SlideShare a Scribd company logo
1 of 8
Data Loss Prevention in 2009


                                     Simon Perry
                      Principal Associate Analyst - Sustainability




© 2009 Quocirca Ltd
What is this presentation about?

      •  This presentation deck was created in November of
         2008, and updated in February of 2009.
      •  It gives an overview of the the concept of “data loss
         prevention”; including:
          –  Market drivers that create the need for DLP
          –  An introduction to the layered content/computer/
             context model of security
          –  Recommendations on policy approaches and
             desirable technology features
          –  Pointers to further reading




© 2008 Quocirca Ltd
Market Drivers




                                          Increased
        Effective          More and
                                         petty theft
          Asset           more remote
                                        and Targeted
       Management          workers
                                            thefts


               Internal                                External


© 2009 Quocirca Ltd
C++ Security



                      Context    • Location
                                 • History




                      Computer   • HW state
                                 • SW stack


                                 • Classified

                      Content
                                 • Encrypted
                                 • Trackable
                                 • Erasable



© 2009 Quocirca Ltd
Security classifications

                      • Sensitive                                    • Publicly
                        corporate                                      available
                        data                                           content


                                       Unregulated,
                                                       Generally
                                       commercially
                                                         open
                                       advantageous




                                                      Unregulated,
                                          Highly
                                                      commercially
                                        regulated
                                                      advantageous

                      • Personally                                   • Intellectual
                        Identifiable                                   property
                        Information


© 2009 Quocirca Ltd
Preventing data loss




              Data inclusion and movement policy


              Data protection policy and technology


              “Diving save” – cleaning up the mess




© 2009 Quocirca Ltd
Recommendations

      •  Truly critical data should not be copied to laptops and
         other portable devices
      •  When portable devices are taken out of the office with
         critical data onboard they must be encrypted
      •  Access controls should exist to ensure critical data can’t
         be forwarded inappropriately
      •  The ability to remotely delete and wipe critical
         information provides the “diving save”
      •  This is a problem that bridges the virtual and physical
         worlds – where a device physically is is important to the
         execution of the protection policy




© 2009 Quocirca Ltd
References and further reading

      •  Managing 21st Century Networks (Quocirca, January 2007)
      http://www.quocirca.com/pages/analysis/reports/view/store250/item3609/?link_683=3609
      •  The Distributed Business Index (Quocirca, March 2008)
      http://www.quocirca.com/pages/analysis/reports/view/store250/item20918/?
          link_683=20918
      •  Quocirca recommends the forthcoming book from Stewart Room of Field Fisher
          Waterhouse LLP based on its seminar series reviewing legal aspects of data protection
          and data privacy. For more information go to:
      http://www.ffw.com/publications/all.aspx?Person=1282
      •  Why Application Security is Crucial (Quocirca, March 2008)
      http://www.quocirca.com/pages/analysis/reports/view/store250/item21107/?
          link_683=21107
      •  Superhighway at the Crossroads (Quocirca, September 2008)
      http://www.quocirca.com/pages/analysis/reports/view/store250/item21547/?
          link_683=21547




© 2009 Quocirca Ltd

More Related Content

Viewers also liked

Het nieuwe werken en de rol van sociale media
Het nieuwe werken en de rol van sociale mediaHet nieuwe werken en de rol van sociale media
Het nieuwe werken en de rol van sociale mediaKees Romkes
 
10 connections to make in 2014
10 connections to make in 201410 connections to make in 2014
10 connections to make in 2014iCrossing
 
Public Comment "How To": Lake Erie & Toxic Sediment Disposal
Public Comment "How To": Lake Erie & Toxic Sediment DisposalPublic Comment "How To": Lake Erie & Toxic Sediment Disposal
Public Comment "How To": Lake Erie & Toxic Sediment DisposalOhio Environmental Council
 
international paper Q2 2003 10-Q
international paper Q2 2003 10-Qinternational paper Q2 2003 10-Q
international paper Q2 2003 10-Qfinance12
 
international paper Q1 2001 10-Q
international paper Q1 2001 10-Qinternational paper Q1 2001 10-Q
international paper Q1 2001 10-Qfinance12
 
WordPress Miami Meetup: Top 9 (August 2015)
WordPress Miami Meetup: Top 9 (August 2015)WordPress Miami Meetup: Top 9 (August 2015)
WordPress Miami Meetup: Top 9 (August 2015)David Bisset
 
