Proactive Measures to Mitigate Insider ThreatPriyanka Aash
The threat posed by rogue insiders affects every organization worldwide. The difficulties in balancing employees’ legitimate need to access corporate data along with the need to compartmentalize access are often in conflict. This presentation will walk through several real-world insider threat cases and discuss proactive measures that could have greatly mitigated the damage and losses.
(Source: RSA USA 2016-San Francisco)
Data loss is considered by security experts to be one of the most serious threats that businesses currently face.
Maintaining the confidentiality of personal information and data is an essential factor in operating a successful business. People must be able to trust that their service provider takes the appropriate measures to implement security controls that will ultimately protect their privacy.
However, some of the largest and most reputable organizations have fallen victim to data loss security breaches resulting in significant legal, financial, and reputation loss, including [1]:
The Bank of America: Losing the personal employee information of over one million employees
The United States Government: Losing data related to the military
Heartland Payment Systems: Transferring credit card information and other personal records of over 130 million customers
In 2013, it was estimated that data breaches had resulted in the exploitation of over 800 million personal records [2]. This number is also expected to rise over the next several years given the advanced tools that cybercriminals use to steal information and data.
Interestingly, it is not just cybercriminals who represent a threat as:
64% of data loss is caused by well-meaning insiders.
50% of employees leave with data.
$3.5 million average cost of a security breach.
Considering these extensive data breaches, it is practical for organizations to understand where their critical data is located and understanding current security controls that can stop data loss.
Data Loss Prevention (DLP) solutions locate critical and personal data for organizations and help prevent data loss. By having a deeper understanding of efficient DLP security controls, you will help protect the reputation of your organization.
For more information contact: rkopaee@riskview.ca
https://www.threatview.ca
http://www.riskview.ca
Proactive Measures to Mitigate Insider ThreatPriyanka Aash
The threat posed by rogue insiders affects every organization worldwide. The difficulties in balancing employees’ legitimate need to access corporate data along with the need to compartmentalize access are often in conflict. This presentation will walk through several real-world insider threat cases and discuss proactive measures that could have greatly mitigated the damage and losses.
(Source: RSA USA 2016-San Francisco)
Data loss is considered by security experts to be one of the most serious threats that businesses currently face.
Maintaining the confidentiality of personal information and data is an essential factor in operating a successful business. People must be able to trust that their service provider takes the appropriate measures to implement security controls that will ultimately protect their privacy.
However, some of the largest and most reputable organizations have fallen victim to data loss security breaches resulting in significant legal, financial, and reputation loss, including [1]:
The Bank of America: Losing the personal employee information of over one million employees
The United States Government: Losing data related to the military
Heartland Payment Systems: Transferring credit card information and other personal records of over 130 million customers
In 2013, it was estimated that data breaches had resulted in the exploitation of over 800 million personal records [2]. This number is also expected to rise over the next several years given the advanced tools that cybercriminals use to steal information and data.
Interestingly, it is not just cybercriminals who represent a threat as:
64% of data loss is caused by well-meaning insiders.
50% of employees leave with data.
$3.5 million average cost of a security breach.
Considering these extensive data breaches, it is practical for organizations to understand where their critical data is located and understanding current security controls that can stop data loss.
Data Loss Prevention (DLP) solutions locate critical and personal data for organizations and help prevent data loss. By having a deeper understanding of efficient DLP security controls, you will help protect the reputation of your organization.
For more information contact: rkopaee@riskview.ca
https://www.threatview.ca
http://www.riskview.ca
Elastica conducted an exhaustive analysis of over 100 million customer files in order to better understand how employees use (and occasionally abuse) file sharing apps. This data has been anonymized and aggregated and, for the first time ever, sheds some much-needed light on typical file sharing behaviors, the nature of the data being shared, including unmanaged “shadow data”, and the possible consequences of file sharing data breaches for organizations like yours.
This slideshare, “Shadow Data Exposed”, delves deeply into this research data to help you unlock the business potential of cloud sharing apps and uncover and manage the “Shadow Data” stored in them, while ensuring these apps are used safely and in compliance with your corporate policy. You will learn:
• Why traditional security technologies like DLP, firewalls, endpoint solutions and antivirus are ineffective in the brave new world of file sharing apps.
