SlideShare a Scribd company logo
The path to most
GRC requirements
Rui Melo Biscaia
Watchful Software
Some “house rules” on thisWebinar
7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2
1
You are muted centrally.
You don’t need to mute/unmute yourself
2
This webinar is being recorded.
You’ll have access to it on-demand
watchfulsoftware.com
3
The Q&A session will be at the end.
You are welcomed to enter questions anytime, using the
Questions feature in the GoToWebinar control panel
Speaker
Rui Melo Biscaia
Director of Product Management & Strategic Accounts
Watchful Software
“Rules ofThumb”
7/20/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3
Leaks
1 It’s not a matter of ‘if’, but ‘when’
2 It’s not really about databases anymore
3 Hackers aren’t the greatest threat
4 This doesn’t have to keep happening
The path to most GRC requirements
7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4
Data classification is the foundation of any successful information GRC initiative as it:
1 Limits Corporate Liability
2 Slashes risk of adverse reaction to the business from data leakage
3 Increases the competency of users
1 Policy-Driven Data Classification & Labelling
2 Role-Based Access Control Policies
3 DynamicWatermarking andTagging
4 Unstructured DataVisibility & Monitoring
5 Complementing the Enterprise Security “Puzzle”
RightsWATCH in a nutshell
7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5
RightsWATCH GRC usage scenario
Paul is an Information
Security officer (ISO)
that extracts a
costumer BD
Data is exported to an
Excel Spreadsheet
(PAN & PII incl.)
Paul attaches the Excel Spreadsheet
onto the new e-mail message
As soon as the Excel Spreadsheet is attached
to the e-mail, RightsWATCH automatically
classifies and protects the file, without asking
Paul for any decision or action on his part
Paul mistypes the recipient e-mail address
and clicks the “Send” button
The email is prevented
from being sent, because
RightsWATCH recognizes
that the e-mail address that
Paul typed is wrong
RightsWATCH informs Paul of
the fact and allows him to
correct the mistype so that
the e-mail can be sent to the
Risk & Compliance manager
Risk & Compliance manager
receives the e-mail
RightsWATCH prevents the Risk & Compliance
manager from saving the file onto Dropbox and/or
from forwarding it to his personal Gmail account,
by blocking him from doing so. He gets a
notification on the reason why he is being
prevented from doing it.
The path to most GRC requirements
7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7
RightsWATCH helps meeting PCI-DSS as it:
• Avoid Liability Risk due to Data Loss or Theft
• Protect information exchanged with external
partners
• Protect information during transfer, storage and
usage
RightsWATCH helps meeting HIPPA as it:
• Allows PHI to be automatically classified and
protected
• Provides a powerful policy engine that identifies
PHI and takes actions to classify, apply
protective markings and labels and decrease
liability
• Applies DRM to control access and usage over
files that contain PHI
• Delivers a comprehensive audit trail
RightsWATCH helps meeting ISO 27001 as it:
• Prevents inadvertent data loss, even when
completely outside your network
• Educates users on data sensitivity, while
ensuring adherence to security policies
• Implements a Multilevel Security Model that
extends the Information Security management
System
• Ensures compliance with the requirements
around the handling of sensitive data
• Allows users to identify key data & make
decisions about how it is stored, transmitted and
used
• Classifies and protects information which
requires special handling
The path to most GRC requirements
7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8
RightsWATCH helps meeting the GSC schema as it:
• Can be supplied with a 'pre-made' security
classification schema to ensure compliance that
includes the security classifications and
descriptors
• Allows for easily adding extra descriptors,
customized tool-tip texts for each classification,
or custom-configured text labels for each
security classification
• Allows the “vanilla” classification schema to
easily be modified to meet the specific needs of
HMG Departments, Agencies, Local Authorities
and Police Forces
RightsWATCH helps meeting GDPR as it:
 Delivers a comprehensive audit trail allowing the
documentation and trace of any authorized and
unauthorized access to confidential data
 Labels and marks sensitive data to help identify
information requiring special handling, allowing
for easily adding extra descriptors, customized
tooltip texts for each classification, or custom-
configured text labels for each security
classification
 Alerts users when sensitive data is leaving the
organization to warn or prevent them from
sending data outside of the organization
 Provids a content, context and metadata aware
policy engine that identifies PII, takes action to
classify the file according to policy, applies
protective markings and labels to identify the
information and decrease corporate liability
RightsWATCH helps meeting PoPI as it:
• Allows for personal information to be
automatically classified and protected,
whenever it is received, handled, or shared
• Warns and blocks from sending an email or
saving a file, if the action being undertaken goes
against corporate policies or PoPI mandates
• Brings a content, context and metadata aware
policy engine that identifies personal
information, to take action to classify the file
according to policy, to apply protective markings
and labels to identify the information and to
decrease corporate liability
• Provides a comprehensive audit trail
POPI
Complementing the Enterprise Security “Puzzle”
7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
Q&A
7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10
1
You are welcomed to enter questions, using the
questions feature in the GoToWebinar control panel
2
Check out the “Resources” area on
www.watchfulsoftware.com and watch, short,
product walkthrough demonstrations of how
RightsWATCH address a comprehensive set of use
cases
3
E-mail info@watchfulsoftware.com to request a
demo of RightsWATCH
4
This webinar was recorded.You’ll have access to it on-
demand at www.watchfulsoftware.com
The path to most
GRC requirements
Rui Melo Biscaia
Watchful Software

