SlideShare a Scribd company logo
1 of 13
Escorts IT – DLP Project Review
Executive Summary
Escorts – Brief Background


More than 65 years old premier engineering company of
India.

 Escorts has four major divisions & Corporate Office
• Escorts Agri Machinery .
• Escorts Construction Equipment.
• Escorts Railway Product.
• Escorts Automotive Product.
 Major products
• Tractors , Implements, Gensets,
• Crains, Compactors, Backhoe loaders,
• Shockers, Brakes, Auto Components ,
• Components for Railways like couplers, shockersss
etc.
 Combined turnover of around Rs.5000 crores.
Data Loss Prevention
Three Key Organization Challenges



Where is my confidential data stored?
• Data at Rest

 Where is my confidential data going?
• Data in Motion

 How do I fix my data loss problems?
• Data Policy Enforcement
DLP- Key Expectations
 To address the challenges of securing data in use, data in
motion and data at rest.
 To protect proprietary and sensitive information against
security threats caused by enhanced employee mobility and
new communication channels.
 To proactively prevent the misuse of data at endpoints
(Laptops/Desktops) for unauthorized circulation, both on and
off the Escorts network.
 E-Mail access control from devices (without DLP Endpoint)
outside of the Escorts Network.
 Protect data at Email gateway in the cloud.
Data Loss Prevention - a Priority
 Compliance
 Secured working environment
 IPR & Critical information protection
 Brand and Reputation Protection
 Remediation Cost
Evaluation Process
Salient Features
 Involved industry leading DLP vendors
 15 days of POC at our site for each solution

 Evaluation of DLP against defined requirements
 Integration feasibility with IRM

 Successful Case studies
 Strong Product Roadmap
 Cost
DLP- SCOPE
 Propose to cover the entire user base across all
divisions of Escorts including
 All end points desktops & laptops
 Servers
 Gateways
 Email solution on the cloud

 Integration with Active Directory
Key Implementation Highlights
 Presented the project objectives to GMC (Group
Management
Committee)
consisting
of
CEO’s, CFO’s, Material Heads, R&D heads of all divisions
and chaired by Managing Director.
 Phased the implementation track wise , across
divisions, covering the most critical departments like R&D
and Materials first.
 Created core user groups, across divisions, for each
vertical such that all interrelated core users were part of
one track. Eg Procurement and R&D core users were part
of one track.
 Established a project governance structure to monitor the
project progress.
Key Implementation Highlights
 Extensive trainings to core users to equip them to
rightly classify the data getting generated in their
respective departments.
 Training to end users on the project objectives, data
classification and its impact on their working.
 Managing the fears, assumptions of users.
 Involved the internal auditors in the project from the
very beginning.
Data Classification
 Data Classification is the heart of the DLP project.


What is Data Classification ?
• It is a scheme by which the organization assigns a level of
sensitivity and an owner to each piece of information that it
generates
,
owns
and
maintains
e.g.
–
Confidential, Internal, Public

 Not all information requires same protection

 Classification helps in establishing the value of information
 Also helps in determining the level of protection required and
in selection of appropriate controls
Data Classification
 Information Owner:
• Individual that has responsibility for making classification
and access control decisions for information

 Information Custodian:
• Individual, organizational unit, or entity acting as caretaker
of information on behalf of its owner

 Information Security Officer (ISO):
• A designated officer responsible for information security
management
Key Learning
 Never try to implement DLP as a IT project. It will fail
miserably. Let Business spearhead the project and do most of
the talking.
 Availability of dedicated core team.
 Involve all stakeholders from end users to senior leadership
at every stage of the project.
 Handle change management issues of people and processes
very intelligently involving stakeholders and dispel all wrong
notions and fears of business community.
 Set the right expectations among business teams.
Top learnings from evaluating and implementing a DLP Solution

More Related Content

What's hot

Matrix Vision Deck
Matrix Vision DeckMatrix Vision Deck
Matrix Vision DeckAbu Turay
 
Bab 6 (understanding it infrastructure)
Bab 6 (understanding  it infrastructure)Bab 6 (understanding  it infrastructure)
Bab 6 (understanding it infrastructure)Siti Mustiani
 
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherIvanti
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeBrenda Majewski
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)Danny Miller
 
AlterTech Company Profile
AlterTech Company ProfileAlterTech Company Profile
AlterTech Company ProfileFaisal Ahmed
 
Benefits of insourcing it services
Benefits of insourcing it servicesBenefits of insourcing it services
Benefits of insourcing it servicesmasonlord
 
On demand cloud
On demand cloudOn demand cloud
On demand cloudNinefold
 
Infrastructure management
Infrastructure managementInfrastructure management
Infrastructure managementIT-BY-DESIGN
 
V3 Service Operation - ITSM Academy Webinar
V3 Service Operation - ITSM Academy WebinarV3 Service Operation - ITSM Academy Webinar
V3 Service Operation - ITSM Academy WebinarITSM Academy, Inc.
 