• How to spot 7 risks of managing file sharing apps, as revealed by Elastica’s big security data research.
• How to build an effective cloud app security architecture that provides visibility, control and remediation.
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónSymantec LATAM
Be Aware Webinar Symantec
Maxímice su prevención hacia la fuga de la información
Nueva Versión Symantec DLP v 14.5
Únete a nuestra comunidad en Facebook y sigue nuestro calendario
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
Data leakage prevention is one of the key topics which we have been talking in present. Due to the organizations moving towards big data, financial systems.. which resides in cyber space, there is an increasing number of frauds associated with the technology revolution in the cyberspace.This post highlights the threats and the counter measures, so we can protect the sensitive personal data. I prefer the approach of “ Trust but verify model ”.
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
With the increasing number of cyber-attacks and incidents seeming to occur weeks/months/years before discovery of breach, simply securing your perimeter is no longer enough to protect your most critical assets. Privacy breaches are averaging upwards of $200 per record and studies have shown at intellectual property infringement cost the average company $101.9 million in revenues.
Key points addressed include:
• The Impact of Cyber Crime on our Economy
• The Cost Companies are incurring due to Cyber Crime and Data Breaches
• Who are the threat actors?
• What makes up a Data Loss Prevention ecosystem?
• What does a Data Loss Prevention strategy do for me?
• Hidden Benefits of Data Loss Prevention
• Justifying a Data Loss Prevention Strategy
Proactive Measures to Defeat Insider ThreatAndrew Case
This presentation was delivered at RSA 2016 and discussed measures to defeat insider threat. It focused on real investigations that I have performed and how the victim companies could have prevented the associated harm.
Box has revolutionized how employees can access, share and manage company data and collaborate more effectively. But while the distributive nature of cloud based file sharing makes it invaluable to business productivity, it also adds increased risk of malicious or accidental leakage of business-critical data.
Today’s cloud sharing services like Box require a complete rethinking of traditional security practices to ensure proper access control, security, and compliance as corporate assets migrate outside the enterprise boundary into 3rd party cloud apps. Implementing these security practices starts with gaining visibility into how cloud apps are being used by employees, identifying sensitive content and how it is being shared, uncovering risky or anomalous behavior, and proactively enforcing policies to protect against internal or external threats.
Data Loss Prevention technologies are needed to protect data coming into and leaving the organization. There are a number of problems and challenges with the many vendors supplying DLP technology. This presenation reviews some of the Myths around Data Loss Prevention.
DATA LOSS PREVENTION ENSURES CRITICAL INFORMATION ARE KEPT SAFELY AT THE CORPORATE NETWORK AND HELPS ADMINISTRATOR CONTROL THE DATA WHAT
END-USERS WISH TO TRANSFER.
All the essential information you need about DLP in one eBook.
As security professionals struggle with how to keep up with threats, DLP - a technology designed to ensure sensitive data isn't stolen or lost - is hot again. This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts.
What's Inside:
-The seven trends that have made DLP hot again
-How to determine the right approach for your organization
-Making the business case to executives
-How to build an RFP and evaluate vendors
-How to start with a clearly defined quick win
-Straight-forward frameworks for success
Data Leakage is an important concern for the business organizations in this increasingly networked world these days. Unauthorized disclosure may have serious consequences for an organization in both long term and short term. Risks include losing clients and stakeholder confidence, tarnishing of brand image, landing in unwanted lawsuits, and overall losing goodwill and market share in the industry.
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
From this presentation you will learn:
· A brief history of encryption
· How encryption is now deployed in the enterprise
· Encryption and key management best practices to keep data safe
Google Apps, Especially Google Drive, have enabled millions of users to easily share documents and collaborate more effectively. However, a lack of visibility and control by IT departments over these users and their activity in Google Apps has actually dramatically increased the risk of malicious or accidental leakage of business-critical data.
In this webcast, cloud security experts Nitin Kumar of Cisco, and Sergio Castro of Elastica will discuss best practices for protecting your data in Google Apps. You will learn:
• What base level security Google Drive provides (and what it doesn’t)
• Examples of companies that are facing these issues and how they are solving them
• Best practices in identifying sensitive, shared content that may violate compliance policies (PCI, PHI, PII, etc.)
