SlideShare a Scribd company logo
1 of 41
Download to read offline
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.
Fighting a different battle than
conventional cybersecurity companies
Cloud Data Protection
Benjamin NATHAN
Director of Sales Engineering Enablement
Varonis Systems
bnathan@varonis.com
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.2
Operational Plan
Risk identification
Set detective controls
Fix
Sustain
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.3
Risk identification – Pre-migration to O365
Define the proper site and permission structures for SharePoint Online based on:
Identification of sensitive data
Mapping of existing permissions
Actual user activity
Removal recommendation analytics
Define acceptable sharing policies for SharePoint Online and OneDrive
Sharing data with external users?
Which users can share data and who cannot?
Identify high risk data that should remain “on-prem”
Employee PII
PCI Data
Sensitive Business Critical Data
Identification of Stale Data
Identify Stale Data that provides NO value
Identify Stale “Sensitive” Data that provides little or no value but creates unnecessary risk
Map risk state, decide which data to move and how.
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.4
Risk identification – External exposure risk indicators
Number of files/folders shared externally (and publicly)
And sensitive
And stale
Concentrations of files/folders shared externally
Organizational sharing structure
Most sharing users/departments
Most “shared with” external users
Most active external users
External users that are stale
External users that are stale on specific links
External users with domains I don’t do business with (with no email traffic to/from my organization)
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.5
Risk identification – Internal overexposure risk indicators
Amount of files/folders open to everyone
And sensitive, and stale
Amount of files/folders overexposed internally
Files with greater permissions than their parent folder
Unique folders with greater permissions than their protected parent
Concentrations of files/folders overexposed internally (Amount per site/folder)
Organizational sharing structure
Most sharing users/departments
Most “shared with” internal users (users with greater permissions to files and unique folders)
“shared with” internal users that are stale
“shared with” internal users that are stale on specific links
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.6
Risk prioritization
Prioritize sites and folders to remediate based on concentrations of the
mentioned risk indicators
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.7
Set detective controls
Audit and Identify what you need to set alerts on
Alert on public/external/internal sharing of sensitive data
Alert on public/external/internal sharing of stale data
Alert on sharing with external users from domains I don’t do business with (with no
email traffic to/from my organization)
Alert on sharing with external users based on threat intel
Alert on suspicious behaviors
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.8
Set Policies (Fix and sustain)
Remove public links
Remove global access groups
Remove stale external links
Remove stale internal links (stale
greater permissions)
Per site collection - Make sure
permission levels are correctly set
Ethical walls
Remove sharing with external users
from domains I don’t do business
with
Remove sharing with external users
based on threat intel
User attributes. E.g. AD attributes
Data Classification
Move data
Move stale and sensitive data to a
secure location
Move alerted data to an admin
quarantine
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.9
Sustain
Provide owners an easy-to-use method to control access to their
data, while still allowing sharing
Identify owners (based on activity and site collections administrators/owners)
Send mail/trigger ER to owners when sensitive data is shared externally/with
everyone/with insiders
Ease entitlement review process
Show sharing information (external + internal)
Show activity information
Analysis engine to recommend on shared links removal (external + internal) based on activity
Cleanup
Remove redundant internal sharing (that does not add permissions)
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.10
Is my data at risk? Am I compliant? Can I detect a breach?
Is my data exposed?
Who can access it?
Who does access it?
Who does it belong to?
Is anyone stealing it?
From which devices and
locations?
Can I investigate quickly?
Where is my regulated
data?
Should I delete it?
Can I prove compliance?
Many questions
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.11
DATA PROTECTION COMPLIANCE THREAT DETECTION & RESPONSE
THREE USE CASES
ONE PLATFORM
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.12
DATA PROTECTION
COMPLIANCE
THREAT DETECTION &
RESPONSE
Varonis Data Security Platform
ENTERPRISE DATA STORES AND
INFRASTRUCTURE
USE CASESANALYTICS & AUTOMATION
PermissionsUsers &
Groups
Perimeter
Telemetry
Access
Activity
AD
Telemetry
Content
Classification
Windows Exchange
SharePoint
Office 365
NASUnix/Linux
Directory
Services
Edge
Services
Box
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.13
What if security started with data?
DATA
DETECT
PREVENT
SUSTAIN
We’d know where our sensitive data lives
We’d monitor it for abuse
Only the right people would have access
We’d efficiently sustain our secure state
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.14
Varonis eliminates blind spots with unstructured data
present in IAM, DLP, threat detection, and incident
response systems.
Provides data-centric entitlements and automation for
IAM.
Adds context to DLP, e.g. where sensitive data is
concentrated and exposed, who uses, who owns.
Adds clean file system events, data context, & role/peer
mining based on data usage to SIEM and UBA solutions.
www.Varonis.com/tap
Varonis in the Security Ecosystem
DLP
SIEM
IAM
UBA
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.15
Least privilege achieved
Permissions rationalized & owners assigned
Authorization & attestations are automated
Stale data archived
Multiple data stores covered
Set alerting & have plan for investigations
How to protect Data (from insider threats and cyber attacks)
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.16 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.
