SlideShare uma empresa Scribd logo
1 de 25
OPTIMIZE YOUR DATA LOSS PREVENTION INVESTMENT FOR BOTTOM LINE RESULTS
DATA LOSS PREVENTION EXPERTISE
Providing DLP Since 2002                 Completed 500+ Assessments

Deployed 400+ DLP Projects               Manage 40+ DLP Solutions in 22 Countries


          Provide Daily Management of 1,000,000+ Users Globally



  Q U I C K FA C T S

     Symantec Master Specialization DLP Partner
     RSA’s Only Authorized Managed DLP Partner
     1st Managed DLP Services Provider (2008)
     Localized Chinese DLP Practice (2011)
     Global Support in 130 countries
     Data Mining, Custom Policies, & Scripting
MARKET EVOLUTION - 2005/2006 GARTNER RESULTS

 BEW Global forms partnership with
 Vericept in 2002. At the time of this
 report, BEW had 38 deployments of
 Vericept in the US and UK.

 BEW Global and Vontu form a
 partnership. BEW Global is the first
 Vontu reseller.

 Vidius changes name to PortAuthority
 and accelerates product development
 and US presence.

 Reconnex enters market with forensics
 approach.
MARKET EVOLUTION - 2007 GARTNER RESULTS


 Websense acquires PortAuthority.
 ($80M)


 Trend Micro acquires Provilla, October
 2007.


 Raytheon acquires Oakley Networks,
 October 2007.


 Tablus touted for exceptional data-at-rest
 capabilities. “Grid Worker”
MARKET EVOLUTION - 2008 GARTNER RESULTS


 Vontu acquired by Symantec. ($350M)


 Tablus acquired by RSA. ($40M Approx.)


 McAfee acquires Reconnex for network
 DLP ($46M) and Onigma ($20M) for Host
 DLP.


 Verdasys and Fidelis announce strategic
 partnership.
MARKET EVOLUTION - 2009 GARTNER RESULTS


 CA acquires Orchestria, January 2009.

 GTB struggles to gain a significant
 customer base.

 Palisade Systems and Code Green
 Networks target SMB DLP market.

 Workshare late entry into DLP market
 lacks functionality.

 Vericept acquired by Trustwave.
MARKET EVOLUTION - 2010 GARTNER RESULTS

 Symantec releases 10.5 and
 DataInsight to enhance DAR
 capabilities.

 RSA releases 8.0 with enhanced
 endpoint capabilities. Strategic
 partnership with Varonis.

 Websense releases 7.5 with
 upgraded management interface.
 Claims DLP in 30-minutes….

 McAfee releases 9.0 with greater
 integration with network and host
 DLP into ePO console.
MARKET EVOLUTION - 2011 GARTNER RESULTS
MARKET EVOLUTION - 2013 GARTNER RESULTS
BEW GLOBAL METHODOLOGY
                                           Risk Assessment


                                     ASSESS             QUANTIFY   IMPLEMENT    OPTIMIZE   REVIEW




 BEW GLOBAL‟S CORE DIFFERENTIATORS

    Methodology based on the cornerstones of ISO Plan-Do-Check-Act
    Leverage our proven Quality Management System (QMS) to drive continuous improvement
    Reduce risk and increase operational efficiencies
USE CASE: DLP PRE-PROJECT STATE
   Organization Overview:    Medical Device & Pharmaceutical Manufacturer, 40,000 employees globally

   DLP Scope:                Protection of Intellectual Property (General)

   DLP Primary Issue:        Customer overwhelmed with inaccurate incident data, no meaningful information

   Application Management:   Operated and managed by IT Security with limited input from business.

   Policy Governance:        Failure to use a lifecycle software development process for policy construction

   Incident Triage:          Infrequently reviewed by IT with little to no review by business owners.

   Event Management:         Hard to accomplish due to large # of false positives. No “gold nuggets.”

   Reporting and Metrics:    Zero customized reports. No relevant business analysis provided.

   Status:                   System generates 25,000 incidents/day / 750,000 incidents/month
APPLICATION SUPPORT & INTEGRATION


    Primary System DLP Management =
    Human Resource / Expertise Requirements



    Integrated System Management =
    Cross Department Collaboration Processes



    Health Check & System Validation Management =
    System Resource Requirements



    Vendor Management =
    Primary and Integrated Technology Vendor Relationships
POLICY & RULE GOVERNANCE


  Who requests rules & policy
                                     Who reviews rule requests?    What‟s the process for
  requirements?
                                                                   converting a rule request into a
                                     Criteria for approved rule?   policy?
  Are business owners engaged?