• Best practices in using data science to uncover risky or anomalous behavior
• How to automate protection against Google Drive data breaches
Eric Cole probably the last person on earth you’d expect to encourage making insider threat a C-level priority after devoting a decade of his career to external threat and endpoint security, as the for CTO of McAfee and Chief Scientist for Lockheed Martin. But sometimes the best advice comes from the least expected places.
Elastica conducted an exhaustive analysis of over 100 million customer files in order to better understand how employees use (and occasionally abuse) file sharing apps. This data has been anonymized and aggregated and, for the first time ever, sheds some much-needed light on typical file sharing behaviors, the nature of the data being shared, including unmanaged “shadow data”, and the possible consequences of file sharing data breaches for organizations like yours.
This slideshare, “Shadow Data Exposed”, delves deeply into this research data to help you unlock the business potential of cloud sharing apps and uncover and manage the “Shadow Data” stored in them, while ensuring these apps are used safely and in compliance with your corporate policy. You will learn:
• Why traditional security technologies like DLP, firewalls, endpoint solutions and antivirus are ineffective in the brave new world of file sharing apps.
• How to spot 7 risks of managing file sharing apps, as revealed by Elastica’s big security data research.
• How to build an effective cloud app security architecture that provides visibility, control and remediation.
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónSymantec LATAM
Be Aware Webinar Symantec
Maxímice su prevención hacia la fuga de la información
Nueva Versión Symantec DLP v 14.5
Únete a nuestra comunidad en Facebook y sigue nuestro calendario
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
Data leakage prevention is one of the key topics which we have been talking in present. Due to the organizations moving towards big data, financial systems.. which resides in cyber space, there is an increasing number of frauds associated with the technology revolution in the cyberspace.This post highlights the threats and the counter measures, so we can protect the sensitive personal data. I prefer the approach of “ Trust but verify model ”.
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
With the increasing number of cyber-attacks and incidents seeming to occur weeks/months/years before discovery of breach, simply securing your perimeter is no longer enough to protect your most critical assets. Privacy breaches are averaging upwards of $200 per record and studies have shown at intellectual property infringement cost the average company $101.9 million in revenues.
Key points addressed include:
• The Impact of Cyber Crime on our Economy
• The Cost Companies are incurring due to Cyber Crime and Data Breaches
• Who are the threat actors?
• What makes up a Data Loss Prevention ecosystem?
• What does a Data Loss Prevention strategy do for me?
• Hidden Benefits of Data Loss Prevention
• Justifying a Data Loss Prevention Strategy
Proactive Measures to Defeat Insider ThreatAndrew Case
This presentation was delivered at RSA 2016 and discussed measures to defeat insider threat. It focused on real investigations that I have performed and how the victim companies could have prevented the associated harm.
Box has revolutionized how employees can access, share and manage company data and collaborate more effectively. But while the distributive nature of cloud based file sharing makes it invaluable to business productivity, it also adds increased risk of malicious or accidental leakage of business-critical data.
Today’s cloud sharing services like Box require a complete rethinking of traditional security practices to ensure proper access control, security, and compliance as corporate assets migrate outside the enterprise boundary into 3rd party cloud apps. Implementing these security practices starts with gaining visibility into how cloud apps are being used by employees, identifying sensitive content and how it is being shared, uncovering risky or anomalous behavior, and proactively enforcing policies to protect against internal or external threats.
Data Loss Prevention technologies are needed to protect data coming into and leaving the organization. There are a number of problems and challenges with the many vendors supplying DLP technology. This presenation reviews some of the Myths around Data Loss Prevention.
DATA LOSS PREVENTION ENSURES CRITICAL INFORMATION ARE KEPT SAFELY AT THE CORPORATE NETWORK AND HELPS ADMINISTRATOR CONTROL THE DATA WHAT
END-USERS WISH TO TRANSFER.
All the essential information you need about DLP in one eBook.
As security professionals struggle with how to keep up with threats, DLP - a technology designed to ensure sensitive data isn't stolen or lost - is hot again. This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts.