Leveraging Hospital Network Analytics
Leveraging Hospital Network AnalyticsLeveraging Hospital Network Analytics
Leveraging Hospital Network AnalyticsExtreme Networks
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsIvanti
 
THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...
THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...
THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...nwilson76
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxTimothy Krupinski
 
Intel it
Intel itIntel it
Intel itSkynat
 
Bus2.0 - IT architecture
Bus2.0 - IT architectureBus2.0 - IT architecture
Bus2.0 - IT architectureUNSW Canberra
 
How to Better Manage Your IT Infrastructure
How to Better Manage Your IT InfrastructureHow to Better Manage Your IT Infrastructure
How to Better Manage Your IT InfrastructureEdarat Group
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownIvanti
 

What's hot (20)

Matrix Vision Deck
Matrix Vision DeckMatrix Vision Deck
Matrix Vision Deck
 
Bab 6 (understanding it infrastructure)
Bab 6 (understanding  it infrastructure)Bab 6 (understanding  it infrastructure)
Bab 6 (understanding it infrastructure)
 
Panel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better TogetherPanel Discussion: Why IT Service and IT Asset Management are Better Together
Panel Discussion: Why IT Service and IT Asset Management are Better Together
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
 
Resume-Mandar
Resume-MandarResume-Mandar
Resume-Mandar
 
AlterTech Company Profile
AlterTech Company ProfileAlterTech Company Profile
AlterTech Company Profile
 
Benefits of insourcing it services
Benefits of insourcing it servicesBenefits of insourcing it services
Benefits of insourcing it services
 
ISEDMAM - star schema
ISEDMAM - star schemaISEDMAM - star schema
ISEDMAM - star schema
 
On demand cloud
On demand cloudOn demand cloud
On demand cloud
 
Infrastructure management
Infrastructure managementInfrastructure management
Infrastructure management
 
V3 Service Operation - ITSM Academy Webinar
V3 Service Operation - ITSM Academy WebinarV3 Service Operation - ITSM Academy Webinar
V3 Service Operation - ITSM Academy Webinar
 
Leveraging Hospital Network Analytics
Leveraging Hospital Network AnalyticsLeveraging Hospital Network Analytics
Leveraging Hospital Network Analytics
 
Contextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized DesktopsContextual Security and Application Control for Virtualized Desktops
Contextual Security and Application Control for Virtualized Desktops
 
THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...
THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...
THE IMPACT OF INFORMATION TECHNOLOGY BEST PRACTICES ON PROJECT SUCCESS RATES ...
 
LuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptxLuminrDRPresentation_AITP_October2014.pptx
LuminrDRPresentation_AITP_October2014.pptx
 
Intel it
Intel itIntel it
Intel it
 
Bus2.0 - IT architecture
Bus2.0 - IT architectureBus2.0 - IT architecture
Bus2.0 - IT architecture
 
How to Better Manage Your IT Infrastructure
How to Better Manage Your IT InfrastructureHow to Better Manage Your IT Infrastructure
How to Better Manage Your IT Infrastructure
 
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you DownDitch the Surplus Software and Hardware Spend that's Weighing you Down
Ditch the Surplus Software and Hardware Spend that's Weighing you Down
 

Viewers also liked

Key learnings including SWOT analysis and draft plans for the next action res...
Key learnings including SWOT analysis and draft plans for the next action res...Key learnings including SWOT analysis and draft plans for the next action res...
Key learnings including SWOT analysis and draft plans for the next action res...Sri Lmb
 
Thai rice project philippines
Thai rice project   philippinesThai rice project   philippines
Thai rice project philippinesStar Star's
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Developing Big Data Strategy
Developing Big Data StrategyDeveloping Big Data Strategy
Developing Big Data StrategyAhsan Aziz Khan
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Big Data in Retail - Examples in Action
Big Data in Retail - Examples in ActionBig Data in Retail - Examples in Action
Big Data in Retail - Examples in ActionDavid Pittman
 
Big Data Analytics in Energy & Utilities
Big Data Analytics in Energy & UtilitiesBig Data Analytics in Energy & Utilities
Big Data Analytics in Energy & UtilitiesAnders Quitzau
 

Viewers also liked (12)

Key learnings including SWOT analysis and draft plans for the next action res...
Key learnings including SWOT analysis and draft plans for the next action res...Key learnings including SWOT analysis and draft plans for the next action res...
Key learnings including SWOT analysis and draft plans for the next action res...
 
