SlideShare a Scribd company logo
The Threat from Within the way we do it
The Threat from Within
Protecting Your Information Assets
What safeguards have you got
in place?
Safeguarding corporate information
assets has become a commercial
imperative for organisations across
the world as the threat of cyber crime
increases and high profile malpractice
cases hit the headlines. Within this
context it is understandable that
enterprises expend significant time
and money protecting their enterprise
from external attack.
It appears that in many cases there
is little or no consideration given to
the activities that take place inside a
business. For example, there may be
no safeguards on what or how much
can be sent out via email from
employee desktops, giving rise to the
leakage of confidential information.
This failure to understand or respond
to internal threats puts key business
assets at risk – the reputation of the
organisation, data, cash, intellectual
property, patents, etc. The electronic
age has brought with it huge
productivity benefits but, inevitably,
alongside this have come threats to
our efficiency and business continuity.
Organisations are now working across
geographies, time zones and currencies
(with corresponding increases in data
volumes) and as different working
practices filter through the
organisation, vulnerabilities appear.
For example, access to strategically
important information is often
unregulated and policies for data
storage and retrieval fail to live up to
statutory requirements.
I A leading credit card provider
suffered the compromise of 40
million credit card account details
I A senior vice president of a high-tech
company was arrested for embezzling
US$10 million
I Private Swiss bank admits theft of
confidential customer data
I Engineer within a global aerospace
company steals confidential
documents and attempts to sell
the information
I UK law enforcement field officer
sells documents to press
Leading analyst groups are now defining
Internal Threat Management as the next
major threat to business security.
Is there a solution for data
rich organisations?
Capgemini has developed an Internal
Audit Solution combining best-of-breed
technology with real-world experience
gained working in both government
and commercial sectors. This solution
facilitates the capture (Collection)
of disparate data; the warehousing
(Storage) of that data; and the mining
(Analysis) of the data to discover and
anticipate non-compliant activity.
By the analysis of people’s behaviour,
the Internal Audit Solution is
capable of proactively identifying
those employees likely to be a threat
to the enterprise.
1
Why is this such an issue?
The consequences of ignoring the
internal threats are significant.
The reputation of your enterprise can
be comprised through negative
publicity that undermines faith in
your ability to meet citizen/customer
expectations. Loss of cash and revenue
are obvious risks through malpractice
within call centres and insider trading.
If this comes to light, the subsequent
damage to a reputation can hit the
share value. Loss of intellectual
property or know-how can degrade
the competitive advantage of an
enterprise and significant research
and development investment can be
nullified through the theft of patents
and designs. Recent documented
examples where business assets
have been compromised include:
Protecting Your
Information Assets
Metadata
Audit Data Warehouse
Storage AnalysisCollection
Systems
Networks
Applications
HR Data
IDS
Business
PABX
Operations
Audit
Anomaly
Detection
Alerting
User
Segmentation
Modelling
Reporting
Data Cleansing
Data Quality
Integration
De-Duplication
Enhancement
Visualisation
Query and Report
Slice and Dice
Text Mining
Data Mining
Figure 1 – Overview of the Capgemini Internal Audit Solution
Capgemini is uniquely placed to bring to bear leading subject matter expertise in the area of Internal Audit, providing insight into likely indicators of
non-compliant behaviour supported by expertise in key information security standards such as BS7799 and ISO 17799.
The Threat from Within – Protecting Your Information Assets 2
the way we do it
How does it work in practice?
The solution facilitates the automated
analysis of security logs from a
number of different systems. It also
provides the capability to analyse and
capture available System Audit Data,
identify anomalous behaviour and
predict who is most likely to breach
system policies.
As a result, there is a requirement
to automate the collection, storage