What's Inside:
-The seven trends that have made DLP hot again
-How to determine the right approach for your organization
-Making the business case to executives
-How to build an RFP and evaluate vendors
-How to start with a clearly defined quick win
-Straight-forward frameworks for success
Data Leakage is an important concern for the business organizations in this increasingly networked world these days. Unauthorized disclosure may have serious consequences for an organization in both long term and short term. Risks include losing clients and stakeholder confidence, tarnishing of brand image, landing in unwanted lawsuits, and overall losing goodwill and market share in the industry.
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
From this presentation you will learn:
· A brief history of encryption
· How encryption is now deployed in the enterprise
· Encryption and key management best practices to keep data safe
Google Apps, Especially Google Drive, have enabled millions of users to easily share documents and collaborate more effectively. However, a lack of visibility and control by IT departments over these users and their activity in Google Apps has actually dramatically increased the risk of malicious or accidental leakage of business-critical data.
In this webcast, cloud security experts Nitin Kumar of Cisco, and Sergio Castro of Elastica will discuss best practices for protecting your data in Google Apps. You will learn:
• What base level security Google Drive provides (and what it doesn’t)
• Examples of companies that are facing these issues and how they are solving them
• Best practices in identifying sensitive, shared content that may violate compliance policies (PCI, PHI, PII, etc.)
• Best practices in using data science to uncover risky or anomalous behavior
• How to automate protection against Google Drive data breaches
Eric Cole probably the last person on earth you’d expect to encourage making insider threat a C-level priority after devoting a decade of his career to external threat and endpoint security, as the for CTO of McAfee and Chief Scientist for Lockheed Martin. But sometimes the best advice comes from the least expected places.
With every Security & Privacy Breach survey pointing towards insiders as a potential threat and incidents leading to data loss and violation of the corporate information security policy, it is imperative that we answer the following questions:
Who are these insiders?
What activities do they carry out to breach security?
Why an insider seeks to cause harm?
How do we mitigate this threat?
Insider Threat Kill Chain: Detecting Human Indicators of CompromiseTripwire
Your organization’s greatest assets are also its greatest threat: People. Your greatest risk are those you trust. Last year, more than a third of data breaches were perpetrated by a malicious insider, such as an employee, contractor or trusted business partner.
On average, an attack by an insider is also more likely to cost the most, averaging $412K per incident.
The intentions of these insiders can be sabotage, fraud, intellectual property theft or espionage. However, in many cases, patterns of detectable behavior and network activity emerge that provide indicators of risk, assist in early detection and in speeding up response time of an actual incident.
In this webinar we discussed:
- how human resources, legal and IT can work together to help prevent insider threats before they become a problem.
- how to dentify risk indicators with employee attitudes and behavior and how it correlates to their patterns of activity on your network.
- how you can use log intelligence and security analytics to automate actions and alerts and rapid reporting and forensics.
The recorded webcast for this presentaion can be found here:
http://www.tripwire.com/register/insider-threat-kill-chain-detecting-human-indicators-of-compromise/
While the current threat landscape is full of sophisticated and well-resourced adversaries, one of the most dangerous is the insider because they already have access to the sensitive data on your network.
According to a report from Forrester Research, nearly half of technology decision makers who experienced a data breach in the year studied reported that an internal incident was the source of their compromise.
Since firewalls and perimeter defenses are largely incapable of addressing insider threats, organizations must turn to internal network monitoring and analytics to identify threats based on their behavior.
Join us for a free webinar on the Five Signs You Have an Insider Threat to learn what to look for to protect your organization from this challenging attack type. The webinar will cover topics including:
- Insider threat prevalence
- Major signs of insider threat activity
- How to detect these signs
- How to identify an insider threat before they impact your organization
Network Forensics and Practical Packet AnalysisPriyanka Aash
Why Packet Analysis?
3 Phases - Analysis, Conversion & Collection
How do we do it ?
Statistics - Protocol Hierarchy
Statistics - End Points & Conversations
I am my worst enemy — A first person look at Insider ThreatAhmed Masud
A non-technical presentation to start thinking about how much each of us affects the security of our own organization. People are the key to an organization, and they also pose the greatest threat to it (well beyond the technology). The breach almost always occurs at the Human-Technology interface. This is first in a series of presentations on this topic.
