SlideShare a Scribd company logo
CYBER SECURITY
DATA LOSS PREVENTION
OVERVIEW
VERSION: 1.3
DATE: 24/07/2019
AUTHOR: SYLVAIN MARTINEZ
REFERENCE: ES-IDLP
CLASSIFICATION: PUBLIC
2
• Cyber Security Risk
context;
• Data breach statistics;
• Data breach cost;
• DLP dependencies;
• Data protection
lifecycle;
• DLP definition;
• DLP Overview;
• Define DLP objectives;
• Define DLP scope;
• Define DLP policy;
• Overview;
• Technology
deployment;
• Policy setup;
• Data discovery and
classification;
• DLP monitoring and
tuning;
• DLP reporting and
protection;
CONTENTS
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
• Core DLP benefits
• Take away to
remember
PUBLIC
CYBER SECURITY RISK CONTEXT
3
PAST FUTURE
100%
0%
TIME
GROWTH
PAST FUTURE
100%
0%
TIME
GROWTH
PAST FUTURE
100%
0%
TIME
GROWTH
CYBER SECURITY RISKS’ PROBABILITY AND IMPACT ARE INCREASING.
THEIR ABILITY TO DISRUPT COMPANIES BUSINESS OPERATION HAVE GROWING
FINANCIAL, REPUTATIONAL AND LEGAL NEGATIVE CONSEQUENCES
+ =
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
PUBLIC
DATA BREACH STATISTICS
4
EVERY DAY
6,313,865
RECORDS
EVERY HOUR
263,078
RECORDS
EVERY MINUTE
4,385
RECORDS
EVERY SECONDS
73
RECORDS
DATA RECORDS ARE LOST OR STOLEN AT THE FOLLOWING FREQUENCY
DATA RECORDS LOST OR STOLEN SINCE 2013
Source: Breach Level Index - May 2019
4 7 1 7 6 1 8 2 8 6, ,,1
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
PUBLIC
INCIDENT AND DATA BREACH COST
5
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
PUBLIC
80% FINANCIAL FRAUDS
ELYSIUMSECURITY
INVESTIGATIONS
MAURITIUS
2018-2019
20% RANSOMWARE
100% PHISHING
JAN 2018 - $0.5M
AUG 2018 - $2M
MAY 2019 - $1M
JULY 2019 - $0M
MAY 2018 - $1M
APR 2019 - $0.5M
JUNE 2019 - $0.5M
$3.86M AVERAGE COST PER DATA BREACH
$1.6M AVERAGE COST PER PHISHING ATTACK
95% OF ALL DATA BREACHES COME FROM PHISHING ATTACKS
24% OF ALL DATA BREACHES COME FROM HEALTHCARE ORGANISATIONS
197 DAYS AVERAGE INCIDENT DETECTION TIME
WORLDWIDE
STATISTICS
WORLDWIDE STATS FROM SAFEATLAST.CO AND RETRUSTER.COM – JUNE 2019
DLP DEPENDENCIES
6
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
ORGANIZATION RISK PROFILE
REVIEWED
DOCUMENTED
COMMUNICATED
1
DATA CLASSIFICATION
DEFINED
COMMUNICATED
ENFORCED
2
TYPE OF DATA TO PROTECT
IDENTIFIED
LOCATED
COMPATIBLE
3
PUBLIC
DATA PROTECTION LIFECYCLE
7
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
WHEN THE DATA IS
TRANSMITED
IN TRANSITAT REST IN USE
WHEN THE DATA IS
CREATED & CONSUMED
LOCAL DISK
FILE SERVER
CLOUD STORAGE
REMOVABLE MEDIA
…
DOCUMENT READ
DOCUMENT MODIFICATION
DOCUMENT DELETION
DATABASE QUERY
…
DATA SENT IN EMAIL
DATA SAVED TO CLOUD
DATA SENT TO SERVER
REMOVABLE MEDIA
…
WHERE THE DATA IS
STORED
PUBLIC
DLP DEFINITION
8
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
