SlideShare a Scribd company logo
1 of 30
Download to read offline
Data Loss Prevention
Eliminate the Hype and Enable Your Business




Andrew Engelbert, CISSP, CISM
IT Risk Management
Delivery Services Manager
Speaker Bio
   • Andrew Engelbert – Delivery Manager, IT Risk Management,
     CISSP, CISM

   • 12 years IT experience (7 years in Risk Management). Held
     various positions at health care, insurance, financial services
     and IT consulting organizations.

   • Extensive knowledge and experience with both traditional and
     non-traditional programmatic and assessment methodologies,
     organizational and IT-based policies and procedures, security
     controls and current industry standards (ISO, PCI, HIPAA, GLBA,
     FACTA).

Corporate Profile
Agenda
   •    Business Drivers
   •    DLP Problem Space
   •    Common Challenges
   •    People, Process and Policy
   •    Technology Solutions
   •    Fear, Uncertainty and Doubt
   •    Enable Your Business



Corporate Profile
Business Drivers
Business Drivers
   • Regulatory, Customer or Business Partner
     requirement

   • Proactive risk management initiative
      – Increased data visibility

   • Cost of doing business in today’s world

   • Reaction to ‘potential’ data breach (Hopefully not!)

Corporate Profile
DLP Problem Space
DLP Problem Space
             Data types                       Risk areas                                    DLP approach




              IN MOTION   Email        Webmail,      IM/chat     File sharing   Encrypted       Network
              (DIM)       (int+ext)    blogs, etc.                              content




  DATA         IN USE     USB sticks   CDs/DVDs      iPods       External       Printouts       Endpoint
               (DIU)                                             hard drives




               AT REST    Desktops     Databases / Mail archives File shares    Document        Discovery
               (DAR)                   repositories                             management
                                                                                systems



Corporate Profile
Common Challenges
Common Challenges
   • Obtaining executive support
   • Identifying what are data you trying to protect?
      – Data at rest
      – Data in transit
      – Data in motion
   • Understanding your threat landscape
      – Business impact analysis
      – Existing control points (prevent, detect, respond)
      – Establish loss implications
Corporate Profile
Common Challenges
   • Data collection and analysis
      – Volume of data to review can be overwhelming
      – False positive research and analysis

   • Employee education and awareness

   • Undocumented policies and procedures

   • Clearly defined roles and responsibilities
Corporate Profile
People, Process and Policy
People, Process and Policy
   • Get the right people involved
      – HR, Legal, InfoSec, LOB leadership, General Council

   • Understand the scope of your solution
      – Consider a phased approach (Monitor, Discover,
        Detect, Prevent)

   • Open and honest communication
     – Clear, concise, consistent, useful

Corporate Profile
People, Process and Policy
   • Education and awareness campaign
      – Explain requirements and expectations from
        regulators, customers and business partners
      – Cost of doing business in today’s world
      – Identify a single point of contact for questions




Corporate Profile
People, Process and Policy
   • Business Interviews
      – Identify stakeholders within each business unit
      – Identify incident owners and points of contact for
        specific data classifications
      – Capture and distribute specific regulatory
        requirements to impacted areas




Corporate Profile
People, Process and Policy
   • Collect and Review Data
      – Target key data entry and exit points based on
        scope
      – Minimum of 60 to 90 days

   • Data Validation
      – Elimination of False Positives
      – Exact Data Matching & Indexing Capabilities


Corporate Profile
People, Process and Policy
   • Data Classification
      – Identify classification criteria
      – Identify data owners
      – Review compliance requirements

   • Incident Management
      – Escalation criteria & processes
      – Automation of incident responses
      – Enable compliance triggers
Corporate Profile
People, Process and Policy
   • Data Use

   • General Acceptable Use

   • Business Partner Contracts




Corporate Profile
Technology Solutions
Technology Solutions

            • The threat of a data breach can be significantly mitigated
              through the use of today’s DLP technology

            • Data loss prevention solutions can provide a clear return
              on investment (ROI) and a manageable total cost of
              ownership (TCO).




