SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
Identifying the Value of
Informational Assets
Before You Move Them
to the Cloud
Jason Rader
Chief Security Strategist
RSA, the Security Division of EMC

© Copyright 2013 EMC Corporation. All rights reserved.

1
Roadmap Information Disclaimer
 EMC makes no representation and undertakes no obligations with
regard to product planning information, anticipated product
characteristics, performance specifications, or anticipated release
dates (collectively, “Roadmap Information”).
 Roadmap Information is provided by EMC as an accommodation to the
recipient solely for purposes of discussion and without intending to be
bound thereby.
 Roadmap information is EMC Restricted Confidential and is provided
under the terms, conditions and restrictions defined in the EMC NonDisclosure Agreement in place with your organization.

© Copyright 2013 EMC Corporation. All rights reserved.

2
How do we value information?

© Copyright 2013 EMC Corporation. All rights reserved.

3
Bits vs Bits
 On one hand, we have bits of data

 On the other, we have MANY “bits” of money

© Copyright 2013 EMC Corporation. All rights reserved.

4
What’s the Conversion Rate?
 10 Bits = €10?
 1 Gigabit = £1,000?
 1 Byte = 2 bits?
 Where is this rate? How do I use it?

– Doesn’t exist!
– Too many factors affect it to map globally.

© Copyright 2013 EMC Corporation. All rights reserved.

5
A Scholar’s Definition
 “Information value arises as the difference between
a decision maker’s payoff in the absence of
information relative to what can be obtained in its
presence.”
 This works for theft, but what about copy?
– China/Mr. Pibb Problem
– Once copied, is it a race to the bottom?

Banker, R. D., & Kauffman, R. J. (2004). The evolution of research on information systems: A fiftieth-year survey of
the literature in management science (Vol. 50, pp. 281-298): INFORMS: Institute for Operations Research.
© Copyright 2013 EMC Corporation. All rights reserved.

6
How do we classify info today?

© Copyright 2013 EMC Corporation. All rights reserved.

7
Why is information classification broken?
 Typical classification systems
are problematic
– Lack definition (what
constitutes info of
this kind?)
– And automation
(teach systems to
handle)
– Don’t address individual
data value (is a vault
required?)

© Copyright 2013 EMC Corporation. All rights reserved.

8
Four Dumb* Classification Schemes
 Structuralist (Focusing on regulatory compliance)
 Realist (Stuff we care about, stuff we don’t)
 Broker (risk-based, three tiers, soft chewy middle)
 Striver (Everyone hates this guy, 3+ tiers, highly
structured, opportunities for automation)

Information Classification: An Essential Security Thing You're (Still) Not Doing, Trent Henry, Gartner
© Copyright 2013 EMC Corporation. All rights reserved.

9
Opportunities for Attack
 Attackers and companies never value data the same.
There are reasons for this:
– The data itself isn’t valuable without the
knowledge/hardware to monetize it
– Secondary/unused business data is ignored
– Differing interpretation of value lifecycle

© Copyright 2013 EMC Corporation. All rights reserved.

11
How do we identify these opportunities?
 The value of information to us (Vc) varies widely
 As does the payoff for an adversary (Pa)
 Where those differ, we have opportunity (O)
– This could also be described as inefficiency

 This opportunity can be expressed as:

O = Vc - Pa
© Copyright 2013 EMC Corporation. All rights reserved.

12
How do we identify these opportunities?

O = Vc - Pa

 Positive values of O suggest we know and understand the
value, and attackers cannot monetize
 Negative values of O suggest we have high risk data that
attackers want, but we devalue
 Small values of O indicate matched intent
 Large values of O indicate inefficiency

© Copyright 2013 EMC Corporation. All rights reserved.

13
Examples of how this works:

O = Vc - Pa

 Credit Card Information, 30m HQ Numbers
– Low value to company, transactions settled
– HIGH payoff to adversary ($1/card = $30m)
– Hugely negative Opportunity value

 Manufacturing process for IP, control SC

– Payoff is low to adversary due to supply chain
– If high spend on security, could be reallocated to other areas.

© Copyright 2013 EMC Corporation. All rights reserved.

14
The Value of Information Over Time
Max Value

Value

Area under this curve
= money for
information owner

Time
© Copyright 2013 EMC Corporation. All rights reserved.