and analysis of disparate system logs
as follows:
The Threat from Within
I The acquisition of System Audit
Data from a number of platforms:
including system accounting logs
from clients, servers, operating
systems and applications; network
connections, Intrusion Detection
System Sensors and, where
appropriate, stand-alone systems
such as door access control systems
and telephone exchanges
I The movement of data into a single
Audit Data Warehouse environment,
providing the following benefits:
• secure repository
• consistent view of all activity
• trusted repository of validated
audit data
I Perform analysis across all
logs including:
• highlighting of defined
procedural events
• identification to the auditor(s)
of ‘unusual’ behaviour patterns
• provision of a small volume of
data (a Data Mart) for use by
the auditor(s)
• storage of the Data Dictionary
(Metadata) that will store
information about the data in
terms of structure and significance
• Output analyses in the form
of textual and graphical reports
(for both standard and
user-defined reports)
Audit Data
Review
Technical Policy
Monitoring
Behavioural
Patterns
Analyse
Data Quality
Technical Policy
Breach
Behavioural
Models
In-depth Analysis
of Individual Behaviour
Additional Data
Capture Requirements
Behavioural
Analysis
Figure 2 – The Internal Audit Process
The process of internal audit is a continuous activity with constant implementation of measures and counter measures. As a result, the Internal Audit
Solution drives continuous interchange between technical policy monitoring and behavioural analysis.
www.uk.capgemini.com
Capgemini, one of
the world’s foremost
providers of Consulting, Technology
and Outsourcing services, has a unique
way of working with its clients, called
the Collaborative Business Experience.
Backed by over three decades of industry
and service experience, the Collaborative
Business Experience is designed to help
our clients achieve better, faster, more
sustainable results through seamless
access to our network of world-leading
technology partners and collaboration-
focused methods and tools.
Through commitment to mutual success
and the achievement of tangible value,
we help businesses implement growth
strategies, leverage technology, and thrive
through the power of collaboration.
Capgemini employs approximately
61,000 people worldwide and
reported 2005 global revenues of
6,954 million euros.
More information about our services,
offices and research is available at
www.uk.capgemini.com.
About Capgemini and the
Collaborative Business Experience
Capgemini UK
No. 1 Forge End
Woking
Surrey
GU21 6DB
Nigel Robinson
Senior Technical Architect
T: +44 (0) 870 904 3620
e: nigel.robinson@capgemini.com
Copyright © 2006 Capgemini – All rights reserved.
Can you afford to leave things
to chance?
With corporate data estimated to
be increasing year-on-year by
between 40% and 60%, there is a
corresponding rise in risk to the
security of that data. If you don’t know
who has access to what, how can you
be sure that your competitors aren’t
getting their hands on sensitive
information? If you don’t know where
vital data is being stored, are you
wasting valuable time trawling through
a plethora of information resources?
Is your corporate governance and
statutory compliance at risk?
The state-of-the-art Capgemini
Internal Audit Solution allows you
to see ‘who, what, where and when’
across your enterprise. It is based
on experienced gained over years
of successful delivery within the
government and commercial sectors.
It utilises robust and proven software,
made scalable through a comprehensive
data acquisition capability.
The solution makes maximum use of
Capgemini’s considerable statistical
analysis and data mining experts
along with the most sophisticated
suite of integrated data mining
techniques available today.
Why wait until a threat becomes
a reality? Capgemini advocates a
discovery workshop where
collaboratively we will work with you
to determine the likely scale and
nature of the threat.
Why Capgemini?
Working collaboratively with our
clients, Capgemini have developed a
unique portfolio of expertise in this
field following successful real-world
deployment of this solution in both
the government and commercial
sectors. Using our team of subject
matter experts in security and audit,
the solution is based on an
Enterprise Intelligence Platform
featuring unrivalled data acquisition,
scalable storage, market leading
business intelligence and industry
standard analytics.
OCTOBER2006_1866_KOR