More Related Content

What's hot

Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
CipherCloud
 
Data Loss Prevention with WatchGuard XCS Solutions
Data Loss Prevention with WatchGuard XCS SolutionsData Loss Prevention with WatchGuard XCS Solutions
Data Loss Prevention with WatchGuard XCS Solutions
Jone Smith
 
How classification augments data loss prevention
How classification augments data loss preventionHow classification augments data loss prevention
How classification augments data loss prevention
Watchful Software
 
Zero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is deadZero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is dead
Jochen Kressin
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
Seclore
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
Seclore
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel Program
Seclore
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
FREVVO
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
Seclore
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
Seclore
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Mark Silverberg
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
Seclore
 
WeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance framework
WeSecure
 
Cloud Data Security
Cloud Data Security Cloud Data Security
Cloud Data Security
Seclore
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
Quick Heal Technologies Ltd.
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
Texas Medical Liability Trust
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
SPS Paris
 
Data Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustryData Security For Pharmaceutical Industry
Data Security For Pharmaceutical Industry
Seclore
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
David J Rosenthal
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud Security
Peak 10
 

What's hot (20)

Understanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: WebinarUnderstanding Global Data Protection Laws: Webinar
Understanding Global Data Protection Laws: Webinar
 
Data Loss Prevention with WatchGuard XCS Solutions
Data Loss Prevention with WatchGuard XCS SolutionsData Loss Prevention with WatchGuard XCS Solutions
Data Loss Prevention with WatchGuard XCS Solutions
 
How classification augments data loss prevention
How classification augments data loss preventionHow classification augments data loss prevention
How classification augments data loss prevention
 
Zero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is deadZero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is dead
 
IRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
 
Insider Threat Protection | Seclore
Insider Threat Protection | SecloreInsider Threat Protection | Seclore
Insider Threat Protection | Seclore
 
Seclore Advantage Channel Program
Seclore Advantage Channel ProgramSeclore Advantage Channel Program
Seclore Advantage Channel Program
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
 
Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions Mcafee CASB/DLP + Seclore Rights Management Solutions
Mcafee CASB/DLP + Seclore Rights Management Solutions
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
 
Customer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | SecloreCustomer Data Privacy & Protection | Seclore
Customer Data Privacy & Protection | Seclore
 
WeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure Data Security Congres: How to build a data governance framework
WeSecure Data Security Congres: How to build a data governance framework
 
Cloud Data Security
Cloud Data Security Cloud Data Security
Cloud Data Security
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Data Security For Pharmaceutical Industry
Data Security For Pharmaceutical IndustryData Security For Pharmaceutical Industry
Data Security For Pharmaceutical Industry
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud Security
 