DATA LOSS PREVENTION (DLP) IS A SOLUTION TO MONITOR,
DETECT AND PREVENT POTENTIAL DATA LOSSES (BREACHES/EX-
FILTRATION) WHILST DATA IS IN USE, IN TRANSIT AND/OR AT REST.
PUBLIC
DLP OVERVIEW
9
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
DISCOVER MONITOR PROTECT
SUPPORT AND REPORT
DATA
HOST BASED
PROTECTION
APP BASED
PROTECTION
NETWORK BASED
PROTECTION
DLP SERVICE
DLP SOLUTION
PUBLIC
DEFINE DLP OBJECTIVES
10
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
WHY
DEFINE THE REASONS FOR
IMPLEMENTING DLP
THREATS, REGULATION, ETC
WHAT
DEFINE THE TYPE AND FORM OF DATA IN
SCOPE FOR DLP
CONTRACTS, PII, ETC.
DOCS, RAW DATA, ETC.
WHERE
DEFINE THE TYPE OF LOCATIONS IN
SCOPE FOR DLP
FILE SERVER, CLOUD,
APPLICATION, DB, ETC.
WHEN DEFINE THE TIME DLP WILL BE NEEDED
IMMEDIATELY AS DATA IS
CREATED, DURATION, ETC.
PUBLIC
DEFINE DLP SCOPE
11
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
DEFINE THE EXACT LOCATION OF DATA IN SCOPE
FOR DLP
FILE SERVER NAMES/IP, APP NAME,
CLOUD PROVIDER, ETC.
DEFINE THE INFRASTRUCTURE DIAGRAM IN SCOPE
FOR DLP
SYSTEM AND NETWORK DIAGRAMS
DEFINE THE DATA FLOW IN SCOPE FOR DLP
BUSINESS AND OPERATION LOGIC,
DATA FLOW DIAGRAMS, ETC.
PUBLIC
DEFINE DLP POLICY
12
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
DEFINE DATA CLASSIFICATION MAPPING
NOMENCLATURE,
KEYWORDS, ETC.
DEFINE THE DIFFERENT ROLES
OWNER, CUSTODIAN,
CONSUMER, ETC.
DEFINE THE DIFFERENT RESTRICTIONS REQUIRED
EXPORT/SAVE AS, PRINT, EDIT,
READ, COPY, ETC.
DEFINE THE ALERT AND REPORTING PROCESS
TEAM, PRIORITIES,
COMMUNICATION, ETC.
PUBLIC
OVERVIEW
13
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
TECHNICAL DEPLOYMENT
DISCOVERY &
CLASSIFICATION
ENFORCE DLP POLICY
MONITOR DLP EVENTS
REPORTING & TUNING
POLICY SETUP
BASIC
PARTIAL
FULL
DISCOVER MONITOR PROTECT
SUPPORT AND REPORT
DLP SERVICE
PUBLIC
TECHNOLOGY DEPLOYMENT
14
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
DATA
HOST BASED
PROTECTION
COVERAGE
FEATURE
OPERATIONAL IMPACT
NETWORK BASED
PROTECTION
EGRESS POINTS
VISIBILITY
OPERATIONAL IMPACT
APP BASED
PROTECTION
COMPATIBILITY
CONFLICT
VISIBILITY
PUBLIC
DLP IMPLEMENTATION
POLICY SETUP
15
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
LIMITED ALERTS GENERATED
LIMITED SCOPE, SOME DATA IDENTIFIED AND CLASSIFIED
NO RESTRICTION ENFORCED
BASIC
ALERTS GENERATED
MOST DATA IDENTIFIED AND CLASSIFIED
SOME RESTRICTIONS ENFORCED
PARTIAL
ALERTS GENERATED
ALL DATA IDENTIFIED AND CLASSIFIED
FULL RESTRICTIONS ENFORCED
FULL
PUBLIC
DLP IMPLEMENTATION
DATA DISCOVERY AND CLASSIFICATION
16
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
DISCOVERY CLASSIFICATION
BASIC
QUICK WINS
KEY EGRESS POINTS
KEY FILE SHARES
SOME DATA TYPES
CRITICAL DATA ONLY IN SCOPE
SIMPLE DETECTION (KEYWORDS)
REPORTING ONLY
PARTIAL
ALL EGRESS POINTS
SOME HOSTS/SERVERS