Corporate Profile
Technology Solutions


                                                                Technology
                                                                 Solutions
                    • Choose your approach
                      • Understand your needs before reviewing vendor
                        products.
                      • Leverage risk modeling solutions and expertise
                        from resources you trust.
                      • Find the product that addresses your particular
                        needs.
                      • Don’t use band aids


Corporate Profile
Technology Solutions




Corporate Profile
Technology Solutions

               Vendor Areas of Focus:

                          • Endpoint (laptops/desktops)
                          • Data at Rest (file servers, archives, mail boxes)
                          • Data in Motion (email, web, IM, P2P)
                          • Encryption (whole disk encryption, or targeted
                            data encryption)
                          • Content Filtering
                          • Monitor vs Blocking




Corporate Profile
Fear, Uncertainty and Doubt
Fear, Uncertainty and Doubt
   • Data Loss Prevention technology is not the silver bullet.

   • The “Whole” solution may not be required.

   • Technology alone is not the answer.

   • Multiple vendor solutions may be required.




Corporate Profile
Enable Your Business
Enable Your Business
   • Leverage executive support

   • Establish DLP strategies and objectives

   • Educate and communicate

   • Highlight relevant data loss examples and explain the
     potential impact


Corporate Profile
Enable Your Business
   • Proactive versus reactive incident management

   • Increase your data visibility

   • Implement a structured and repeatable DLP policy
     development and management process

   • Prioritize findings and take action


Corporate Profile
Enable Your Business
   • Automated the incident response workflow process

   • Clearly define roles and responsibilities

   • Share results with executive management




Corporate Profile
Summary
   • Prepare, plan and execute your DLP strategy

   • Leverage executive management support

   • Communicate, communicate, communicate

   • People, Process and Policy approach

   • Align DLP technology with your goals and objectives
Corporate Profile
Questions?

 Thank You!

More Related Content

What's hot

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Symantec
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónSymantec LATAM
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaksAbhishek Sood
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionDigital Guardian
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonVlad Catrinescu
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreuschJohan Klerk
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage PresentationMike Spaulding
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 

What's hot (20)

Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11Symantec Data Loss Prevention 11
Symantec Data Loss Prevention 11
 
Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14Introducing Data Loss Prevention 14
Introducing Data Loss Prevention 14
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la informaciónBe Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
Be Aware Webinar Symantec-Maxímice su prevención hacia la fuga de la información
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
2010 za con_stephen_kreusch
2010 za con_stephen_kreusch2010 za con_stephen_kreusch
2010 za con_stephen_kreusch
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 

Viewers also liked

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?CBT Nuggets
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDPriyanka Aash
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data BreachDavid Hunt
 
DTm presentacion linea de enfasis 2-2016
DTm presentacion linea de enfasis 2-2016DTm presentacion linea de enfasis 2-2016
DTm presentacion linea de enfasis 2-2016javhur
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
Tarea 3 disca jorge suáreztamayo,danielcaballero,jorgelastanao.
Tarea 3 disca  jorge suáreztamayo,danielcaballero,jorgelastanao.Tarea 3 disca  jorge suáreztamayo,danielcaballero,jorgelastanao.
Tarea 3 disca jorge suáreztamayo,danielcaballero,jorgelastanao.Jorge Lastanao Almazan
 
Capacitación para facilitadores del IESLP
Capacitación para facilitadores del IESLPCapacitación para facilitadores del IESLP
Capacitación para facilitadores del IESLPStartupLab MX
 
Catálogo Comuniones 2015 - Azul y Rosa
Catálogo Comuniones 2015 - Azul y RosaCatálogo Comuniones 2015 - Azul y Rosa
Catálogo Comuniones 2015 - Azul y RosaDelleno
 