Information
eventually becomes a
liability
15
Events Occur, changes the curve
Max Value

Value

Information is now
copied, breach occurs

Time
© Copyright 2013 EMC Corporation. All rights reserved.

The loot
becomes divided
among holders.
16
What’s interesting about these curves?
 This one is a sample, but somewhat representative
 Curve notes:
–
–
–
–

Each ACTOR has their own curve
Curves can be steeper or flatter
Curves can converge/diverge with actor action
Curves only represent value for the ACTOR (i.e., unrealized
value may not be represented)
– Eventually, information becomes a liability
– Impending threat mirrors value curve
– Think about a zero day exploit on its own curve

© Copyright 2013 EMC Corporation. All rights reserved.

17
Beginning to translate these curves
 Information’s value varies over time

– We need to consider malicious actors when planning
information security defenses
– Blanket controls cause inefficiency

 When curves converge/diverge…

– Values can dramatically consolidate/divide

 Curves represent potential value to the actor
– Pent up value may exist without realization

© Copyright 2013 EMC Corporation. All rights reserved.

18
We need a new model
 Minimum model requirements:
– Information grouped by value
▪ To ME
▪ To Competitor/Military
▪ Only if LOST

– Address information value over time

▪ Information changes in value over time
▪ Usually depreciating, some more rapidly than others

– Reflect # of actors and motivation
– Reflect change in motivation based on payoff

▪ Market forces can dramatically alter this
▪ Large data stores are more attractive than small ones

© Copyright 2013 EMC Corporation. All rights reserved.

19
Moreover: The model needs to be simple
 No industry jargon
 No dictionary required
 Not dozens of pages

© Copyright 2013 EMC Corporation. All rights reserved.

20
Simple, Yet flexible
 Must be able to adjust with value changes
 Must rely on accurate inputs
–
–
–
–
–
–

Numbers of actors
Projected payoffs with data theft
Strength of perimeter defenses
Number of business processes using the data
Amount of data sprawl
Account for amount of data as a change in payoff

 Must be able to affect security posture
21

© Copyright 2013 EMC Corporation. All rights reserved.

21
How SHOULD we view the world?
Secret Sauce
Intellectual Property
Software Vuln DB
Corp Strategy
Crown Jewels
Easily Transferrable IP
Actionable IP
Encryption Keys
COMPINT
Defense Information

© Copyright 2013 EMC Corporation. All rights reserved.

Customer Analytics
IT Configs
Biz Processes
Valuable to me

Derivative Data
Analytics for Sale
Medical Records
Valuable to
Competitors
or Military

Valuable if
Lost

CC Data
PII/PHI Data
Unused Biz Data
Disinformation

Old Source Code
Old IP
Old/Retired Encryption Keys
22
The Model
Value to
You

Value to
Comp.

Value
if Lost

1

50

2.3B*

Y

N

N

Customer Analytics
IT Configs
Business Processes

N

Intellectual Property
Secret Sauce
Software Vuln DB
Corp Strategy

Y?

Old Source Code
Old IP (where new IP is
derived)
Old encryption keys

Y

N

Y

Y

© Copyright 2013 EMC Corporation. All rights reserved.

Examples

Breach
Prob.

Biz Impact

Low

A/I

Med

C–Delayed
Risk
A/I Immediate

ACTION

Number of Potential Actors

Med

C/I

Secured, but
not vaulted
Protect (Vault)

C: Destroy
I: Secure
Archive

23
The Model (part 2)
Value to
You
1
N

Value to
Comp.

Value
if Lost

50

2.3B*

N

Examples

Biz Impact

ACTION

Number of Potential Actors

Y

Credit Card Numbers
PII/PHI
Unused Biz Data

Low (High
Impact)

C

High

C

Y

N

Y

Sec. Data Analytics
(revenue)
Medical Records
High roller customers
Proprietary Algorithms
Financial Results

Y

Y

Y

Crown Jewels
Easily transferrable IP

© Copyright 2013 EMC Corporation. All rights reserved.

Breach
Prob.

High
(# Actors)

C

Outsource
Destroy
Obfuscate
Protect IP
(Vault)
Secure Data

Protect (Vault)

24
Payoff

The Relevance of Data Mass

Amount of data
© Copyright 2013 EMC Corporation. All rights reserved.

25
Combating Risk from Data Growth
 Reduce data stores

– Truncation
– De-value options (tokens)
– DESTROY

 Reduce the effective size
– 1M records / 10 keys =
100K recs!
– Multiple algorithms

© Copyright 2013 EMC Corporation. All rights reserved.