SOME APPS
MOST DATA TYPES
ALL DATA CLASSIFICATION IN SCOPE
COMPLEX DETECTION
AUTO LABELLING
FULL
ALL EGRESS POINTS
ALL HOSTS/SERVERS
ALL APPS
ALL DATA TYPES
ALL DATA CLASSIFICATION IN SCOPE
MACHINE LEARNING DETECTION
AUTO LABELLING ALL DATA
PUBLIC
DLP IMPLEMENTATION
DLP MONITORING AND TUNING
17
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
MONITORING TUNING
BASIC
DEFAULT DASHBOARD
LIMITED VISIBILITY
AD-HOC
LOT OF FALSE POSITIVES
AD-HOC
MANUAL
PARTIAL
CUSTOMISED DASHBAORD
IMPROVED VISIBILITY
REGULAR
SOME FALSE POSITIVES
REGULAR
MANUAL
FULL
FULLY CUSTOMISED DASHBOARD
FULL VISIBILITY
REGULAR
LIMITED FALSE POSITIVES
REGULAR
MANUAL AND AUTOMATED
PUBLIC
DLP IMPLEMENTATION
DLP REPORTING AND PROTECTION
18
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
REPORTING PROTECTION
BASIC
REACTIVE REPORTING
LIMITED REPORTING
AD-HOC REPORTING
MANUAL REPORTING
LIMITED VISIBILITY
LIMITED ALERTS
NO USER FEEDBACK
NO RESTRICTIONS
PARTIAL
SOME PRO-ACTIVE REPORTING
DETAILED REPORTING
REGULAR REPORTING
SOME AUTOMATED REPORTING
MOST DATA VISIBILITY
USEFUL ALERTS
SOME USER FEEDBACK
SOME RESTRICTIONS
FULL
PRO-ACTIVE REPORTING
COMPREHENSIVE REPORTING
REGULAR REPORTING
AUTOMATED REPORTING
FULL VISIBILITY
COMPREHENSIVE ALERTS
USER AND ADMIN FEEDBACK
RESTRICTIONS ENFORCED
PUBLIC
DLP IMPLEMENTATION
CORE DLP BENEFITS
19
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
VISIBILITY OF DATA
LOCATION/USAGE/SENSITIVITY
1
MONITORING AND ALERTING OF
DATA SUSPICIOUS ACTIVITIES
2
IMPROVED DATA PROTECTION3
PUBLIC
TAKE AWAY TO REMEMBER
20PUBLIC
CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT
DLP DEPENDENCIES1
IMPORTANCE OF DLP SCOPING2
IMPORTANCE OF DLP PREPARATION3
PROGRESSIVE IMPLEMENTATION4
CONTINUOUS IMPROVEMENT5
© 2015-2019 ELYSIUMSECURITY LTD
ALL RIGHTS RESERVED
HTTPS://WWW.ELYSIUMSECURITY.COM
CONSULTING@ELYSIUMSECURITY.COM
ABOUT ELYSIUMSECURITY LTD.
ELYSIUMSECURITY PROVIDES PRACTICAL EXPERTISE TO IDENTIFY
VULNERABILITIES, ASSESS THEIR RISKS AND IMPACT, REMEDIATE THOSE
RISKS, PREPARE AND RESPOND TO INCIDENTS AS WELL AS RAISE
SECURITY AWARENESS THROUGH AN ORGANIZATION.
ELYSIUMSECURITY PROVIDES HIGH LEVEL EXPERTISE GATHERED
THROUGH YEARS OF BEST PRACTICES EXPERIENCE IN LARGE
INTERNATIONAL COMPANIES ALLOWING US TO PROVIDE ADVICE BEST
SUITED TO YOUR BUSINESS OPERATIONAL MODEL AND PRIORITIES.
ELYSIUMSECURITY PROVIDES A PORTFOLIO OF STRATEGIC AND TACTICAL
SERVICES TO HELP COMPANIES PROTECT AND RESPOND AGAINST CYBER
SECURITY THREATS. WE DIFFERENTIATE OURSELVES BY OFFERING
DISCREET, TAILORED AND SPECIALIZED ENGAGEMENTS.
ELYSIUMSECURITY OPERATES IN MAURITIUS AND IN EUROPE,
A BOUTIQUE STYLE APPROACH MEANS WE CAN EASILY ADAPT TO YOUR
BUSINESS OPERATIONAL MODEL AND REQUIREMENTS TO PROVIDE A
PERSONALIZED SERVICE THAT FITS YOUR WORKING ENVIRONMENT.