DATA PROTECTION
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.17
Understand Potential Access
Review Actual Access
Remediate Permission
Manually or Automatically
Being able to see impact of the
changes
Permission visibility
Achieve least privilege data access model
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.18
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.19
Set KPI to identify risk
Stale data
Get rid of it to reduce cost and administration overhead –
Automatically remove stale data from main storage – creating rules to either delete or archive automatically to
different storage and at the same time secure it (limit access permissions to archived folders)
Data exposure
Identify which data is over exposed either internally or externally
Folders / Document Librairies opened to global access groups, sharepoint online/onedrives folders that are shared
widely internally and or externally – reducing exposure by automatically fixing widely exposed data in order to limit
the risk
Data sensitivity
Identify sensitive data and whether this data is accessible by the right people in the organization in order to prioritize
risk
Automated Reports sent to Business / Data Owners to constantly keep track and take actions
Data discovery – Understand Risk & Exposure (sensitive, stale data…)
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.20
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.21
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.22
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.23
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.24
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.25
Set and maintain “secured state for the data”
Automatically securing sensitive data discovered
Automatically archiving/deleting Stale Data
Automatically fix newly over exposed data – automated remediation
Identify and Involve Data Owners
Identify Data Owners (based on data usage and reports)
Identify Data Owners using statistics and specific business data
Target Tailored Reports to Data Owners
Involve data owners in entitlement reviews and ability to control who is accessing their data
Remediation & Data Owners
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.26 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.
COMPLIANCE & CLASSIFICATION
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.27
Indexing data
Identify risk related to company critical data
Based on compliance needs (GDPR, PCI DSS, HIPAA, CCPA…)
Or on important data (company intellectual property, sensitive keywords, product names…)
Labelling
Make sure sensitive data is protected using labels and encryption to avoid data leakage
Protect from insider threats (someone willing to steal information or doing data exposure by mistake) and
cyber attacks (phishing attacks, APT…)
DSAR – Set a plan to easily being able to identify where personal data resides and take action
COMPLIANCE & CLASSIFICATION
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.28
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.29
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.30 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.
THREAT DETECTION & RESPONSE
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.31
Audit
Understand what users are doing with the data, which data is being accessed, by whom
from where and when, including not only insider threats, but also external potential attacks
(ransomware, phishing, APT…)
Alert on misusage, attacks and specific behaviors
Either depending on usage or type of data (sensitive, stale…)
Security, Forensics
Have a complete investigation plan with playbooks to understand what is happening and
have dedicated action to set.
THREAT DETECTION & RESPONSE
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.32
Threat Detection (Insiders / Cyber) – profiling
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.33
Threat Detection (Insiders / Cyber) – Machine learning
Hackers are constantly
changing their way of working
Understand your organization habits and leverages machine learning to
build and maintain extensive behavioral profiles on all users and devices
Standard users act the same from the same
devices - They are predictable
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.34
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.35
DatAlert - Dashboard
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.36
DatAlert – Investigation
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.37 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.
Recommendations
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.38
Data Security Highlights
✓ Implement “privacy by design” across
ALL platforms
✓ Enforce least privilege access
✓ Remove excessive access to critical
folders
✓ Monitor and record all activity
✓ Identify and monitor sensitive data
✓ Create a behavioral profile for all users
✓ Automate and track risk based on “Key
Risk Indicators”
✓ Define Data Classification Requirements
✓ Implement classification rules to support
compliance regulations such as PCI,
CCPA, etc…
✓ Define acceptable use policy for
classified data
✓ Identify and assign data owners
✓ Automate access recertification or
entitlement review process
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.39
Governance & Compliance
• Classification
• Permissions Cleanup
• Data Ownership Identification
• Attestations/Entitlement Reviews
Data Migrations & Disposition
• Stale Data Identification
Active Directory Cleanup & Monitoring
Threat Detection & Response
• Insider Threats
• Ransomware
Compliance – NYDFS, SOX, PCI…
Adjacent technologies
• Identity & Access Management
• Privilege Account Management
• Classification, tagging & DLP
• SIEM & UBA
• Endpoint protection
• Malware detection
• FIM
Deprecated point technologies
• Permissions reporting tools
• Native audit logs & auditing tools
• AD monitoring tools
• Migration tools
Project/Use Case Alignment
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.40
DATA PROTECTION
THREAT DETECTION & RESPONSE
RISK ASSESSMENT
PCI, HIPAA, GDPR, CCPA, SOX, ITAR,
GLBA, EXPORT CONTROL
COMPLIANCE & CLASSIFICATION
Insider Threats
Cyber Attacks
Data Exposure
Remediation
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.
Thank You
VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.