26
How to apply the model
 Look at the kinds of data your business controls
–
–
–
–

Try to define what it is, then relate it to the model
Be sure to find information NOT IN USE
Understand flow and sprawl of data
Look for large values of O

 Add values where you can

– Valuing information is personal
– Use your own data
– Don’t rely on external sources to define data value

 Remember CONFIDENCE factor!
 Take Action Per the Model!

© Copyright 2013 EMC Corporation. All rights reserved.

27
Identifying the Value of Informational Assets Before You Move Them to the Cloud

Mais conteúdo relacionado

Destaque

Primary vs secondary source
Primary vs secondary sourcePrimary vs secondary source
Primary vs secondary sourceTravis Klein
 
Frutos da Beneficência Cristã
Frutos da Beneficência CristãFrutos da Beneficência Cristã
Frutos da Beneficência CristãJoão Carlos
 
White Paper: EMC Infrastructure for Microsoft Private Cloud
White Paper: EMC Infrastructure for Microsoft Private Cloud White Paper: EMC Infrastructure for Microsoft Private Cloud
White Paper: EMC Infrastructure for Microsoft Private Cloud EMC
 
Connecting Access Governance and Privileged Access Management
Connecting Access Governance and Privileged Access ManagementConnecting Access Governance and Privileged Access Management
Connecting Access Governance and Privileged Access ManagementEMC
 
цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1pvsa_8990
 
Flipbook sarah burress
Flipbook sarah burressFlipbook sarah burress
Flipbook sarah burressSarah_Burress
 
Company Logos
Company LogosCompany Logos
Company Logosloousmith
 
Metabolic syndrome and dementia
Metabolic syndrome and dementiaMetabolic syndrome and dementia
Metabolic syndrome and dementiaRavi Soni
 
What's New in VMware Virtual SAN
What's New in VMware Virtual SANWhat's New in VMware Virtual SAN
What's New in VMware Virtual SANEMC
 
InBicocca, non si cerca, si trova!
InBicocca, non si cerca, si trova!InBicocca, non si cerca, si trova!
InBicocca, non si cerca, si trova!Sara M
 
Fri reading comp strategy
Fri reading comp strategyFri reading comp strategy
Fri reading comp strategyTravis Klein
 
โรคอ้วน!!
โรคอ้วน!!โรคอ้วน!!
โรคอ้วน!!sumethinee
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationEMC
 
Insaat kursu-kagithane
Insaat kursu-kagithaneInsaat kursu-kagithane
Insaat kursu-kagithanesersld54
 
Golfbrands
GolfbrandsGolfbrands
Golfbrandsjgalla14
 
Friday columbian exchange
Friday columbian exchangeFriday columbian exchange
Friday columbian exchangeTravis Klein
 

Destaque (19)

Primary vs secondary source
Primary vs secondary sourcePrimary vs secondary source
Primary vs secondary source
 
Frutos da Beneficência Cristã
Frutos da Beneficência CristãFrutos da Beneficência Cristã
Frutos da Beneficência Cristã
 
White Paper: EMC Infrastructure for Microsoft Private Cloud
White Paper: EMC Infrastructure for Microsoft Private Cloud White Paper: EMC Infrastructure for Microsoft Private Cloud
White Paper: EMC Infrastructure for Microsoft Private Cloud
 
Connecting Access Governance and Privileged Access Management
Connecting Access Governance and Privileged Access ManagementConnecting Access Governance and Privileged Access Management
Connecting Access Governance and Privileged Access Management
 
Atlassian Bamboo
Atlassian BambooAtlassian Bamboo
Atlassian Bamboo
 
цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1цахим хэрэглэгдэхүүн 1
цахим хэрэглэгдэхүүн 1
 
The darvaza well
The darvaza wellThe darvaza well
The darvaza well
 
Flipbook sarah burress
Flipbook sarah burressFlipbook sarah burress
Flipbook sarah burress
 
Company Logos
Company LogosCompany Logos
Company Logos
 
Metabolic syndrome and dementia
Metabolic syndrome and dementiaMetabolic syndrome and dementia
Metabolic syndrome and dementia
 
What's New in VMware Virtual SAN
What's New in VMware Virtual SANWhat's New in VMware Virtual SAN
What's New in VMware Virtual SAN
 
InBicocca, non si cerca, si trova!
InBicocca, non si cerca, si trova!InBicocca, non si cerca, si trova!
InBicocca, non si cerca, si trova!
 
