SlideShare a Scribd company logo
1 of 23
Download to read offline
Zdravko Stoychev, CISM CRISC




                                      10th regional Information Security and Storage conference
                                      “The New Cross-Section”, Sep 28th, 2011 – Sofia, Bulgaria



10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria                 1
The need of new skills

      What a DLP system is?

      To DLP or not to DLP? – Questions, Risks, Outcomes

      Examples – Business needs, Insider threats, Implementation

      Questions




10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria   2
“Ab ovo (usque ad mala)”
                                                 - From the beginning to the end




10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria   3
RSA appoints its first CSO
    » EMC’s security division RSA has plucked its first chief security officer (CSO) from NetWitness,
      the company it acquired shortly after admitting it was hacked;
    » Following RSA' offer to replace as many as 40 million SecurID tokens, three Australian banks
                     s
      have dumped their tokens, including Australia' largest bank, Westpac;
                                                     s
    » Eddie Schwartz, RSA’s new CSO:


           “Only job more public and challenging at the moment would be CSO of Sony.”

Sony promised its first CISO
    » In response to its equally devastating breach, Sony promised to appoint its first chief information
      security officer (CISO) to ensure the company could avoid a repeat;
    » However, “Lulzsec” is claiming to have attacked the servers yet again and say that they have
      walked away with unencrypted security information.


                “At this point in time we are not in the position to say one way or another
                                        what the impact will be in full."
                                                                                        Source: itnews, ghacks

10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria                            4
Source: World Economic Forum

10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria                              5
Technical knowledge—that connects to business operations
    » While technical expertise is something a CISO has always needed, in fact, it is this level of
      knowledge that will broaden the gap and continue to differentiate senior information security
      leaders, from their counterparts with backgrounds solely in physical security, and make them
      more attractive in the selection process.
Business acumen—at a whole new level
    » While you may be an expert in application security, comparing yourself to a group of application
      security professionals will only keep you in application security and won'get you elevated to
                                                                               t
      management. In the past ISO' used their peer group of security pros to be their benchmark of
                                      ve
      what their skills should be; now that is really the executive team.
Communication ability—including the skill of listening
    » In order for a security program to be implemented correctly you have to be able to get that
      message to everyone. Everybody has to develop some kind of security conscience. The listening
      skills may be even more important than speaking in the first stages of communicating with others
      throughout the organization.
Leadership skill—no matter your current position
    » Of all the skills today' employer is looking for from their CISO or security manager, it is
                             s
      leadership. And many companies may be hiring a CISO because they are seeking change within
      an organization and they want a CISO who can drive their security in a new direction. And that
      takes someone with leadership ability.
                                                                                      Source: CSO Magazine

10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria                        6
“Et ipsa scientia potestas est”
                                                - And knowledge itself, is power

                                                                                    !


10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria       7
"                                  #


Data leakage/loss prevention (DLP) is:                                              DLP products use business rules to
A set of information security tools that                                            examine file content and tag
is intended to stop users from sending                                              confidential and critical information so
sensitive or critical information outside                                           that users cannot disclose it.
of the corporate network.
                                                                                    Tagging is the process of classifying
Adoption of DLP, variously called data                                              which data on a system is confidential
leak prevention, information loss                                                   and marking it appropriately.
prevention or extrusion prevention, is
being driven by significant insider                                                 Example: A user who accidentally or
threats and by more rigorous state                                                  maliciously attempts to disclose
privacy laws, many of which have                                                    confidential information that's been
stringent data protection or access                                                 tagged will be denied, e.g. prevent a
components.                                                                         sensitive financial spreadsheet from
                                                                                    being emailed by one employee to
                                                                                    another within the same corporation.



10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria                                              8
$                       %&

The first and the foremost thing is to answer the question: What problem space are we
talking about when we talk about Data Leakage?
    » The Data Leakage problem can be defined as any unauthorized access of data due to an
      improper implementation or inadequacy of a technology, process or a policy.