More Related Content

What's hot

Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
dj1arry
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
Ariel Evans
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
Dhananjay Aloorkar
 
DLP
DLPDLP
Dlp notes
Dlp notesDlp notes
Dlp notes
anuepcet
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Seccuris Inc.
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshop
Arpan Raval
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
n|u - The Open Security Community
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
Rizwan S
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
MarketingArrowECS_CZ
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
k33a
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
Detection and Response Roles
Detection and Response RolesDetection and Response Roles
Detection and Response Roles
Florian Roth
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
Danny Wong
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
Iftikhar Ali Iqbal
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
n|u - The Open Security Community
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
danb02
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
SnapComms
 

What's hot (20)

Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
DLP
DLPDLP
DLP
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshop
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Detection and Response Roles
Detection and Response RolesDetection and Response Roles
Detection and Response Roles
 
7 Steps to Threat Modeling
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Security Information Event Management - nullhyd
Security Information Event Management - nullhydSecurity Information Event Management - nullhyd
Security Information Event Management - nullhyd
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 

Similar to DATA LOSS PREVENTION OVERVIEW

Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
Ariel Martin Beliera
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
David Sweigert
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLP
Adi Saputra
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
♟Sergej Epp
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An Enabler
SLA-Ready Network
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
Sridhar Karnam
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Troy Kitch
 
PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITY
Sylvain Martinez
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
Sylvain Martinez
 
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
SLA-Ready Network
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An Enabler
SLA-Ready Network
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
IBM Security
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
Sachin Paul
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
6620handout5o
6620handout5o6620handout5o
6620handout5o
Shahbaz Sidhu
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
Lora O'Haver
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Angeloluca Barba
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Kurt Hagerman
 
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEAdversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
Jorge Orchilles
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
Digital Guardian
 

Similar to DATA LOSS PREVENTION OVERVIEW (20)

Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
Protect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLPProtect your sensitive data against data leaks with Safetica DLP
Protect your sensitive data against data leaks with Safetica DLP
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An Enabler
 
Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?Are your Cloud Services Secure and Compliant today?
Are your Cloud Services Secure and Compliant today?
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
 
PROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITYPROGRAMMING AND CYBER SECURITY
PROGRAMMING AND CYBER SECURITY
 
INTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICS
 
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: The Strategic, Legal & Pragmatic Approach
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An Enabler
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......Palo Alto Cortex XDR presentation .......
Palo Alto Cortex XDR presentation .......
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
6620handout5o
6620handout5o6620handout5o
6620handout5o
 
Strengthen Cloud Security
Strengthen Cloud SecurityStrengthen Cloud Security
Strengthen Cloud Security
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSEAdversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation and Red Team Exercises - EDUCAUSE
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 

More from Sylvain Martinez

INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHYINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY
Sylvain Martinez
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
Sylvain Martinez
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
Sylvain Martinez
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
Sylvain Martinez
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
Sylvain Martinez
 
VIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
Sylvain Martinez
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEW
Sylvain Martinez
 