Jisheng Wang at AI Frontiers: Deep Learning in SecurityAI Frontiers
Deep learning is the next wave of AI-based attack detection. We will share our customer-driven experiences and learnings from building a comprehensive User and Entity Behavior Analytics (UEBA) solution using Apache Spark and Google Tensorflow to detect multi-stage advanced attacks. We will also discuss the challenges and guidelines for successfully deploying deep learning in broader security.
Li Deng at AI Frontiers: Three Generations of Spoken Dialogue Systems (Bots)AI Frontiers
Spoken dialogue systems have nearly 30 years of history, which can be divided into three generations: symbolic-rule or template based (before late 90’s), statistical learning based, and deep learning based (since 2014). This talk will briefly survey the history of conversational systems, and analyze why and how the underlying technology moved from one generation to the next. Strengths and weaknesses of these three largely distinct types of bot technology are examined and future directions are discussed. Part of this talk is based on my recent article: How deep reinforcement learning can help chatbots, Venturebeat, Aug 2016.
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
Hundreds of companies, and the most demanding Federal agencies rely on DMI for Mobile Security services and solutions. And with more than 500,000 devices under management, we know how to do it right.
Now we’ve distilled 9 years of Mobile Security best practices into a white paper you can download. The paper lays out a smart, sensible approach to managing mobile risk without unnecessary cost and business disruption.
Please be our guest and check out the white paper. You’ll learn:
How to identify and protect against the threats that matter the most
What to do about “the hottest new technologies”
How to get the most protection for the least cost and disruption
The key differences and similarities between Mobile and traditional cybersecurity
- See more at: http://dminc.com/solutions/enterprise-mobility-services/mobilesecuritywp/#sthash.yTptNZRw.dpuf
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
NetIQ was a Platinum sponsor for “Plugging the Leaks: Finding and Fixing the IT Security Holes in Your Enterprise,” a virtual trade show (VTS) produced by Information Week Magazine and Dark Reading.
This was our presentation deck: "Proven Practices to Protect Critical Data" presented by Matt Mosley, Senior Product Manager, and Matt Ulery, Director of Product Management during a live presentation. They explored some of the most significant problems facing security teams tasked with protecting critical data. And, they will reveal some of the most effective approaches and technology that can be used to quickly identify real threats.
3 guiding priciples to improve data securityKeith Braswell
The information explosion, the proliferation of endpoint devices, growing user volumes, and new computing models like cloud, social business, and big data have created new security vulnerabilities. To secure sensitive data and address compliance requirements, organizations need to adopt a more proactive and systematic approach. Read this white paper to learn three simple guiding principles to help your organization achieve better security and compliance without impacting production systems or straining already-tight budgets.
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
Discover the latest in RegTech and stay up-to-date on compliance tools and best practices.
The move to digital has meant that many organizations have had to rethink legacy systems.
They need to put the customer first, focus on the Customer Experience and Digital Experience Platforms.
They also need to understand the latest in RegTech and solutions for hybrid cloud.
We will discuss Regtech for the financial industry and related technologies for compliance.
We will discuss new International Standards, tools and best practices for financial institutions including PCI v4, FFIEC, NACHA, NIST, GDPR and CCPA.
We will discuss related technologies for Data Security and Privacy, including data de-identification, encryption, tokenization and the new API Economy.
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
Cyber Security is a protection offered to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications). To read more visit: https://www.rangtech.com/blog/cybersecurity/cyber-security-what-is-it-and-what-you-need-to-know
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.
The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value.
This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
• Learn New Application and Data Protection Strategies
• Learn Advancements in Machine Learning
• Learn how to develop a roadmap for EU GDPR compliance
• Learn Data-centric Security for Digital Business
• Learn Where Data Security and Value of Data Meet in the Cloud
• Learn Data Protection On-premises, and in Public and Private Clouds
• Learn about Emerging Application and Data Protection for Multi-cloud
• Learn about Emerging Data Privacy and Security for Cloud
• Learn about New Enterprise Application and Data Security Challenges
• Learn about Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
Many major companies realize the continued importance of data and systems protection. Organizations will need to remain vigilant with regard to remote work policies, data access, and upskilling. Learn more about the different types of cyber security trends by PM Integrated.