More Related Content

What's hot

Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...Ulf Mattsson
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementRiwut Libinuko
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...Ulf Mattsson
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Preventiondj1arry
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Seclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Boldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big DataBoldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big Databoldonjames
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityAccenture
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Seclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance SolutionsSeclore
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore
 
Cloud Data Security
Cloud Data Security Cloud Data Security
Cloud Data Security Seclore
 
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataUL Transaction Security
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraLuca Martelli
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in IndonesiaEryk Budi Pratama
 

What's hot (20)

Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...
 
Global Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights ManagementGlobal Azure Bootcamp 216 - Azure Rights Management
Global Azure Bootcamp 216 - Azure Rights Management
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
C24 Top 12 tips
C24 Top 12 tipsC24 Top 12 tips
C24 Top 12 tips
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Seclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore for Forcepoint DLP
Seclore for Forcepoint DLP
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Boldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big DataBoldon James - How Data Classification can harness the power of Big Data
Boldon James - How Data Classification can harness the power of Big Data
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_security
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel Program
 
Cloud Data Security
Cloud Data Security Cloud Data Security
Cloud Data Security
 
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP DataWebinar: Data Classification - Closing the Gap between Enterprise and SAP Data
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Personal Data Protection in Indonesia
Personal Data Protection in IndonesiaPersonal Data Protection in Indonesia
Personal Data Protection in Indonesia
 

Similar to Cloud Data Protection and Risk Identification

Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb? Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb? Varonis
 
Maturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyMaturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyPrivacera
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Richard Harbridge
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITSMike Saunders
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatese-Safe Systems
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Karim Vaes
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatMike Saunders
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gapxband
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issuesErnest Staats
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation pptvaishalshah01
 
Information security group presentation
Information security group presentationInformation security group presentation
Information security group presentationvaishalshah01
 

Similar to Cloud Data Protection and Risk Identification (20)

Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb? Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb?
 
Maturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyMaturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management Strategy
 
Data security
Data securityData security
Data security
 
Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365Security and Compliance with SharePoint and Office 365
Security and Compliance with SharePoint and Office 365
 
InsiderThreat-2016NDITS
InsiderThreat-2016NDITSInsiderThreat-2016NDITS
InsiderThreat-2016NDITS
 
Data security
Data securityData security
Data security
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Detecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-ThreatDetecting-Preventing-Insider-Threat
Detecting-Preventing-Insider-Threat
 
Bridging the Data Security Gap
Bridging the Data Security GapBridging the Data Security Gap
Bridging the Data Security Gap
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation ppt
 
Information security group presentation
Information security group presentationInformation security group presentation
Information security group presentation
 

More from aOS Community

Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020
Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020
Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020aOS Community
 
Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020
Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020
Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020aOS Community
 
Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020
Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020
Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020aOS Community
 
Serverless avec azure functions - aOS Tahiti 03-03-2020
Serverless avec azure functions - aOS Tahiti 03-03-2020Serverless avec azure functions - aOS Tahiti 03-03-2020
Serverless avec azure functions - aOS Tahiti 03-03-2020aOS Community
 
Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020
Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020 Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020
Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020 aOS Community
 
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...aOS Community
 
Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020aOS Community
 
Introduction a Power Automate - aOS Nouméa 28-02-2020
Introduction a Power Automate  - aOS Nouméa 28-02-2020 Introduction a Power Automate  - aOS Nouméa 28-02-2020
Introduction a Power Automate - aOS Nouméa 28-02-2020 aOS Community
 
aOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent Pilo
aOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent PiloaOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent Pilo
aOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent PiloaOS Community
 
aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...
aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...
aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...aOS Community
 
aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...
aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...
aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...aOS Community
 
aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...
aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...
aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...aOS Community
 
aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...
aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...
aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...aOS Community
 
aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...
aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...
aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...aOS Community
 
aOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi Voncina
aOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi VoncinaaOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi Voncina
aOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi VoncinaaOS Community
 
aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...
aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...
aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...aOS Community
 
aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...
aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...
aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...aOS Community
 
