference : http://securosis.com/blog/some-dlp-metrics/, Rich Mogull w w w .niiconsulting.com
  • 35. Questions? Thank you! kkmookhey@niiconsulting.com Information Security Information Security Consulting Services Training Services w w w .niiconsulting.com