SlideShare a Scribd company logo
Protecting Clients’ Assets and Brand Reputation

Data exfiltration
Just when we thought we had it
addressed
Protecting Clients’ Assets and Brand Reputation

My Top 5 Worries
•
•
•
•
•

Social Media
Ineffective Patching
Portable Media
Internet Printing Protocol
Email
Protecting Clients’ Assets and Brand Reputation

Tackling Data Security:
Data Management & Control
Data Management & Control

Protecting Clients’ Assets and Brand Reputation

Key Questions
• Where is our data?
• Who is using our data internally?
• Who have they shared our data with externally?
• How is our data being stored?
• Is our data being protected?
• Is our data SAFE?
• What is it we WANT to achieve?
But all I need is DLP right?

Protecting Clients’ Assets and Brand Reputation

DLP is an essential part of any Data Management and Control
program, but there are things it cant do:

• Protect your data when its not on your premises
• Stop 3rd parties forwarding it on
• Prevent the human factor
• Secure the physical
• Stop theft!
Protecting Clients’ Assets and Brand Reputation

Mapping Data Management
Where is your Data?

Protecting Clients’ Assets and Brand Reputation

Think about it, it may not be obvious. We can all guess our file
stores and our systems but;
• Your suppliers?
• Your bins?
• On twitter?
• Your employees websites?
• On your premises?
• In the cloud?
• Behind the fridge?
• Is it safe?
• Cornell Universities Spider
How do you use your data?

Protecting Clients’ Assets and Brand Reputation

We know we use our data to carry out business, but how is it
actually used?
• What do finance do with all those numbers?
• Why do marketing have all those mp3 files?
• How are development maintaining their source code?
• Has payroll embedded data in hidden spreadsheet fields?
• 3rd party processing?
• Is it safe?
We understand our data – lets protect it

Protecting Clients’ Assets and Brand Reputation

Protecting your data can prove harder than you think. 80% of the
challenge is to fix the human element

• User Training, User Training & User Training
• Policy Process & Procedure
• Fostering culture change
• Remember, Accidents Happen!
We understand our data – lets protect it

Protecting Clients’ Assets and Brand Reputation

The technology is easy, isn't it? Remember: if you can think of a
way around your technical controls, your staff will think of 5.

• Encrypt your laptops & devices
• Use strong endpoint technologies
• Have good identity management
• Enforce Data Classification
• Audit the change logs
• Train those above you
• Now train those below you
Take the Holistic View

Protecting Clients’ Assets and Brand Reputation

There is no one product that fits all scenarios, you need to find
what fits in your business.

• Protect at creation – Awareness Training? DLP?
• Protect during transmission – Awareness Training? Encryption?
• Protect in processing – Awareness Training? IRM?
• Protect the physical – Awareness Training?
• Protect at rest – Awareness Training? DLP?
Protecting Clients’ Assets and Brand Reputation

Tackling Data Security - Links:
• Our Website
• Information Security
• Our Skills, Your Team
• Penetration Testing

More Related Content

Viewers also liked

DG Gaudi
DG GaudiDG Gaudi
Búsqueda en vector
Búsqueda en vectorBúsqueda en vector
Búsqueda en vector
Magda Fernandez
 
Múltiples autorrepresentaciones
Múltiples autorrepresentacionesMúltiples autorrepresentaciones
Múltiples autorrepresentaciones
Anabel Ventura Palomino
 
Common sense in security
Common sense in securityCommon sense in security
Common sense in security
Peter Bassill
 
Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016
sistemasvenecia
 
Estrategias
EstrategiasEstrategias
Estrategias
Gerardo Carreón
 
Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1
gpyaniry
 
3. presentacion
3. presentacion3. presentacion
3. presentacion
Jose Mina Lugo
 
Estrategias de guerras
Estrategias de guerrasEstrategias de guerras
Estrategias de guerras
ariadnasabrinaruizf
 
Null bachav
Null bachavNull bachav
TransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A PrimerTransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A Primer
LexSage PC
 
Null meet Code Review
Null meet Code ReviewNull meet Code Review
Null meet Code Review
Naga Venkata Sunil Alamuri
 
Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015
Eslam Maksoud
 
2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE
David D'hooge
 
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
Cuadro comparativo  de las Reglas Generales de Comercio Exterior.Cuadro comparativo  de las Reglas Generales de Comercio Exterior.
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
Paola Salais
 
Proporcionalidad
ProporcionalidadProporcionalidad
Proporcionalidad
jcremiro
 
El sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino UnidoEl sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino Unido
Josep Vidal-Alaball
 
Agnosias
Agnosias Agnosias
Alteraciones en la asociacion visual
Alteraciones en la  asociacion visual Alteraciones en la  asociacion visual
Alteraciones en la asociacion visual
Mauricio Giraldo Hoyos
 
Funciones de variable real: definiciones
Funciones de variable real: definicionesFunciones de variable real: definiciones
Funciones de variable real: definiciones
jcremiro
 

Viewers also liked (20)

DG Gaudi
DG GaudiDG Gaudi
DG Gaudi
 
Búsqueda en vector
Búsqueda en vectorBúsqueda en vector
Búsqueda en vector
 
Múltiples autorrepresentaciones
Múltiples autorrepresentacionesMúltiples autorrepresentaciones
Múltiples autorrepresentaciones
 