Next, the second question to answer is what part of the problem space defined above
does the DLP product market solve?
    » In the above definition of data leakage, the DLP solutions are designed to prevent unauthorized
      access of data due to inadequacy or improper implementation of a process or a policy, but not
      technology. They are not designed to address data leakage issues resulting from external
      attacks.

Hence the DLP systems primarily help enforce “acceptable use” policies and processes
for an enterprise.
What you don’t have is that:
    » They are not designed to solve the part of data leakage problem space that is related to
      technology–the information security aspect. So, it is not an information security data leakage
      issue that the DLP solution is trying to solve.

                                                                                         Source: InfoSecIsland

10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria                            9
$                       %&

The third question that comes to mind, where is our enterprise in this Data Leakage
Problem space?
    » Surprisingly, one will notice that Data Leakage is already a part of one' enterprise security
                                                                               s
      strategy in the form of deployed firewalls, encryption solutions, IDS, LDAP etc.


Next, getting to the real question – does my enterprise need to invest in a DLP solution?
    » And this is a million dollar question which requires comprehensive evaluation specifically to the
      current state of enterprise security technology investments, and of course the data type the
      enterprise processes/stores.


Hence the DLP system should be/ is implicitly a part of an enterprise security strategy.
What you should do/ have is:
        Enterprise Data Classification – if you cannot answer the question where is my sensitive data,
        you need to first work on a data classification effort for your enterprise;
        Streamline or Implement Processes and Policies in support of data leakage prevention;
        Perform a gap assessment on current security infrastructure that already implicitly supports DLP
        or can be leveraged to support DLP – purely for cost savings.


10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria                          10
“Amat victoria curam”
                                                       - Victory loves preparation

                                                      '                             #


10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria       11
(                        )

DLP solutions help mitigate following risks:

 Identifying insecure business processes. For example, use of FTP for transporting
personal data;

 Accidental data disclosure by employees. For example, employee sending
unencrypted email containing sensitive data;

 Intentional data leakage by employees. For example, disgruntled employees stealing
data or an employee leaving the company with sensitive data.

                The problem space is not solved comprehensively by DLP solutions!
              Example: an employee can still take a picture of sensitive data and leak it.

So DLP are being systems that aid the enforcement of acceptable use policies and
process with certain limitations.


10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria            12
* &                   & +

Data Classification efforts can be very easy for a small enterprise, and a beast for large
enterprise. Similarly, implementing a DLP solution is an easy and effective for a small
enterprise vs. a medium or large enterprise.
The larger enterprises should always use a phased approach and also account for the
extra manpower required to continuously configure, monitor and tune the DLP solution.
This will reduce false positives and false negatives, which is usually the biggest
problem enterprises have reported once implementing the DLP solution.
    » Some of the features could result in serious business interruptions in the case of no data
      classification or a rules misconfiguration;
    » Also, it' easy to get blown away by some of the rally features like copy-paste functions for certain
              s
      kinds of data, or pattern matching features, etc.


         Its not the tool which is a problem here, it's the preparation and implementation
                            shortcomings that result in such outcomes.

Conclusion: the DLP solutions address only a subset of data leakage issues and only
help enforce “acceptable use” policies and processes with a number of limitations. They
do not prevent information security related data leakage issues.

10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria                        13
“A bove maiore discit arare minor”
                                           - A good example makes a good job




10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria   14
!, &

In most of the cases, the company exchanges information with third parties (customers,
partners, authorities etc) using the E-mail and the Internet services;

Sensitive Information is located at many places, such as in:
        central databases;
        workstations (local drives) and laptops;
        shared workplaces (file servers, SharePoint servers);
        USB sticks and external hard drives.


The company provides E-mail and Internet services to the users of its own units (and
probably several group companies).

                        The risk of inadvertent or deliberate data loss due to inadequate
                          security measures and users negligence is present. Isn’t it?

