McAfee - Securing Your Data Storage With DLP - Alex de Graaf
-
Upload
cioeastafrica -
Category
Documents
-
view
614 -
download
0
Transcript of McAfee - Securing Your Data Storage With DLP - Alex de Graaf
April 9, 2023
Securing your Stored Data with DLP
Alex de GraafSenior Manager Sales EngineeringEmerging Markets EMEAMcAfee, Inc.
Confidential McAfee Internal Use OnlyApril 9, 20232
…DLP…Data Loss?
or
Data Leakage?
Confidential McAfee Internal Use OnlyApril 9, 20233
Data Loss…
• We lose stuff! You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out of our pockets and bags all the time.
• Oktoberfest At Oktoberfest many smart stupid people lost a lot stuff including 410 wallets, 4 wedding rings, 1 toaster, 1 set of dentures, 1 prosthetic leg and 320 mobile phones.
• Mobile PhonesWhile wallets are problematic, phones are the biggest issue here.
– Number of phones left in taxis every 6 months = 3 per taxi. – Number of phones stolen in London alone = 10,000 per month!!!– Our phones transmit almost 17 billion texts per day, 52% of us store
passwords on our phones, 87.5 million of us bank on our phones.
Confidential McAfee Internal Use OnlyApril 9, 20234
Data Leakage…
• What part of the computer is causing the most of data leakage?– The end-user!
• As enterprises deploy more systems to promote information sharing, the more information leaks
• Are you using the right technology?• Data leakage can not only cause financial loss, but also lead to loss of
reputation, loss of clients, cause embarrassment to the Organization and could lead to legal liability.
Confidential McAfee Internal Use Only
Data & Risk: What’s driving the need?
Compliance
Corporate Governance
CriticalInfrastructure
Are there regulatory risks?
Do employees respect and adhere to internal policies and controls?
Are insiders creating vulnerabilities?
Are intruders gaining access and removing data?
Competitive AdvantageAre insiders putting the organization at risk?
Are you better able to protect your customers’ and partners’ data?
Confidential McAfee Internal Use Only
Data & Risk: Fear of the Unknown
“Where” is the data?
How do I get effective protection in place in a
“timely” manner?
How do I “automate”
processes to reduce audit
costs?“What” data
needs protection?
“Who” should have access to
the data?
• Lost / stolen devices and media
• Blogs, Email, Chat
• Sensitive information
• “Trusted” employees
KNOWN
UNKNOWN
Confidential McAfee Internal Use Only
Where’s your Data?
Data-at-Rest
Data-in-Motion
Data-in-Use
Monitor, Notify, Prevent
Enforce, Audit and Respond
Identify, Classify and Protect
Desktops
Notebooks
Databases
Mail Archives
File Shares
Docu Mgmt Sys
Webmail
IM / Chat
Blogs
File Sharing
USB Sticks
CD / DVD
iPod
Ext. Hard drives
Printouts
Confidential McAfee Internal Use Only
Data & Risk: It’s all about the data!
Compliance Intellectual Property
• Customer Lists• Price/Cost Lists • Target Customer Lists • New Designs• Company Logo• Source Code• Formulas• Process Advantages• Pending Patents
High Business Impact (HBI) Information
• Board Minutes• Financial Reports• Merger/Acquisitions• Product Plans• Hiring/Firing/RIF Plans• Salary Information• Acceptable Use
J-SOX
Sarbanes-Oxley Basel II
PIPEDA EUDPD
GLBA
HIPAA
PCI
MITS
FISMA
DPA
DPA
DTO-93
CPCArt. 43
FFIEC
CPA
Solvency IIDPA
SA-PL
R-DPL
J-SOX
Sarbanes-Oxley Basel II
PIPEDA EUDPD
GLBA
HIPAA
PCI
MITS
FISMA
DPA
DPA
DTO-93
CPCArt. 43
FFIEC
CPA
Solvency IIDPA
SA-PL
J-SOX
Sarbanes-Oxley Basel II
PIPEDA EUDPD
GLBA
HIPAA
PCI
MITS
FISMA
DPA
DPA
DTO-93
CPCArt. 43
FFIEC
CPA
Solvency IIDPA
SA-PL
R-DPL
• SOX • HIPAA • PCI• Credit Card numbers• GLBA • FISMA• ITAR• SB 1386 • Others
…and Importantly:
• Review of Key Employee actions before they announced departure
• Unreported but Important Memos/Reports • Code names of projects not reported to Security department
What you did not know needed protection
Confidential McAfee Internal Use Only
Simple to say, but …
• What data?• From whom?• Where is the data?
“Protect all sensitive data!…and don’t interfere with
the business!”
DLP Challenge…
The DLP Challenge…
Confidential McAfee Internal Use Only
Data Protection needs to be tightly woven into the business!
Sensitive and confidential information can be lost anywhere The threat comes from the outside AND the inside!
Technology is NOT the hard part Aligning the business stakeholder is key Raise the awareness level for the threat
Data protection is not a static decision Information is constantly changing & travelling Partners are changing, so solutions need to evolve
The First Step: Understand the Risk!
Understand the Risk!
Confidential McAfee Internal Use Only
1. Focus on risk drivers specific to your organization Compliance, Intellectual Property Business information, staff related information Legal information
2. Define most critical vectors Data-at-Rest, Data-in-Motion, Data-in-Use Location of data Focus on data that travels
3. Determine the functional stakeholders’ needs Interview stakeholders; i.e. legal, HR, compliance, … Define their needs & requirements
Understand the Risk!
Confidential McAfee Internal Use Only
Indentify, Classify and Protect your data!
First Step Second Step
Define DLP Policy Run report
tune &refine Mine your Data
Capture Data Transfers Data Classification
Confidential McAfee Internal Use Only
Questions?