OFFENSIVE IDS
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDS
Sylvain Martinez
 
IOT Security
IOT SecurityIOT Security
IOT Security
Sylvain Martinez
 
ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?
Sylvain Martinez
 
GDPR SECURITY ISSUES
GDPR SECURITY ISSUESGDPR SECURITY ISSUES
GDPR SECURITY ISSUES
Sylvain Martinez
 
Mobile Security Assessment
Mobile Security AssessmentMobile Security Assessment
Mobile Security Assessment
Sylvain Martinez
 
The Art of CTF
The Art of CTFThe Art of CTF
The Art of CTF
Sylvain Martinez
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
Sylvain Martinez
 
Risk on Crypto Currencies
Risk on Crypto CurrenciesRisk on Crypto Currencies
Risk on Crypto Currencies
Sylvain Martinez
 
Talk1 esc7 muscl-gdpr_debate_v1_2
Talk1 esc7 muscl-gdpr_debate_v1_2Talk1 esc7 muscl-gdpr_debate_v1_2
Talk1 esc7 muscl-gdpr_debate_v1_2
Sylvain Martinez
 
Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
Sylvain Martinez
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sylvain Martinez
 
INCIDENT HANDLING IN ORGANISATIONS
INCIDENT HANDLING IN ORGANISATIONSINCIDENT HANDLING IN ORGANISATIONS
INCIDENT HANDLING IN ORGANISATIONS
Sylvain Martinez
 
SOCIAL MEDIA AS A CYBER WEAPON
SOCIAL MEDIA AS A CYBER WEAPONSOCIAL MEDIA AS A CYBER WEAPON
SOCIAL MEDIA AS A CYBER WEAPON
Sylvain Martinez
 

More from Sylvain Martinez (20)

INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHYINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY
 
INCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
 
2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
VIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
 
INCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEW
 
OFFENSIVE IDS
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDS
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?
 
GDPR SECURITY ISSUES
GDPR SECURITY ISSUESGDPR SECURITY ISSUES
GDPR SECURITY ISSUES
 
Mobile Security Assessment
Mobile Security AssessmentMobile Security Assessment
Mobile Security Assessment
 
The Art of CTF
The Art of CTFThe Art of CTF
The Art of CTF
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Risk on Crypto Currencies
Risk on Crypto CurrenciesRisk on Crypto Currencies
Risk on Crypto Currencies
 
Talk1 esc7 muscl-gdpr_debate_v1_2
Talk1 esc7 muscl-gdpr_debate_v1_2Talk1 esc7 muscl-gdpr_debate_v1_2
Talk1 esc7 muscl-gdpr_debate_v1_2
 
Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2Talk1 esc7 muscl-dataprotection_v1_2
Talk1 esc7 muscl-dataprotection_v1_2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
INCIDENT HANDLING IN ORGANISATIONS
INCIDENT HANDLING IN ORGANISATIONSINCIDENT HANDLING IN ORGANISATIONS
INCIDENT HANDLING IN ORGANISATIONS
 
SOCIAL MEDIA AS A CYBER WEAPON
SOCIAL MEDIA AS A CYBER WEAPONSOCIAL MEDIA AS A CYBER WEAPON
SOCIAL MEDIA AS A CYBER WEAPON
 

Recently uploaded

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 

Recently uploaded (20)

