SlideShare una empresa de Scribd logo
1 de 38
Securing the data on your retired electronic assets Information Governance, Risk and Compliance 20/05/2010
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Methods for Retrieving Data With gratitude to Pete Warren, Investigative Journalist (ICT Industry)
Examples of Data Leakage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Data Leakage ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Methods of retrieving data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Pros and Cons of in-house solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pros and Cons of outsourced solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recognised methods for destroying data Advantages and Disadvantages
What knowledge exists on data destruction? ,[object Object],[object Object]
Data Destruction - terminology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Impact Level (IL) IL Descriptor of Data Secure Sanitation Level (SSL) High or low security 6 Top Secret SSL3 High 5 Secret SSL3 High 4 Confidential SSL2 High 3 Restricted SSL2 Low 2 Protect SSL1 Low 1 Protect SSL1 Low
Data Destruction – Software based ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Destruction – Software based ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Original Data Data Wipe (1 st  pass)... Data Wipe (2 nd  pass)... ... Subsequent passes.
Data Destruction – Hardware based, Degaussers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Destruction – Hardware based, Degaussers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Destruction – Physical destruction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Destruction – Physical destruction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Understanding ICT Equipment Data risk by equipment and how to destroy it
What equipment is at risk? ,[object Object]
Desktop, laptops, servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Printers, Scanners, Copiers, Faxes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data storage media ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Communications devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network equipment – Routers and Switches ,[object Object],[object Object],[object Object],[object Object]
Point of sale, retail debit/credit terminals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Specialist equipment ,[object Object],[object Object],[object Object],[object Object],[object Object]
Methods of Raising Awareness How to kick start a secure asset recovery strategy
Methods of raising awareness – open discussion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information about your data Understanding what has been destroyed
Blancco Data Erasure Report – page 1
Blancco Data Erasure Report – page 2
WebView - Client billing report ,[object Object],[object Object],[object Object],[object Object]
WebView - Deleted software register report ,[object Object],[object Object],[object Object],[object Object],[object Object]
Information about your assets and data ,[object Object]
Sims Recycling Solutions ICT Asset Management In summary – Why we are experts
Sims Recycling Solutions - Global ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Standards and Licenses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Global Operations – Sims Recycling Solutions 38 Operations Globally Australia 4 Operations EU 14 Operations California 3 Operations Asia Representative offices Tennessee 1 Operation Canada 1 Operation Illinois 2 Operations India 3 Operations Singapore 1 Operation Florida 2 Operations South Carolina 2 Operations Louisiana 1 Operation Nevada 1 Operation Arizona  1 Operation New Zealand 1 Operation South Africa 1 Operations

Más contenido relacionado

La actualidad más candente

2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 

La actualidad más candente (20)

Protecting pii and phi exec summary
Protecting pii and phi   exec summaryProtecting pii and phi   exec summary
Protecting pii and phi exec summary
 
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
Gartner Security & Risk Management Summit 2014 - Defending the Enterprise Aga...
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Data Use Rules in Different Business Scenarios: It's All Contextual
Data Use Rules in Different Business Scenarios:  It's All Contextual Data Use Rules in Different Business Scenarios:  It's All Contextual
Data Use Rules in Different Business Scenarios: It's All Contextual
 
Wm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business CasesWm Tanenbaum Data Business Cases
Wm Tanenbaum Data Business Cases
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios:  It's All Contextual Date Use Rules in Different Business Scenarios:  It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
A frame work for data warehouse for nigerian police force
A frame work for data warehouse for nigerian police forceA frame work for data warehouse for nigerian police force
A frame work for data warehouse for nigerian police force
 
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
Date Use Rules in Different Business Scenarios: It's All Contectual it is all...
 
Date Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All ContextualDate Use Rules in Different Business Scenarios: It's All Contextual
Date Use Rules in Different Business Scenarios: It's All Contextual
 
Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual Date Use Rules in Different Business Scenarios:It's All Contextual
Date Use Rules in Different Business Scenarios:It's All Contextual
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Toreon adding privacy by design in secure application development oss18 v20...
Toreon adding privacy by design in secure application development   oss18 v20...Toreon adding privacy by design in secure application development   oss18 v20...
Toreon adding privacy by design in secure application development oss18 v20...
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 

Similar a An Introduction to Asset Recovery

Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
STO STRATEGY
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
IlonaThornburg83
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
David Kearney
 

Similar a An Introduction to Asset Recovery (20)

IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Computer forensic
Computer forensicComputer forensic
Computer forensic
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
EDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-iltaEDRM Foundational e-Discovery Practices-ilta
EDRM Foundational e-Discovery Practices-ilta
 
F1805023942
F1805023942F1805023942
F1805023942
 
Data Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best PracticesData Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best Practices
 
Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...Medical Records on the Run: Protecting Patient Data with Device Control and...
Medical Records on the Run: Protecting Patient Data with Device Control and...
 
PREPARING FOR THE GDPR
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup System
 
Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?Anti Counterfeiting - Playing Roulette Or Chess?
Anti Counterfeiting - Playing Roulette Or Chess?
 

An Introduction to Asset Recovery

  • 1. Securing the data on your retired electronic assets Information Governance, Risk and Compliance 20/05/2010
  • 2.
  • 3. The Methods for Retrieving Data With gratitude to Pete Warren, Investigative Journalist (ICT Industry)
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Recognised methods for destroying data Advantages and Disadvantages
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. Understanding ICT Equipment Data risk by equipment and how to destroy it
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. Methods of Raising Awareness How to kick start a secure asset recovery strategy
  • 28.
  • 29. Information about your data Understanding what has been destroyed
  • 30. Blancco Data Erasure Report – page 1
  • 31. Blancco Data Erasure Report – page 2
  • 32.
  • 33.
  • 34.
  • 35. Sims Recycling Solutions ICT Asset Management In summary – Why we are experts
  • 36.
  • 37.
  • 38. Global Operations – Sims Recycling Solutions 38 Operations Globally Australia 4 Operations EU 14 Operations California 3 Operations Asia Representative offices Tennessee 1 Operation Canada 1 Operation Illinois 2 Operations India 3 Operations Singapore 1 Operation Florida 2 Operations South Carolina 2 Operations Louisiana 1 Operation Nevada 1 Operation Arizona 1 Operation New Zealand 1 Operation South Africa 1 Operations

Notas del editor

  1. Every year we throw away more data than has ever been housed in the world’s libraries. On PC, hard drives, photo-copier hard drives, Personal Digital Assistants, Smart Phones, tape drives, USB sticks and CD-Roms the list is endless and the amount of data virtually limitless. Everything is thrown away from company and state secrets, intensely personal information on our private lives and those of our families to the health records and data on complete strangers.  
  2. This report is a year out of date and was taking part at the height of the credit crunch when loyalty may have been lower due to the working culture. However – it does highlight how little store employees may place on your data. One method to address this is to improve the control mechanisms in an organisation. Another is to highlight the risks involved and to educate people into why information governance is important. Before we talk about a successful method we have used to highlight the issues surrounding end of life equipment to as a vehicle to improve understanding of data loss, we thought to ask: What are the advantages and Disadvantages of Improving Control? What are the advantages and disadvantages of improving culture through education? What methods might exist for achieving that culture change?
  3. What information would you like to see available from electronic Asset Recovery reporting?
  4. ISO - International Standards Organisation OHSAS - Occupational Health & Safety Advisory Services WAMITAB – Waste Management Industry Training and Advisory Board CoTC – Certificate of Technical Competence
  5. Go check with Tom.