5 STEP PROCESS TO MOBILE RISK MANAGEMENT
1/ Understand how employees want to use Mobile Devices and Applications
2/ Identify potential threats
3/ Define the impact to the business based on probable threat scenarios
4/ Develop policies and procedures to protect the business to an acceptable level
5/ Implement manageable procedural and technical controls, and monitor their effectiveness
Module 02 Performance Risk-based Analytics With all the advancemIlonaThornburg83
Module 02 Performance Risk-based Analytics
With all the advancements in technology and encryption levels, some methods are faster or slower than others. In most cases a cybersecurity professional must weigh cost, performance, and security. Risk is a powerful tool used by all cybersecurity professionals to assist in making these decisions, and in influencing appropriate stakeholders by providing appropriate information with regard to these three elements.
Risk analysis or risk base analytics helps determine the level of risk to an organization. The first step in this process is to determine the sensitivity of the data being processed. The example below is a common data classification for many organizations; however, depending on how the data will be used, these data fields may vary due to classification levels.
· Public: Data available to the general public and approved for distribution outside the organization.
· Examples: press releases, directory information (not subject to a government regulations or blocks), product catalogs, application and request forms, and other general information that is openly shared. The type of information an organization would choose to post on its website offers a good example of Public data.
· Internal: Data necessary for the operation of the business and generally available to all internal users, users of that particular customer, and potentially interested third-parties if appropriate and when authorized.
· Examples: Some memos, correspondence, and meeting minutes; contact lists that contain information that is not publicly available; and procedural documentation that should remain internal.
· Confidential: Data generally not made available outside the organization and the unauthorized access, use, disclosure, duplication, modification, or destruction of which could adversely impact the organization and/or customers. All confidential information is sensitive in nature and must be restricted to those with a legitimate business need to know.
· Examples:
· Information covered by the Family Educational Rights and Privacy Act (FERPA), which requires protection of records for current and former students. This includes pictures of students kept for official purposes.
· Personally identifiable information entrusted to the organization’s care that is not restricted use data, such as information regarding applicants, donors, potential donors, or competitive marketing research data.
· Information covered by the Gramm-Leach-Bliley Act (GLB), which requires protection of certain financial records.
· Individual employment information, including salary, benefits and performance appraisals for current, former, and prospective employees.
· Legally privileged information.
· Information that is the subject of a confidentiality agreement.
· Restricted: Data that MUST be specifically protected via various access, confidentiality, integrity and/or non-repudiation controls in order to comply with legislative, regulatory, con ...
It is shocking to note that about 3.5 billion people saw their
personal data stolen in the top two of the 15 biggest breaches
of this century alone. With the average cost of a data breach
exceeding $8 million, it is no wonder that safeguarding
confidential business and customer information has become
more important than ever. Furthermore, with stricter laws and governance requirements, data security is now everyone’s
responsibility across the entire enterprise.
However, that is easier said than done, and for that reason, an
an increasing number of organizations are relying heavily on data masking to proactively protect their data, avoid the cost of security breaches, and ensure compliance.
Similar to Comprehensive Data Leak Prevention (20)
Show drafts
volume_up
Empowering the Data Analytics Ecosystem: A Laser Focus on Value
The data analytics ecosystem thrives when every component functions at its peak, unlocking the true potential of data. Here's a laser focus on key areas for an empowered ecosystem:
1. Democratize Access, Not Data:
Granular Access Controls: Provide users with self-service tools tailored to their specific needs, preventing data overload and misuse.
Data Catalogs: Implement robust data catalogs for easy discovery and understanding of available data sources.
2. Foster Collaboration with Clear Roles:
Data Mesh Architecture: Break down data silos by creating a distributed data ownership model with clear ownership and responsibilities.
Collaborative Workspaces: Utilize interactive platforms where data scientists, analysts, and domain experts can work seamlessly together.
