SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
“You’re monitoring my what…?!”
Balancing privacy against enhanced security outcomes
Duncan Brown
EMEA Chief Security Strategist
© 2019 Forcepoint | 2
What’s wrong with this picture?
2011 2012 2013 2014 2015 2016 2017 2018
Sources:
1. CVE List, The MITRE Corporation 2019
2. Information is Beautiful (Dec 18 update)
3. Accenture Ponemon 2017 Cost Of Cyber Crime Study
4. https://www.avtest.org/en/statistics/malware/
5. IDC Software Tracker Historical (2H17) & Forecast (2018): Security Software
6. IBM Ponemon Cost of a Data Breach Report 2018. Per capita cost = total cost of data breach
divided by the number of lost or stolen records.
CAGR 2011-18 except:
- 4. 2013-17
- 6. 2014-18
Breached PII
records1 (m), 51%
231m
4,202m
389m
New malicious
programs2 (m), 44%
65m
856m
Variablescale
CVE Vulns3, 22%
5,331
21,210
Average cost of cyber
crime4 ($m), 10%
$7.2m
$11.7m
Security software
spend5 ($b), 7.7%
$21b
$29b
Per capita cost of
data breach6(m), 1%$145
$148
© 2019 Forcepoint | 3
Inadvertent
Behaviors
Poorly communicated
policies and user
awareness
Broken Business
Process
Data where it shouldn’t
be, not where it should
be
Rogue
Employee
Leaving the
company, poor
performance review
Criminal Actor
Employees
Corporate espionage,
national espionage,
organized crime
Malware
Infections
Phishing targets,
breaches, BYOD
contamination
Stolen
Credentials
Credential exfiltration,
social engineering,
device control hygiene
MALICIOUS INSIDER COMPROMIZED INSIDERACCIDENTAL INSIDER
TRUSTED USERS PUTTING ORGANISATIONS AT RISK
13%23%64%
MALICIOUS INSIDER COMPROMIZED INSIDERACCIDENTAL INSIDER
TRUSTED USERS PUTTING ORGANISATIONS AT RISK
Source: Ponemon 2018
© 2019 Forcepoint | 6
Risk-Adaptive In Action Senior sales rep,
Copenhagen, DK
Monday
January 21 @ 10am
Working while on PTO
+ Additional Context
Thursday
January 24 @ 1pm
Downloads customer records to Excel
+ Additional Context
Wednesday
January 30 @ 9pm
Copy multiple files to staging
area
+ Additional Context
Saturday
February 9 @ 6am
Bulk copy to USB drive
+ Additional Context
Forcepoint Proprietary
Risk Score: 30
Risk-Adaptive Protection
No enforcement action
Risk Score: 50
Risk-Adaptive Protection
Enhanced auditing activated
Evidence available for investigation later
Risk Score: 80
Risk-Adaptive Protection
Copy allowed but file encrypted
No corporate data at risk
Risk Score: 95
Risk-Adaptive Protection
Action is blocked & account is locked
Avoided $10M breach and forensic proof of
the attack is available
© 2019 Forcepoint | 7
Do privacy concerns outweigh security objectives?
You’re tracking my what???!!!
© 2019 Forcepoint | 8
Processing personal data for security is a legitimate
interest
“The processing of personal data to the extent strictly necessary and
proportionate for the purposes of ensuring network and information security …
constitutes a legitimate interest of the data controller concerned.”
GDPR Recital 49
© 2019 Forcepoint | 9
We already “monitor” our users
Logins
Failed login attempts
Application access
Presence (Skype, WhatsApp, Chatter, Slack, etc)
Cloud apps (sanction, blocked, tolerated, etc)
Web filtering
White- and black-listing
Endpoint process monitoring
Physical card swipes for office access
Join these dots to create an overall risk profile for each user
Have a framework for transparency that protects our users, customers and partners
We should…
© 2019 Forcepoint | 10
Where should companies strike the balance?
How bad is the Privacy risk
to employees?
How bad is the Security risk
to the firm?
Thank you
duncan.brown@forcepoint.com
© 2019 Forcepoint | 11Forcepoint Proprietary