To answer that question we have to evaluate the existing threats…

10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria           15
!

   Lack of or insufficient security policies & procedures;

   Appropriate security measures not implemented (perimeter, endpoints);

   Lack of employees’ awareness & training;

   Lack of employees’ diligence;

   Disgruntled employees steal corporate data;

   Misuse of corporate computers, systems and passwords;

   Information destruction and recycling of media;

   Remote working & mobility;

   Economic crisis.




10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria   16
! -

   Based on the policies and rules, the DLP Email Prevent system
          » Releases the message (no violation of policies)
          » Blocks the message (unauthorized user)
          » Modifies the header of the message (authorized users).


 When the SMTP Gateway receives an email with this special header, forwards it to the
encryption server.

  The encryption server encrypts the email and sends it back to the SMTP Gateway for
forwarding it to the Internet.
          » No user (sender) intervention is required.
          » Different encryption options provided for the recipients.




10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria         17
! -




10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria         18
!

   Proxy server forwards all web traffic to the DLP Web Prevent system;

   Based on the policies and rules, the DLP system can:
          » block the file upload or remove the confidential content from the file;
          » release the traffic back to the proxy server.


   Main goal is to block the uploading of files using HTTP/S or FTP:
          » real-time monitoring of the ongoing traffic – transparent to the users;
          » blocking certain websites based on BlackLists / keywords, etc;
          » encrypted traffic is being monitored too (by replacing root CA).


   No additional protection (encryption) mechanism.




10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria       19
!




10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria       20
Related security projects to consider for minimizing the risks of Data Leakage:

  Discover where the sensitive Information is located across the company and take
relevant measures;

 Implement DLP at workstations with critical operations, in conjunction with the current
Endpoint security technology;

 Protection at the endpoint (workstations, laptops, removable storage devices, mobile
devices, smartphones);

   Protecting Databases from unauthorized access and actions (audit & prevent);

 Protection for shared information (file servers, backups, Databases) by using
encryption mechanisms;

   This is an ongoing process (Monitoring, assessment, optimization).



10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria       21
“Prudens quaestio dimidium scientiae”
                                - To know what to ask is already to know half

                                                                  . &


10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria   22
. &


                                          Thank you for your time!
                                                      Zdravko Stoychev, CISM CRISC
                                                                 http://twitter.com/zdravkos




10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria              23

More Related Content

What's hot

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for TabletSymantec
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...Andris Soroka
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss preventionssuser1eca7d
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)Trustmarque
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteVCW Security Ltd
 
50 Shapes of Network & Information Security
50 Shapes of Network & Information Security50 Shapes of Network & Information Security
50 Shapes of Network & Information SecurityHatem ElSahhar
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 

What's hot (20)

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Data Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. MookheyData Leakage Prevention - K. K. Mookhey
Data Leakage Prevention - K. K. Mookhey
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
DSS ITSEC 2013 Conference 07.11.2013 - For your eyes only - Symantec PGP Re-L...
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Data Loss Prevention: Brainstorming
Data Loss Prevention: BrainstormingData Loss Prevention: Brainstorming
Data Loss Prevention: Brainstorming
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
DLP
DLPDLP
DLP
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
50 Shapes of Network & Information Security
50 Shapes of Network & Information Security50 Shapes of Network & Information Security
50 Shapes of Network & Information Security
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 

Similar to Data leakage prevention EN Final

Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Professionamiable_indian
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Chris Ross
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Dlp content-discovery-best-practices
Dlp content-discovery-best-practicesDlp content-discovery-best-practices
Dlp content-discovery-best-practiceslookout4raj
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the CloudPeak 10
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2olambel
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Information security[277]
Information security[277]Information security[277]
Information security[277]Timothy Warren
 
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxPROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxwoodruffeloisa
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based securityArun Gopinath
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-preventionanuepcet
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 

