SlideShare una empresa de Scribd logo
1 de 43
Beyond Accidental
  Data Leakage
A simple, easy to use, online, B2B procurement
 portal for purchasing products and services to
  identify, minimise and manage the security
             threat to business data.
               www.riskfactory.com
Read All About It…

               TJX Data Breach: At 45.6M
               TJX Data Breach: At 45.6M
                 Card Numbers, It's the
                 Card Numbers, It's the
                    Biggest Ever
                     Biggest Ever
                             (March 2007)
                              (March 2007)
               “We may never be able to identify much of the
                “We may never be able to identify much of the
                      information believed stolen."
                       information believed stolen."

               The company has so far spent about
                The company has so far spent about
                      $250+ million to resolve it
                       $250+ million to resolve it
               ($1B+ estimate in cases / / lost revenue)
                ($1B+ estimate in cases lost revenue)
Leakage Defined

  Data-Leakage is a loosely defined term used to describe
       an incident where the confidentiality of
        information has been compromised .

 • Data-Breach and Information
   Loss are also widely used terms

 • Data Slurping: The use of iPODs
   or portable USB hard drives
Who’s Leaking?




        www.privacyrights.org


         www.datalossdb.org
Who’s Leaking ?
Who’s Leaking?



       The government sector accounted for
       35% of reported data loss with 20%
       Education and 10% Healthcare and
       remainder reported in private sector…
The Leakers

External      Internal
What's Leaking
Biggest Leakers?


   FBI/Computer Security Institute 2011:
 85% of all offenders prosecuted for cyber crimes
     were employees of the company attacked
Top 10 Motives
 1.    Money
 2.    Dosh
 3.    Moola
 4.    Bread
 5.    Baksheesh
 6.    Scratch
 7.    Cabbage
 8.    Sheckles
 9.    Chicken Feed
 10.   Wampum
Accidents Can Happen

 •   Accidental / unintentional
 •   Carelessness
 •   Leaving sensitive information accessible to others
 •   Loosing a laptop
 •   Sending email to mistaken name or “all”
 •   Malicious code (viruses, worms, Trojan horses)
 •   Suspicious email, jokes, etc.
Beyond Accidental

 • Malicious / intentional
   vandalism / delinquency
 • Bulletin board postings
   (Fu*kedCompany,
   Dotcomscoop, Deja)
 • Disgruntled employees
 • Forwarding company data
   to home email, time bombs,
   deletion of data
You Can Find
•   Without hacking
•   Without intrusion (denial of service)
•   Without breaking any law
•   With consent of firewall
•   Regardless of company consent
•   With consent of end-user / author
•   Virtually untraceable
•   Replicable millions of times
•   Available to anyone with a PC online
•   Accessible anywhere in the world
Potential M&A Org
Restructure
Private Company’s Share
Plan
Internal Reorganization
Banking Statements
Client Contact List
Research Data
Airplane Specifications
Airplane Specifications
Flight Simulation Data
Flight Sim. Data – Engine
Failure
The Where?
Beyond Accidental II

           The trusted user turned
           entrepreneur


           Under cover / overlooked
           Easy to trust / hard to detect
           Has a key to the house
           Know’s when you’re not home
           Knows your strengths /
           weaknesses
           Why do they do it?
That’s Where The Money
Is…
Easy Money Getting
Easier
    2000
Name, Address DOB = £2.00

Credit card # = £2.00

Expiry date = £ 3.00                            2005
Security Code = £3.00              Name, Address DOB = £1.00

                  Total = £10.00   Credit card # = £1.00

                                   Expiry date = £ 1.00

                                   Security Code = £2.00                            2010
                                                       Total = £5.00   Name, Address DOB = £.25

                                                                       Credit card # = £.25

                                                                       Expiry date = £ .25

                                                                       Security Code = £.25
                                                                                              Total = £1.00
Where to Start ?