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...aOS Community
 
aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...
aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...
aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...aOS Community
 
aOS Monaco 2019 - Dois-je protéger mes données Office 365 - Christopher Glémot
aOS Monaco 2019 - Dois-je protéger mes données Office 365 - Christopher GlémotaOS Monaco 2019 - Dois-je protéger mes données Office 365 - Christopher Glémot
aOS Monaco 2019 - Dois-je protéger mes données Office 365 - Christopher GlémotaOS Community
 

More from aOS Community (20)

Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020
Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020
Commencer le IaaS sur Azure - aOS Tahiti 03-03-2020
 
Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020
Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020
Migrer vers O365. Quelles stragtégies? - aOS Tahiti 03-03-2020
 
Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020
Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020
Passer des macro Excel à la power plateform - aOS Tahiti 03-03-2020
 
Serverless avec azure functions - aOS Tahiti 03-03-2020
Serverless avec azure functions - aOS Tahiti 03-03-2020Serverless avec azure functions - aOS Tahiti 03-03-2020
Serverless avec azure functions - aOS Tahiti 03-03-2020
 
Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020
Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020 Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020
Passer des macro Excel à la power plateform - aOS Nouméa 28-02-2020
 
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
 
Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020
 
Introduction a Power Automate - aOS Nouméa 28-02-2020
Introduction a Power Automate  - aOS Nouméa 28-02-2020 Introduction a Power Automate  - aOS Nouméa 28-02-2020
Introduction a Power Automate - aOS Nouméa 28-02-2020
 
aOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent Pilo
aOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent PiloaOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent Pilo
aOS Monaco 2019 - S2 - Présentation ARKADIN - TEAMS Adoption - Laurent Pilo
 
aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...
aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...
aOS Monaco 2019 - C1 - Sécuriser sa messagerie sur Office 365 - Hakim Taoussi...
 
aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...
aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...
aOS Monaco 2019 - B7 - I Developed a SPFx solution, what to do next and how t...
 
aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...
aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...
aOS Monaco 2019 - B6 - Mister Governance and Doctor Teams - Jean-François Ber...
 
aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...
aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...
aOS Monaco 2019 - B5 - The good, the bad and the unexpected - a BOT story - K...
 
aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...
aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...
aOS Monaco 2019 - B4 - Three must have workflows with Microsoft Flow - Vlad C...
 
aOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi Voncina
aOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi VoncinaaOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi Voncina
aOS Monaco 2019 - B3 - Create purchase request in PowerApps - Robi Voncina
 
aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...
aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...
aOS Monaco 2019 - B2 - Intégrer la Power Platform avec SharePoint - Patrick G...
 
aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...
aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...
aOS Monaco 2019 - B1 - Construire son infrastructure sur Azure un jeu d'enfan...
 
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
aOS Monaco 2019 - A7 - Sécurisez votre SI et vos services Office 365 partie 2...
 
aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...
aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...
aOS Monaco 2019 - A6 - Sécurisez votre SI et vos services Office 365 partie 1...
 
aOS Monaco 2019 - Dois-je protéger mes données Office 365 - Christopher Glémot
aOS Monaco 2019 - Dois-je protéger mes données Office 365 - Christopher GlémotaOS Monaco 2019 - Dois-je protéger mes données Office 365 - Christopher Glémot
aOS Monaco 2019 - Dois-je protéger mes données Office 365 - Christopher Glémot
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Cloud Data Protection and Risk Identification