More Related Content

What's hot

Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
Druva
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsJason Dover
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
OnRamp
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
Eryk Budi Pratama
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2
Graham Mann
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
Druva
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
Marc St-Pierre
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Eryk Budi Pratama
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
daveGBE
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
Resilient Systems
 
Data Sheet For Erg
Data Sheet For ErgData Sheet For Erg
Data Sheet For Erg
mjschreck
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
Constantine Karbaliotis
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
thinkASG
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the Standard
SecurityScorecard
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
Joey Jablonski
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 

What's hot (20)

Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant Environments
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2Boards' Eye View of Digital Risk & GDPR v2
Boards' Eye View of Digital Risk & GDPR v2
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
Managed Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) WhitepaperManaged Detection and Response (MDR) Whitepaper
Managed Detection and Response (MDR) Whitepaper
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
 
Data Sheet For Erg
Data Sheet For ErgData Sheet For Erg
Data Sheet For Erg
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
IT Executive Guide to Security Intelligence
IT Executive Guide to Security IntelligenceIT Executive Guide to Security Intelligence
IT Executive Guide to Security Intelligence
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the Standard
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 

Viewers also liked

悪問・糞問コンテスト[解説]
悪問・糞問コンテスト[解説]悪問・糞問コンテスト[解説]
悪問・糞問コンテスト[解説]
皓介 三田
 
Análisis de imagen
Análisis de imagenAnálisis de imagen
Análisis de imagen
laurafersam
 
#DeStArt: Чи є життя не в IT?
#DeStArt: Чи є життя не в IT?#DeStArt: Чи є життя не в IT?
#DeStArt: Чи є життя не в IT?
Forge Events
 
Privatizaciya kaz 2017
Privatizaciya kaz 2017Privatizaciya kaz 2017
Privatizaciya kaz 2017
Рустам Калиев
 
Classe moyenne : un Américain sur deux, deux Français sur trois
Classe moyenne : un Américain sur deux, deux Français sur troisClasse moyenne : un Américain sur deux, deux Français sur trois
Classe moyenne : un Américain sur deux, deux Français sur trois
France Stratégie
 
5 çanakkale i̇çinde türkü,
5 çanakkale i̇çinde türkü,5 çanakkale i̇çinde türkü,
5 çanakkale i̇çinde türkü,
Mustafa Kuşcu
 
letter head word (1)
letter head word (1)letter head word (1)
letter head word (1)Dennis Maingi
 
Yank Avails 1 Billion Meals
Yank Avails 1 Billion MealsYank Avails 1 Billion Meals
Yank Avails 1 Billion Meals
yankbarry
 

Viewers also liked (11)

CertificateReport
CertificateReportCertificateReport
CertificateReport
 
1470899_MLT076
1470899_MLT0761470899_MLT076
1470899_MLT076
 
悪問・糞問コンテスト[解説]
悪問・糞問コンテスト[解説]悪問・糞問コンテスト[解説]
悪問・糞問コンテスト[解説]
 
Análisis de imagen
Análisis de imagenAnálisis de imagen
Análisis de imagen
 
#DeStArt: Чи є життя не в IT?
#DeStArt: Чи є життя не в IT?#DeStArt: Чи є життя не в IT?
#DeStArt: Чи є життя не в IT?
 
Privatizaciya kaz 2017
Privatizaciya kaz 2017Privatizaciya kaz 2017
Privatizaciya kaz 2017
 
Business_Geografic_EN
Business_Geografic_ENBusiness_Geografic_EN
Business_Geografic_EN
 
Classe moyenne : un Américain sur deux, deux Français sur trois
Classe moyenne : un Américain sur deux, deux Français sur troisClasse moyenne : un Américain sur deux, deux Français sur trois
Classe moyenne : un Américain sur deux, deux Français sur trois
 
5 çanakkale i̇çinde türkü,
5 çanakkale i̇çinde türkü,5 çanakkale i̇çinde türkü,
5 çanakkale i̇çinde türkü,
 
letter head word (1)
letter head word (1)letter head word (1)
letter head word (1)
 
Yank Avails 1 Billion Meals
Yank Avails 1 Billion MealsYank Avails 1 Billion Meals
Yank Avails 1 Billion Meals
 

Similar to Internal Audit

Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
lilabroughton259
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
Hokme
 
StoneWork Solutions Brochure _ English
StoneWork Solutions Brochure _ EnglishStoneWork Solutions Brochure _ English
StoneWork Solutions Brochure _ English
oscar_garcia_arano
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
NA Putra
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
Wolters Kluwer Tax & Accounting US
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
Danielle Bowers
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
stilliegeorgiana
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
Fuji Xerox Asia Pacific
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
Kaloyan Krastev
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
 
Igs animation s;lide
Igs animation s;lideIgs animation s;lide
Igs animation s;lideRecommind
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
CloudMask inc.
 