 Conduct data leakage survey


                               – ITM software
                               – Logical review
                               – Physical review
Detecting the Covert
Channels

1. Check classification scheme & security policies
2. Write policy-synchronised objective & scope
3. Identify keywords/folders & files
4. Identify target department
5. Get Board-level approval before you start
6. Deploy data leakage detection software (30-60 free trials!)
7. Audit office equipment (copy machine, faxes, scanners)
8. Audit VoIP storage access logs
9. Audit CCTV footage
10. Test physical/procedural security measures
Where Is Your Data?


• Network
• Client devices: removable media,
    unauthorised connections, devices, applications,
    local storage, file copy, save as….

•   Remote connections
•   Storage: photocopiers, scanners, faxes
•   3rd Parties
•   Service Providers
•   Contractors
How & Where Leaking?
                                                                                Laptop / Desktop
                                                                                Server
                                                                                CD / DVD
         Piggybacking
                                                                                USB       iPod
 Dumpster (Skip) Diving
                           Social Engineering                                             Memory Stick
           Contractors
           Road Apple                                                           PCMCIA
        Eavesdropping                                                           Memory Card Readers
                                                                                                 Bluetooth
                                                                   Endpoint
                                                                                Communication    Infrared
                     Databases
                                                                                                 Firewire
                  File Systems
                                                                                                 Serial / Parallel Ports
                   File Servers
          NAS                       Data-At-Rest                                Virtual Machine
         SANs / iSCSI Storage                                                                            Screen Scrapers
                    Voice Mail                         Data Loss                                         Trojans
                                                                                Other Threat Vectors
            Video Surveillance                                                                           Key Loggers
                                                                                                         Phishing / Spear Phishing
                           E-Mail
                          HTTP/S                                                  Printers
                            SSH                                                   Backup Tapes / CD / DVD
                             FTP                                                  Laptop / Desktop / Server
                                      Data-In-Motion
                              IM                                                  Fax
                            VoIP
                                                                     Physical     Photocopier
                             P2P                                                  Mobile Phone / PDA
                           Blogs                                                  Digital Camera (incl. Mobile Phone Cameras)
                                                                                  Incorrect Disposal
                                                                                  Printed Reports
Free Advice…

• Stay focussed. Follow the White Rabbit.
• Stay cool. Stay professional.
• Be a-political. No hidden agendas.
• Be prepared. You will see the Sexy Beast.
• Remember: What you will see is not new.
• You’ll see how the business really operates
But Remember



  “When the Gods want to punish us, they
          answer our prayers.”
Top Ten Distractions

• Employees viewing porn / shopping …
• Management viewing porn / shopping…
• Clandestine affairs
• Personal affairs
• Rumours
• Employees falsifying company records (expense
  accounts)
• Employees running a side business
• Convenience connections
Risk Factory Survey


•   Analysed over 200,000 hours of user activity
•   Carried out over 24 months
•   Linked to specific files, folders, and keywords
•   Identified the who, what where & when
Who?
How?
Summary Findings

• 68% theft linked to mobile rather than fixed desktop systems.
• IT and Customer Services Departments highest number data thefts.
• 96% male
• 79% incidents occurred on Fridays between 3 and 5PM.
• Applications most favoured to remove data were identified as web mail,
  instant messaging (IM) and social networking web sites.
• The top 4 theft vectors were identified as mobile devices, web mail,
  removable media and web applications.
• All instances identified could have been prevented. Existing corporate
  security policies were not implemented, monitored or enforced.
Prevention Steps

Step 1: Classification scheme

Step 2: Education & awareness

Step 3: Locate & marking

Step 4: Implement defensive measures

Step 5: Monitor, enforce, report
Defense Must Be Layered
                            Spyware        Hackers

          Inappropriate
               Content


        Network                                                          Perimeter security
   Layer Attacks
                                                                          Strong authentication
                                                                          URL filtering

                                                                         Anti-virus
      Viruses
                                                                      IDS/IPS




                                                             UNAUTHORISED APPLICATION USE
                                                             Cut, Copy, Paste, Print, Rename, Save As