Common sense in security
Common sense in securityCommon sense in security
Common sense in security
 
Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016
 
Estrategias
EstrategiasEstrategias
Estrategias
 
Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1
 
3. presentacion
3. presentacion3. presentacion
3. presentacion
 
Estrategias de guerras
Estrategias de guerrasEstrategias de guerras
Estrategias de guerras
 
Null bachav
Null bachavNull bachav
Null bachav
 
TransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A PrimerTransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A Primer
 
Null meet Code Review
Null meet Code ReviewNull meet Code Review
Null meet Code Review
 
Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015
 
2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE
 
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
Cuadro comparativo  de las Reglas Generales de Comercio Exterior.Cuadro comparativo  de las Reglas Generales de Comercio Exterior.
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
 
Proporcionalidad
ProporcionalidadProporcionalidad
Proporcionalidad
 
El sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino UnidoEl sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino Unido
 
Agnosias
Agnosias Agnosias
Agnosias
 
Alteraciones en la asociacion visual
Alteraciones en la  asociacion visual Alteraciones en la  asociacion visual
Alteraciones en la asociacion visual
 
Funciones de variable real: definiciones
Funciones de variable real: definicionesFunciones de variable real: definiciones
Funciones de variable real: definiciones
 

Similar to Tackling data security

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
Brenton Johnson
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
Evan Francen
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
fenichawla
 
External-WB Foundational Security 1.4.pptx
External-WB Foundational Security 1.4.pptxExternal-WB Foundational Security 1.4.pptx
External-WB Foundational Security 1.4.pptx
SattarKiani
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
DavidNicholls52
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagye
Lenin Aboagye
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
Security Innovation
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance World
Evan Francen
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
Marc Gallardo
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
Edge Pereira
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Edge Pereira
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
TargetX
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
UL Transaction Security
 
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
zoheirop
 
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Jasper Oosterveld
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
Rochester Software Associates
 
Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17
Cloudera, Inc.
 

Similar to Tackling data security (20)

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
External-WB Foundational Security 1.4.pptx
External-WB Foundational Security 1.4.pptxExternal-WB Foundational Security 1.4.pptx
External-WB Foundational Security 1.4.pptx
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagye
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance World
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
 
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Tackling data security

  • 1. Protecting Clients’ Assets and Brand Reputation Data exfiltration Just when we thought we had it addressed
  • 2. Protecting Clients’ Assets and Brand Reputation My Top 5 Worries • • • • • Social Media Ineffective Patching Portable Media Internet Printing Protocol Email
  • 3. Protecting Clients’ Assets and Brand Reputation Tackling Data Security: Data Management & Control
  • 4. Data Management & Control Protecting Clients’ Assets and Brand Reputation Key Questions • Where is our data? • Who is using our data internally? • Who have they shared our data with externally? • How is our data being stored? • Is our data being protected? • Is our data SAFE? • What is it we WANT to achieve?
  • 5. But all I need is DLP right? Protecting Clients’ Assets and Brand Reputation DLP is an essential part of any Data Management and Control program, but there are things it cant do: • Protect your data when its not on your premises • Stop 3rd parties forwarding it on • Prevent the human factor • Secure the physical • Stop theft!
  • 6. Protecting Clients’ Assets and Brand Reputation Mapping Data Management
  • 7. Where is your Data? Protecting Clients’ Assets and Brand Reputation Think about it, it may not be obvious. We can all guess our file stores and our systems but; • Your suppliers? • Your bins? • On twitter? • Your employees websites? • On your premises? • In the cloud? • Behind the fridge? • Is it safe? • Cornell Universities Spider
  • 8. How do you use your data? Protecting Clients’ Assets and Brand Reputation We know we use our data to carry out business, but how is it actually used? • What do finance do with all those numbers? • Why do marketing have all those mp3 files? • How are development maintaining their source code? • Has payroll embedded data in hidden spreadsheet fields? • 3rd party processing? • Is it safe?
  • 9. We understand our data – lets protect it Protecting Clients’ Assets and Brand Reputation Protecting your data can prove harder than you think. 80% of the challenge is to fix the human element • User Training, User Training & User Training • Policy Process & Procedure • Fostering culture change • Remember, Accidents Happen!
  • 10. We understand our data – lets protect it Protecting Clients’ Assets and Brand Reputation The technology is easy, isn't it? Remember: if you can think of a way around your technical controls, your staff will think of 5. • Encrypt your laptops & devices • Use strong endpoint technologies • Have good identity management • Enforce Data Classification • Audit the change logs • Train those above you • Now train those below you
  • 11. Take the Holistic View Protecting Clients’ Assets and Brand Reputation There is no one product that fits all scenarios, you need to find what fits in your business. • Protect at creation – Awareness Training? DLP? • Protect during transmission – Awareness Training? Encryption? • Protect in processing – Awareness Training? IRM? • Protect the physical – Awareness Training? • Protect at rest – Awareness Training? DLP?
  • 12. Protecting Clients’ Assets and Brand Reputation Tackling Data Security - Links: • Our Website • Information Security • Our Skills, Your Team • Penetration Testing