Fri reading comp strategy
Fri reading comp strategyFri reading comp strategy
Fri reading comp strategy
 
โรคอ้วน!!
โรคอ้วน!!โรคอ้วน!!
โรคอ้วน!!
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
 
Insaat kursu-kagithane
Insaat kursu-kagithaneInsaat kursu-kagithane
Insaat kursu-kagithane
 
Golfbrands
GolfbrandsGolfbrands
Golfbrands
 
Friday columbian exchange
Friday columbian exchangeFriday columbian exchange
Friday columbian exchange
 
Tue law of demand
Tue law of demandTue law of demand
Tue law of demand
 

Semelhante a Identifying the Value of Informational Assets Before You Move Them to the Cloud

Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?EMC
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloudNicholas Chia
 
Big data: tendências e oportunidades - Palestrante: Ana Oliveira
Big data: tendências e oportunidades - Palestrante: Ana OliveiraBig data: tendências e oportunidades - Palestrante: Ana Oliveira
Big data: tendências e oportunidades - Palestrante: Ana OliveiraRio Info
 
Seguridad en información digital Carlos Galeano EMC2 Regional Storage Specialist
Seguridad en información digital Carlos Galeano EMC2 Regional Storage SpecialistSeguridad en información digital Carlos Galeano EMC2 Regional Storage Specialist
Seguridad en información digital Carlos Galeano EMC2 Regional Storage SpecialistMinisterio TIC Colombia
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?OurCrowd
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
EAI - Master Data Management - MDM - Use Case
EAI - Master Data Management - MDM - Use CaseEAI - Master Data Management - MDM - Use Case
EAI - Master Data Management - MDM - Use CaseSherif Rasmy
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousPriyanka Aash
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousRaffael Marty
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)ecommerce
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in CybersecurityForcepoint LLC
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetWatcher
 
Beware of the Risk Behind Big Data
Beware of the Risk Behind Big DataBeware of the Risk Behind Big Data
Beware of the Risk Behind Big DataEMC
 

Semelhante a Identifying the Value of Informational Assets Before You Move Them to the Cloud (20)

Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
Big data: tendências e oportunidades - Palestrante: Ana Oliveira
Big data: tendências e oportunidades - Palestrante: Ana OliveiraBig data: tendências e oportunidades - Palestrante: Ana Oliveira
Big data: tendências e oportunidades - Palestrante: Ana Oliveira
 
DAMA Big Data & The Cloud 2012-01-19
DAMA Big Data & The Cloud 2012-01-19DAMA Big Data & The Cloud 2012-01-19
DAMA Big Data & The Cloud 2012-01-19
 
Seguridad en información digital Carlos Galeano EMC2 Regional Storage Specialist
Seguridad en información digital Carlos Galeano EMC2 Regional Storage SpecialistSeguridad en información digital Carlos Galeano EMC2 Regional Storage Specialist
Seguridad en información digital Carlos Galeano EMC2 Regional Storage Specialist
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?Why Are Investors Excited About Cyber Security Startups, Again?
Why Are Investors Excited About Cyber Security Startups, Again?
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Seed investdeck
Seed investdeckSeed investdeck
Seed investdeck
 
Cloud Essentials - ISACA CPE Meeting
Cloud Essentials - ISACA CPE MeetingCloud Essentials - ISACA CPE Meeting
Cloud Essentials - ISACA CPE Meeting
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
EAI - Master Data Management - MDM - Use Case
EAI - Master Data Management - MDM - Use CaseEAI - Master Data Management - MDM - Use Case
EAI - Master Data Management - MDM - Use Case
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
AI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are DangerousAI & ML in Cyber Security - Why Algorithms are Dangerous
AI & ML in Cyber Security - Why Algorithms are Dangerous
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)
 
AI and ML in Cybersecurity
AI and ML in CybersecurityAI and ML in Cybersecurity
AI and ML in Cybersecurity
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Beware of the Risk Behind Big Data
Beware of the Risk Behind Big DataBeware of the Risk Behind Big Data
Beware of the Risk Behind Big Data
 

Mais de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Mais de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Último

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Último (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Identifying the Value of Informational Assets Before You Move Them to the Cloud