Similar to Data leakage prevention EN Final (20)

Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Dlp content-discovery-best-practices
Dlp content-discovery-best-practicesDlp content-discovery-best-practices
Dlp content-discovery-best-practices
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxPROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
 
Secure by design
Secure by designSecure by design
Secure by design
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based security
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
data-leakage-prevention
 data-leakage-prevention data-leakage-prevention
data-leakage-prevention
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 

More from Zdravko Stoychev, CISM, CRISC

(You better) change focus, 2015 finance ict & isaca v2
(You better) change focus, 2015 finance ict & isaca v2(You better) change focus, 2015 finance ict & isaca v2
(You better) change focus, 2015 finance ict & isaca v2Zdravko Stoychev, CISM, CRISC
 
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...Zdravko Stoychev, CISM, CRISC
 
Въведение в международния стандарт ISO 27001
Въведение в международния стандарт ISO 27001Въведение в международния стандарт ISO 27001
Въведение в международния стандарт ISO 27001Zdravko Stoychev, CISM, CRISC
 
Управление и сигурност на информацията с McAfee
Управление и сигурност на информацията с McAfeeУправление и сигурност на информацията с McAfee
Управление и сигурност на информацията с McAfeeZdravko Stoychev, CISM, CRISC
 

More from Zdravko Stoychev, CISM, CRISC (8)

ISACA Day - New CSX Certifications
ISACA Day - New CSX CertificationsISACA Day - New CSX Certifications
ISACA Day - New CSX Certifications
 
(You better) change focus, 2015 finance ict & isaca v2
(You better) change focus, 2015 finance ict & isaca v2(You better) change focus, 2015 finance ict & isaca v2
(You better) change focus, 2015 finance ict & isaca v2
 
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
 
Training People and Rising Awareness
Training People and Rising AwarenessTraining People and Rising Awareness
Training People and Rising Awareness
 
ISACA Certification Program 2012
ISACA Certification Program 2012ISACA Certification Program 2012
ISACA Certification Program 2012
 
ISACA certification programme 2010
ISACA certification programme 2010ISACA certification programme 2010
ISACA certification programme 2010
 
Въведение в международния стандарт ISO 27001
Въведение в международния стандарт ISO 27001Въведение в международния стандарт ISO 27001
Въведение в международния стандарт ISO 27001
 
Управление и сигурност на информацията с McAfee
Управление и сигурност на информацията с McAfeeУправление и сигурност на информацията с McAfee
Управление и сигурност на информацията с McAfee
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Data leakage prevention EN Final