  • 1. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Fighting a different battle than conventional cybersecurity companies Cloud Data Protection Benjamin NATHAN Director of Sales Engineering Enablement Varonis Systems bnathan@varonis.com
  • 2. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.2 Operational Plan Risk identification Set detective controls Fix Sustain
  • 3. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.3 Risk identification – Pre-migration to O365 Define the proper site and permission structures for SharePoint Online based on: Identification of sensitive data Mapping of existing permissions Actual user activity Removal recommendation analytics Define acceptable sharing policies for SharePoint Online and OneDrive Sharing data with external users? Which users can share data and who cannot? Identify high risk data that should remain “on-prem” Employee PII PCI Data Sensitive Business Critical Data Identification of Stale Data Identify Stale Data that provides NO value Identify Stale “Sensitive” Data that provides little or no value but creates unnecessary risk Map risk state, decide which data to move and how.
  • 4. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.4 Risk identification – External exposure risk indicators Number of files/folders shared externally (and publicly) And sensitive And stale Concentrations of files/folders shared externally Organizational sharing structure Most sharing users/departments Most “shared with” external users Most active external users External users that are stale External users that are stale on specific links External users with domains I don’t do business with (with no email traffic to/from my organization)
  • 5. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.5 Risk identification – Internal overexposure risk indicators Amount of files/folders open to everyone And sensitive, and stale Amount of files/folders overexposed internally Files with greater permissions than their parent folder Unique folders with greater permissions than their protected parent Concentrations of files/folders overexposed internally (Amount per site/folder) Organizational sharing structure Most sharing users/departments Most “shared with” internal users (users with greater permissions to files and unique folders) “shared with” internal users that are stale “shared with” internal users that are stale on specific links
  • 6. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.6 Risk prioritization Prioritize sites and folders to remediate based on concentrations of the mentioned risk indicators
  • 7. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.7 Set detective controls Audit and Identify what you need to set alerts on Alert on public/external/internal sharing of sensitive data Alert on public/external/internal sharing of stale data Alert on sharing with external users from domains I don’t do business with (with no email traffic to/from my organization) Alert on sharing with external users based on threat intel Alert on suspicious behaviors
  • 8. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.8 Set Policies (Fix and sustain) Remove public links Remove global access groups Remove stale external links Remove stale internal links (stale greater permissions) Per site collection - Make sure permission levels are correctly set Ethical walls Remove sharing with external users from domains I don’t do business with Remove sharing with external users based on threat intel User attributes. E.g. AD attributes Data Classification Move data Move stale and sensitive data to a secure location Move alerted data to an admin quarantine
  • 9. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.9 Sustain Provide owners an easy-to-use method to control access to their data, while still allowing sharing Identify owners (based on activity and site collections administrators/owners) Send mail/trigger ER to owners when sensitive data is shared externally/with everyone/with insiders Ease entitlement review process Show sharing information (external + internal) Show activity information Analysis engine to recommend on shared links removal (external + internal) based on activity Cleanup Remove redundant internal sharing (that does not add permissions)
  • 10. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.10 Is my data at risk? Am I compliant? Can I detect a breach? Is my data exposed? Who can access it? Who does access it? Who does it belong to? Is anyone stealing it? From which devices and locations? Can I investigate quickly? Where is my regulated data? Should I delete it? Can I prove compliance? Many questions
  • 11. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.11 DATA PROTECTION COMPLIANCE THREAT DETECTION & RESPONSE THREE USE CASES ONE PLATFORM
  • 12. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.12 DATA PROTECTION COMPLIANCE THREAT DETECTION & RESPONSE Varonis Data Security Platform ENTERPRISE DATA STORES AND INFRASTRUCTURE USE CASESANALYTICS & AUTOMATION PermissionsUsers & Groups Perimeter Telemetry Access Activity AD Telemetry Content Classification Windows Exchange SharePoint Office 365 NASUnix/Linux Directory Services Edge Services Box
  • 13. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.13 What if security started with data? DATA DETECT PREVENT SUSTAIN We’d know where our sensitive data lives We’d monitor it for abuse Only the right people would have access We’d efficiently sustain our secure state
  • 14. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.14 Varonis eliminates blind spots with unstructured data present in IAM, DLP, threat detection, and incident response systems. Provides data-centric entitlements and automation for IAM. Adds context to DLP, e.g. where sensitive data is concentrated and exposed, who uses, who owns. Adds clean file system events, data context, & role/peer mining based on data usage to SIEM and UBA solutions. www.Varonis.com/tap Varonis in the Security Ecosystem DLP SIEM IAM UBA
  • 15. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.15 Least privilege achieved Permissions rationalized & owners assigned Authorization & attestations are automated Stale data archived Multiple data stores covered Set alerting & have plan for investigations How to protect Data (from insider threats and cyber attacks)
  • 16. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.16 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. DATA PROTECTION
