SlideShare a Scribd company logo
Click to edit Master title style




Humans Are The Weakest Link –
How DLP Can Help
Valery Boronin, Director DLP Research
Vera Trubacheva, System Analyst

DLP Research, R&D, Kaspersky Lab
February 3, 2012
Cancun, Mexico, Ritz-Carlton Hotel
Click to edit Master title style
Agenda
1. DLP to date
2. Key challenge
3. User awareness
   1. What is it?
   2. Why is it required?
   3. How to raise it?
   4. How DLP could help?
4. Q&A
DLP to date Master title style
 Click to edit

Customers want:                                      Customers receive:
1. Easy                                              1. Complicated
2. Convenient                                        2. Inconvenient
3. Reliable                                          3. Unreliable
4. Cheap                                             4. Expensive
 Gartner research estimates that more than 800 technology vendors and other
 providers currently have data security offerings. Numerous nontechnical controls
 are also available. The difficulty of understanding all these options, their benefits
 and their challenges tends to lead to enterprises using limited subsets of
 the available tools and having serious gaps in controls and risk mitigation
             Typical Elements of an Enterprise Data Security Program, Gartner, Aug 2009



Page 3       SAS 2012, DLP Research, Kaspersky Lab       February, 3d, 2012
Key Challenge is the Complexity
 Click to edit Master title style


                                  Technologies



                                    Data
             Expertise
              & Tools             Luxury                  People
                                 Protection


                                    Processes


Page 4   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Accusation against title style
 Click to edit Master DLP 1.0
No user awareness in DLP 1.0


Claim 1: Raising user awareness.
Claim 2: Control of education efficiency.




                                        Mock trial
Page 5    SAS 2012, DLP Research, Kaspersky Lab      February, 3d, 2012
What to userMaster title style
 Click is edit awareness?
User awareness is making users aware of information
security policies, threats, mitigating controls

 Security education




   Childhood                                                           Work



Page 6    SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Why is user awareness required?
Click to edit Master title style
1. It is required by law




                                                                      See Appendix 1

Page 7   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Why is user awareness required?
Click to edit Master title style
2. To protect the weakest link in
   security – the human




Page 8   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Why is user awareness required? Evidence 1
 Click to edit Master title style

             Guess what this is:
                             •     12345
                             •     qwerty
                             •     11111
                             •     abc123
                             •     admin
Page 9   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Why is user awareness required? Evidence 2
Click to edit Master title style




Page 10   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Why is user awareness required? Evidence 3
 Click to edit Master title style
  Security incidents                                 The weakest link in
                                                     security is human!


 100%
   Target of all            90%
successful APT
attacks is a user     Exploits need a
                                                     75%
   (Mandiant)         user interaction
                        (Symantec)                   Human factor                 60%
                                                                             Accidental mistakes
                                                                                 (InfoWatch)

Page 11      SAS 2012, DLP Research, Kaspersky Lab      February, 3d, 2012
Why is user awareness required?
Click to edit Master title style
3. To reduce huge costs!


                                                                   $7,2 billion per data
                                                                   breach in 2010

                                                                    $56,165 for a lost
                                                                    notebook in 2010




    You could buy a yacht like this for one data breach

Page 12       SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
How to raiseMaster title style
 Click to edit user awareness?



                                                      Recognize
                                                    the problem




Page 13   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
How to raiseMaster title style
 Click to edit user awareness?




Get top
management
support



Page 14   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
How to raiseMaster title style
 Click to edit user awareness?




                       Know your data
Page 15   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
How to raise user awareness?
Click to edit Master title style




                                                  Prepare
                                                  clear, simple
                                                  instructions



Page 16   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
What to edit Master title style
Click to teach?