3. Leverage Advanced Analytics Strategically:
AI-powered Automation: Automate repetitive tasks like data cleaning and feature engineering, freeing up data talent for higher-level analysis.
Right-Tool Selection: Strategically choose the most effective advanced analytics techniques (e.g., AI, ML) based on specific business problems.
4. Prioritize Data Quality with Automation:
Automated Data Validation: Implement automated data quality checks to identify and rectify errors at the source, minimizing downstream issues.
Data Lineage Tracking: Track the flow of data throughout the ecosystem, ensuring transparency and facilitating root cause analysis for errors.
5. Cultivate a Data-Driven Mindset:
Metrics-Driven Performance Management: Align KPIs and performance metrics with data-driven insights to ensure actionable decision making.
Data Storytelling Workshops: Equip stakeholders with the skills to translate complex data findings into compelling narratives that drive action.
Benefits of a Precise Ecosystem:
Sharpened Focus: Precise access and clear roles ensure everyone works with the most relevant data, maximizing efficiency.
Actionable Insights: Strategic analytics and automated quality checks lead to more reliable and actionable data insights.
Continuous Improvement: Data-driven performance management fosters a culture of learning and continuous improvement.
Sustainable Growth: Empowered by data, organizations can make informed decisions to drive sustainable growth and innovation.
By focusing on these precise actions, organizations can create an empowered data analytics ecosystem that delivers real value by driving data-driven decisions and maximizing the return on their data investment.
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
2. 2
Knowing ‘what’ is sensitive is a business problem that
Technology alone can not solve. (The Policy)
Technology need to know the data, to know ‘How’ and
‘Where’ to manage it. ( Process & Federation)
Ancillary functions are required in order to increase further
functionalities.
Each DLP program is unique and ancillary functions
changes from deployment to deployment.
What is Information or Data Leak Prevention ?
Information / Data Leak Prevention (DLP) is a strategy for making sure that
sensitive information doesn’t reach to wrong hands either inside or outside
of the enterprise network. The term is also used to describe technology
products that help a network administrator to control the data that end-users
transfer. Terms Information-Data, Leak-Loss and Prevention-Protection are
used interchangeably.
3. 3
Quiz - Ahead of Apple much anticipated
new product launch. On iCloud, a celebrity
picture leak incident caused its share prize
to fall by 4.2%. If Apple have total 5.99
Billion shares then Kindly put a price tag on
this leak ?
a) $ 6 Million
b) $15 Million
c) $15 Billion
d) $25 Billion
Financial Implication of a Single Information Leak; An example
4. 4
“According to Kaspersky Labs Accidental Data sharing leads to loss of more
data than software flaws.27% of organizations have lost sensitive business
data due to internal threats in last 12 months…”
Industry Trend
Vulnerabilities in Existing software
Accidental Leaks / Sharing od data by staff
Loss / Theft of mobile device by staff
Intentional Leaks / Sharing of data by staff
Information leaked / inappropriately shared on mobile device
Security failure by third part supplier
Fraud by employess
7%
7%
7%
9%
5%
4%
5%
13%
14%
12%
9%
10%
7%
7%
16%
7%
7%
3%
6%
5%
4%
Data Loss Threats
Yes- Of Sensitive Business Data Yes- Of Non Sensitive Data No
5. 5
Obtain top management buy-in, Have a policy and Have a high-level
vision of enterprise network to establish the primary boundary and
identifying primary gateways Speak to Corporate Governance, Data
Governance, Control Minded Cousin
Speak to IT and understand various Information
types and its handling
Speak to sample staff at all levels to understand
the culture around information life cycle
Survey to business function to understand
specific Business Process and develop data flow
diagrams
Develop a road map with all the above details
Finding the Starting Point
Policy
Leak Control
at Mail
Gateway
(@xyz.co.kw)
Leak Control
at
Automation
(USB,CD, etc.)
Leak Control
at Internet
Gateway
(Gmail,
SkyDrive, etc.)
6. 6
Data
Classification
Policy
Framework
Rights
Management
Gateway Tech
Integration
Encryption
Mobile
Support
While developing a roadmap, identify the ‘What’, ‘How’ and ‘Where’, and
ancillary functionality as per organization priorities.
