SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
Data Leakage Prevention
Sigal Russin, CISO
Senior Analyst at STKI
sigalr@stki.info
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
What are you getting:
2
1 2 3 4
5 6
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Symantec DLP News
3
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
It’s about People
4
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Customers need more than a technology solution
5
Source: http://www.slideshare.net/ArrowECSMarketing/data-loss-
prevention-from-symantec
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Variety of Misuse Actions
6
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
What is DLP?
• DLP means different things to different people
* Data Loss Prevention
* Data Leakage Prevention
* Data Loss Protection
• DLP is always about protecting organization sensitive information.
• DLP technology is content aware
referred to as deep packet inspection, analyzes the payload
contained within a file or session.
• DLP references data in one of three states
* Data in motion
* Data at rest
* Data in use
7
Source: http://www.slideshare.net/technetbelux/data-leakage-
prevention-22804526
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Defense In Depth: Encryption + DLP
8
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Sensitive organization data
Lack of familiarity with the types of information
that exist in organizations and processes related to use.
• What is confidential information?
• Where is it stored?
• What are the channels through which
information may leak ?
• What actions will be taken if and
when the event occurs leaked
confidential information?
9
Source: http://searchsecurity.techtarget.com/feature/IT-
Security-Trends-2013-Mobile-security-concerns-tops-the-
list
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Round table Insights 2010
10
This project includes:
Legal dep. , IT, HR.
50% organization
culture, 50%
technology tools.
Data classification
should include all
Department managers
and management.
You can not get 100%
coverage of Data
Leakage, even with
three systems.
Not all organizations
covering the issue of
data leakage from all
views.
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
DLP Project
I. Analysis of the business environment and existing threats
(internal / external ).
II. Data classification - Definition of Confidential Information /
sensitive and classified according to the level of sensitivity.
For example, Financial info, medical info, customers info
etc.
III. Identification and mapping of confidential / sensitive data
storage. For example: USB drives, Data Bases, file servers,
mobile, PC etc.
11
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
DLP Project
V. Mapping and analysis of business processes and information
lifecycle organization: create data, distribution data (email),
backup, update a file server etc.
VI. Mapping and assessment of potential leakage channels.
For example: Interfaces and external web links, third-party
authors or temporary workers, faxes and printers etc.
VII. Characterization requirements- product selection and
implementation, including compliance and design policies,
procedures, processes Reply and complementary measures.
12
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
13
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Recommendations
14
Work Procedures and Guidelines
Processing of events - depending on organization nature
and information security team.capabilities
Responsibilities and new roles
Life cycle processes of organization information- Determining the
classification tags each document creation stage.
Audit logging and connection to SIEM systems
Lifelong learning and improving the quality of monitoring depending on
the events and the number of false alarms produced by the system.
Sigal Russin’s work/ Copyright@2014
Do not remove source or attribution from any slide, graph or portion of graph
Thank You!
Sigalr@stki.info

Mais conteúdo relacionado

Mais procurados

Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsLiwei Ren任力偉
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorCamilo Fandiño Gómez
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Chaitanya chandra sekhar
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and MitigationsApril Mardock CISSP
 

Mais procurados (20)

Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
DLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and AlgorithmsDLP Systems: Models, Architecture and Algorithms
DLP Systems: Models, Architecture and Algorithms
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Data Loss Prevention in Office 365
Data Loss Prevention in Office 365Data Loss Prevention in Office 365
Data Loss Prevention in Office 365
 
Dlp notes
Dlp notesDlp notes
Dlp notes
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
Mcafee data loss_prevention_11.6.x_product_guide_9-28-2021
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Data Loss Threats and Mitigations
Data Loss Threats and MitigationsData Loss Threats and Mitigations
Data Loss Threats and Mitigations
 

Semelhante a DLP Data leak prevention

Sigal summit 2014 final
Sigal summit 2014 finalSigal summit 2014 final
Sigal summit 2014 finalAriel Evans
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalAriel Evans
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014Ariel Evans
 
Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014Ariel Evans
 
Output management 2013
Output management 2013 Output management 2013
Output management 2013 Ariel Evans
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014Ariel Evans
 
Printing om 2014
Printing om 2014Printing om 2014
Printing om 2014Ariel Evans
 
Israel IT trends and positioning in networking and security
Israel IT  trends and positioning in networking and security Israel IT  trends and positioning in networking and security
Israel IT trends and positioning in networking and security Dr. Jimmy Schwarzkopf
 
Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Ariel Evans
 
Secure develpment 2014
Secure develpment 2014Secure develpment 2014
Secure develpment 2014Ariel Evans
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013 Ariel Evans
 
297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015Inbalraanan
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyberAriel Evans
 
Pini sigal Summit 2014 final
Pini sigal  Summit 2014 finalPini sigal  Summit 2014 final
Pini sigal Summit 2014 finalAriel Evans
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Priyanka Aash
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365Elastica Inc.
 
infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 deliveryAriel Evans
 

Semelhante a DLP Data leak prevention (20)

Sigal summit 2014 final
Sigal summit 2014 finalSigal summit 2014 final
Sigal summit 2014 final
 
Stki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 finalStki summit2013 infra_pini sigaltechnologies_v5 final
Stki summit2013 infra_pini sigaltechnologies_v5 final
 
contact center trends 2014
contact center trends 2014contact center trends 2014
contact center trends 2014
 
Contact Center infrastructure 2014
Contact Center infrastructure 2014Contact Center infrastructure 2014
Contact Center infrastructure 2014
 
Output management 2013
Output management 2013 Output management 2013
Output management 2013
 
CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014CONTACT CENTER TRENDS 2014
CONTACT CENTER TRENDS 2014
 
Printing om 2014
Printing om 2014Printing om 2014
Printing om 2014
 
Israel IT trends and positioning in networking and security
Israel IT  trends and positioning in networking and security Israel IT  trends and positioning in networking and security
Israel IT trends and positioning in networking and security
 
Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014Positioning+trends sigal summit 2014
Positioning+trends sigal summit 2014
 
Secure develpment 2014
Secure develpment 2014Secure develpment 2014
Secure develpment 2014
 
Cyber security 2013
Cyber security 2013 Cyber security 2013
Cyber security 2013
 
297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015297727851 getting-to-the-cloud-event-2015
297727851 getting-to-the-cloud-event-2015
 
Risk mngt gov compliance security cyber
Risk mngt  gov compliance security cyberRisk mngt  gov compliance security cyber
Risk mngt gov compliance security cyber
 
Embedding Security in IT Projects
Embedding Security in IT ProjectsEmbedding Security in IT Projects
Embedding Security in IT Projects
 
Pini sigal Summit 2014 final
Pini sigal  Summit 2014 finalPini sigal  Summit 2014 final
Pini sigal Summit 2014 final
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Protecting Your Data In Office 365
Protecting Your Data In Office 365Protecting Your Data In Office 365
Protecting Your Data In Office 365
 
infra 2015 delivery
infra 2015  deliveryinfra 2015  delivery
infra 2015 delivery
 

Mais de Ariel Evans

2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networkingAriel Evans
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014Ariel Evans
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratiosAriel Evans
 
Cloud cc security
Cloud cc securityCloud cc security
Cloud cc securityAriel Evans
 
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalStki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalAriel Evans
 
Mdm byod survey results 2013
Mdm byod survey results 2013Mdm byod survey results 2013
Mdm byod survey results 2013Ariel Evans
 
Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure ServicesAriel Evans
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnetAriel Evans
 

Mais de Ariel Evans (9)

2015 positioning security & networking
2015 positioning security & networking2015 positioning security & networking
2015 positioning security & networking
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014
 
Stki summit2013 ratios
Stki summit2013 ratiosStki summit2013 ratios
Stki summit2013 ratios
 
Cloud cc security
Cloud cc securityCloud cc security
Cloud cc security
 
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 finalStki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
 
Mdm byod survey results 2013
Mdm byod survey results 2013Mdm byod survey results 2013
Mdm byod survey results 2013
 
IDM & IAM 2012
IDM & IAM 2012IDM & IAM 2012
IDM & IAM 2012
 
Trends In Infrastructure Services
Trends In Infrastructure ServicesTrends In Infrastructure Services
Trends In Infrastructure Services
 
From creeper to stuxnet
From creeper to stuxnetFrom creeper to stuxnet
From creeper to stuxnet
 

Último

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 

Último (20)

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

DLP Data leak prevention

  • 1. Data Leakage Prevention Sigal Russin, CISO Senior Analyst at STKI sigalr@stki.info
  • 2. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph What are you getting: 2 1 2 3 4 5 6
  • 3. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Symantec DLP News 3
  • 4. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph It’s about People 4
  • 5. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Customers need more than a technology solution 5 Source: http://www.slideshare.net/ArrowECSMarketing/data-loss- prevention-from-symantec
  • 6. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Variety of Misuse Actions 6
  • 7. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph What is DLP? • DLP means different things to different people * Data Loss Prevention * Data Leakage Prevention * Data Loss Protection • DLP is always about protecting organization sensitive information. • DLP technology is content aware referred to as deep packet inspection, analyzes the payload contained within a file or session. • DLP references data in one of three states * Data in motion * Data at rest * Data in use 7 Source: http://www.slideshare.net/technetbelux/data-leakage- prevention-22804526
  • 8. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Defense In Depth: Encryption + DLP 8
  • 9. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Sensitive organization data Lack of familiarity with the types of information that exist in organizations and processes related to use. • What is confidential information? • Where is it stored? • What are the channels through which information may leak ? • What actions will be taken if and when the event occurs leaked confidential information? 9 Source: http://searchsecurity.techtarget.com/feature/IT- Security-Trends-2013-Mobile-security-concerns-tops-the- list
  • 10. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Round table Insights 2010 10 This project includes: Legal dep. , IT, HR. 50% organization culture, 50% technology tools. Data classification should include all Department managers and management. You can not get 100% coverage of Data Leakage, even with three systems. Not all organizations covering the issue of data leakage from all views.
  • 11. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph DLP Project I. Analysis of the business environment and existing threats (internal / external ). II. Data classification - Definition of Confidential Information / sensitive and classified according to the level of sensitivity. For example, Financial info, medical info, customers info etc. III. Identification and mapping of confidential / sensitive data storage. For example: USB drives, Data Bases, file servers, mobile, PC etc. 11
  • 12. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph DLP Project V. Mapping and analysis of business processes and information lifecycle organization: create data, distribution data (email), backup, update a file server etc. VI. Mapping and assessment of potential leakage channels. For example: Interfaces and external web links, third-party authors or temporary workers, faxes and printers etc. VII. Characterization requirements- product selection and implementation, including compliance and design policies, procedures, processes Reply and complementary measures. 12
  • 13. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph 13
  • 14. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Recommendations 14 Work Procedures and Guidelines Processing of events - depending on organization nature and information security team.capabilities Responsibilities and new roles Life cycle processes of organization information- Determining the classification tags each document creation stage. Audit logging and connection to SIEM systems Lifelong learning and improving the quality of monitoring depending on the events and the number of false alarms produced by the system.
  • 15. Sigal Russin’s work/ Copyright@2014 Do not remove source or attribution from any slide, graph or portion of graph Thank You! Sigalr@stki.info