Thai rice project philippines
Thai rice project   philippinesThai rice project   philippines
Thai rice project philippines
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Developing Big Data Strategy
Developing Big Data StrategyDeveloping Big Data Strategy
Developing Big Data Strategy
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Big Data in Retail - Examples in Action
Big Data in Retail - Examples in ActionBig Data in Retail - Examples in Action
Big Data in Retail - Examples in Action
 
Big Data Analytics in Energy & Utilities
Big Data Analytics in Energy & UtilitiesBig Data Analytics in Energy & Utilities
Big Data Analytics in Energy & Utilities
 

Similar to Top learnings from evaluating and implementing a DLP Solution

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Moving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial ManufacturingMoving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial ManufacturingZero Wait-State
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behindMatt Mandich
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureGoutama Bachtiar
 
Thomas R Graham bio
Thomas R Graham bioThomas R Graham bio
Thomas R Graham bioTom Graham
 
Information resources, mis, csvtu
Information resources, mis, csvtuInformation resources, mis, csvtu
Information resources, mis, csvtuNarender Chintada
 
Info-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop PresentationInfo-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop PresentationHilary Carney Badoian
 
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Stratio
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Daljit Banger
 
Pega_Profile_Having 5 years Expirence_Updated
Pega_Profile_Having 5 years Expirence_UpdatedPega_Profile_Having 5 years Expirence_Updated
Pega_Profile_Having 5 years Expirence_UpdatedSrikrisna Chaitna
 
Saurav Resume_V1.2
Saurav Resume_V1.2Saurav Resume_V1.2
Saurav Resume_V1.2Kumar Saurav
 
Resume _571966_Hrushikesh Deshpande
Resume _571966_Hrushikesh DeshpandeResume _571966_Hrushikesh Deshpande
Resume _571966_Hrushikesh Deshpandehrushikesh deshpande
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Pega profile having 5 years expirence_updated
Pega profile having 5 years expirence_updatedPega profile having 5 years expirence_updated
Pega profile having 5 years expirence_updatedSrikrisna Chaitna
 
Pega profile having 5 years expirence_updated
Pega profile having 5 years expirence_updatedPega profile having 5 years expirence_updated
Pega profile having 5 years expirence_updatedSrikrisna Chaitna
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protectionAujas Networks Pvt. Ltd.
 
Director of it operations job description revised
Director of it operations job description revisedDirector of it operations job description revised
Director of it operations job description revisedPat Maher
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldHao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldInside Analysis
 

Similar to Top learnings from evaluating and implementing a DLP Solution (20)

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Moving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial ManufacturingMoving Up the PVC Maturity Curve in Industrial Manufacturing
Moving Up the PVC Maturity Curve in Industrial Manufacturing
 
Get ahead of the cloud or get left behind
Get ahead of the cloud or get left behindGet ahead of the cloud or get left behind
Get ahead of the cloud or get left behind
 
Valuing Information Management and IT Architecture
Valuing Information Management and IT ArchitectureValuing Information Management and IT Architecture
Valuing Information Management and IT Architecture
 
Thomas R Graham bio
Thomas R Graham bioThomas R Graham bio
Thomas R Graham bio
 
Information resources, mis, csvtu
Information resources, mis, csvtuInformation resources, mis, csvtu
Information resources, mis, csvtu
 
Info-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop PresentationInfo-Tech Research Group & Boardroom Events Value Prop Presentation
Info-Tech Research Group & Boardroom Events Value Prop Presentation
 
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
 
Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction Enterprise Architecture - An Introduction
Enterprise Architecture - An Introduction
 
Pega_Profile_Having 5 years Expirence_Updated
Pega_Profile_Having 5 years Expirence_UpdatedPega_Profile_Having 5 years Expirence_Updated
Pega_Profile_Having 5 years Expirence_Updated
 