                                                       UNAUTHORISED APPLICATIONS
 UNAUTHORISED CONNECTIONS                              Malware, IM, Webmail, Skype, MySpace, file sharing
     Wireless (802.11, Bluetooth, IR,
     GPRS/UMTS/HSPDA), Modems           UNAUTHORISED FILE COPYING & OUTPUT DEVICES
                                        Local file copies (removable storage, mobile devices), printers,
                                        copiers, faxes
Obligatory Summary
Slide

• Data leakage is not a phenomenon
• Your data worth money - treat it accordingly
• Statistically speaking, bad guy works for you
• Know where your data resides: exit end
  points, at rest and in motion…
• Its all about the user
26 Dover Street
        London
    United Kingdom
        W1S 4LY
  +44 (0)20 3586 1025
+44 (0)20 7763 7101(fax)

Más contenido relacionado

La actualidad más candente

"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent..."Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
Earley Information Science
 
Poken for Sales
Poken for SalesPoken for Sales
Poken for Sales
pokenjedi
 

La actualidad más candente (8)

"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent..."Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
"Building Intelligent Content from 30 Years of Legacy Documents," Intelligent...
 
Thornton e authentication guidance
Thornton   e authentication guidanceThornton   e authentication guidance
Thornton e authentication guidance
 
Stefan Decker
Stefan DeckerStefan Decker
Stefan Decker
 
Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...Turning social disputes into knowledge representations DERI reading group 201...
Turning social disputes into knowledge representations DERI reading group 201...
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
How To Protect and Commercialize Intellectual Property
How To Protect and Commercialize Intellectual PropertyHow To Protect and Commercialize Intellectual Property
How To Protect and Commercialize Intellectual Property
 
Poken for Sales
Poken for SalesPoken for Sales
Poken for Sales
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
 

Destacado

Paulking dlp
Paulking dlpPaulking dlp
Paulking dlp
d0nn9n
 
DLP_AlcoholandYou (4)
DLP_AlcoholandYou (4)DLP_AlcoholandYou (4)
DLP_AlcoholandYou (4)
Tony Bishop
 

Destacado (7)

Paulking dlp
Paulking dlpPaulking dlp
Paulking dlp
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
пр Все про Dlp 1.1
пр Все про Dlp 1.1пр Все про Dlp 1.1
пр Все про Dlp 1.1
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
FICCI India Risk Survey 2016
FICCI India Risk Survey 2016 FICCI India Risk Survey 2016
FICCI India Risk Survey 2016
 
DLP_AlcoholandYou (4)
DLP_AlcoholandYou (4)DLP_AlcoholandYou (4)
DLP_AlcoholandYou (4)
 
Tracxn Research — Enterprise Storage Landscape, November 2016
Tracxn Research — Enterprise Storage Landscape, November 2016Tracxn Research — Enterprise Storage Landscape, November 2016
Tracxn Research — Enterprise Storage Landscape, November 2016
 

Similar a Risk Factory: Beyond Data Leakage

You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
TechGenie
 
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
BodeGeorge
 
Digital evidence and the information security manager
Digital evidence and the information security managerDigital evidence and the information security manager
Digital evidence and the information security manager
Bradley Schatz
 

Similar a Risk Factory: Beyond Data Leakage (20)

Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to Fit
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
Protection against Lost or Stolen Data with Novell ZENworks Endpoint Security...
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
Csi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide MerdingerCsi Netsec 2006 Poor Mans Guide Merdinger
Csi Netsec 2006 Poor Mans Guide Merdinger
 
B Hkorba
B HkorbaB Hkorba
B Hkorba
 
Data Breach from the Inside Out
Data Breach from the Inside Out Data Breach from the Inside Out
Data Breach from the Inside Out
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Recent developments in data analytics and big data
Recent developments in data analytics and big dataRecent developments in data analytics and big data
Recent developments in data analytics and big data
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
 
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
Multi-Factor Authentication of zOS (Steven Ringelberg - VANGUARD Integrity Pr...
 