Viewers also liked

You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricks
Watchful Software
 
Make a case for Data Classification in your organization
Make a case for Data Classification in your organizationMake a case for Data Classification in your organization
Make a case for Data Classification in your organization
Watchful Software
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classification
Watchful Software
 
Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
Watchful Software
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCH
Watchful Software
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
Watchful Software
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
Watchful Software
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast Presentation
Watchful Software
 
Behavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingBehavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprinting
Watchful Software
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
Watchful Software
 

Viewers also liked (10)

You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricks
 
Make a case for Data Classification in your organization
Make a case for Data Classification in your organizationMake a case for Data Classification in your organization
Make a case for Data Classification in your organization
 
Strategies for policy driven information classification
Strategies for policy driven information classificationStrategies for policy driven information classification
Strategies for policy driven information classification
 
Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCH
 
The X Factor in Data Centric Security
The X Factor in Data Centric SecurityThe X Factor in Data Centric Security
The X Factor in Data Centric Security
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast Presentation
 
Behavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingBehavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprinting
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 

Similar to The path to most GRC requirements

Compliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsCompliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulations
SherWeb
 
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
Sébastien Paulet
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
Ernest Staats
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
backdoor
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
LindaWatson19
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysis
CARMEN ALCIVAR
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
Ernest Staats
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
DataExpress
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
DataExpress
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
ALI ANWAR, OCP®
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Innovators
 
Digitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalstakeout Scout Overview
Digitalstakeout Scout Overview
DigitalStakeout
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
Amazon Web Services
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
Nicholas Davis
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
Marco Essomba
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
Octogence
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
TechSoup
 

Similar to The path to most GRC requirements (20)

Compliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsCompliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulations
 
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
aMS Aachen -Personal and confidential data - how to manage them in M365 2022-...
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysis
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Expanded ten reasons to deploy data express final
Expanded ten reasons to deploy data express   finalExpanded ten reasons to deploy data express   final
Expanded ten reasons to deploy data express final
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 
Digitalstakeout Scout Overview
Digitalstakeout Scout OverviewDigitalstakeout Scout Overview
Digitalstakeout Scout Overview
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 

Recently uploaded

Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Undress Baby
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 

Recently uploaded (20)

Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdfRevolutionizing Visual Effects Mastering AI Face Swaps.pdf
Revolutionizing Visual Effects Mastering AI Face Swaps.pdf
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 