Informe Estadistico Facebook
Informe Estadistico FacebookInforme Estadistico Facebook
Informe Estadistico FacebookSlarrauri
 

Viewers also liked (18)

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
 
DTm presentacion linea de enfasis 2-2016
DTm presentacion linea de enfasis 2-2016DTm presentacion linea de enfasis 2-2016
DTm presentacion linea de enfasis 2-2016
 
Website Audit
Website Audit Website Audit
Website Audit
 
Presentación gmail chat
Presentación gmail chatPresentación gmail chat
Presentación gmail chat
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Tarea 3 disca jorge suáreztamayo,danielcaballero,jorgelastanao.
Tarea 3 disca  jorge suáreztamayo,danielcaballero,jorgelastanao.Tarea 3 disca  jorge suáreztamayo,danielcaballero,jorgelastanao.
Tarea 3 disca jorge suáreztamayo,danielcaballero,jorgelastanao.
 
Cv e uropeen
Cv e uropeenCv e uropeen
Cv e uropeen
 
Palabras en jp
Palabras en jpPalabras en jp
Palabras en jp
 
Capacitación para facilitadores del IESLP
Capacitación para facilitadores del IESLPCapacitación para facilitadores del IESLP
Capacitación para facilitadores del IESLP
 
Alexandra caguana auditoriainformática_ii_bimestre
Alexandra caguana auditoriainformática_ii_bimestreAlexandra caguana auditoriainformática_ii_bimestre
Alexandra caguana auditoriainformática_ii_bimestre
 
Regresando a nuestro origen parte2
Regresando a nuestro origen parte2Regresando a nuestro origen parte2
Regresando a nuestro origen parte2
 
Catálogo Comuniones 2015 - Azul y Rosa
Catálogo Comuniones 2015 - Azul y RosaCatálogo Comuniones 2015 - Azul y Rosa
Catálogo Comuniones 2015 - Azul y Rosa
 
Informe Estadistico Facebook
Informe Estadistico FacebookInforme Estadistico Facebook
Informe Estadistico Facebook
 

Similar to Eliminate DLP Hype and Enable Your Business

CFITS Disaster Recovery 2009
CFITS Disaster Recovery 2009CFITS Disaster Recovery 2009
CFITS Disaster Recovery 2009cfits
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?PECB
 
How to successfully engage enterprise software vendors – software selection
How to successfully engage enterprise software vendors – software selectionHow to successfully engage enterprise software vendors – software selection
How to successfully engage enterprise software vendors – software selectionJohn Cachat
 
Fight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsFight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsDatameer
 
Creating collaboration between compliance and internal audit
Creating collaboration between compliance and internal auditCreating collaboration between compliance and internal audit
Creating collaboration between compliance and internal auditEDGAR Online
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Raleigh ISSA: "Optimize Your Data Protection Investment for Bottom Line Resul...
Raleigh ISSA: "Optimize Your Data Protection Investment for Bottom Line Resul...Raleigh ISSA: "Optimize Your Data Protection Investment for Bottom Line Resul...
Raleigh ISSA: "Optimize Your Data Protection Investment for Bottom Line Resul...Raleigh ISSA
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance frameworkkaiyun7631
 
Presumption of Abundance: Architecting the Future of Success
Presumption of Abundance: Architecting the Future of SuccessPresumption of Abundance: Architecting the Future of Success
Presumption of Abundance: Architecting the Future of SuccessInside Analysis
 
RW Keynote IDM2009
RW Keynote IDM2009RW Keynote IDM2009
RW Keynote IDM2009racingsnake
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM
 
Enterprise Data Architect Job Description
Enterprise Data Architect Job DescriptionEnterprise Data Architect Job Description
Enterprise Data Architect Job DescriptionLars E Martinsson
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...Skoda Minotti
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
 
Corporate Awareness Litigation
Corporate Awareness  LitigationCorporate Awareness  Litigation
Corporate Awareness Litigationdkarpinsky
 