  Who‟s responsible for converting   What is the formal policy
  a rule into technical policy?      development process?          Is there a process to relay
                                                                   production policy metrics to
  Do they have technical policy      First drafts rarely work as   stakeholders?
  authoring expertise?               expected!
WORKFLOW DEVELOPMENT & MANAGEMENT

  Who develops & manages policy   Who defines thresholds that
  “buckets”?                                                        Who designs & sets the policy
                                  determine response rules for      response triggers?
                                  each “bucket”?
  False positive, inbound
  partner, outbound employee                                        Malicious, Inadvertent,
                                  Are 10 SSNs a high, medium or     Suspicious, above threshold.
                                  low severity incident?




                                  Who‟s responsible for building
  Triage response options:                                          Who manages the DLP policy &
                                  alerts, alarms & notifications?
  Human notification                                                rules repository?
  System notification (auto)
                                  Has business been engaged on
  Hybrid?                                                           Why recreate the wheel?
                                  event management?
INCIDENT TRIAGE & EVENT MANAGEMENT

  Who reviews volume & yield of       How are events/incidents             How does DLP fit in overall
  incidents & events?                 routed?                              incident/event management
                                                                           process?
  What‟s the review frequency?        Who owns the incident/event?
                                                                           Can this be mapped to DLP
                                                                           system?




  What metrics are developed to       Revision of rules based on quality   How will integrated systems be
  measure success of rules &          of policy results.                   tied together to yield valued info?
  related policy?
                                      Who manages policy optimization      Secure mail, web
  Who „s responsible for developing   process?                             gateway, GRC, SIEM
  metrics?
BUSINESS ANALYTICS
       Who drives report requirements? Requestors, Reviewers, others?


       Who develops reports?


       Do they have the expertise with 3rd party reporting tools?


       Are DLP system generated reports adequate?


       Are the metrics valuable & driving meaningful change?


       Report accuracy tied into QA process?
APPLICATION MANAGEMENT PITFALL
Inadequately Trained Infrastructu re Resources


             Inadequate Planning & Resources

                Problem: Current IT infrastructure management is often inadequately
                 trained for planning, deployment and ongoing operational
                 management of DLP operation system. (Oracle vs. SQL, etc.)

                Solution: Better internal planning & cross functional involvement. In
                 addition to outsourced 3rd party management of on premise solution or
                 fully managed cloud-based delivery. This provides you with instance
                 expertise reducing the need for staffing and providing higher
                 availability.
POLICY GOVERNANCE PITFALL
No Plan of Attack


                   Inadequate Planning & Resources

                    Problem: A survey of 50 DLP customers in 2010 said 83% of firms
                     did not consider the overall DLP system cycle & the necessary
                     resources for optimal system usage prior to solution acquisition.
                     Inadequate or lack of resources leads to poor policy construction &
                     unmanageable incidents.

                    Solution: A well thought out DLP scope with a supporting policy
                     governance process that is VERY inclusive of business unit input
                     as well as involvement with the triage & event management process.
                     There must be people budgeted for any DLP project as well as
                     preparation for business unit buy-in.
POLICY GOVERNANCE PITFALL
Failure to Engage the Business



            Stuck in the IT Department

            • Problem: A survey of 50 DLP customers in 2010 said 76% of firms stated
              the DLP system technical management & daily operations were the
              responsibility of a group directly involved with IT. In these cases it is very
              rare to find heavy involvement from business owners directly involved with
              the creation & usage of the data targeted for protection.

            • Solution: Designation of a primary business owner of the DLP solution, in
              conjunction with technical management, is the best recipe for success on
              the front-end planning phase of the project. Without direct & serious
              involvement from the business, it is very likely that the entire DLP will
              never get more than mediocre results.
POLICY GOVERNANCE PITFALL
Lack of Rule Customization



            Inaccuracy of Out-of-Box (OOB) Policies

            • Problem: The reliance of organizations to use OOB policies as the
              primary detection criteria for their DLP scope. In many cases data
              identifiers in OOB policies may never capture unique attributes of a
              organizations information targets, yielding a combination of false
              positives and false negatives which lead to an unmanageable incident
              yield.