Digital evidence and the information security manager
Digital evidence and the information security managerDigital evidence and the information security manager
Digital evidence and the information security manager
 

Más de Risk Crew

Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013
Risk Crew
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile Devices
Risk Crew
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
Risk Crew
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Crew
 

Más de Risk Crew (18)

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a Hacker
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 Numbers
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best Practice
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big Data
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile Devices
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Risk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response ProgrammeRisk Factory: How to Implement an Effective Incident Response Programme
Risk Factory: How to Implement an Effective Incident Response Programme
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back Door
 
Risk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Factory How to Steal an Identity
Risk Factory How to Steal an Identity
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic Eavesdropping
 
Risk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best Practices
 

Risk Factory: Beyond Data Leakage

  • 1. Beyond Accidental Data Leakage
  • 2. A simple, easy to use, online, B2B procurement portal for purchasing products and services to identify, minimise and manage the security threat to business data. www.riskfactory.com
  • 3. Read All About It… TJX Data Breach: At 45.6M TJX Data Breach: At 45.6M Card Numbers, It's the Card Numbers, It's the Biggest Ever Biggest Ever (March 2007) (March 2007) “We may never be able to identify much of the “We may never be able to identify much of the information believed stolen." information believed stolen." The company has so far spent about The company has so far spent about $250+ million to resolve it $250+ million to resolve it ($1B+ estimate in cases / / lost revenue) ($1B+ estimate in cases lost revenue)
  • 4. Leakage Defined Data-Leakage is a loosely defined term used to describe an incident where the confidentiality of information has been compromised . • Data-Breach and Information Loss are also widely used terms • Data Slurping: The use of iPODs or portable USB hard drives
  • 5. Who’s Leaking? www.privacyrights.org www.datalossdb.org
  • 7. Who’s Leaking? The government sector accounted for 35% of reported data loss with 20% Education and 10% Healthcare and remainder reported in private sector…
  • 10. Biggest Leakers? FBI/Computer Security Institute 2011: 85% of all offenders prosecuted for cyber crimes were employees of the company attacked
  • 11. Top 10 Motives 1. Money 2. Dosh 3. Moola 4. Bread 5. Baksheesh 6. Scratch 7. Cabbage 8. Sheckles 9. Chicken Feed 10. Wampum
  • 12. Accidents Can Happen • Accidental / unintentional • Carelessness • Leaving sensitive information accessible to others • Loosing a laptop • Sending email to mistaken name or “all” • Malicious code (viruses, worms, Trojan horses) • Suspicious email, jokes, etc.
  • 13. Beyond Accidental • Malicious / intentional vandalism / delinquency • Bulletin board postings (Fu*kedCompany, Dotcomscoop, Deja) • Disgruntled employees • Forwarding company data to home email, time bombs, deletion of data
  • 14. You Can Find • Without hacking • Without intrusion (denial of service) • Without breaking any law • With consent of firewall • Regardless of company consent • With consent of end-user / author • Virtually untraceable • Replicable millions of times • Available to anyone with a PC online • Accessible anywhere in the world
  • 24. Flight Sim. Data – Engine Failure
  • 26. Beyond Accidental II The trusted user turned entrepreneur Under cover / overlooked Easy to trust / hard to detect Has a key to the house Know’s when you’re not home Knows your strengths / weaknesses Why do they do it?
  • 27. That’s Where The Money Is…
  • 28. Easy Money Getting Easier 2000 Name, Address DOB = £2.00 Credit card # = £2.00 Expiry date = £ 3.00 2005 Security Code = £3.00 Name, Address DOB = £1.00 Total = £10.00 Credit card # = £1.00 Expiry date = £ 1.00 Security Code = £2.00 2010 Total = £5.00 Name, Address DOB = £.25 Credit card # = £.25 Expiry date = £ .25 Security Code = £.25 Total = £1.00
