SlideShare una empresa de Scribd logo
1 de 12
Protecting Clients’ Assets and Brand Reputation

Data exfiltration
Just when we thought we had it
addressed
Protecting Clients’ Assets and Brand Reputation

My Top 5 Worries
•
•
•
•
•

Social Media
Ineffective Patching
Portable Media
Internet Printing Protocol
Email
Protecting Clients’ Assets and Brand Reputation

Tackling Data Security:
Data Management & Control
Data Management & Control

Protecting Clients’ Assets and Brand Reputation

Key Questions
• Where is our data?
• Who is using our data internally?
• Who have they shared our data with externally?
• How is our data being stored?
• Is our data being protected?
• Is our data SAFE?
• What is it we WANT to achieve?
But all I need is DLP right?

Protecting Clients’ Assets and Brand Reputation

DLP is an essential part of any Data Management and Control
program, but there are things it cant do:

• Protect your data when its not on your premises
• Stop 3rd parties forwarding it on
• Prevent the human factor
• Secure the physical
• Stop theft!
Protecting Clients’ Assets and Brand Reputation

Mapping Data Management
Where is your Data?

Protecting Clients’ Assets and Brand Reputation

Think about it, it may not be obvious. We can all guess our file
stores and our systems but;
• Your suppliers?
• Your bins?
• On twitter?
• Your employees websites?
• On your premises?
• In the cloud?
• Behind the fridge?
• Is it safe?
• Cornell Universities Spider
How do you use your data?

Protecting Clients’ Assets and Brand Reputation

We know we use our data to carry out business, but how is it
actually used?
• What do finance do with all those numbers?
• Why do marketing have all those mp3 files?
• How are development maintaining their source code?
• Has payroll embedded data in hidden spreadsheet fields?
• 3rd party processing?
• Is it safe?
We understand our data – lets protect it

Protecting Clients’ Assets and Brand Reputation

Protecting your data can prove harder than you think. 80% of the
challenge is to fix the human element

• User Training, User Training & User Training
• Policy Process & Procedure
• Fostering culture change
• Remember, Accidents Happen!
We understand our data – lets protect it

Protecting Clients’ Assets and Brand Reputation

The technology is easy, isn't it? Remember: if you can think of a
way around your technical controls, your staff will think of 5.

• Encrypt your laptops & devices
• Use strong endpoint technologies
• Have good identity management
• Enforce Data Classification
• Audit the change logs
• Train those above you
• Now train those below you
Take the Holistic View

Protecting Clients’ Assets and Brand Reputation

There is no one product that fits all scenarios, you need to find
what fits in your business.

• Protect at creation – Awareness Training? DLP?
• Protect during transmission – Awareness Training? Encryption?
• Protect in processing – Awareness Training? IRM?
• Protect the physical – Awareness Training?
• Protect at rest – Awareness Training? DLP?
Protecting Clients’ Assets and Brand Reputation

Tackling Data Security - Links:
• Our Website
• Information Security
• Our Skills, Your Team
• Penetration Testing

Más contenido relacionado

Destacado

2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE
David D'hooge
 

Destacado (20)

DG Gaudi
DG GaudiDG Gaudi
DG Gaudi
 
Búsqueda en vector
Búsqueda en vectorBúsqueda en vector
Búsqueda en vector
 
Múltiples autorrepresentaciones
Múltiples autorrepresentacionesMúltiples autorrepresentaciones
Múltiples autorrepresentaciones
 
Common sense in security
Common sense in securityCommon sense in security
Common sense in security
 
Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016Decreto no. 046 08 06-2016
Decreto no. 046 08 06-2016
 
Estrategias
EstrategiasEstrategias
Estrategias
 
Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1Presentacion edilsa yaniry 1
Presentacion edilsa yaniry 1
 
3. presentacion
3. presentacion3. presentacion
3. presentacion
 
Estrategias de guerras
Estrategias de guerrasEstrategias de guerras
Estrategias de guerras
 
Null bachav
Null bachavNull bachav
Null bachav
 
TransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A PrimerTransPacific Partnership Agreement: A Primer
TransPacific Partnership Agreement: A Primer
 
Null meet Code Review
Null meet Code ReviewNull meet Code Review
Null meet Code Review
 
Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015Innovation and Interior Design - Nov.2015
Innovation and Interior Design - Nov.2015
 
2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE2015-VEOLIA-CORPORATE
2015-VEOLIA-CORPORATE
 
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
Cuadro comparativo  de las Reglas Generales de Comercio Exterior.Cuadro comparativo  de las Reglas Generales de Comercio Exterior.
Cuadro comparativo de las Reglas Generales de Comercio Exterior.
 