1.Security basics
2.Corporate policy rules
3.Incident response




Page 17   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
How to teach?
Click to edit Master title style


 Use different ways




                                                                       See Appendix 2

Page 18   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Key Factor 1Master title style
 Click to edit

                                  Explain




Page 19   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Key Factor 2Master title style
 Click to edit




  Measure
  results
  before and
  after


Page 20   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Key Factor 3Master title style
 Click to edit




                                                         Explain
                                                  consequences
                                                  for secure and
                                                       unsecure
                                                        behavior

Page 21   SAS 2012, DLP Research, Kaspersky Lab    February, 3d, 2012
Members of the Jury: Time for Action
Click to edit Master title style




  Poll of the Jury

Page 22   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Courtto edit Master title style
 Click Decision: Verdict




DLP 1.0 must

1. Raise user awareness
2. Control education efficiency


Page 23   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Click to edit Master title style
   Humans Are The Weakest Link – How DLP Can Help




               Thank you!
         Raise User Awareness!

Valery Boronin                           Vera Trubacheva
Director DLP Research           System Analyst, DLP Research
Kaspersky Lab                                   Kaspersky Lab
Valery.Boronin@kaspersky.com   Vera.Trubacheva@kaspersky.com
+7 495 797 8700 x4200                    +7 495 797 8700 x4201
Appendix 1 Master title style
Click to edit
For compliance with laws and regulations:
    •     Payment Card Industry Data Security Standard (PCI DSS)
    •     Federal Information System Security Managers Act (FISMA)
    •     Health Insurance Portability and Accountability Act (HIPAA)
    •     Gramm-Leach-Bliley Act (GLBA)
    •     Sarbanes-Oxley Act (SOX)
    •     EU Data Protection Directive
    •     National Institute of Standards and Technology (NIST 800-53)
    •     International Organization for Standardization: ISO/IEC 27001 & 27002
    •     Control Objectives for Information and Related Technology (CoBiT 4.1)
    •     Red Flag Identity Theft Prevention
    •     Personal Information Protection and Electronic Documents Act (PIPEDA)
    •     Management of Federal Information Resources (OMB Circular A-130)
    •     Some state breach notification laws (ie Massachusetts 201 CMR 17.00)
    •     Стандарт Банка России по обеспечению информационной безопасности
          организаций банковской системы Российской Федерации (СТО БР
          ИББС)
Page 25         SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Appendix 2 Master title style
 Click to edit
• Security topics
• E-mail etiquette
• Social Engineering
• Clean Desk
• Protecting Sensitive Information
• Strong Password
• Data owners
• Internet
• Identity theft
• Personal use
• Protecting data
• Mobile security
Page 26   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012
Appendix 3 Master title style
 Click to edit
Sources of Awareness Material:
• CERT
• Ponemon Institute
• ISSA
• The university of Arizona
• NIST SP 800-50 and NIST SP 800-16
• SANS (presentations, Security Awareness Newsletters,
  training)
• InfoSecurityLab (posters, Wallpapers & Screensavers,
  Newsletters)




Page 27   SAS 2012, DLP Research, Kaspersky Lab   February, 3d, 2012

More Related Content

What's hot

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
Ariel Evans
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
Dhananjay Aloorkar
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
Kim Jensen
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
Gary Bahadur
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
Symantec
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
Network Intelligence India
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
Abhishek Sood
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
Digital Guardian
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Vlad Catrinescu
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
Liwei Ren任力偉
 
Dlp notes
Dlp notesDlp notes
Dlp notes
anuepcet
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
Liwei Ren任力偉
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
Andris Soroka
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
Mike Spaulding
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
Robert Kloots
 

What's hot (20)

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
DLP customer presentation
DLP customer presentationDLP customer presentation
DLP customer presentation
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 

Viewers also liked

InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
Global Business Events
 
Catalogo Portachiavi Per Auto
Catalogo Portachiavi Per AutoCatalogo Portachiavi Per Auto
Catalogo Portachiavi Per Auto
Alessio Astolfi
 
DLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечекDLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечек
Vladyslav Radetsky
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge Pereira
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
Symantec
 
Управление инцидентами информационной безопасности с помощью DLP Solar Dozor
Управление инцидентами информационной безопасности с помощью DLP Solar DozorУправление инцидентами информационной безопасности с помощью DLP Solar Dozor
Управление инцидентами информационной безопасности с помощью DLP Solar Dozor
Solar Security
 

Viewers also liked (6)

InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
InfoWatch - Data loss prevention (dlp) and social media monitoring (smm)
 