The path to most GRC requirements

  • 1. The path to most GRC requirements Rui Melo Biscaia Watchful Software
  • 2. Some “house rules” on thisWebinar 7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2 1 You are muted centrally. You don’t need to mute/unmute yourself 2 This webinar is being recorded. You’ll have access to it on-demand watchfulsoftware.com 3 The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel Speaker Rui Melo Biscaia Director of Product Management & Strategic Accounts Watchful Software
  • 3. “Rules ofThumb” 7/20/2016 © Copyright www.watchfulsoftware.com. 2015 All Rights Reserved. 3 Leaks 1 It’s not a matter of ‘if’, but ‘when’ 2 It’s not really about databases anymore 3 Hackers aren’t the greatest threat 4 This doesn’t have to keep happening
  • 4. The path to most GRC requirements 7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4 Data classification is the foundation of any successful information GRC initiative as it: 1 Limits Corporate Liability 2 Slashes risk of adverse reaction to the business from data leakage 3 Increases the competency of users
  • 5. 1 Policy-Driven Data Classification & Labelling 2 Role-Based Access Control Policies 3 DynamicWatermarking andTagging 4 Unstructured DataVisibility & Monitoring 5 Complementing the Enterprise Security “Puzzle” RightsWATCH in a nutshell 7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5
  • 6. RightsWATCH GRC usage scenario Paul is an Information Security officer (ISO) that extracts a costumer BD Data is exported to an Excel Spreadsheet (PAN & PII incl.) Paul attaches the Excel Spreadsheet onto the new e-mail message As soon as the Excel Spreadsheet is attached to the e-mail, RightsWATCH automatically classifies and protects the file, without asking Paul for any decision or action on his part Paul mistypes the recipient e-mail address and clicks the “Send” button The email is prevented from being sent, because RightsWATCH recognizes that the e-mail address that Paul typed is wrong RightsWATCH informs Paul of the fact and allows him to correct the mistype so that the e-mail can be sent to the Risk & Compliance manager Risk & Compliance manager receives the e-mail RightsWATCH prevents the Risk & Compliance manager from saving the file onto Dropbox and/or from forwarding it to his personal Gmail account, by blocking him from doing so. He gets a notification on the reason why he is being prevented from doing it.
  • 7. The path to most GRC requirements 7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7 RightsWATCH helps meeting PCI-DSS as it: • Avoid Liability Risk due to Data Loss or Theft • Protect information exchanged with external partners • Protect information during transfer, storage and usage RightsWATCH helps meeting HIPPA as it: • Allows PHI to be automatically classified and protected • Provides a powerful policy engine that identifies PHI and takes actions to classify, apply protective markings and labels and decrease liability • Applies DRM to control access and usage over files that contain PHI • Delivers a comprehensive audit trail RightsWATCH helps meeting ISO 27001 as it: • Prevents inadvertent data loss, even when completely outside your network • Educates users on data sensitivity, while ensuring adherence to security policies • Implements a Multilevel Security Model that extends the Information Security management System • Ensures compliance with the requirements around the handling of sensitive data • Allows users to identify key data & make decisions about how it is stored, transmitted and used • Classifies and protects information which requires special handling
  • 8. The path to most GRC requirements 7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8 RightsWATCH helps meeting the GSC schema as it: • Can be supplied with a 'pre-made' security classification schema to ensure compliance that includes the security classifications and descriptors • Allows for easily adding extra descriptors, customized tool-tip texts for each classification, or custom-configured text labels for each security classification • Allows the “vanilla” classification schema to easily be modified to meet the specific needs of HMG Departments, Agencies, Local Authorities and Police Forces RightsWATCH helps meeting GDPR as it:  Delivers a comprehensive audit trail allowing the documentation and trace of any authorized and unauthorized access to confidential data  Labels and marks sensitive data to help identify information requiring special handling, allowing for easily adding extra descriptors, customized tooltip texts for each classification, or custom- configured text labels for each security classification  Alerts users when sensitive data is leaving the organization to warn or prevent them from sending data outside of the organization  Provids a content, context and metadata aware policy engine that identifies PII, takes action to classify the file according to policy, applies protective markings and labels to identify the information and decrease corporate liability RightsWATCH helps meeting PoPI as it: • Allows for personal information to be automatically classified and protected, whenever it is received, handled, or shared • Warns and blocks from sending an email or saving a file, if the action being undertaken goes against corporate policies or PoPI mandates • Brings a content, context and metadata aware policy engine that identifies personal information, to take action to classify the file according to policy, to apply protective markings and labels to identify the information and to decrease corporate liability • Provides a comprehensive audit trail POPI
  • 9. Complementing the Enterprise Security “Puzzle” 7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
  • 10. Q&A 7/20/2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10 1 You are welcomed to enter questions, using the questions feature in the GoToWebinar control panel 2 Check out the “Resources” area on www.watchfulsoftware.com and watch, short, product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases 3 E-mail info@watchfulsoftware.com to request a demo of RightsWATCH 4 This webinar was recorded.You’ll have access to it on- demand at www.watchfulsoftware.com
  • 11. The path to most GRC requirements Rui Melo Biscaia Watchful Software