            • Solution: Prior to enabling ANY managed production policies, it is
              highly recommended to select one primary data criteria to focus initial
              efforts. Once agreed upon, use business process mapping to capture
              how the data is used and stored, obtain examples, and then construct
              policies based on the collected data.
DATA-IN-MOTION PITFALLS:
M i s s i n g t h e Ta r g e t – F a l s e S e n s e o f S e c u r i t y


 Mis-configured Tap                      Encryption – The                   Misfire of Network          Network versus
    or Port Span                           Masked Data                      Discovery Scans           Endpoint Discovery

 Problem                               Problem                             Problem                    Problem
 Missing segments of                   Analysis of data DID not            Locations of sensitive     Running DAR scans
 network traffic or protocols          take place prior to                 data never targeted by     using a combo of
                                       encryption.                         the organization for       network & endpoint
 Solution Comprehensive                                                    scanning due to lack of    without thinking about
 test plan that maps to in             Solution                            an effective policy        which policy types &
 scope business processes              Comprehensive test plan             governance process.        detection methods are
 and related data types                that proves ALL DLP data                                       not the same.
 transmitted from various              assessment takes place              Solution
 network locations to                  prior to the gateway                Identify potential data    Solution
 ensure all relevant data              encryption & implement              stores by discussing the   Prior to acquiring DLP
 streams are being                     managed “test” DLP                  DLP program with staff     solution, have an
 captured.                             policies that identify              to understand process.     understanding of the
                                       encrypted transmissions                                        data types that make up
                                       as part of the test plan.                                      your target environment
                                                                                                      & then, decide on
                                                                                                      scanning method.
                                                                                                      .
DATA-IN-MOTION (ENDPOINT) PITFALLS:
T h e P a n d o r a ‟s B o x o f D L P


       Environment                        Staying in                User Performance             Network/System
       Assessment                          Contact                       Impacts               Performance Impacts


 • Problem                          • Problem
                                                                 • Problem                    • Problem
   No rigorous endpoint               Failure to monitor
                                                                   Implementing same            Failure to calculate &
   environment                        endpoint population &
                                                                   policies for network         measure the impact of
   assessment prior to the            their frequency of
                                                                   based & endpoint             endpoint policy traffic
   selection of the                   “checking-in” to the
                                                                   assessments without          across wide & local
   application &                      management server
                                                                   testing or modification.     area network
   enablement.                        with validated results.
                                                                                                connections.
 • Solution                         • Solution
                                                                 • Solution                   • Solution
   Address age of                     Phased deployment of
                                                                   Utilize a                    Thorough assessment
   environment, performa              endpoint with
                                                                   comprehensive test           of endpoint policies
   nce                                validation via test plan
                                                                   plan outlining specific      that addresses all of
   capabilities, technical &          on initial success of
                                                                   metrics (time to open        the concerns including
   human issues, & load               ALL agents & on-
                                                                   files, open/send             policy design
   of applications, in                going endpoint agent
                                                                   emails, open                 requirements, timing, fr
   conjunction with                   health reports.
                                                                   applications) prior to       equency & delivery
   education on the DLP                                            deployment.                  methods.
   endpoints.
QMS SAMPLE QUARTERLY REPORT
USE CASE –POST PROJECT STATE
Organization Overview:    Medical Device & Pharmaceutical Manufacturer, 40,000 employees globally

DLP Scope:                Focused on 3 specific product lines linked to highest revenue & earnings

DLP Primary Goal:         Identification of unauthorized movement of specific elements of IP

Application Management:   Operated by a combination of IT, messaging & desktop management teams

Policy Governance:        100% customized policies based on data collected from business unit

Incident Triage:          Daily review of incidents by Information Security

Event Management:         Incidents meeting severity criteria routed to business unit for investigation

Reporting and Metrics:    Behavioral pattern analysis leading to preventive actions

Status:                   R&D teams have high-level of confidence in ability to identify leakage of IP.
BEW GLOBAL SALES CONTACT
                                    Cole Harter
                             Regional Account Manager
                       720.775.6984 | charter@bewglobal.com



  BEW GLOBAL HQ                    BEW GLOBAL EMEA               BEW GLOBAL APAC
    5613 DTC Parkway                    3 Albany Court              520 Oxford Street
        Suite 810                        Albany Park                Level 23, Tower 1
Greenwood Village, CO 80111          Camberley GU16 7QR              Bondi Junction
          USA                              England                    Sydney 2022