Más contenido relacionado

La actualidad más candente

Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017PhishingBox
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftIntellias
 
4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About PhishingPhishingBox
 
It's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint StrategyIt's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint StrategyLumension
 
Example presentation
Example presentationExample presentation
Example presentationaturnock
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
Hackmageddon stats: 4 Year of Cyber Attacks
Hackmageddon stats: 4 Year of Cyber AttacksHackmageddon stats: 4 Year of Cyber Attacks
Hackmageddon stats: 4 Year of Cyber AttacksPaolo Passeri
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionObserveIT
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
Integrated cyber defense
Integrated cyber defenseIntegrated cyber defense
Integrated cyber defensekajal kumari
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksProofpoint
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sectorSeqrite
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of SecurityVeracode
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationProofpoint
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry Seqrite
 

La actualidad más candente (20)

Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017Verizon Data Breach Investigations Report (DBIR) 2017
Verizon Data Breach Investigations Report (DBIR) 2017
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing4 Facts Every Business Should Know About Phishing
4 Facts Every Business Should Know About Phishing
 
It's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint StrategyIt's Time to Rethink Your Endpoint Strategy
It's Time to Rethink Your Endpoint Strategy
 
Example presentation
Example presentationExample presentation
Example presentation
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Hackmageddon stats: 4 Year of Cyber Attacks
Hackmageddon stats: 4 Year of Cyber AttacksHackmageddon stats: 4 Year of Cyber Attacks
Hackmageddon stats: 4 Year of Cyber Attacks
 
Security/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and ComplianceSecurity/Compliance - Advanced Threat Detection and Compliance
Security/Compliance - Advanced Threat Detection and Compliance
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Integrated cyber defense
Integrated cyber defenseIntegrated cyber defense
Integrated cyber defense
 
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based AttacksESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
ESG Validates Proofpoint’s Ability to Stop Advanced Email-based Attacks
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
 
The Seven Kinds of Security
The Seven Kinds of SecurityThe Seven Kinds of Security
The Seven Kinds of Security
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
[Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry [Infographic] 5 Security Threats in Healthcare Industry
[Infographic] 5 Security Threats in Healthcare Industry
 

Similar a "Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my what…?!” - Balancing privacy against enhanced security outcomes, Duncan Brown

Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19IBM Sverige
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsLumension
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Government
 
Enhance Security with Windows 10 and Office 365 - Infographic
Enhance Security with Windows 10 and Office 365 - InfographicEnhance Security with Windows 10 and Office 365 - Infographic
Enhance Security with Windows 10 and Office 365 - InfographicChristyChurch1
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 

Similar a "Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my what…?!” - Balancing privacy against enhanced security outcomes, Duncan Brown (20)

Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19CS Sakerhetsdagen 2015 IBM Feb 19
CS Sakerhetsdagen 2015 IBM Feb 19
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Paul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware TrendsPaul Henry’s 2011 Malware Trends
Paul Henry’s 2011 Malware Trends
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Secure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate CollegeSecure Web Apps Training at Corporate College
Secure Web Apps Training at Corporate College
 
Security Firm Program - Corporate College
Security Firm Program - Corporate CollegeSecurity Firm Program - Corporate College
Security Firm Program - Corporate College
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Rapport X force 2014
Rapport X force 2014Rapport X force 2014
Rapport X force 2014
 
IBM Cyber Threat Analysis
IBM Cyber Threat AnalysisIBM Cyber Threat Analysis
IBM Cyber Threat Analysis
 
Enhance Security with Windows 10 and Office 365 - Infographic
Enhance Security with Windows 10 and Office 365 - InfographicEnhance Security with Windows 10 and Office 365 - Infographic
Enhance Security with Windows 10 and Office 365 - Infographic
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Forensics
ForensicsForensics
Forensics
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 

Más de e-SIDES.eu

BDVe Webinar Series - Why are privacy-preserving technologies not used more w...
BDVe Webinar Series - Why are privacy-preserving technologies not used more w...BDVe Webinar Series - Why are privacy-preserving technologies not used more w...
BDVe Webinar Series - Why are privacy-preserving technologies not used more w...e-SIDES.eu
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...e-SIDES.eu
 