Ahmed_Khiry_CV
Ahmed_Khiry_CVAhmed_Khiry_CV
Ahmed_Khiry_CV
 
Saurav Resume_V1.2
Saurav Resume_V1.2Saurav Resume_V1.2
Saurav Resume_V1.2
 
Resume _571966_Hrushikesh Deshpande
Resume _571966_Hrushikesh DeshpandeResume _571966_Hrushikesh Deshpande
Resume _571966_Hrushikesh Deshpande
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Pega profile having 5 years expirence_updated
Pega profile having 5 years expirence_updatedPega profile having 5 years expirence_updated
Pega profile having 5 years expirence_updated
 
Pega profile having 5 years expirence_updated
Pega profile having 5 years expirence_updatedPega profile having 5 years expirence_updated
Pega profile having 5 years expirence_updated
 
Data protection services lifecycle approach to critical information protection
Data protection services  lifecycle approach to critical information protectionData protection services  lifecycle approach to critical information protection
Data protection services lifecycle approach to critical information protection
 
Director of it operations job description revised
Director of it operations job description revisedDirector of it operations job description revised
Director of it operations job description revised
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

Top learnings from evaluating and implementing a DLP Solution

  • 1. Escorts IT – DLP Project Review Executive Summary
  • 2. Escorts – Brief Background  More than 65 years old premier engineering company of India.  Escorts has four major divisions & Corporate Office • Escorts Agri Machinery . • Escorts Construction Equipment. • Escorts Railway Product. • Escorts Automotive Product.  Major products • Tractors , Implements, Gensets, • Crains, Compactors, Backhoe loaders, • Shockers, Brakes, Auto Components , • Components for Railways like couplers, shockersss etc.  Combined turnover of around Rs.5000 crores.
  • 3. Data Loss Prevention Three Key Organization Challenges  Where is my confidential data stored? • Data at Rest  Where is my confidential data going? • Data in Motion  How do I fix my data loss problems? • Data Policy Enforcement
  • 4. DLP- Key Expectations  To address the challenges of securing data in use, data in motion and data at rest.  To protect proprietary and sensitive information against security threats caused by enhanced employee mobility and new communication channels.  To proactively prevent the misuse of data at endpoints (Laptops/Desktops) for unauthorized circulation, both on and off the Escorts network.  E-Mail access control from devices (without DLP Endpoint) outside of the Escorts Network.  Protect data at Email gateway in the cloud.
  • 5. Data Loss Prevention - a Priority  Compliance  Secured working environment  IPR & Critical information protection  Brand and Reputation Protection  Remediation Cost
  • 6. Evaluation Process Salient Features  Involved industry leading DLP vendors  15 days of POC at our site for each solution  Evaluation of DLP against defined requirements  Integration feasibility with IRM  Successful Case studies  Strong Product Roadmap  Cost
  • 7. DLP- SCOPE  Propose to cover the entire user base across all divisions of Escorts including  All end points desktops & laptops  Servers  Gateways  Email solution on the cloud  Integration with Active Directory
  • 8. Key Implementation Highlights  Presented the project objectives to GMC (Group Management Committee) consisting of CEO’s, CFO’s, Material Heads, R&D heads of all divisions and chaired by Managing Director.  Phased the implementation track wise , across divisions, covering the most critical departments like R&D and Materials first.  Created core user groups, across divisions, for each vertical such that all interrelated core users were part of one track. Eg Procurement and R&D core users were part of one track.  Established a project governance structure to monitor the project progress.
  • 9. Key Implementation Highlights  Extensive trainings to core users to equip them to rightly classify the data getting generated in their respective departments.  Training to end users on the project objectives, data classification and its impact on their working.  Managing the fears, assumptions of users.  Involved the internal auditors in the project from the very beginning.
  • 10. Data Classification  Data Classification is the heart of the DLP project.  What is Data Classification ? • It is a scheme by which the organization assigns a level of sensitivity and an owner to each piece of information that it generates , owns and maintains e.g. – Confidential, Internal, Public  Not all information requires same protection  Classification helps in establishing the value of information  Also helps in determining the level of protection required and in selection of appropriate controls
  • 11. Data Classification  Information Owner: • Individual that has responsibility for making classification and access control decisions for information  Information Custodian: • Individual, organizational unit, or entity acting as caretaker of information on behalf of its owner  Information Security Officer (ISO): • A designated officer responsible for information security management
  • 12. Key Learning  Never try to implement DLP as a IT project. It will fail miserably. Let Business spearhead the project and do most of the talking.  Availability of dedicated core team.  Involve all stakeholders from end users to senior leadership at every stage of the project.  Handle change management issues of people and processes very intelligently involving stakeholders and dispel all wrong notions and fears of business community.  Set the right expectations among business teams.