   (ph) +1 720 227 0990             (ph) +44 (0) 845 481 0882    (ph) +61 (2) 9513 8800
   (fax) +1 720 227 0984            (fax) +44 (0) 871 714 2170   (fax) +61 (2) 9513 8888

   www.bewglobal.com                  www.bewglobal.com           www.bewglobal.com

Mais conteúdo relacionado

Mais procurados

Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic ManagementMarcelo Martins
 
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk IqFinding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk IqJoe Oringel
 
Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...Symmetry™
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramInfo-Tech Research Group
 
it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3Robert Nardella
 
IT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit CenterIT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit CenterGary Pennington
 
The Agile Alliance has Stated in their Manifesto
The Agile Alliance has Stated in their ManifestoThe Agile Alliance has Stated in their Manifesto
The Agile Alliance has Stated in their ManifestoGlen Alleman
 
Accretive solutions northstarinitiativeassessment-datasheet
Accretive solutions northstarinitiativeassessment-datasheetAccretive solutions northstarinitiativeassessment-datasheet
Accretive solutions northstarinitiativeassessment-datasheetrichibh
 
End Solutions Ltd CIO presentation
End Solutions Ltd CIO presentationEnd Solutions Ltd CIO presentation
End Solutions Ltd CIO presentationBluehusker
 
Creating a Free and Open Source Software ecosystem to facilitate government F...
Creating a Free and Open Source Software ecosystem to facilitate government F...Creating a Free and Open Source Software ecosystem to facilitate government F...
Creating a Free and Open Source Software ecosystem to facilitate government F...Derek Keats
 
IT Business Value
IT Business ValueIT Business Value
IT Business ValueVictor Font
 
IT GOVERNANCE OUTSOURCING
IT GOVERNANCE OUTSOURCINGIT GOVERNANCE OUTSOURCING
IT GOVERNANCE OUTSOURCINGArul Nambi
 
Tender Care Pediatric Dentistry
Tender Care Pediatric DentistryTender Care Pediatric Dentistry
Tender Care Pediatric Dentistryrheezy777
 
IT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperIT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperChuck Boutcher
 
Major Incident - make your NOC Rock
Major Incident - make your NOC RockMajor Incident - make your NOC Rock
Major Incident - make your NOC RockBob Fishman
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesJorge Sebastiao
 
Decision Lens Overview
Decision Lens OverviewDecision Lens Overview
Decision Lens OverviewDL Buzz
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 

Mais procurados (20)

Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk IqFinding Money & Detecting Fraud   Super Strategies 2009 By Visual Risk Iq
Finding Money & Detecting Fraud Super Strategies 2009 By Visual Risk Iq
 
Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...Review the five signs that you need a new Segregation of Duties compliance st...
Review the five signs that you need a new Segregation of Duties compliance st...
 
Build a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management ProgramBuild a Business-Driven IT Risk Management Program
Build a Business-Driven IT Risk Management Program
 
it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3it-Select-a-Best-Fit-DR-Solution-Phases-1-3
it-Select-a-Best-Fit-DR-Solution-Phases-1-3
 
IT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit CenterIT Compliance: Shifting from Cost Center to Profit Center
IT Compliance: Shifting from Cost Center to Profit Center
 
The Agile Alliance has Stated in their Manifesto
The Agile Alliance has Stated in their ManifestoThe Agile Alliance has Stated in their Manifesto
The Agile Alliance has Stated in their Manifesto
 
Accretive solutions northstarinitiativeassessment-datasheet
Accretive solutions northstarinitiativeassessment-datasheetAccretive solutions northstarinitiativeassessment-datasheet
Accretive solutions northstarinitiativeassessment-datasheet
 
End Solutions Ltd CIO presentation
End Solutions Ltd CIO presentationEnd Solutions Ltd CIO presentation
End Solutions Ltd CIO presentation
 
Creating a Free and Open Source Software ecosystem to facilitate government F...
Creating a Free and Open Source Software ecosystem to facilitate government F...Creating a Free and Open Source Software ecosystem to facilitate government F...
Creating a Free and Open Source Software ecosystem to facilitate government F...
 