  • 1. Identifying the Value of Informational Assets Before You Move Them to the Cloud Jason Rader Chief Security Strategist RSA, the Security Division of EMC © Copyright 2013 EMC Corporation. All rights reserved. 1
  • 2. Roadmap Information Disclaimer  EMC makes no representation and undertakes no obligations with regard to product planning information, anticipated product characteristics, performance specifications, or anticipated release dates (collectively, “Roadmap Information”).  Roadmap Information is provided by EMC as an accommodation to the recipient solely for purposes of discussion and without intending to be bound thereby.  Roadmap information is EMC Restricted Confidential and is provided under the terms, conditions and restrictions defined in the EMC NonDisclosure Agreement in place with your organization. © Copyright 2013 EMC Corporation. All rights reserved. 2
  • 3. How do we value information? © Copyright 2013 EMC Corporation. All rights reserved. 3
  • 4. Bits vs Bits  On one hand, we have bits of data  On the other, we have MANY “bits” of money © Copyright 2013 EMC Corporation. All rights reserved. 4
  • 5. What’s the Conversion Rate?  10 Bits = €10?  1 Gigabit = £1,000?  1 Byte = 2 bits?  Where is this rate? How do I use it? – Doesn’t exist! – Too many factors affect it to map globally. © Copyright 2013 EMC Corporation. All rights reserved. 5
  • 6. A Scholar’s Definition  “Information value arises as the difference between a decision maker’s payoff in the absence of information relative to what can be obtained in its presence.”  This works for theft, but what about copy? – China/Mr. Pibb Problem – Once copied, is it a race to the bottom? Banker, R. D., & Kauffman, R. J. (2004). The evolution of research on information systems: A fiftieth-year survey of the literature in management science (Vol. 50, pp. 281-298): INFORMS: Institute for Operations Research. © Copyright 2013 EMC Corporation. All rights reserved. 6
  • 7. How do we classify info today? © Copyright 2013 EMC Corporation. All rights reserved. 7
  • 8. Why is information classification broken?  Typical classification systems are problematic – Lack definition (what constitutes info of this kind?) – And automation (teach systems to handle) – Don’t address individual data value (is a vault required?) © Copyright 2013 EMC Corporation. All rights reserved. 8
  • 9. Four Dumb* Classification Schemes  Structuralist (Focusing on regulatory compliance)  Realist (Stuff we care about, stuff we don’t)  Broker (risk-based, three tiers, soft chewy middle)  Striver (Everyone hates this guy, 3+ tiers, highly structured, opportunities for automation) Information Classification: An Essential Security Thing You're (Still) Not Doing, Trent Henry, Gartner © Copyright 2013 EMC Corporation. All rights reserved. 9
  • 10. Opportunities for Attack  Attackers and companies never value data the same. There are reasons for this: – The data itself isn’t valuable without the knowledge/hardware to monetize it – Secondary/unused business data is ignored – Differing interpretation of value lifecycle © Copyright 2013 EMC Corporation. All rights reserved. 11
  • 11. How do we identify these opportunities?  The value of information to us (Vc) varies widely  As does the payoff for an adversary (Pa)  Where those differ, we have opportunity (O) – This could also be described as inefficiency  This opportunity can be expressed as: O = Vc - Pa © Copyright 2013 EMC Corporation. All rights reserved. 12
  • 12. How do we identify these opportunities? O = Vc - Pa  Positive values of O suggest we know and understand the value, and attackers cannot monetize  Negative values of O suggest we have high risk data that attackers want, but we devalue  Small values of O indicate matched intent  Large values of O indicate inefficiency © Copyright 2013 EMC Corporation. All rights reserved. 13
  • 13. Examples of how this works: O = Vc - Pa  Credit Card Information, 30m HQ Numbers – Low value to company, transactions settled – HIGH payoff to adversary ($1/card = $30m) – Hugely negative Opportunity value  Manufacturing process for IP, control SC – Payoff is low to adversary due to supply chain – If high spend on security, could be reallocated to other areas. © Copyright 2013 EMC Corporation. All rights reserved. 14
  • 14. The Value of Information Over Time Max Value Value Area under this curve = money for information owner Time © Copyright 2013 EMC Corporation. All rights reserved. Information eventually becomes a liability 15