Catalogo Portachiavi Per Auto
Catalogo Portachiavi Per AutoCatalogo Portachiavi Per Auto
Catalogo Portachiavi Per Auto
 
DLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечекDLP 9.4 - новые возможности защиты от утечек
DLP 9.4 - новые возможности защиты от утечек
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Управление инцидентами информационной безопасности с помощью DLP Solar Dozor
Управление инцидентами информационной безопасности с помощью DLP Solar DozorУправление инцидентами информационной безопасности с помощью DLP Solar Dozor
Управление инцидентами информационной безопасности с помощью DLP Solar Dozor
 

Similar to Humans Are The Weakest Link – How DLP Can Help

Humans Are The Weakest Link – How DLP Can Help?
Humans Are The Weakest Link – How DLP Can Help?Humans Are The Weakest Link – How DLP Can Help?
Humans Are The Weakest Link – How DLP Can Help?
Vera Trubacheva
 
Big data - teams not technology
Big data - teams not technologyBig data - teams not technology
Big data - teams not technology
Upside Energy Ltd
 
DDN Accelerating-Decisions-Through-Enterprise-Hadoop-final
DDN Accelerating-Decisions-Through-Enterprise-Hadoop-finalDDN Accelerating-Decisions-Through-Enterprise-Hadoop-final
DDN Accelerating-Decisions-Through-Enterprise-Hadoop-finalIntelHealthcare
 
The Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning QueriesThe Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning Queries
Eric Kavanagh
 
Why there is no future for Model Driven Development
Why there is no future for Model Driven DevelopmentWhy there is no future for Model Driven Development
Why there is no future for Model Driven Development
Johan den Haan
 
Sunrise Presentation, Company Overview 2012
Sunrise Presentation, Company Overview 2012Sunrise Presentation, Company Overview 2012
Sunrise Presentation, Company Overview 2012
jvangombos
 
Sunrise presentation
Sunrise presentationSunrise presentation
Sunrise presentation
Barbara G Gibney
 
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf
DataScienceConferenc1
 
Sira insights from cloud vendor risk assessments
Sira   insights from cloud vendor risk assessmentsSira   insights from cloud vendor risk assessments
Sira insights from cloud vendor risk assessments
Cary Sholer
 
Dynamic Data Masking - Breakthrough Innovation in Application Security
Dynamic Data Masking - Breakthrough Innovation in Application SecurityDynamic Data Masking - Breakthrough Innovation in Application Security
Dynamic Data Masking - Breakthrough Innovation in Application Security
Dobler Consulting
 
The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the CloudThe New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the Cloud
Inside Analysis
 
Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners
Dell World
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointWalter Liu
 
Ron Kasabian - Intel Big Data & Cloud Summit 2013
Ron Kasabian - Intel Big Data & Cloud Summit 2013Ron Kasabian - Intel Big Data & Cloud Summit 2013
Ron Kasabian - Intel Big Data & Cloud Summit 2013IntelAPAC
 
Peopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashupsPeopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashups
Justo Hidalgo
 
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalDataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
Harvinder Atwal
 
Real-World Data Governance: Tools of Data Governance – Purchased and Develope...
Real-World Data Governance: Tools of Data Governance – Purchased and Develope...Real-World Data Governance: Tools of Data Governance – Purchased and Develope...
Real-World Data Governance: Tools of Data Governance – Purchased and Develope...DATAVERSITY
 
ElizabethPrattConsulting_DellPortfolio
ElizabethPrattConsulting_DellPortfolioElizabethPrattConsulting_DellPortfolio
ElizabethPrattConsulting_DellPortfolioLiz Pratt
 
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...
Denodo
 
Extreme SSAS - Part I
Extreme SSAS  - Part IExtreme SSAS  - Part I
Extreme SSAS - Part I
Itay Braun
 

Similar to Humans Are The Weakest Link – How DLP Can Help (20)

Humans Are The Weakest Link – How DLP Can Help?
Humans Are The Weakest Link – How DLP Can Help?Humans Are The Weakest Link – How DLP Can Help?
Humans Are The Weakest Link – How DLP Can Help?
 