Decision Due Diligence
Decision Due DiligenceDecision Due Diligence
Decision Due DiligenceLee White
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionTop 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionEnterprise Management Associates
 
International Risk Advisory Solutions
International Risk Advisory SolutionsInternational Risk Advisory Solutions
International Risk Advisory Solutionstcorley
 

Similar to Eliminate DLP Hype and Enable Your Business (20)

BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
CFITS Disaster Recovery 2009
CFITS Disaster Recovery 2009CFITS Disaster Recovery 2009
CFITS Disaster Recovery 2009
 
How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?How to Boost your Cyber Risk Management Program and Capabilities?
How to Boost your Cyber Risk Management Program and Capabilities?
 
How to successfully engage enterprise software vendors – software selection
How to successfully engage enterprise software vendors – software selectionHow to successfully engage enterprise software vendors – software selection
How to successfully engage enterprise software vendors – software selection
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Fight Fraud with Big Data Analytics
Fight Fraud with Big Data AnalyticsFight Fraud with Big Data Analytics
Fight Fraud with Big Data Analytics
 
Creating collaboration between compliance and internal audit
Creating collaboration between compliance and internal auditCreating collaboration between compliance and internal audit
Creating collaboration between compliance and internal audit
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Raleigh ISSA: "Optimize Your Data Protection Investment for Bottom Line Resul...
Raleigh ISSA: "Optimize Your Data Protection Investment for Bottom Line Resul...Raleigh ISSA: "Optimize Your Data Protection Investment for Bottom Line Resul...
Raleigh ISSA: "Optimize Your Data Protection Investment for Bottom Line Resul...
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance framework
 
Presumption of Abundance: Architecting the Future of Success
Presumption of Abundance: Architecting the Future of SuccessPresumption of Abundance: Architecting the Future of Success
Presumption of Abundance: Architecting the Future of Success
 
RW Keynote IDM2009
RW Keynote IDM2009RW Keynote IDM2009
RW Keynote IDM2009
 
ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021ZIGRAM Introduction July 2021
ZIGRAM Introduction July 2021
 
Enterprise Data Architect Job Description
Enterprise Data Architect Job DescriptionEnterprise Data Architect Job Description
Enterprise Data Architect Job Description
 
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Corporate Awareness Litigation
Corporate Awareness  LitigationCorporate Awareness  Litigation
Corporate Awareness Litigation
 
Decision Due Diligence
Decision Due DiligenceDecision Due Diligence
Decision Due Diligence
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionTop 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
 
International Risk Advisory Solutions
International Risk Advisory SolutionsInternational Risk Advisory Solutions
International Risk Advisory Solutions
 