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 

DATA LOSS PREVENTION OVERVIEW

  • 1. CYBER SECURITY DATA LOSS PREVENTION OVERVIEW VERSION: 1.3 DATE: 24/07/2019 AUTHOR: SYLVAIN MARTINEZ REFERENCE: ES-IDLP CLASSIFICATION: PUBLIC
  • 2. 2 • Cyber Security Risk context; • Data breach statistics; • Data breach cost; • DLP dependencies; • Data protection lifecycle; • DLP definition; • DLP Overview; • Define DLP objectives; • Define DLP scope; • Define DLP policy; • Overview; • Technology deployment; • Policy setup; • Data discovery and classification; • DLP monitoring and tuning; • DLP reporting and protection; CONTENTS CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT • Core DLP benefits • Take away to remember PUBLIC
  • 3. CYBER SECURITY RISK CONTEXT 3 PAST FUTURE 100% 0% TIME GROWTH PAST FUTURE 100% 0% TIME GROWTH PAST FUTURE 100% 0% TIME GROWTH CYBER SECURITY RISKS’ PROBABILITY AND IMPACT ARE INCREASING. THEIR ABILITY TO DISRUPT COMPANIES BUSINESS OPERATION HAVE GROWING FINANCIAL, REPUTATIONAL AND LEGAL NEGATIVE CONSEQUENCES + = CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT PUBLIC
  • 4. DATA BREACH STATISTICS 4 EVERY DAY 6,313,865 RECORDS EVERY HOUR 263,078 RECORDS EVERY MINUTE 4,385 RECORDS EVERY SECONDS 73 RECORDS DATA RECORDS ARE LOST OR STOLEN AT THE FOLLOWING FREQUENCY DATA RECORDS LOST OR STOLEN SINCE 2013 Source: Breach Level Index - May 2019 4 7 1 7 6 1 8 2 8 6, ,,1 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT PUBLIC
  • 5. INCIDENT AND DATA BREACH COST 5 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT PUBLIC 80% FINANCIAL FRAUDS ELYSIUMSECURITY INVESTIGATIONS MAURITIUS 2018-2019 20% RANSOMWARE 100% PHISHING JAN 2018 - $0.5M AUG 2018 - $2M MAY 2019 - $1M JULY 2019 - $0M MAY 2018 - $1M APR 2019 - $0.5M JUNE 2019 - $0.5M $3.86M AVERAGE COST PER DATA BREACH $1.6M AVERAGE COST PER PHISHING ATTACK 95% OF ALL DATA BREACHES COME FROM PHISHING ATTACKS 24% OF ALL DATA BREACHES COME FROM HEALTHCARE ORGANISATIONS 197 DAYS AVERAGE INCIDENT DETECTION TIME WORLDWIDE STATISTICS WORLDWIDE STATS FROM SAFEATLAST.CO AND RETRUSTER.COM – JUNE 2019
  • 6. DLP DEPENDENCIES 6 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT ORGANIZATION RISK PROFILE REVIEWED DOCUMENTED COMMUNICATED 1 DATA CLASSIFICATION DEFINED COMMUNICATED ENFORCED 2 TYPE OF DATA TO PROTECT IDENTIFIED LOCATED COMPATIBLE 3 PUBLIC
  • 7. DATA PROTECTION LIFECYCLE 7 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT WHEN THE DATA IS TRANSMITED IN TRANSITAT REST IN USE WHEN THE DATA IS CREATED & CONSUMED LOCAL DISK FILE SERVER CLOUD STORAGE REMOVABLE MEDIA … DOCUMENT READ DOCUMENT MODIFICATION DOCUMENT DELETION DATABASE QUERY … DATA SENT IN EMAIL DATA SAVED TO CLOUD DATA SENT TO SERVER REMOVABLE MEDIA … WHERE THE DATA IS STORED PUBLIC