Similar to Internal Audit (20)

Strategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdfStrategic Insights on IT & Cyber Risk Assessments.pdf
Strategic Insights on IT & Cyber Risk Assessments.pdf
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
StoneWork Solutions Brochure _ English
StoneWork Solutions Brochure _ EnglishStoneWork Solutions Brochure _ English
StoneWork Solutions Brochure _ English
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docxProject 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
Project 3 – Hollywood and IT· Find 10 incidents of Hollywood p.docx
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Cyber Defence - Service portfolio
Cyber Defence - Service portfolioCyber Defence - Service portfolio
Cyber Defence - Service portfolio
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Igs animation s;lide
Igs animation s;lideIgs animation s;lide
Igs animation s;lide
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 

Internal Audit

  • 1. The Threat from Within the way we do it The Threat from Within Protecting Your Information Assets What safeguards have you got in place? Safeguarding corporate information assets has become a commercial imperative for organisations across the world as the threat of cyber crime increases and high profile malpractice cases hit the headlines. Within this context it is understandable that enterprises expend significant time and money protecting their enterprise from external attack. It appears that in many cases there is little or no consideration given to the activities that take place inside a business. For example, there may be no safeguards on what or how much can be sent out via email from employee desktops, giving rise to the leakage of confidential information. This failure to understand or respond to internal threats puts key business assets at risk – the reputation of the organisation, data, cash, intellectual property, patents, etc. The electronic age has brought with it huge productivity benefits but, inevitably, alongside this have come threats to our efficiency and business continuity. Organisations are now working across geographies, time zones and currencies (with corresponding increases in data volumes) and as different working practices filter through the organisation, vulnerabilities appear. For example, access to strategically important information is often unregulated and policies for data storage and retrieval fail to live up to statutory requirements.
  • 2. I A leading credit card provider suffered the compromise of 40 million credit card account details I A senior vice president of a high-tech company was arrested for embezzling US$10 million I Private Swiss bank admits theft of confidential customer data I Engineer within a global aerospace company steals confidential documents and attempts to sell the information I UK law enforcement field officer sells documents to press Leading analyst groups are now defining Internal Threat Management as the next major threat to business security. Is there a solution for data rich organisations? Capgemini has developed an Internal Audit Solution combining best-of-breed technology with real-world experience gained working in both government and commercial sectors. This solution facilitates the capture (Collection) of disparate data; the warehousing (Storage) of that data; and the mining (Analysis) of the data to discover and anticipate non-compliant activity. By the analysis of people’s behaviour, the Internal Audit Solution is capable of proactively identifying those employees likely to be a threat to the enterprise. 1 Why is this such an issue? The consequences of ignoring the internal threats are significant. The reputation of your enterprise can be comprised through negative publicity that undermines faith in your ability to meet citizen/customer expectations. Loss of cash and revenue are obvious risks through malpractice within call centres and insider trading. If this comes to light, the subsequent damage to a reputation can hit the share value. Loss of intellectual property or know-how can degrade the competitive advantage of an enterprise and significant research and development investment can be nullified through the theft of patents and designs. Recent documented examples where business assets have been compromised include: Protecting Your Information Assets Metadata Audit Data Warehouse Storage AnalysisCollection Systems Networks Applications HR Data IDS Business PABX Operations Audit Anomaly Detection Alerting User Segmentation Modelling Reporting Data Cleansing Data Quality Integration De-Duplication Enhancement Visualisation Query and Report Slice and Dice Text Mining Data Mining Figure 1 – Overview of the Capgemini Internal Audit Solution Capgemini is uniquely placed to bring to bear leading subject matter expertise in the area of Internal Audit, providing insight into likely indicators of non-compliant behaviour supported by expertise in key information security standards such as BS7799 and ISO 17799.
