SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Miroslav Bajgar
Sales Engineer EEUR
Inteligentní ochrana osobních údajů (a citlivých dat)
v procesu digitální transformace a přechodu do cloudu.
100x reduction in
malware incidents when
deploying Forcepoint.1
Forcepoint
Web & Email
Security
Forcepoint
Data Guard
Eliminates costly and time-consuming
manual data transfers of highly-
regulated, sensitive data.
Forcepoint
NGFW
Cuts network expenses by 50%, reduces
cyberattacks by up to 86%, slashes
incident response time as much as 73%.
Forcepoint
CASB
Broadest cloud application support with unique
customized risk assessment based on user
behavior and data access classification.
Forcepoint
Insider Threat
The most comprehensive
understanding of user intent,
trusted on over 1M endpoints.
Forcepoint
DLP
Gartner Magic Quadrant
Leader in Enterprise DLP
9 consecutive times.
Forcepoint
UEBA
The leader in actionable
insights based on
risk-adaptive scoring.
BEST IN CLASS CAPABILITIES
© 2019 Forcepoint | 3
We as Forcepoint are disrupting the security industry
• By delivering a unique human-centric cybersecurity approach
• With the goal of protecting users and data
• Frictionless and at scale for cloud, on-premises, and hybrid
Forcepoint: the Company
© 2019 Forcepoint | 4
Why are we disrupting the industry through
human-centric security?
Making the
Perimeter Intelligent
© 2019 Forcepoint | 5
How are we doing Human-Centric Security?
Making the
Perimeter Intelligent
© 2019 Forcepoint | 6
Lets take a step back. What is the idea of perimeter security?
You are building a wall around what you want to protect
Building a Wall Around What
You Want to Protect
© 2019 Forcepoint | 7
• The wall is not high enough
What are the options to build that wall?
Building a Wall Around What
You Want to Protect
© 2019 Forcepoint | 8
Outcome
© 2019 Forcepoint | 9
• The wall is too high
What are the options to build that wall?
Building a Wall Around What
You Want to Protect
© 2019 Forcepoint | 10
Outcome
© 2019 Forcepoint | 11
• The wall is just right!
What are the options to build that wall?
Building a Wall Around What
You Want to Protect
© 2019 Forcepoint | 12
Single point of failure: delay, scalability, etc.
Perimeter needs a template what to look for.
What happens before and after the perimeter: It is not analyzed!
Full trust behind the perimeter. Not everybody is an angel!
• Malicious insiders and accidental threat activity
Data is flowing like meandering rivers from on-premises to the cloud
• New paradigm
The wall is just right! So why is
the perimeter still not enough?
© 2019 Forcepoint | 13
Enrich the perimeter through two dimensions:
data and users
Goal is to make the perimeter smart!
Also understand what is happening before
and behind the perimeter
How? Behavioral Analytics at the user level—
not at the perimeter
What is the Solution Now?
A different approach to cybersecurity
© 2019 Forcepoint | 14
Does This Compromise Privacy?
No – you need to change the perception and view:
© 2019 Forcepoint | 15
Compliance (goal: trust of shareholders) is built on
control frameworks
• This is not about controlling the user
• This is about controlling the risk
This is your liability based on the
compliance frameworks
No – you Need to Change the
Perception and View:
Step 1
Analyzing Behavior before and after
the perimeter. Zero Trust
Step 2
Dynamically feeding back the risk into the
policy. No static policies!
Step 3
Making a decision based on context, not just
blanket black and white policies
Putting this all together
We already have the idea of zero trust.
This is the first incarnation in 2 steps:
This is about using behavior analysis to make the perimeter intelligent
© 2019 Forcepoint | 17
Use Case 1: Risk-Adaptive Dynamic Usage IT Director (Henry)
Monday
January 21 @ 10am
Risk Score: 30
Working while on PTO
+ Additional Context
Risk-Adaptive Protection
No enforcement action
Risk Score: 50
Risk-Adaptive Protection
Video capture activated
Evidence available for investigation later
Thursday
January 24 @ 1pm
Remote login with
change of UserID
+ Additional Context
Wednesday
January 30 @ 9pm
Risk Score: 80
Copy file to staging area
Risk-Adaptive Protection
Copy allowed but file encrypted
No corporate data at risk
+ Additional Context
Saturday
February 9 @ 6am
Risk Score: 95
Bulk copy to USB drive
Risk-Adaptive Protection
Action is blocked & account is locked
Avoided $10M breach and proof that
Henry is the attacker is available
+ Additional Context
© 2019 Forcepoint | 18
From
Blocking
To
Empowering
Graduated Enforcement Based on Risk
Removing friction to enable productivity without sacrificing security
© 2019 Forcepoint | 19
You have successfully installed and deployed Data Loss Prevention
You have 3,000 users. Based on statistics:
• You have 3,000 incidents per day
• You need to hire five Data Scientists to handle the top priority 250 incidents
• The rest is ‘flying below the radar’
• People learn the rules. More flying under the radar
• Three lower incidents could mean a significant risk
• You need people to go through PI data. GDPR
What if a machine learning algorithm bubbles up risk and feeds the
result back dynamically into a DLP policy?
Use Case 2: The Operational Dilemma
© 2019 Forcepoint | 20
Data Swamp
Limited visibility of data
Unknown security breaches
Policy framework in place
Visibility into all data sources
Audit-only to reduce friction
Post-breach analytics
Understand what has happened
Change policies retrospectively
Individualized, automated
enforcement based on risk to
stop or prevent
data loss
All other employees
unaffected within a frictionless
environment
Risk-adaptive and dynamic
feedback of risk into
the policy
EnterpriseMaturity
Level 0 Level 1 Level 2 Level 3
Proactive Automation
Understanding
Visibility
The Dynamic Data Protection Maturity Curve
From data swamp to automated security action
Protect your users and data
without impacting usability
Empower your business with frictionless
security that runs
in the background
Human-Centric Security for a Smart Perimeter
Lower risk of brand or financial penalties
resulting from data breaches
Move from passive data loss
prevention to active Dynamic
Data Protection
Protect Empower Lower Risk Active
© 2019 Forcepoint | 22
@Forcepointsec ForcepointForcepoint Forcepoint
@Forcepointlabs
Follow us!