  • 17. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.17 Understand Potential Access Review Actual Access Remediate Permission Manually or Automatically Being able to see impact of the changes Permission visibility Achieve least privilege data access model
  • 18. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.18
  • 19. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.19 Set KPI to identify risk Stale data Get rid of it to reduce cost and administration overhead – Automatically remove stale data from main storage – creating rules to either delete or archive automatically to different storage and at the same time secure it (limit access permissions to archived folders) Data exposure Identify which data is over exposed either internally or externally Folders / Document Librairies opened to global access groups, sharepoint online/onedrives folders that are shared widely internally and or externally – reducing exposure by automatically fixing widely exposed data in order to limit the risk Data sensitivity Identify sensitive data and whether this data is accessible by the right people in the organization in order to prioritize risk Automated Reports sent to Business / Data Owners to constantly keep track and take actions Data discovery – Understand Risk & Exposure (sensitive, stale data…)
  • 20. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.20
  • 21. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.21
  • 22. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.22
  • 23. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.23
  • 24. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.24
  • 25. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.25 Set and maintain “secured state for the data” Automatically securing sensitive data discovered Automatically archiving/deleting Stale Data Automatically fix newly over exposed data – automated remediation Identify and Involve Data Owners Identify Data Owners (based on data usage and reports) Identify Data Owners using statistics and specific business data Target Tailored Reports to Data Owners Involve data owners in entitlement reviews and ability to control who is accessing their data Remediation & Data Owners
  • 26. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.26 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. COMPLIANCE & CLASSIFICATION
  • 27. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.27 Indexing data Identify risk related to company critical data Based on compliance needs (GDPR, PCI DSS, HIPAA, CCPA…) Or on important data (company intellectual property, sensitive keywords, product names…) Labelling Make sure sensitive data is protected using labels and encryption to avoid data leakage Protect from insider threats (someone willing to steal information or doing data exposure by mistake) and cyber attacks (phishing attacks, APT…) DSAR – Set a plan to easily being able to identify where personal data resides and take action COMPLIANCE & CLASSIFICATION
  • 28. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.28
  • 29. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.29
  • 30. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.30 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. THREAT DETECTION & RESPONSE
  • 31. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.31 Audit Understand what users are doing with the data, which data is being accessed, by whom from where and when, including not only insider threats, but also external potential attacks (ransomware, phishing, APT…) Alert on misusage, attacks and specific behaviors Either depending on usage or type of data (sensitive, stale…) Security, Forensics Have a complete investigation plan with playbooks to understand what is happening and have dedicated action to set. THREAT DETECTION & RESPONSE
  • 32. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.32 Threat Detection (Insiders / Cyber) – profiling
  • 33. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.33 Threat Detection (Insiders / Cyber) – Machine learning Hackers are constantly changing their way of working Understand your organization habits and leverages machine learning to build and maintain extensive behavioral profiles on all users and devices Standard users act the same from the same devices - They are predictable
  • 34. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.34
  • 35. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.35 DatAlert - Dashboard
  • 36. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.36 DatAlert – Investigation
  • 37. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.37 VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Recommendations
  • 38. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.38 Data Security Highlights ✓ Implement “privacy by design” across ALL platforms ✓ Enforce least privilege access ✓ Remove excessive access to critical folders ✓ Monitor and record all activity ✓ Identify and monitor sensitive data ✓ Create a behavioral profile for all users ✓ Automate and track risk based on “Key Risk Indicators” ✓ Define Data Classification Requirements ✓ Implement classification rules to support compliance regulations such as PCI, CCPA, etc… ✓ Define acceptable use policy for classified data ✓ Identify and assign data owners ✓ Automate access recertification or entitlement review process
  • 39. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.39 Governance & Compliance • Classification • Permissions Cleanup • Data Ownership Identification • Attestations/Entitlement Reviews Data Migrations & Disposition • Stale Data Identification Active Directory Cleanup & Monitoring Threat Detection & Response • Insider Threats • Ransomware Compliance – NYDFS, SOX, PCI… Adjacent technologies • Identity & Access Management • Privilege Account Management • Classification, tagging & DLP • SIEM & UBA • Endpoint protection • Malware detection • FIM Deprecated point technologies • Permissions reporting tools • Native audit logs & auditing tools • AD monitoring tools • Migration tools Project/Use Case Alignment
  • 40. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.40 DATA PROTECTION THREAT DETECTION & RESPONSE RISK ASSESSMENT PCI, HIPAA, GDPR, CCPA, SOX, ITAR, GLBA, EXPORT CONTROL COMPLIANCE & CLASSIFICATION Insider Threats Cyber Attacks Data Exposure Remediation
  • 41. VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL. Thank You VARONIS SYSTEMS. PROPRIETARY & CONFIDENTIAL.