Big data - teams not technology
Big data - teams not technologyBig data - teams not technology
Big data - teams not technology
 
DDN Accelerating-Decisions-Through-Enterprise-Hadoop-final
DDN Accelerating-Decisions-Through-Enterprise-Hadoop-finalDDN Accelerating-Decisions-Through-Enterprise-Hadoop-final
DDN Accelerating-Decisions-Through-Enterprise-Hadoop-final
 
The Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning QueriesThe Key to Effective Analytics: Fast-Returning Queries
The Key to Effective Analytics: Fast-Returning Queries
 
Why there is no future for Model Driven Development
Why there is no future for Model Driven DevelopmentWhy there is no future for Model Driven Development
Why there is no future for Model Driven Development
 
Sunrise Presentation, Company Overview 2012
Sunrise Presentation, Company Overview 2012Sunrise Presentation, Company Overview 2012
Sunrise Presentation, Company Overview 2012
 
Sunrise presentation
Sunrise presentationSunrise presentation
Sunrise presentation
 
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf
[DSC MENA 24] Abdelrahman_Ghallab_-_Data_Product_mgmt.pdf
 
Sira insights from cloud vendor risk assessments
Sira   insights from cloud vendor risk assessmentsSira   insights from cloud vendor risk assessments
Sira insights from cloud vendor risk assessments
 
Dynamic Data Masking - Breakthrough Innovation in Application Security
Dynamic Data Masking - Breakthrough Innovation in Application SecurityDynamic Data Masking - Breakthrough Innovation in Application Security
Dynamic Data Masking - Breakthrough Innovation in Application Security
 
The New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the CloudThe New Database Frontier: Harnessing the Cloud
The New Database Frontier: Harnessing the Cloud
 
Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners Dell Software: An Opportunity for Channel Partners
Dell Software: An Opportunity for Channel Partners
 
Service production from d3 pitfall viewpoint
Service production from d3 pitfall viewpointService production from d3 pitfall viewpoint
Service production from d3 pitfall viewpoint
 
Ron Kasabian - Intel Big Data & Cloud Summit 2013
Ron Kasabian - Intel Big Data & Cloud Summit 2013Ron Kasabian - Intel Big Data & Cloud Summit 2013
Ron Kasabian - Intel Big Data & Cloud Summit 2013
 
Peopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashupsPeopleware. Introduction to Enterprise DataMashups
Peopleware. Introduction to Enterprise DataMashups
 
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder AtwalDataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
DataOps - Big Data and AI World London - March 2020 - Harvinder Atwal
 
Real-World Data Governance: Tools of Data Governance – Purchased and Develope...
Real-World Data Governance: Tools of Data Governance – Purchased and Develope...Real-World Data Governance: Tools of Data Governance – Purchased and Develope...
Real-World Data Governance: Tools of Data Governance – Purchased and Develope...
 
ElizabethPrattConsulting_DellPortfolio
ElizabethPrattConsulting_DellPortfolioElizabethPrattConsulting_DellPortfolio
ElizabethPrattConsulting_DellPortfolio
 
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...
Self Service Analytics and a Modern Data Architecture with Data Virtualizatio...
 
Extreme SSAS - Part I
Extreme SSAS  - Part IExtreme SSAS  - Part I
Extreme SSAS - Part I
 

More from Valery Boronin

Тренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 годуТренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 году
Valery Boronin
 
SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.
Valery Boronin
 
Практика оформления проекта и презентаций
Практика оформления проекта и презентацийПрактика оформления проекта и презентаций
Практика оформления проекта и презентаций
Valery Boronin
 
SDL/SSDL для руководителей
SDL/SSDL для руководителейSDL/SSDL для руководителей
SDL/SSDL для руководителей
Valery Boronin
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product brief
Valery Boronin
 
PT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовкаPT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовка
Valery Boronin
 
Application Inspector SSDL Edition product
Application Inspector SSDL Edition productApplication Inspector SSDL Edition product
Application Inspector SSDL Edition product
Valery Boronin
 
Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016
Valery Boronin
 
Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010
Valery Boronin
 
Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!
Valery Boronin
 

More from Valery Boronin (10)

Тренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 годуТренды кибербезопасности, угрозы и вызовы в 2018 году
Тренды кибербезопасности, угрозы и вызовы в 2018 году
 
SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.SecDevOps. Разработка, DevOps и безопасность.
SecDevOps. Разработка, DevOps и безопасность.
 