Más contenido relacionado

La actualidad más candente

The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
Kaspersky
 

La actualidad más candente (20)

Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeDisección de amenazas en entornos de nube
Disección de amenazas en entornos de nube
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
Unified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud InfrastructureUnified Protection for Multi-Cloud Infrastructure
Unified Protection for Multi-Cloud Infrastructure
 
Zenith Live - Security Lab - Phantom
Zenith Live - Security Lab - PhantomZenith Live - Security Lab - Phantom
Zenith Live - Security Lab - Phantom
 
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
Sacon - IoT Forum Fresh Thinking (Arvind Tiwary + Bikash Barai)
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for meraki
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 

Similar a Inteligentní ochrana osobních údajů v procesu digitální transformace

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 

Similar a Inteligentní ochrana osobních údajů v procesu digitální transformace (20)

Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
CNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical SecurityCNL Software PSIM Presentation - Information Management within Physical Security
CNL Software PSIM Presentation - Information Management within Physical Security
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Stay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breachStay out of headlines for non compliance or data breach
Stay out of headlines for non compliance or data breach
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa versionLarry Whiteside - Optiv Cloud ready or steam rolled csa version
Larry Whiteside - Optiv Cloud ready or steam rolled csa version
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
 
Evolution security controls towards Cloud Services
Evolution security controls towards Cloud ServicesEvolution security controls towards Cloud Services
Evolution security controls towards Cloud Services
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
Webinar: 5 Key Trends That Could Challenge Your Data Protection Plan in 2018
 
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 

Más de MarketingArrowECS_CZ

Más de MarketingArrowECS_CZ (20)

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Inteligentní ochrana osobních údajů v procesu digitální transformace