STOP: How Social Media Affects Every Part of your Business
STOP:  How Social Media Affects Every Part of your Business STOP:  How Social Media Affects Every Part of your Business
STOP: How Social Media Affects Every Part of your Business iCrossing
 
raytheon Q4 Earnings Presentation
raytheon Q4 Earnings Presentationraytheon Q4 Earnings Presentation
raytheon Q4 Earnings Presentationfinance12
 
Maine guide final_080214[1][1]
Maine guide final_080214[1][1]Maine guide final_080214[1][1]
Maine guide final_080214[1][1]prog832000
 
raytheon Q4 Earnings Presentation
raytheon Q4 Earnings Presentationraytheon Q4 Earnings Presentation
raytheon Q4 Earnings Presentationfinance12
 
Architectuur & Fotografie Opdracht 2
Architectuur & Fotografie Opdracht 2Architectuur & Fotografie Opdracht 2
Architectuur & Fotografie Opdracht 2monique.kerkhof
 
wyeth UBS Global Life Sciences Conference
wyeth UBS Global Life Sciences Conferencewyeth UBS Global Life Sciences Conference
wyeth UBS Global Life Sciences Conferencefinance12
 
goodyear 10K Reports 2004
goodyear 10K Reports 2004goodyear 10K Reports 2004
goodyear 10K Reports 2004finance12
 
international paper Q1 2006 10-Q
international paper Q1 2006 10-Qinternational paper Q1 2006 10-Q
international paper Q1 2006 10-Qfinance12
 
Educational Outcomes - Path 101
Educational Outcomes -  Path 101Educational Outcomes -  Path 101
Educational Outcomes - Path 101path101
 
Another Kind of World Tour
Another Kind of World TourAnother Kind of World Tour
Another Kind of World Tourninedots
 
How To Make A Great Pbj
How To Make A Great PbjHow To Make A Great Pbj
How To Make A Great Pbjguestafd23
 
Pretty Blue Planet
Pretty Blue PlanetPretty Blue Planet
Pretty Blue Planetninedots
 

Viewers also liked (20)

Het nieuwe werken en de rol van sociale media
Het nieuwe werken en de rol van sociale mediaHet nieuwe werken en de rol van sociale media
Het nieuwe werken en de rol van sociale media
 
10 connections to make in 2014
10 connections to make in 201410 connections to make in 2014
10 connections to make in 2014
 
Public Comment "How To": Lake Erie & Toxic Sediment Disposal
Public Comment "How To": Lake Erie & Toxic Sediment DisposalPublic Comment "How To": Lake Erie & Toxic Sediment Disposal
Public Comment "How To": Lake Erie & Toxic Sediment Disposal
 
international paper Q2 2003 10-Q
international paper Q2 2003 10-Qinternational paper Q2 2003 10-Q
international paper Q2 2003 10-Q
 
international paper Q1 2001 10-Q
international paper Q1 2001 10-Qinternational paper Q1 2001 10-Q
international paper Q1 2001 10-Q
 
Cq 12º
Cq 12ºCq 12º
Cq 12º
 
WordPress Miami Meetup: Top 9 (August 2015)
WordPress Miami Meetup: Top 9 (August 2015)WordPress Miami Meetup: Top 9 (August 2015)
WordPress Miami Meetup: Top 9 (August 2015)
 
STOP: How Social Media Affects Every Part of your Business
STOP:  How Social Media Affects Every Part of your Business STOP:  How Social Media Affects Every Part of your Business
STOP: How Social Media Affects Every Part of your Business
 
Blogovi1
Blogovi1Blogovi1
Blogovi1
 
raytheon Q4 Earnings Presentation
raytheon Q4 Earnings Presentationraytheon Q4 Earnings Presentation
raytheon Q4 Earnings Presentation
 
Maine guide final_080214[1][1]
Maine guide final_080214[1][1]Maine guide final_080214[1][1]
Maine guide final_080214[1][1]
 
raytheon Q4 Earnings Presentation
raytheon Q4 Earnings Presentationraytheon Q4 Earnings Presentation
raytheon Q4 Earnings Presentation
 
Architectuur & Fotografie Opdracht 2
Architectuur & Fotografie Opdracht 2Architectuur & Fotografie Opdracht 2
Architectuur & Fotografie Opdracht 2
 
wyeth UBS Global Life Sciences Conference
wyeth UBS Global Life Sciences Conferencewyeth UBS Global Life Sciences Conference
wyeth UBS Global Life Sciences Conference
 
goodyear 10K Reports 2004
goodyear 10K Reports 2004goodyear 10K Reports 2004
goodyear 10K Reports 2004
 
international paper Q1 2006 10-Q
international paper Q1 2006 10-Qinternational paper Q1 2006 10-Q
international paper Q1 2006 10-Q
 