  • 29. Where to Start ? Conduct data leakage survey – ITM software – Logical review – Physical review
  • 30. Detecting the Covert Channels 1. Check classification scheme & security policies 2. Write policy-synchronised objective & scope 3. Identify keywords/folders & files 4. Identify target department 5. Get Board-level approval before you start 6. Deploy data leakage detection software (30-60 free trials!) 7. Audit office equipment (copy machine, faxes, scanners) 8. Audit VoIP storage access logs 9. Audit CCTV footage 10. Test physical/procedural security measures
  • 31. Where Is Your Data? • Network • Client devices: removable media, unauthorised connections, devices, applications, local storage, file copy, save as…. • Remote connections • Storage: photocopiers, scanners, faxes • 3rd Parties • Service Providers • Contractors
  • 32. How & Where Leaking? Laptop / Desktop Server CD / DVD Piggybacking USB iPod Dumpster (Skip) Diving Social Engineering Memory Stick Contractors Road Apple PCMCIA Eavesdropping Memory Card Readers Bluetooth Endpoint Communication Infrared Databases Firewire File Systems Serial / Parallel Ports File Servers NAS Data-At-Rest Virtual Machine SANs / iSCSI Storage Screen Scrapers Voice Mail Data Loss Trojans Other Threat Vectors Video Surveillance Key Loggers Phishing / Spear Phishing E-Mail HTTP/S Printers SSH Backup Tapes / CD / DVD FTP Laptop / Desktop / Server Data-In-Motion IM Fax VoIP Physical Photocopier P2P Mobile Phone / PDA Blogs Digital Camera (incl. Mobile Phone Cameras) Incorrect Disposal Printed Reports
  • 33. Free Advice… • Stay focussed. Follow the White Rabbit. • Stay cool. Stay professional. • Be a-political. No hidden agendas. • Be prepared. You will see the Sexy Beast. • Remember: What you will see is not new. • You’ll see how the business really operates
  • 34. But Remember “When the Gods want to punish us, they answer our prayers.”
  • 35. Top Ten Distractions • Employees viewing porn / shopping … • Management viewing porn / shopping… • Clandestine affairs • Personal affairs • Rumours • Employees falsifying company records (expense accounts) • Employees running a side business • Convenience connections
  • 36. Risk Factory Survey • Analysed over 200,000 hours of user activity • Carried out over 24 months • Linked to specific files, folders, and keywords • Identified the who, what where & when
  • 37. Who?
  • 38. How?
  • 39. Summary Findings • 68% theft linked to mobile rather than fixed desktop systems. • IT and Customer Services Departments highest number data thefts. • 96% male • 79% incidents occurred on Fridays between 3 and 5PM. • Applications most favoured to remove data were identified as web mail, instant messaging (IM) and social networking web sites. • The top 4 theft vectors were identified as mobile devices, web mail, removable media and web applications. • All instances identified could have been prevented. Existing corporate security policies were not implemented, monitored or enforced.
  • 40. Prevention Steps Step 1: Classification scheme Step 2: Education & awareness Step 3: Locate & marking Step 4: Implement defensive measures Step 5: Monitor, enforce, report
  • 41. Defense Must Be Layered Spyware Hackers Inappropriate Content Network Perimeter security Layer Attacks Strong authentication URL filtering Anti-virus Viruses IDS/IPS UNAUTHORISED APPLICATION USE Cut, Copy, Paste, Print, Rename, Save As UNAUTHORISED APPLICATIONS UNAUTHORISED CONNECTIONS Malware, IM, Webmail, Skype, MySpace, file sharing Wireless (802.11, Bluetooth, IR, GPRS/UMTS/HSPDA), Modems UNAUTHORISED FILE COPYING & OUTPUT DEVICES Local file copies (removable storage, mobile devices), printers, copiers, faxes
  • 42. Obligatory Summary Slide • Data leakage is not a phenomenon • Your data worth money - treat it accordingly • Statistically speaking, bad guy works for you • Know where your data resides: exit end points, at rest and in motion… • Its all about the user
  • 43. 26 Dover Street London United Kingdom W1S 4LY +44 (0)20 3586 1025 +44 (0)20 7763 7101(fax)

Notas del editor

  1. Give out cards
  2. Oldest crime on record – not prostitution First recorded case of identity theft Bible: Genesis XXX