  • 1. Miroslav Bajgar Sales Engineer EEUR Inteligentní ochrana osobních údajů (a citlivých dat) v procesu digitální transformace a přechodu do cloudu.
  • 2. 100x reduction in malware incidents when deploying Forcepoint.1 Forcepoint Web & Email Security Forcepoint Data Guard Eliminates costly and time-consuming manual data transfers of highly- regulated, sensitive data. Forcepoint NGFW Cuts network expenses by 50%, reduces cyberattacks by up to 86%, slashes incident response time as much as 73%. Forcepoint CASB Broadest cloud application support with unique customized risk assessment based on user behavior and data access classification. Forcepoint Insider Threat The most comprehensive understanding of user intent, trusted on over 1M endpoints. Forcepoint DLP Gartner Magic Quadrant Leader in Enterprise DLP 9 consecutive times. Forcepoint UEBA The leader in actionable insights based on risk-adaptive scoring. BEST IN CLASS CAPABILITIES
  • 3. © 2019 Forcepoint | 3 We as Forcepoint are disrupting the security industry • By delivering a unique human-centric cybersecurity approach • With the goal of protecting users and data • Frictionless and at scale for cloud, on-premises, and hybrid Forcepoint: the Company
  • 4. © 2019 Forcepoint | 4 Why are we disrupting the industry through human-centric security? Making the Perimeter Intelligent
  • 5. © 2019 Forcepoint | 5 How are we doing Human-Centric Security? Making the Perimeter Intelligent
  • 6. © 2019 Forcepoint | 6 Lets take a step back. What is the idea of perimeter security? You are building a wall around what you want to protect Building a Wall Around What You Want to Protect
  • 7. © 2019 Forcepoint | 7 • The wall is not high enough What are the options to build that wall? Building a Wall Around What You Want to Protect
  • 8. © 2019 Forcepoint | 8 Outcome
  • 9. © 2019 Forcepoint | 9 • The wall is too high What are the options to build that wall? Building a Wall Around What You Want to Protect
  • 10. © 2019 Forcepoint | 10 Outcome
  • 11. © 2019 Forcepoint | 11 • The wall is just right! What are the options to build that wall? Building a Wall Around What You Want to Protect
  • 12. © 2019 Forcepoint | 12 Single point of failure: delay, scalability, etc. Perimeter needs a template what to look for. What happens before and after the perimeter: It is not analyzed! Full trust behind the perimeter. Not everybody is an angel! • Malicious insiders and accidental threat activity Data is flowing like meandering rivers from on-premises to the cloud • New paradigm The wall is just right! So why is the perimeter still not enough?
  • 13. © 2019 Forcepoint | 13 Enrich the perimeter through two dimensions: data and users Goal is to make the perimeter smart! Also understand what is happening before and behind the perimeter How? Behavioral Analytics at the user level— not at the perimeter What is the Solution Now? A different approach to cybersecurity
  • 14. © 2019 Forcepoint | 14 Does This Compromise Privacy? No – you need to change the perception and view:
  • 15. © 2019 Forcepoint | 15 Compliance (goal: trust of shareholders) is built on control frameworks • This is not about controlling the user • This is about controlling the risk This is your liability based on the compliance frameworks No – you Need to Change the Perception and View:
  • 16. Step 1 Analyzing Behavior before and after the perimeter. Zero Trust Step 2 Dynamically feeding back the risk into the policy. No static policies! Step 3 Making a decision based on context, not just blanket black and white policies Putting this all together We already have the idea of zero trust. This is the first incarnation in 2 steps: This is about using behavior analysis to make the perimeter intelligent
  • 17. © 2019 Forcepoint | 17 Use Case 1: Risk-Adaptive Dynamic Usage IT Director (Henry) Monday January 21 @ 10am Risk Score: 30 Working while on PTO + Additional Context Risk-Adaptive Protection No enforcement action Risk Score: 50 Risk-Adaptive Protection Video capture activated Evidence available for investigation later Thursday January 24 @ 1pm Remote login with change of UserID + Additional Context Wednesday January 30 @ 9pm Risk Score: 80 Copy file to staging area Risk-Adaptive Protection Copy allowed but file encrypted No corporate data at risk + Additional Context Saturday February 9 @ 6am Risk Score: 95 Bulk copy to USB drive Risk-Adaptive Protection Action is blocked & account is locked Avoided $10M breach and proof that Henry is the attacker is available + Additional Context
  • 18. © 2019 Forcepoint | 18 From Blocking To Empowering Graduated Enforcement Based on Risk Removing friction to enable productivity without sacrificing security
  • 19. © 2019 Forcepoint | 19 You have successfully installed and deployed Data Loss Prevention You have 3,000 users. Based on statistics: • You have 3,000 incidents per day • You need to hire five Data Scientists to handle the top priority 250 incidents • The rest is ‘flying below the radar’ • People learn the rules. More flying under the radar • Three lower incidents could mean a significant risk • You need people to go through PI data. GDPR What if a machine learning algorithm bubbles up risk and feeds the result back dynamically into a DLP policy? Use Case 2: The Operational Dilemma
  • 20. © 2019 Forcepoint | 20 Data Swamp Limited visibility of data Unknown security breaches Policy framework in place Visibility into all data sources Audit-only to reduce friction Post-breach analytics Understand what has happened Change policies retrospectively Individualized, automated enforcement based on risk to stop or prevent data loss All other employees unaffected within a frictionless environment Risk-adaptive and dynamic feedback of risk into the policy EnterpriseMaturity Level 0 Level 1 Level 2 Level 3 Proactive Automation Understanding Visibility The Dynamic Data Protection Maturity Curve From data swamp to automated security action
  • 21. Protect your users and data without impacting usability Empower your business with frictionless security that runs in the background Human-Centric Security for a Smart Perimeter Lower risk of brand or financial penalties resulting from data breaches Move from passive data loss prevention to active Dynamic Data Protection Protect Empower Lower Risk Active
  • 22. © 2019 Forcepoint | 22 @Forcepointsec ForcepointForcepoint Forcepoint @Forcepointlabs Follow us!