  • 8. DLP DEFINITION 8 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT DATA LOSS PREVENTION (DLP) IS A SOLUTION TO MONITOR, DETECT AND PREVENT POTENTIAL DATA LOSSES (BREACHES/EX- FILTRATION) WHILST DATA IS IN USE, IN TRANSIT AND/OR AT REST. PUBLIC
  • 9. DLP OVERVIEW 9 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT DISCOVER MONITOR PROTECT SUPPORT AND REPORT DATA HOST BASED PROTECTION APP BASED PROTECTION NETWORK BASED PROTECTION DLP SERVICE DLP SOLUTION PUBLIC
  • 10. DEFINE DLP OBJECTIVES 10 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT WHY DEFINE THE REASONS FOR IMPLEMENTING DLP THREATS, REGULATION, ETC WHAT DEFINE THE TYPE AND FORM OF DATA IN SCOPE FOR DLP CONTRACTS, PII, ETC. DOCS, RAW DATA, ETC. WHERE DEFINE THE TYPE OF LOCATIONS IN SCOPE FOR DLP FILE SERVER, CLOUD, APPLICATION, DB, ETC. WHEN DEFINE THE TIME DLP WILL BE NEEDED IMMEDIATELY AS DATA IS CREATED, DURATION, ETC. PUBLIC
  • 11. DEFINE DLP SCOPE 11 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT DEFINE THE EXACT LOCATION OF DATA IN SCOPE FOR DLP FILE SERVER NAMES/IP, APP NAME, CLOUD PROVIDER, ETC. DEFINE THE INFRASTRUCTURE DIAGRAM IN SCOPE FOR DLP SYSTEM AND NETWORK DIAGRAMS DEFINE THE DATA FLOW IN SCOPE FOR DLP BUSINESS AND OPERATION LOGIC, DATA FLOW DIAGRAMS, ETC. PUBLIC
  • 12. DEFINE DLP POLICY 12 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT DEFINE DATA CLASSIFICATION MAPPING NOMENCLATURE, KEYWORDS, ETC. DEFINE THE DIFFERENT ROLES OWNER, CUSTODIAN, CONSUMER, ETC. DEFINE THE DIFFERENT RESTRICTIONS REQUIRED EXPORT/SAVE AS, PRINT, EDIT, READ, COPY, ETC. DEFINE THE ALERT AND REPORTING PROCESS TEAM, PRIORITIES, COMMUNICATION, ETC. PUBLIC
  • 13. OVERVIEW 13 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT TECHNICAL DEPLOYMENT DISCOVERY & CLASSIFICATION ENFORCE DLP POLICY MONITOR DLP EVENTS REPORTING & TUNING POLICY SETUP BASIC PARTIAL FULL DISCOVER MONITOR PROTECT SUPPORT AND REPORT DLP SERVICE PUBLIC
  • 14. TECHNOLOGY DEPLOYMENT 14 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT DATA HOST BASED PROTECTION COVERAGE FEATURE OPERATIONAL IMPACT NETWORK BASED PROTECTION EGRESS POINTS VISIBILITY OPERATIONAL IMPACT APP BASED PROTECTION COMPATIBILITY CONFLICT VISIBILITY PUBLIC DLP IMPLEMENTATION
  • 15. POLICY SETUP 15 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT LIMITED ALERTS GENERATED LIMITED SCOPE, SOME DATA IDENTIFIED AND CLASSIFIED NO RESTRICTION ENFORCED BASIC ALERTS GENERATED MOST DATA IDENTIFIED AND CLASSIFIED SOME RESTRICTIONS ENFORCED PARTIAL ALERTS GENERATED ALL DATA IDENTIFIED AND CLASSIFIED FULL RESTRICTIONS ENFORCED FULL PUBLIC DLP IMPLEMENTATION