  • 1. Zdravko Stoychev, CISM CRISC 10th regional Information Security and Storage conference “The New Cross-Section”, Sep 28th, 2011 – Sofia, Bulgaria 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 1
  • 2. The need of new skills What a DLP system is? To DLP or not to DLP? – Questions, Risks, Outcomes Examples – Business needs, Insider threats, Implementation Questions 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 2
  • 3. “Ab ovo (usque ad mala)” - From the beginning to the end 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 3
  • 4. RSA appoints its first CSO » EMC’s security division RSA has plucked its first chief security officer (CSO) from NetWitness, the company it acquired shortly after admitting it was hacked; » Following RSA' offer to replace as many as 40 million SecurID tokens, three Australian banks s have dumped their tokens, including Australia' largest bank, Westpac; s » Eddie Schwartz, RSA’s new CSO: “Only job more public and challenging at the moment would be CSO of Sony.” Sony promised its first CISO » In response to its equally devastating breach, Sony promised to appoint its first chief information security officer (CISO) to ensure the company could avoid a repeat; » However, “Lulzsec” is claiming to have attacked the servers yet again and say that they have walked away with unencrypted security information. “At this point in time we are not in the position to say one way or another what the impact will be in full." Source: itnews, ghacks 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 4
  • 5. Source: World Economic Forum 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 5
  • 6. Technical knowledge—that connects to business operations » While technical expertise is something a CISO has always needed, in fact, it is this level of knowledge that will broaden the gap and continue to differentiate senior information security leaders, from their counterparts with backgrounds solely in physical security, and make them more attractive in the selection process. Business acumen—at a whole new level » While you may be an expert in application security, comparing yourself to a group of application security professionals will only keep you in application security and won'get you elevated to t management. In the past ISO' used their peer group of security pros to be their benchmark of ve what their skills should be; now that is really the executive team. Communication ability—including the skill of listening » In order for a security program to be implemented correctly you have to be able to get that message to everyone. Everybody has to develop some kind of security conscience. The listening skills may be even more important than speaking in the first stages of communicating with others throughout the organization. Leadership skill—no matter your current position » Of all the skills today' employer is looking for from their CISO or security manager, it is s leadership. And many companies may be hiring a CISO because they are seeking change within an organization and they want a CISO who can drive their security in a new direction. And that takes someone with leadership ability. Source: CSO Magazine 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 6
  • 7. “Et ipsa scientia potestas est” - And knowledge itself, is power ! 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 7
  • 8. " # Data leakage/loss prevention (DLP) is: DLP products use business rules to A set of information security tools that examine file content and tag is intended to stop users from sending confidential and critical information so sensitive or critical information outside that users cannot disclose it. of the corporate network. Tagging is the process of classifying Adoption of DLP, variously called data which data on a system is confidential leak prevention, information loss and marking it appropriately. prevention or extrusion prevention, is being driven by significant insider Example: A user who accidentally or threats and by more rigorous state maliciously attempts to disclose privacy laws, many of which have confidential information that's been stringent data protection or access tagged will be denied, e.g. prevent a components. sensitive financial spreadsheet from being emailed by one employee to another within the same corporation. 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 8
  • 9. $ %& The first and the foremost thing is to answer the question: What problem space are we talking about when we talk about Data Leakage? » The Data Leakage problem can be defined as any unauthorized access of data due to an improper implementation or inadequacy of a technology, process or a policy. Next, the second question to answer is what part of the problem space defined above does the DLP product market solve? » In the above definition of data leakage, the DLP solutions are designed to prevent unauthorized access of data due to inadequacy or improper implementation of a process or a policy, but not technology. They are not designed to address data leakage issues resulting from external attacks. Hence the DLP systems primarily help enforce “acceptable use” policies and processes for an enterprise. What you don’t have is that: » They are not designed to solve the part of data leakage problem space that is related to technology–the information security aspect. So, it is not an information security data leakage issue that the DLP solution is trying to solve. Source: InfoSecIsland 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 9
  • 10. $ %& The third question that comes to mind, where is our enterprise in this Data Leakage Problem space? » Surprisingly, one will notice that Data Leakage is already a part of one' enterprise security s strategy in the form of deployed firewalls, encryption solutions, IDS, LDAP etc. Next, getting to the real question – does my enterprise need to invest in a DLP solution? » And this is a million dollar question which requires comprehensive evaluation specifically to the current state of enterprise security technology investments, and of course the data type the enterprise processes/stores. Hence the DLP system should be/ is implicitly a part of an enterprise security strategy. What you should do/ have is: Enterprise Data Classification – if you cannot answer the question where is my sensitive data, you need to first work on a data classification effort for your enterprise; Streamline or Implement Processes and Policies in support of data leakage prevention; Perform a gap assessment on current security infrastructure that already implicitly supports DLP or can be leveraged to support DLP – purely for cost savings. 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 10