"Towards Value-centric Big Data: Community Position Paper" Daniel Bachlechner...
"Towards Value-centric Big Data: Community Position Paper" Daniel Bachlechner..."Towards Value-centric Big Data: Community Position Paper" Daniel Bachlechner...
"Towards Value-centric Big Data: Community Position Paper" Daniel Bachlechner...e-SIDES.eu
 
e-SIDES Community Position Paper User Manual
e-SIDES Community Position Paper User Manuale-SIDES Community Position Paper User Manual
e-SIDES Community Position Paper User Manuale-SIDES.eu
 
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese..."Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...e-SIDES.eu
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-decke-SIDES.eu
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn..."Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...e-SIDES.eu
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "A win-win initiative for...
"Towards Value-Centric Big Data" e-SIDES Workshop - "A win-win initiative for..."Towards Value-Centric Big Data" e-SIDES Workshop - "A win-win initiative for...
"Towards Value-Centric Big Data" e-SIDES Workshop - "A win-win initiative for...e-SIDES.eu
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete..."Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...e-SIDES.eu
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Responsible Research: An...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Responsible Research: An..."Towards Value-Centric Big Data" e-SIDES Workshop - "Responsible Research: An...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Responsible Research: An...e-SIDES.eu
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar..."Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...e-SIDES.eu
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-decke-SIDES.eu
 
e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018e-SIDES.eu
 
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018e-SIDES.eu
 
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES.eu
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES.eu
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
 
e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES.eu
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES.eu
 

Más de e-SIDES.eu (19)

BDVe Webinar Series - Why are privacy-preserving technologies not used more w...
BDVe Webinar Series - Why are privacy-preserving technologies not used more w...BDVe Webinar Series - Why are privacy-preserving technologies not used more w...
BDVe Webinar Series - Why are privacy-preserving technologies not used more w...
 
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
Beyond Privacy: Learning Data Ethics - European Big Data Community Forum 2019...
 
"Towards Value-centric Big Data: Community Position Paper" Daniel Bachlechner...
"Towards Value-centric Big Data: Community Position Paper" Daniel Bachlechner..."Towards Value-centric Big Data: Community Position Paper" Daniel Bachlechner...
"Towards Value-centric Big Data: Community Position Paper" Daniel Bachlechner...
 
e-SIDES Community Position Paper User Manual
e-SIDES Community Position Paper User Manuale-SIDES Community Position Paper User Manual
e-SIDES Community Position Paper User Manual
 
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese..."Legal implementation barriers of privacy-preserving technologies" eLAW prese...
"Legal implementation barriers of privacy-preserving technologies" eLAW prese...
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn..."Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Privacy Preserving Techn...
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "A win-win initiative for...
"Towards Value-Centric Big Data" e-SIDES Workshop - "A win-win initiative for..."Towards Value-Centric Big Data" e-SIDES Workshop - "A win-win initiative for...
"Towards Value-Centric Big Data" e-SIDES Workshop - "A win-win initiative for...
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete..."Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...
"Towards Value-Centric Big Data" e-SIDES Workshop - "The dangers of tech-dete...
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Responsible Research: An...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Responsible Research: An..."Towards Value-Centric Big Data" e-SIDES Workshop - "Responsible Research: An...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Responsible Research: An...
 
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar..."Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
"Towards Value-Centric Big Data" e-SIDES Workshop - "Safe and secure data mar...
 
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
"Towards Value-Centric Big Data" e-SIDES Workshop - Slide-deck
 
e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018
 
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
e-SIDES presentation at WISP 2018, San Francisco 13/12/2018
 
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018e-SIDES workshop at ICT 2018, Vienna 5/12/2018
e-SIDES workshop at ICT 2018, Vienna 5/12/2018
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017e-SIDES presentation at Leiden University 21/09/2017
e-SIDES presentation at Leiden University 21/09/2017
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
 

Último

Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Delhi Call girls
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxfirstjob4
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 

Último (20)

Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort ServiceBDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
BDSM⚡Call Girls in Mandawali Delhi >༒8448380779 Escort Service
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Introduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptxIntroduction-to-Machine-Learning (1).pptx
Introduction-to-Machine-Learning (1).pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 

"Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my what…?!” - Balancing privacy against enhanced security outcomes, Duncan Brown

  • 1. “You’re monitoring my what…?!” Balancing privacy against enhanced security outcomes Duncan Brown EMEA Chief Security Strategist
  • 2. © 2019 Forcepoint | 2 What’s wrong with this picture? 2011 2012 2013 2014 2015 2016 2017 2018 Sources: 1. CVE List, The MITRE Corporation 2019 2. Information is Beautiful (Dec 18 update) 3. Accenture Ponemon 2017 Cost Of Cyber Crime Study 4. https://www.avtest.org/en/statistics/malware/ 5. IDC Software Tracker Historical (2H17) & Forecast (2018): Security Software 6. IBM Ponemon Cost of a Data Breach Report 2018. Per capita cost = total cost of data breach divided by the number of lost or stolen records. CAGR 2011-18 except: - 4. 2013-17 - 6. 2014-18 Breached PII records1 (m), 51% 231m 4,202m 389m New malicious programs2 (m), 44% 65m 856m Variablescale CVE Vulns3, 22% 5,331 21,210 Average cost of cyber crime4 ($m), 10% $7.2m $11.7m Security software spend5 ($b), 7.7% $21b $29b Per capita cost of data breach6(m), 1%$145 $148
  • 4. Inadvertent Behaviors Poorly communicated policies and user awareness Broken Business Process Data where it shouldn’t be, not where it should be Rogue Employee Leaving the company, poor performance review Criminal Actor Employees Corporate espionage, national espionage, organized crime Malware Infections Phishing targets, breaches, BYOD contamination Stolen Credentials Credential exfiltration, social engineering, device control hygiene MALICIOUS INSIDER COMPROMIZED INSIDERACCIDENTAL INSIDER TRUSTED USERS PUTTING ORGANISATIONS AT RISK
  • 5. 13%23%64% MALICIOUS INSIDER COMPROMIZED INSIDERACCIDENTAL INSIDER TRUSTED USERS PUTTING ORGANISATIONS AT RISK Source: Ponemon 2018
  • 6. © 2019 Forcepoint | 6 Risk-Adaptive In Action Senior sales rep, Copenhagen, DK Monday January 21 @ 10am Working while on PTO + Additional Context Thursday January 24 @ 1pm Downloads customer records to Excel + Additional Context Wednesday January 30 @ 9pm Copy multiple files to staging area + Additional Context Saturday February 9 @ 6am Bulk copy to USB drive + Additional Context Forcepoint Proprietary Risk Score: 30 Risk-Adaptive Protection No enforcement action Risk Score: 50 Risk-Adaptive Protection Enhanced auditing activated Evidence available for investigation later Risk Score: 80 Risk-Adaptive Protection Copy allowed but file encrypted No corporate data at risk Risk Score: 95 Risk-Adaptive Protection Action is blocked & account is locked Avoided $10M breach and forensic proof of the attack is available
  • 7. © 2019 Forcepoint | 7 Do privacy concerns outweigh security objectives? You’re tracking my what???!!!
  • 8. © 2019 Forcepoint | 8 Processing personal data for security is a legitimate interest “The processing of personal data to the extent strictly necessary and proportionate for the purposes of ensuring network and information security … constitutes a legitimate interest of the data controller concerned.” GDPR Recital 49
  • 9. © 2019 Forcepoint | 9 We already “monitor” our users Logins Failed login attempts Application access Presence (Skype, WhatsApp, Chatter, Slack, etc) Cloud apps (sanction, blocked, tolerated, etc) Web filtering White- and black-listing Endpoint process monitoring Physical card swipes for office access Join these dots to create an overall risk profile for each user Have a framework for transparency that protects our users, customers and partners We should…
  • 10. © 2019 Forcepoint | 10 Where should companies strike the balance? How bad is the Privacy risk to employees? How bad is the Security risk to the firm?
  • 11. Thank you duncan.brown@forcepoint.com © 2019 Forcepoint | 11Forcepoint Proprietary