Educational Outcomes - Path 101
Educational Outcomes -  Path 101Educational Outcomes -  Path 101
Educational Outcomes - Path 101
 
Another Kind of World Tour
Another Kind of World TourAnother Kind of World Tour
Another Kind of World Tour
 
How To Make A Great Pbj
How To Make A Great PbjHow To Make A Great Pbj
How To Make A Great Pbj
 
Pretty Blue Planet
Pretty Blue PlanetPretty Blue Planet
Pretty Blue Planet
 

Similar to InfoSecurity Magazine - Data Loss Prevention

InDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation FinalInDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation FinalRob Marano
 
RW Keynote IDM2009
RW Keynote IDM2009RW Keynote IDM2009
RW Keynote IDM2009racingsnake
 
Concept Searching ConceptClassifier For SharePoint
Concept Searching ConceptClassifier For SharePointConcept Searching ConceptClassifier For SharePoint
Concept Searching ConceptClassifier For SharePointmartingarland
 
Soa R 7 16 08 Appistry Private Clouds Etc Bob Lozano
Soa R 7 16 08   Appistry   Private Clouds Etc Bob LozanoSoa R 7 16 08   Appistry   Private Clouds Etc Bob Lozano
Soa R 7 16 08 Appistry Private Clouds Etc Bob LozanoGovCloud Network
 
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGrant Swanson
 
Axmedis2007 Presentation
Axmedis2007 PresentationAxmedis2007 Presentation
Axmedis2007 PresentationCarlos Serrao
 
Clouds in emerging markets
Clouds in emerging marketsClouds in emerging markets
Clouds in emerging marketsACMBangalore
 
Rule Imc Records Management & Discovery Offering Q109 V2
Rule Imc Records Management & Discovery Offering Q109 V2Rule Imc Records Management & Discovery Offering Q109 V2
Rule Imc Records Management & Discovery Offering Q109 V2mikelines
 
Right Space Brief
Right Space BriefRight Space Brief
Right Space Briefjnassour
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayGovCloud Network
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elementsahmed_vr
 
Stingray - Riverbed Technology
Stingray - Riverbed TechnologyStingray - Riverbed Technology
Stingray - Riverbed TechnologyChris Westin
 
Lived It Lecture: Building a better deal
Lived It Lecture: Building a better dealLived It Lecture: Building a better deal
Lived It Lecture: Building a better dealMaRS Discovery District
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
 
Glonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self ServiceGlonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self ServiceCarleton Bedell
 
Prefix Capabilities Summary
Prefix Capabilities SummaryPrefix Capabilities Summary
Prefix Capabilities Summaryrcdb0lton
 
Missouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General SessionMissouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General SessionKurt Madel
 
Ian Jindal: Presentation to the "Future of Digital Marketing", June 2008
Ian Jindal: Presentation to the "Future of Digital Marketing", June 2008Ian Jindal: Presentation to the "Future of Digital Marketing", June 2008
Ian Jindal: Presentation to the "Future of Digital Marketing", June 2008Ian Jindal
 
Converged Application Platforms Enhance Your Bottom Line
Converged Application Platforms Enhance Your Bottom LineConverged Application Platforms Enhance Your Bottom Line
Converged Application Platforms Enhance Your Bottom Linesebastien_stevenoot
 

Similar to InfoSecurity Magazine - Data Loss Prevention (20)

InDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation FinalInDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation Final
 
RW Keynote IDM2009
RW Keynote IDM2009RW Keynote IDM2009
RW Keynote IDM2009
 
Concept Searching ConceptClassifier For SharePoint
Concept Searching ConceptClassifier For SharePointConcept Searching ConceptClassifier For SharePoint
Concept Searching ConceptClassifier For SharePoint
 
LEAR aany
LEAR aanyLEAR aany
LEAR aany
 
Soa R 7 16 08 Appistry Private Clouds Etc Bob Lozano
Soa R 7 16 08   Appistry   Private Clouds Etc Bob LozanoSoa R 7 16 08   Appistry   Private Clouds Etc Bob Lozano
Soa R 7 16 08 Appistry Private Clouds Etc Bob Lozano
 
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic AnalysisGigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
Gigamon U - You Will See, Content Monitoring, Alerting, and Forensic Analysis
 