  • 3. The Threat from Within – Protecting Your Information Assets 2 the way we do it How does it work in practice? The solution facilitates the automated analysis of security logs from a number of different systems. It also provides the capability to analyse and capture available System Audit Data, identify anomalous behaviour and predict who is most likely to breach system policies. As a result, there is a requirement to automate the collection, storage and analysis of disparate system logs as follows: The Threat from Within I The acquisition of System Audit Data from a number of platforms: including system accounting logs from clients, servers, operating systems and applications; network connections, Intrusion Detection System Sensors and, where appropriate, stand-alone systems such as door access control systems and telephone exchanges I The movement of data into a single Audit Data Warehouse environment, providing the following benefits: • secure repository • consistent view of all activity • trusted repository of validated audit data I Perform analysis across all logs including: • highlighting of defined procedural events • identification to the auditor(s) of ‘unusual’ behaviour patterns • provision of a small volume of data (a Data Mart) for use by the auditor(s) • storage of the Data Dictionary (Metadata) that will store information about the data in terms of structure and significance • Output analyses in the form of textual and graphical reports (for both standard and user-defined reports) Audit Data Review Technical Policy Monitoring Behavioural Patterns Analyse Data Quality Technical Policy Breach Behavioural Models In-depth Analysis of Individual Behaviour Additional Data Capture Requirements Behavioural Analysis Figure 2 – The Internal Audit Process The process of internal audit is a continuous activity with constant implementation of measures and counter measures. As a result, the Internal Audit Solution drives continuous interchange between technical policy monitoring and behavioural analysis.
  • 4. www.uk.capgemini.com Capgemini, one of the world’s foremost providers of Consulting, Technology and Outsourcing services, has a unique way of working with its clients, called the Collaborative Business Experience. Backed by over three decades of industry and service experience, the Collaborative Business Experience is designed to help our clients achieve better, faster, more sustainable results through seamless access to our network of world-leading technology partners and collaboration- focused methods and tools. Through commitment to mutual success and the achievement of tangible value, we help businesses implement growth strategies, leverage technology, and thrive through the power of collaboration. Capgemini employs approximately 61,000 people worldwide and reported 2005 global revenues of 6,954 million euros. More information about our services, offices and research is available at www.uk.capgemini.com. About Capgemini and the Collaborative Business Experience Capgemini UK No. 1 Forge End Woking Surrey GU21 6DB Nigel Robinson Senior Technical Architect T: +44 (0) 870 904 3620 e: nigel.robinson@capgemini.com Copyright © 2006 Capgemini – All rights reserved. Can you afford to leave things to chance? With corporate data estimated to be increasing year-on-year by between 40% and 60%, there is a corresponding rise in risk to the security of that data. If you don’t know who has access to what, how can you be sure that your competitors aren’t getting their hands on sensitive information? If you don’t know where vital data is being stored, are you wasting valuable time trawling through a plethora of information resources? Is your corporate governance and statutory compliance at risk? The state-of-the-art Capgemini Internal Audit Solution allows you to see ‘who, what, where and when’ across your enterprise. It is based on experienced gained over years of successful delivery within the government and commercial sectors. It utilises robust and proven software, made scalable through a comprehensive data acquisition capability. The solution makes maximum use of Capgemini’s considerable statistical analysis and data mining experts along with the most sophisticated suite of integrated data mining techniques available today. Why wait until a threat becomes a reality? Capgemini advocates a discovery workshop where collaboratively we will work with you to determine the likely scale and nature of the threat. Why Capgemini? Working collaboratively with our clients, Capgemini have developed a unique portfolio of expertise in this field following successful real-world deployment of this solution in both the government and commercial sectors. Using our team of subject matter experts in security and audit, the solution is based on an Enterprise Intelligence Platform featuring unrivalled data acquisition, scalable storage, market leading business intelligence and industry standard analytics. OCTOBER2006_1866_KOR