Editor's Notes

  1. Remind them of the key things that we’ve all learned from the Snowden affair: If it happened to the NSA – arguably the most secure organization on the planet – it’s going to happen to you The real valuable information is the ‘distilled information’ that’s already been thought about, processed, and refined – things like executive reports, studies, intellectual property, sales forecasts, project proposals, etc. This stuff is at greatest risk by the people that touch it every day, and can either a) make an honest mistake, b) do something stupid, or c) take a malicious action The only thing that allows this to keep happening is OLD THINKING; the audience needs to use NEW TECHNOLOGY to break away from their OLD APPROACH
  2. Organizations deal with increasing Governance, Risk and Compliance (GRC) requirements. At the heart of these GRC mandates lies the need to identify, classify and label sensitive information. RightsWATCH can classify data in accordance with your information classification mandate RightsWATCH dynamically classifies all type of information (email, documents, reports, worksheets, etc.) in accord with your organization’s predefined policies and standards. Once classified, that information can receive any markings, disclaimers, etc. that are required by statutory, regulatory, or contractual obligations. This can be done without the common user even needing to know what the policies are, much less remembering to implement them. The result is that the organization remains compliant, avoids breach and limits liability. RightsWATCH remembers, implements, and supports your company’s security requirements…even if all of the users don’t.
  3. Watchful Software RightsWATCH digitizes your corporate classification and labeling policies to automate the process. If your policy allows, we can allow your users to override the automatic classification. RightsWATCH streamlines and simplifies the user experience. There is no impact on the end user. Unlike our competitors, there is no user input required, no time-consuming pop-up questions to answer and no judgement calls. RightsWATCH shows the user why an asset is being classified or labeled allowing him to modify the data before finalizing it. RightsWATCH automation of your policies makes your existing security infrastructure work better and faster improving compliance throughout your organization. RightsWATCH is used by a wide variety of leading companies globally. You should be using RightsWatch too.
  4. Paul Brown, the Information Security Officer (ISO) of a financial institution in Johannesburg, is requested to make the bank’s costumer database available to John Smith, who is the headquarters’ Risk & Compliance manager. He exports the data to an Excel Spreadsheet. As the exported file comes out of the database, Paul saves it onto his desktop. The file includes PAN (Primary Account Numbers) and other PII (Personally Identifiable Information). Paul then clicks on the “New e-mail” button on MS Outlook. Next, Paul browses his desktop to attach that very same Excel Spreadsheet onto the new e-mail message. As soon as the Excel Spreadsheet is attached to the e-mail, RightsWATCH automatically classifies and RMS protects the file, without asking Paul for any decision or action on his part. RightsWATCH automatically classifies and protects this sensitive Excel Spreadsheet, according to the policy rules set up by Paul’s company. Paul then types in John’s e-mail address, but he mistypes the e-mail address and clicks on the “Send” button. Without RightsWATCH, nothing happens and the e-mail will be sent to the wrong recipient. With RightsWATCH, the email is prevented from being sent, because RightsWATCH recognises that the e-mail address that Paul typed is wrong and the recipient is not the allowed and intended recipient of the e-mail. At the same, RightsWATCH informs Paul of the fact and allows him to correct the mistype so that the e-mail can be sent to John. John receives the e-mail and opens the attached Excel Spreadsheet. He then tries to save the file onto his personal Dropbox folder, so that he can work on the file at home. RightsWATCH prevents John from saving the file onto Dropbox, by blocking him from doing so. He gets a notification on the reason why he is being prevented from doing it. He then tries to forward the email he got from Paul to his personal Gmail account. RightsWATCH prevents him from doing that also. John realizes that corporate policy dictates that sensitive files are not to be saved and shared via cloud-based drives nor are e-mails, holding corporate classified information, to be forwarded to personal e-mail accounts.
  5. The PCI-DSS is a set of comprehensive requirements for enhancing payment account data security. to help organizations that process card payments prevent credit card fraud through increased controls around data. RightsWATCH ensures that PHI is only handled by the proper, intended users, and reduces potential liability: With RightsWATCH, a physician dealing with a patient can use email to transmit information from patient healthcare records to other appropriate parties without leading to trouble. In the same manner, a hospital might retrieve patient records from an archive and send them to an insurer as an encrypted, rights-managed document in compliance with HIPAA. To comply with ISO 27001, organizations must plan, establish, maintain, and improve an ISMS policy that includes objectives, processes, and procedures to manage risk and improve information security, including the use of classification and labeling.
  6. RightsWATCH is uniquely capable of providing a seamless changeover to the new GSC schema as it: Can be supplied with a 'pre-made' security classification schema to ensure compliance that includes the security classifications and descriptors Allows for easily adding extra descriptors, customized tool-tip texts for each classification, or custom-configured text labels for each security classification Allows the “vanilla” classification schema to easily be modified to meet the specific needs of HMG Departments, Agencies, Local Authorities and Police Forces