The Roadmap
‘What’ shall constitute the Information Classification
as per the Policy, to achieve the primary building
block of the program
‘Where’ shall form the base and extended
boundaries thus constituting the Federation
‘Who’ shall constitute the Rights Management
‘How’ shall constitute related Business Processes,
flow diagrams and also the deployment of gateway
technology (Mostly referred as the DLP Products)
Ancillary functions are further added to bring in the
functionality for Encryption and Mobility
7. 7
Public Information which is to be shared outside the
enterprise
Internal Use Information accessible to staff on need-to-
know basis or need-to-have basis.
Business Partners Information accessible to Vendors,
Partners or consultant (i.e. outside KFH Domain) .
Confidential Information accessible to staff only on need-
to-know or need-to-have basis perform assigned jobs
responsibilities within organization only.
Secret Information accessible to highly restricted
authorized employees within org with absolute need to
know or need to have requirement to perform assigned
job.
Information Classification Scheme
InformationSensitivity
Information Classification is the fundamental requirement of identifying sensitive data. In
its absence, no amount of technology deployment can be an alternative
Information Classification Policy
1
Public Internal use
Business Partners Confidential
Secret
8. 8
The term ‘Leak’ refers to the breach of boundaries
by respective classification
Boundaries also constitutes the constituency of
each classification
Similar to Social media framework allows end user
to classify his / her information accordingly.
KSA
3rd
party
Oman
UAE
Qatar
Bahrain
KSA
Kuwait
Examples of
LinkedIn,
Google, FB :
Its fundamental requirement to establish
logical enterprise boundaries as per base
organization.
Federation Framework
9. 9
Print
Rights Management along with validation
features manages the restriction and
access control mechanism of program
Rights to change the classification are
managed to avoid unauthorized business
partner classification in order to send the
information Outside
RM mechanism deployed to restrict the
printing of ‘Confidential’ and ‘Secret’
information.
RM manages the authorization of Public
information.
Its required to establish ‘Who’ can do ‘what’ as per job authorization.
Rights Management
Right
Management
Mechanism
10. 10
Identified sensitive information shall be auto encrypted and do not
require interference from average end user
Encryption mechanism get auto
evoked based on classification
without end user intervention.
Organization do not need to apply
cumbersome encryption across the
organization.
Special public announcement that
needs to be treated as confidential
till released are managed with
special process.
Encryption and Digital Certificates
50%
10%
20% 5%
15%
Sensitivity Trends
Internal Use Business Partners Confidential Secret Public
11. 11
Extend the program on Mobile Devices as per organization appetite, similar
to PC.
Integrate Mobile Device Management
with solution Including device identity
parameters
For large organization facility can be
rolled out with limited staff only to keep
license cost down
SMB may consider integration with MS
Office360 / Google Docs
Deploy Black and white (MAC Address)
list at the enterprise gateway
Mobility
Corporate Network
Manageme
nt Server
ProxyData
Stora
ge
Exchange
+
Policy
+
Policy
DMZ
CA Server
Forrester Research 2013
12. 12
General Benefits
# Benefits
1 Gaining Competitive advantage, in both brand value and reputation
2 Data leakage prevention comprehensively covers all information types, that
Management do not wish to get leaked
3 Once information is classified, no user interference is required, further security is
managed in the background
4 Increases the staff awareness about value and sensitivity of the data adherence to
corporate governance and information security policies
5 Confidential information printing is restricted
6 Secure work environment, Archive Data Governance, Intellectual Property
protection, Privacy and Regulations, Culture Change
7 Securing Proprietary information against security threats caused by enhanced
employee mobility and new communication channels
8 Preventing the misuse of information, both on and off the enterprise network
14. 14
https://kw.linkedin.com/in/tanvirh
Tanvir is an Information Security professional
specializing in managing large scale programs
that requires unique blend of expertise in strategy,
process re-engineering and technological action
planning.
Prior to his role at Kuwait Finance House (KFH),
He has been associated with leading companies
including National Commercial Bank (NCB),
Emirates NBD, Riyad Bank and HSBC.
Tanvir has MS in Electronics & Communications
and CISSP, CISA, AMBCI Certifications.
Speaker Profile