  • 15. Events Occur, changes the curve Max Value Value Information is now copied, breach occurs Time © Copyright 2013 EMC Corporation. All rights reserved. The loot becomes divided among holders. 16
  • 16. What’s interesting about these curves?  This one is a sample, but somewhat representative  Curve notes: – – – – Each ACTOR has their own curve Curves can be steeper or flatter Curves can converge/diverge with actor action Curves only represent value for the ACTOR (i.e., unrealized value may not be represented) – Eventually, information becomes a liability – Impending threat mirrors value curve – Think about a zero day exploit on its own curve © Copyright 2013 EMC Corporation. All rights reserved. 17
  • 17. Beginning to translate these curves  Information’s value varies over time – We need to consider malicious actors when planning information security defenses – Blanket controls cause inefficiency  When curves converge/diverge… – Values can dramatically consolidate/divide  Curves represent potential value to the actor – Pent up value may exist without realization © Copyright 2013 EMC Corporation. All rights reserved. 18
  • 18. We need a new model  Minimum model requirements: – Information grouped by value ▪ To ME ▪ To Competitor/Military ▪ Only if LOST – Address information value over time ▪ Information changes in value over time ▪ Usually depreciating, some more rapidly than others – Reflect # of actors and motivation – Reflect change in motivation based on payoff ▪ Market forces can dramatically alter this ▪ Large data stores are more attractive than small ones © Copyright 2013 EMC Corporation. All rights reserved. 19
  • 19. Moreover: The model needs to be simple  No industry jargon  No dictionary required  Not dozens of pages © Copyright 2013 EMC Corporation. All rights reserved. 20
  • 20. Simple, Yet flexible  Must be able to adjust with value changes  Must rely on accurate inputs – – – – – – Numbers of actors Projected payoffs with data theft Strength of perimeter defenses Number of business processes using the data Amount of data sprawl Account for amount of data as a change in payoff  Must be able to affect security posture 21 © Copyright 2013 EMC Corporation. All rights reserved. 21
  • 21. How SHOULD we view the world? Secret Sauce Intellectual Property Software Vuln DB Corp Strategy Crown Jewels Easily Transferrable IP Actionable IP Encryption Keys COMPINT Defense Information © Copyright 2013 EMC Corporation. All rights reserved. Customer Analytics IT Configs Biz Processes Valuable to me Derivative Data Analytics for Sale Medical Records Valuable to Competitors or Military Valuable if Lost CC Data PII/PHI Data Unused Biz Data Disinformation Old Source Code Old IP Old/Retired Encryption Keys 22
  • 22. The Model Value to You Value to Comp. Value if Lost 1 50 2.3B* Y N N Customer Analytics IT Configs Business Processes N Intellectual Property Secret Sauce Software Vuln DB Corp Strategy Y? Old Source Code Old IP (where new IP is derived) Old encryption keys Y N Y Y © Copyright 2013 EMC Corporation. All rights reserved. Examples Breach Prob. Biz Impact Low A/I Med C–Delayed Risk A/I Immediate ACTION Number of Potential Actors Med C/I Secured, but not vaulted Protect (Vault) C: Destroy I: Secure Archive 23
  • 23. The Model (part 2) Value to You 1 N Value to Comp. Value if Lost 50 2.3B* N Examples Biz Impact ACTION Number of Potential Actors Y Credit Card Numbers PII/PHI Unused Biz Data Low (High Impact) C High C Y N Y Sec. Data Analytics (revenue) Medical Records High roller customers Proprietary Algorithms Financial Results Y Y Y Crown Jewels Easily transferrable IP © Copyright 2013 EMC Corporation. All rights reserved. Breach Prob. High (# Actors) C Outsource Destroy Obfuscate Protect IP (Vault) Secure Data Protect (Vault) 24
  • 24. Payoff The Relevance of Data Mass Amount of data © Copyright 2013 EMC Corporation. All rights reserved. 25
  • 25. Combating Risk from Data Growth  Reduce data stores – Truncation – De-value options (tokens) – DESTROY  Reduce the effective size – 1M records / 10 keys = 100K recs! – Multiple algorithms © Copyright 2013 EMC Corporation. All rights reserved. 26
  • 26. How to apply the model  Look at the kinds of data your business controls – – – – Try to define what it is, then relate it to the model Be sure to find information NOT IN USE Understand flow and sprawl of data Look for large values of O  Add values where you can – Valuing information is personal – Use your own data – Don’t rely on external sources to define data value  Remember CONFIDENCE factor!  Take Action Per the Model! © Copyright 2013 EMC Corporation. All rights reserved. 27