Eliminate DLP Hype and Enable Your Business

  • 1. Data Loss Prevention Eliminate the Hype and Enable Your Business Andrew Engelbert, CISSP, CISM IT Risk Management Delivery Services Manager
  • 2. Speaker Bio • Andrew Engelbert – Delivery Manager, IT Risk Management, CISSP, CISM • 12 years IT experience (7 years in Risk Management). Held various positions at health care, insurance, financial services and IT consulting organizations. • Extensive knowledge and experience with both traditional and non-traditional programmatic and assessment methodologies, organizational and IT-based policies and procedures, security controls and current industry standards (ISO, PCI, HIPAA, GLBA, FACTA). Corporate Profile
  • 3. Agenda • Business Drivers • DLP Problem Space • Common Challenges • People, Process and Policy • Technology Solutions • Fear, Uncertainty and Doubt • Enable Your Business Corporate Profile
  • 5. Business Drivers • Regulatory, Customer or Business Partner requirement • Proactive risk management initiative – Increased data visibility • Cost of doing business in today’s world • Reaction to ‘potential’ data breach (Hopefully not!) Corporate Profile
  • 7. DLP Problem Space Data types Risk areas DLP approach IN MOTION Email Webmail, IM/chat File sharing Encrypted Network (DIM) (int+ext) blogs, etc. content DATA IN USE USB sticks CDs/DVDs iPods External Printouts Endpoint (DIU) hard drives AT REST Desktops Databases / Mail archives File shares Document Discovery (DAR) repositories management systems Corporate Profile
  • 9. Common Challenges • Obtaining executive support • Identifying what are data you trying to protect? – Data at rest – Data in transit – Data in motion • Understanding your threat landscape – Business impact analysis – Existing control points (prevent, detect, respond) – Establish loss implications Corporate Profile
  • 10. Common Challenges • Data collection and analysis – Volume of data to review can be overwhelming – False positive research and analysis • Employee education and awareness • Undocumented policies and procedures • Clearly defined roles and responsibilities Corporate Profile
  • 12. People, Process and Policy • Get the right people involved – HR, Legal, InfoSec, LOB leadership, General Council • Understand the scope of your solution – Consider a phased approach (Monitor, Discover, Detect, Prevent) • Open and honest communication – Clear, concise, consistent, useful Corporate Profile
  • 13. People, Process and Policy • Education and awareness campaign – Explain requirements and expectations from regulators, customers and business partners – Cost of doing business in today’s world – Identify a single point of contact for questions Corporate Profile
  • 14. People, Process and Policy • Business Interviews – Identify stakeholders within each business unit – Identify incident owners and points of contact for specific data classifications – Capture and distribute specific regulatory requirements to impacted areas Corporate Profile
  • 15. People, Process and Policy • Collect and Review Data – Target key data entry and exit points based on scope – Minimum of 60 to 90 days • Data Validation – Elimination of False Positives – Exact Data Matching & Indexing Capabilities Corporate Profile
  • 16. People, Process and Policy • Data Classification – Identify classification criteria – Identify data owners – Review compliance requirements • Incident Management – Escalation criteria & processes – Automation of incident responses – Enable compliance triggers Corporate Profile
  • 17. People, Process and Policy • Data Use • General Acceptable Use • Business Partner Contracts Corporate Profile
  • 19. Technology Solutions • The threat of a data breach can be significantly mitigated through the use of today’s DLP technology • Data loss prevention solutions can provide a clear return on investment (ROI) and a manageable total cost of ownership (TCO). Corporate Profile
  • 20. Technology Solutions Technology Solutions • Choose your approach • Understand your needs before reviewing vendor products. • Leverage risk modeling solutions and expertise from resources you trust. • Find the product that addresses your particular needs. • Don’t use band aids Corporate Profile
  • 22. Technology Solutions Vendor Areas of Focus: • Endpoint (laptops/desktops) • Data at Rest (file servers, archives, mail boxes) • Data in Motion (email, web, IM, P2P) • Encryption (whole disk encryption, or targeted data encryption) • Content Filtering • Monitor vs Blocking Corporate Profile
  • 24. Fear, Uncertainty and Doubt • Data Loss Prevention technology is not the silver bullet. • The “Whole” solution may not be required. • Technology alone is not the answer. • Multiple vendor solutions may be required. Corporate Profile
  • 26. Enable Your Business • Leverage executive support • Establish DLP strategies and objectives • Educate and communicate • Highlight relevant data loss examples and explain the potential impact Corporate Profile
  • 27. Enable Your Business • Proactive versus reactive incident management • Increase your data visibility • Implement a structured and repeatable DLP policy development and management process • Prioritize findings and take action Corporate Profile
  • 28. Enable Your Business • Automated the incident response workflow process • Clearly define roles and responsibilities • Share results with executive management Corporate Profile
  • 29. Summary • Prepare, plan and execute your DLP strategy • Leverage executive management support • Communicate, communicate, communicate • People, Process and Policy approach • Align DLP technology with your goals and objectives Corporate Profile