Практика оформления проекта и презентаций
Практика оформления проекта и презентацийПрактика оформления проекта и презентаций
Практика оформления проекта и презентаций
 
SDL/SSDL для руководителей
SDL/SSDL для руководителейSDL/SSDL для руководителей
SDL/SSDL для руководителей
 
PT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product briefPT Application Inspector SSDL Edition product brief
PT Application Inspector SSDL Edition product brief
 
PT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовкаPT Application Inspector SSDL Edition листовка
PT Application Inspector SSDL Edition листовка
 
Application Inspector SSDL Edition product
Application Inspector SSDL Edition productApplication Inspector SSDL Edition product
Application Inspector SSDL Edition product
 
Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016Построение процесса безопасной разработки - Стачка 2016
Построение процесса безопасной разработки - Стачка 2016
 
Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010Valery Boronin on DLP Russia 2010
Valery Boronin on DLP Russia 2010
 
Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!Data Luxury Protection - защита данных с удовольствием!
Data Luxury Protection - защита данных с удовольствием!
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Humans Are The Weakest Link – How DLP Can Help

  • 1. Click to edit Master title style Humans Are The Weakest Link – How DLP Can Help Valery Boronin, Director DLP Research Vera Trubacheva, System Analyst DLP Research, R&D, Kaspersky Lab February 3, 2012 Cancun, Mexico, Ritz-Carlton Hotel
  • 2. Click to edit Master title style Agenda 1. DLP to date 2. Key challenge 3. User awareness 1. What is it? 2. Why is it required? 3. How to raise it? 4. How DLP could help? 4. Q&A
  • 3. DLP to date Master title style Click to edit Customers want: Customers receive: 1. Easy 1. Complicated 2. Convenient 2. Inconvenient 3. Reliable 3. Unreliable 4. Cheap 4. Expensive Gartner research estimates that more than 800 technology vendors and other providers currently have data security offerings. Numerous nontechnical controls are also available. The difficulty of understanding all these options, their benefits and their challenges tends to lead to enterprises using limited subsets of the available tools and having serious gaps in controls and risk mitigation Typical Elements of an Enterprise Data Security Program, Gartner, Aug 2009 Page 3 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 4. Key Challenge is the Complexity Click to edit Master title style Technologies Data Expertise & Tools Luxury People Protection Processes Page 4 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 5. Accusation against title style Click to edit Master DLP 1.0 No user awareness in DLP 1.0 Claim 1: Raising user awareness. Claim 2: Control of education efficiency. Mock trial Page 5 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 6. What to userMaster title style Click is edit awareness? User awareness is making users aware of information security policies, threats, mitigating controls Security education Childhood Work Page 6 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 7. Why is user awareness required? Click to edit Master title style 1. It is required by law See Appendix 1 Page 7 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 8. Why is user awareness required? Click to edit Master title style 2. To protect the weakest link in security – the human Page 8 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 9. Why is user awareness required? Evidence 1 Click to edit Master title style Guess what this is: • 12345 • qwerty • 11111 • abc123 • admin Page 9 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 10. Why is user awareness required? Evidence 2 Click to edit Master title style Page 10 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 11. Why is user awareness required? Evidence 3 Click to edit Master title style Security incidents The weakest link in security is human! 100% Target of all 90% successful APT attacks is a user Exploits need a 75% (Mandiant) user interaction (Symantec) Human factor 60% Accidental mistakes (InfoWatch) Page 11 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 12. Why is user awareness required? Click to edit Master title style 3. To reduce huge costs! $7,2 billion per data breach in 2010 $56,165 for a lost notebook in 2010 You could buy a yacht like this for one data breach Page 12 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 13. How to raiseMaster title style Click to edit user awareness? Recognize the problem Page 13 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 14. How to raiseMaster title style Click to edit user awareness? Get top management support Page 14 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 15. How to raiseMaster title style Click to edit user awareness? Know your data Page 15 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 16. How to raise user awareness? Click to edit Master title style Prepare clear, simple instructions Page 16 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 17. What to edit Master title style Click to teach? 