  • 16. DATA DISCOVERY AND CLASSIFICATION 16 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT DISCOVERY CLASSIFICATION BASIC QUICK WINS KEY EGRESS POINTS KEY FILE SHARES SOME DATA TYPES CRITICAL DATA ONLY IN SCOPE SIMPLE DETECTION (KEYWORDS) REPORTING ONLY PARTIAL ALL EGRESS POINTS SOME HOSTS/SERVERS SOME APPS MOST DATA TYPES ALL DATA CLASSIFICATION IN SCOPE COMPLEX DETECTION AUTO LABELLING FULL ALL EGRESS POINTS ALL HOSTS/SERVERS ALL APPS ALL DATA TYPES ALL DATA CLASSIFICATION IN SCOPE MACHINE LEARNING DETECTION AUTO LABELLING ALL DATA PUBLIC DLP IMPLEMENTATION
  • 17. DLP MONITORING AND TUNING 17 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT MONITORING TUNING BASIC DEFAULT DASHBOARD LIMITED VISIBILITY AD-HOC LOT OF FALSE POSITIVES AD-HOC MANUAL PARTIAL CUSTOMISED DASHBAORD IMPROVED VISIBILITY REGULAR SOME FALSE POSITIVES REGULAR MANUAL FULL FULLY CUSTOMISED DASHBOARD FULL VISIBILITY REGULAR LIMITED FALSE POSITIVES REGULAR MANUAL AND AUTOMATED PUBLIC DLP IMPLEMENTATION
  • 18. DLP REPORTING AND PROTECTION 18 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT REPORTING PROTECTION BASIC REACTIVE REPORTING LIMITED REPORTING AD-HOC REPORTING MANUAL REPORTING LIMITED VISIBILITY LIMITED ALERTS NO USER FEEDBACK NO RESTRICTIONS PARTIAL SOME PRO-ACTIVE REPORTING DETAILED REPORTING REGULAR REPORTING SOME AUTOMATED REPORTING MOST DATA VISIBILITY USEFUL ALERTS SOME USER FEEDBACK SOME RESTRICTIONS FULL PRO-ACTIVE REPORTING COMPREHENSIVE REPORTING REGULAR REPORTING AUTOMATED REPORTING FULL VISIBILITY COMPREHENSIVE ALERTS USER AND ADMIN FEEDBACK RESTRICTIONS ENFORCED PUBLIC DLP IMPLEMENTATION
  • 19. CORE DLP BENEFITS 19 CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT VISIBILITY OF DATA LOCATION/USAGE/SENSITIVITY 1 MONITORING AND ALERTING OF DATA SUSPICIOUS ACTIVITIES 2 IMPROVED DATA PROTECTION3 PUBLIC
  • 20. TAKE AWAY TO REMEMBER 20PUBLIC CONCLUSIONIMPLEMENTATIONPREPARATIONCONCEPTCONTEXT DLP DEPENDENCIES1 IMPORTANCE OF DLP SCOPING2 IMPORTANCE OF DLP PREPARATION3 PROGRESSIVE IMPLEMENTATION4 CONTINUOUS IMPROVEMENT5
  • 21. © 2015-2019 ELYSIUMSECURITY LTD ALL RIGHTS RESERVED HTTPS://WWW.ELYSIUMSECURITY.COM CONSULTING@ELYSIUMSECURITY.COM ABOUT ELYSIUMSECURITY LTD. ELYSIUMSECURITY PROVIDES PRACTICAL EXPERTISE TO IDENTIFY VULNERABILITIES, ASSESS THEIR RISKS AND IMPACT, REMEDIATE THOSE RISKS, PREPARE AND RESPOND TO INCIDENTS AS WELL AS RAISE SECURITY AWARENESS THROUGH AN ORGANIZATION. ELYSIUMSECURITY PROVIDES HIGH LEVEL EXPERTISE GATHERED THROUGH YEARS OF BEST PRACTICES EXPERIENCE IN LARGE INTERNATIONAL COMPANIES ALLOWING US TO PROVIDE ADVICE BEST SUITED TO YOUR BUSINESS OPERATIONAL MODEL AND PRIORITIES. ELYSIUMSECURITY PROVIDES A PORTFOLIO OF STRATEGIC AND TACTICAL SERVICES TO HELP COMPANIES PROTECT AND RESPOND AGAINST CYBER SECURITY THREATS. WE DIFFERENTIATE OURSELVES BY OFFERING DISCREET, TAILORED AND SPECIALIZED ENGAGEMENTS. ELYSIUMSECURITY OPERATES IN MAURITIUS AND IN EUROPE, A BOUTIQUE STYLE APPROACH MEANS WE CAN EASILY ADAPT TO YOUR BUSINESS OPERATIONAL MODEL AND REQUIREMENTS TO PROVIDE A PERSONALIZED SERVICE THAT FITS YOUR WORKING ENVIRONMENT.