Proporcionalidad
ProporcionalidadProporcionalidad
Proporcionalidad
 
El sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino UnidoEl sistema de Salud Publica del Reino Unido
El sistema de Salud Publica del Reino Unido
 
Agnosias
Agnosias Agnosias
Agnosias
 
Alteraciones en la asociacion visual
Alteraciones en la  asociacion visual Alteraciones en la  asociacion visual
Alteraciones en la asociacion visual
 
Funciones de variable real: definiciones
Funciones de variable real: definicionesFunciones de variable real: definiciones
Funciones de variable real: definiciones
 

Similar a Tackling data security

People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
Evan Francen
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Edge Pereira
 
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
zoheirop
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
JMS Secure Data
 

Similar a Tackling data security (20)

Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data PrivacyFalcon.io | 2021 Trends Virtual Summit - Data Privacy
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagye
 
Aligning Application Security to Compliance
Aligning Application Security to ComplianceAligning Application Security to Compliance
Aligning Application Security to Compliance
 
Information Security in a Compliance World
Information Security in a Compliance WorldInformation Security in a Compliance World
Information Security in a Compliance World
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
espc2023-protectandgovernyoursensitivedatawithmicrosoftpurviewinmicrosoftteam...
 
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
IT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to KnowIT Security: What an In-Plant Print Center Needs to Know
IT Security: What an In-Plant Print Center Needs to Know
 
Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17Transform Banking with Big Data and Automated Machine Learning 9.12.17
Transform Banking with Big Data and Automated Machine Learning 9.12.17
 
Data Protection, Humans and Common Sense
Data Protection, Humans and Common SenseData Protection, Humans and Common Sense
Data Protection, Humans and Common Sense
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Tackling data security

  • 1. Protecting Clients’ Assets and Brand Reputation Data exfiltration Just when we thought we had it addressed
  • 2. Protecting Clients’ Assets and Brand Reputation My Top 5 Worries • • • • • Social Media Ineffective Patching Portable Media Internet Printing Protocol Email
  • 3. Protecting Clients’ Assets and Brand Reputation Tackling Data Security: Data Management & Control
  • 4. Data Management & Control Protecting Clients’ Assets and Brand Reputation Key Questions • Where is our data? • Who is using our data internally? • Who have they shared our data with externally? • How is our data being stored? • Is our data being protected? • Is our data SAFE? • What is it we WANT to achieve?
  • 5. But all I need is DLP right? Protecting Clients’ Assets and Brand Reputation DLP is an essential part of any Data Management and Control program, but there are things it cant do: • Protect your data when its not on your premises • Stop 3rd parties forwarding it on • Prevent the human factor • Secure the physical • Stop theft!
  • 6. Protecting Clients’ Assets and Brand Reputation Mapping Data Management
  • 7. Where is your Data? Protecting Clients’ Assets and Brand Reputation Think about it, it may not be obvious. We can all guess our file stores and our systems but; • Your suppliers? • Your bins? • On twitter? • Your employees websites? • On your premises? • In the cloud? • Behind the fridge? • Is it safe? • Cornell Universities Spider
  • 8. How do you use your data? Protecting Clients’ Assets and Brand Reputation We know we use our data to carry out business, but how is it actually used? • What do finance do with all those numbers? • Why do marketing have all those mp3 files? • How are development maintaining their source code? • Has payroll embedded data in hidden spreadsheet fields? • 3rd party processing? • Is it safe?
  • 9. We understand our data – lets protect it Protecting Clients’ Assets and Brand Reputation Protecting your data can prove harder than you think. 80% of the challenge is to fix the human element • User Training, User Training & User Training • Policy Process & Procedure • Fostering culture change • Remember, Accidents Happen!
  • 10. We understand our data – lets protect it Protecting Clients’ Assets and Brand Reputation The technology is easy, isn't it? Remember: if you can think of a way around your technical controls, your staff will think of 5. • Encrypt your laptops & devices • Use strong endpoint technologies • Have good identity management • Enforce Data Classification • Audit the change logs • Train those above you • Now train those below you
  • 11. Take the Holistic View Protecting Clients’ Assets and Brand Reputation There is no one product that fits all scenarios, you need to find what fits in your business. • Protect at creation – Awareness Training? DLP? • Protect during transmission – Awareness Training? Encryption? • Protect in processing – Awareness Training? IRM? • Protect the physical – Awareness Training? • Protect at rest – Awareness Training? DLP?
  • 12. Protecting Clients’ Assets and Brand Reputation Tackling Data Security - Links: • Our Website • Information Security • Our Skills, Your Team • Penetration Testing