  • 11. “Amat victoria curam” - Victory loves preparation ' # 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 11
  • 12. ( ) DLP solutions help mitigate following risks: Identifying insecure business processes. For example, use of FTP for transporting personal data; Accidental data disclosure by employees. For example, employee sending unencrypted email containing sensitive data; Intentional data leakage by employees. For example, disgruntled employees stealing data or an employee leaving the company with sensitive data. The problem space is not solved comprehensively by DLP solutions! Example: an employee can still take a picture of sensitive data and leak it. So DLP are being systems that aid the enforcement of acceptable use policies and process with certain limitations. 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 12
  • 13. * & & + Data Classification efforts can be very easy for a small enterprise, and a beast for large enterprise. Similarly, implementing a DLP solution is an easy and effective for a small enterprise vs. a medium or large enterprise. The larger enterprises should always use a phased approach and also account for the extra manpower required to continuously configure, monitor and tune the DLP solution. This will reduce false positives and false negatives, which is usually the biggest problem enterprises have reported once implementing the DLP solution. » Some of the features could result in serious business interruptions in the case of no data classification or a rules misconfiguration; » Also, it' easy to get blown away by some of the rally features like copy-paste functions for certain s kinds of data, or pattern matching features, etc. Its not the tool which is a problem here, it's the preparation and implementation shortcomings that result in such outcomes. Conclusion: the DLP solutions address only a subset of data leakage issues and only help enforce “acceptable use” policies and processes with a number of limitations. They do not prevent information security related data leakage issues. 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 13
  • 14. “A bove maiore discit arare minor” - A good example makes a good job 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 14
  • 15. !, & In most of the cases, the company exchanges information with third parties (customers, partners, authorities etc) using the E-mail and the Internet services; Sensitive Information is located at many places, such as in: central databases; workstations (local drives) and laptops; shared workplaces (file servers, SharePoint servers); USB sticks and external hard drives. The company provides E-mail and Internet services to the users of its own units (and probably several group companies). The risk of inadvertent or deliberate data loss due to inadequate security measures and users negligence is present. Isn’t it? To answer that question we have to evaluate the existing threats… 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 15
  • 16. ! Lack of or insufficient security policies & procedures; Appropriate security measures not implemented (perimeter, endpoints); Lack of employees’ awareness & training; Lack of employees’ diligence; Disgruntled employees steal corporate data; Misuse of corporate computers, systems and passwords; Information destruction and recycling of media; Remote working & mobility; Economic crisis. 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 16
  • 17. ! - Based on the policies and rules, the DLP Email Prevent system » Releases the message (no violation of policies) » Blocks the message (unauthorized user) » Modifies the header of the message (authorized users). When the SMTP Gateway receives an email with this special header, forwards it to the encryption server. The encryption server encrypts the email and sends it back to the SMTP Gateway for forwarding it to the Internet. » No user (sender) intervention is required. » Different encryption options provided for the recipients. 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 17
  • 18. ! - 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 18
  • 19. ! Proxy server forwards all web traffic to the DLP Web Prevent system; Based on the policies and rules, the DLP system can: » block the file upload or remove the confidential content from the file; » release the traffic back to the proxy server. Main goal is to block the uploading of files using HTTP/S or FTP: » real-time monitoring of the ongoing traffic – transparent to the users; » blocking certain websites based on BlackLists / keywords, etc; » encrypted traffic is being monitored too (by replacing root CA). No additional protection (encryption) mechanism. 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 19
  • 20. ! 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 20
  • 21. Related security projects to consider for minimizing the risks of Data Leakage: Discover where the sensitive Information is located across the company and take relevant measures; Implement DLP at workstations with critical operations, in conjunction with the current Endpoint security technology; Protection at the endpoint (workstations, laptops, removable storage devices, mobile devices, smartphones); Protecting Databases from unauthorized access and actions (audit & prevent); Protection for shared information (file servers, backups, Databases) by using encryption mechanisms; This is an ongoing process (Monitoring, assessment, optimization). 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 21
  • 22. “Prudens quaestio dimidium scientiae” - To know what to ask is already to know half . & 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 22
  • 23. . & Thank you for your time! Zdravko Stoychev, CISM CRISC http://twitter.com/zdravkos 10th regional conference Information Security and Storage, 2011 – Sofia, Bulgaria 23