1.Security basics 2.Corporate policy rules 3.Incident response Page 17 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 18. How to teach? Click to edit Master title style Use different ways See Appendix 2 Page 18 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 19. Key Factor 1Master title style Click to edit Explain Page 19 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 20. Key Factor 2Master title style Click to edit Measure results before and after Page 20 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 21. Key Factor 3Master title style Click to edit Explain consequences for secure and unsecure behavior Page 21 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 22. Members of the Jury: Time for Action Click to edit Master title style Poll of the Jury Page 22 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 23. Courtto edit Master title style Click Decision: Verdict DLP 1.0 must 1. Raise user awareness 2. Control education efficiency Page 23 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 24. Click to edit Master title style Humans Are The Weakest Link – How DLP Can Help Thank you! Raise User Awareness! Valery Boronin Vera Trubacheva Director DLP Research System Analyst, DLP Research Kaspersky Lab Kaspersky Lab Valery.Boronin@kaspersky.com Vera.Trubacheva@kaspersky.com +7 495 797 8700 x4200 +7 495 797 8700 x4201
  • 25. Appendix 1 Master title style Click to edit For compliance with laws and regulations: • Payment Card Industry Data Security Standard (PCI DSS) • Federal Information System Security Managers Act (FISMA) • Health Insurance Portability and Accountability Act (HIPAA) • Gramm-Leach-Bliley Act (GLBA) • Sarbanes-Oxley Act (SOX) • EU Data Protection Directive • National Institute of Standards and Technology (NIST 800-53) • International Organization for Standardization: ISO/IEC 27001 & 27002 • Control Objectives for Information and Related Technology (CoBiT 4.1) • Red Flag Identity Theft Prevention • Personal Information Protection and Electronic Documents Act (PIPEDA) • Management of Federal Information Resources (OMB Circular A-130) • Some state breach notification laws (ie Massachusetts 201 CMR 17.00) • Стандарт Банка России по обеспечению информационной безопасности организаций банковской системы Российской Федерации (СТО БР ИББС) Page 25 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 26. Appendix 2 Master title style Click to edit • Security topics • E-mail etiquette • Social Engineering • Clean Desk • Protecting Sensitive Information • Strong Password • Data owners • Internet • Identity theft • Personal use • Protecting data • Mobile security Page 26 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012
  • 27. Appendix 3 Master title style Click to edit Sources of Awareness Material: • CERT • Ponemon Institute • ISSA • The university of Arizona • NIST SP 800-50 and NIST SP 800-16 • SANS (presentations, Security Awareness Newsletters, training) • InfoSecurityLab (posters, Wallpapers & Screensavers, Newsletters) Page 27 SAS 2012, DLP Research, Kaspersky Lab February, 3d, 2012

Editor's Notes

  1. Valery brings funny toy to the scene & makes it sitting.Hello everyone.I am veryglad to openConference Day Two. My name is Valery Boronin and, together <pointing gesture to Vera> with Vera Trubacheva, werepresent DLP Research department at Kaspersky Lab.Antimalware technologiesare primarily focused on external threats and have achieved truly outstanding results to date, in many respects this success is due to years of effort by many of you. DLP focuses mainly on internal threatsandthe technology for this is not yet very mature But what is common for both is that a weakest link is always the same.Today, together with you, we will talk about the weakest link in security –the human.We will talkhow DLP can help the Human.
  2. Let’s briefly overview an agenda.We spend a few minutes to figure out Customers’ expectationsin regard to DLP 1.0<pointing gesture to DLP 1.0 toy>, represented by this funny toy as a personification of DLP technologies to date.Then, I’ll describe Key Challenge for DLP vendors, relate it to the topic and deliver it together with Vera. <pointing gesture to Vera> Let’s go!
  3. Valery :Dear friends, our performance is finished. Hope you enjoyed it. Thank you very much for your attention!