Axmedis2007 Presentation
Axmedis2007 PresentationAxmedis2007 Presentation
Axmedis2007 Presentation
 
Clouds in emerging markets
Clouds in emerging marketsClouds in emerging markets
Clouds in emerging markets
 
Rule Imc Records Management & Discovery Offering Q109 V2
Rule Imc Records Management & Discovery Offering Q109 V2Rule Imc Records Management & Discovery Offering Q109 V2
Rule Imc Records Management & Discovery Offering Q109 V2
 
Right Space Brief
Right Space BriefRight Space Brief
Right Space Brief
 
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim MayValue Of Cloud Computing For Fed Governmen Oct 8 Tim May
Value Of Cloud Computing For Fed Governmen Oct 8 Tim May
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elements
 
Stingray - Riverbed Technology
Stingray - Riverbed TechnologyStingray - Riverbed Technology
Stingray - Riverbed Technology
 
Lived It Lecture: Building a better deal
Lived It Lecture: Building a better dealLived It Lecture: Building a better deal
Lived It Lecture: Building a better deal
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Glonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self ServiceGlonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self Service
 
Prefix Capabilities Summary
Prefix Capabilities SummaryPrefix Capabilities Summary
Prefix Capabilities Summary
 
Missouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General SessionMissouri Issues in Workers’ Compensation General Session
Missouri Issues in Workers’ Compensation General Session
 
Ian Jindal: Presentation to the "Future of Digital Marketing", June 2008
Ian Jindal: Presentation to the "Future of Digital Marketing", June 2008Ian Jindal: Presentation to the "Future of Digital Marketing", June 2008
Ian Jindal: Presentation to the "Future of Digital Marketing", June 2008
 
Converged Application Platforms Enhance Your Bottom Line
Converged Application Platforms Enhance Your Bottom LineConverged Application Platforms Enhance Your Bottom Line
Converged Application Platforms Enhance Your Bottom Line
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

InfoSecurity Magazine - Data Loss Prevention

  • 1. Data Loss Prevention in 2009 Simon Perry Principal Associate Analyst - Sustainability © 2009 Quocirca Ltd
  • 2. What is this presentation about? •  This presentation deck was created in November of 2008, and updated in February of 2009. •  It gives an overview of the the concept of “data loss prevention”; including: –  Market drivers that create the need for DLP –  An introduction to the layered content/computer/ context model of security –  Recommendations on policy approaches and desirable technology features –  Pointers to further reading © 2008 Quocirca Ltd
  • 3. Market Drivers Increased Effective More and petty theft Asset more remote and Targeted Management workers thefts Internal External © 2009 Quocirca Ltd
  • 4. C++ Security Context • Location • History Computer • HW state • SW stack • Classified Content • Encrypted • Trackable • Erasable © 2009 Quocirca Ltd
  • 5. Security classifications • Sensitive • Publicly corporate available data content Unregulated, Generally commercially open advantageous Unregulated, Highly commercially regulated advantageous • Personally • Intellectual Identifiable property Information © 2009 Quocirca Ltd
  • 6. Preventing data loss Data inclusion and movement policy Data protection policy and technology “Diving save” – cleaning up the mess © 2009 Quocirca Ltd
  • 7. Recommendations •  Truly critical data should not be copied to laptops and other portable devices •  When portable devices are taken out of the office with critical data onboard they must be encrypted •  Access controls should exist to ensure critical data can’t be forwarded inappropriately •  The ability to remotely delete and wipe critical information provides the “diving save” •  This is a problem that bridges the virtual and physical worlds – where a device physically is is important to the execution of the protection policy © 2009 Quocirca Ltd
  • 8. References and further reading •  Managing 21st Century Networks (Quocirca, January 2007) http://www.quocirca.com/pages/analysis/reports/view/store250/item3609/?link_683=3609 •  The Distributed Business Index (Quocirca, March 2008) http://www.quocirca.com/pages/analysis/reports/view/store250/item20918/? link_683=20918 •  Quocirca recommends the forthcoming book from Stewart Room of Field Fisher Waterhouse LLP based on its seminar series reviewing legal aspects of data protection and data privacy. For more information go to: http://www.ffw.com/publications/all.aspx?Person=1282 •  Why Application Security is Crucial (Quocirca, March 2008) http://www.quocirca.com/pages/analysis/reports/view/store250/item21107/? link_683=21107 •  Superhighway at the Crossroads (Quocirca, September 2008) http://www.quocirca.com/pages/analysis/reports/view/store250/item21547/? link_683=21547 © 2009 Quocirca Ltd