IT Business Value
IT Business ValueIT Business Value
IT Business Value
 
Insights on it risk bcm
Insights on it risk bcmInsights on it risk bcm
Insights on it risk bcm
 
IT GOVERNANCE OUTSOURCING
IT GOVERNANCE OUTSOURCINGIT GOVERNANCE OUTSOURCING
IT GOVERNANCE OUTSOURCING
 
Tender Care Pediatric Dentistry
Tender Care Pediatric DentistryTender Care Pediatric Dentistry
Tender Care Pediatric Dentistry
 
IT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_WhitepaperIT_Crisis_Problem_Management_Whitepaper
IT_Crisis_Problem_Management_Whitepaper
 
Major Incident - make your NOC Rock
Major Incident - make your NOC RockMajor Incident - make your NOC Rock
Major Incident - make your NOC Rock
 
Information Security Cost Effective Managed Services
Information Security Cost Effective Managed ServicesInformation Security Cost Effective Managed Services
Information Security Cost Effective Managed Services
 
Decision Lens Overview
Decision Lens OverviewDecision Lens Overview
Decision Lens Overview
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Create a Winning BPI Playbook
Create a Winning BPI PlaybookCreate a Winning BPI Playbook
Create a Winning BPI Playbook
 

Destaque

Transitioning Economies pd. 1
Transitioning Economies pd. 1Transitioning Economies pd. 1
Transitioning Economies pd. 1phelpscivics
 
2013-05 Raleigh ISSA Chapter Updates May 2013
2013-05 Raleigh ISSA Chapter Updates May 20132013-05 Raleigh ISSA Chapter Updates May 2013
2013-05 Raleigh ISSA Chapter Updates May 2013Raleigh ISSA
 
2012-03 MultiFactor Not Just For Auditors
2012-03 MultiFactor Not Just For Auditors2012-03 MultiFactor Not Just For Auditors
2012-03 MultiFactor Not Just For AuditorsRaleigh ISSA
 
Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh ISSA
 
Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh ISSA
 
Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh ISSA
 
2013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 20132013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 2013Raleigh ISSA
 

Destaque (7)

Transitioning Economies pd. 1
Transitioning Economies pd. 1Transitioning Economies pd. 1
Transitioning Economies pd. 1
 
2013-05 Raleigh ISSA Chapter Updates May 2013
2013-05 Raleigh ISSA Chapter Updates May 20132013-05 Raleigh ISSA Chapter Updates May 2013
2013-05 Raleigh ISSA Chapter Updates May 2013
 
2012-03 MultiFactor Not Just For Auditors
2012-03 MultiFactor Not Just For Auditors2012-03 MultiFactor Not Just For Auditors
2012-03 MultiFactor Not Just For Auditors
 
Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6
 
Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7
 
Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8
 
2013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 20132013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 2013
 

Semelhante a Raleigh ISSA: "Optimize Your Data Protection Investment for Bottom Line Results" by BEW Global

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Oracle big data and rtd v5
Oracle big data and rtd v5Oracle big data and rtd v5
Oracle big data and rtd v5techsuda
 
Medical Clinic - Daragh O Brien
Medical Clinic - Daragh O BrienMedical Clinic - Daragh O Brien
Medical Clinic - Daragh O Brienhealthcareisi
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?DLT Solutions
 
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation:  Cloud Computing and Compliance For RIAsAdvisorAssist Presentation:  Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAsAdvisorAssist, LLC
 
value and implications of master data management.pptx
value and implications of master data management.pptxvalue and implications of master data management.pptx
value and implications of master data management.pptxMuhammad Khalid
 
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...DAMA Ireland
 
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...Ken O'Connor
 
The Analytics COE positioning your business analytics program for success
The Analytics COE   positioning your business analytics program for successThe Analytics COE   positioning your business analytics program for success
The Analytics COE positioning your business analytics program for successKiran Garimella
 
Project office automation whitepaper
Project office automation whitepaperProject office automation whitepaper
Project office automation whitepaperComputer Aid, Inc
 
Data summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data opsData summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data opsRyan Gross
 
COVID-19 Impact on Analytics Teams
COVID-19 Impact on Analytics TeamsCOVID-19 Impact on Analytics Teams
COVID-19 Impact on Analytics TeamsMichael Jennings
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterprisePerficient, Inc.
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodologytbeckwith
 
Information Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data ConundrumInformation Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data ConundrumDeloitte United States
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and TrendsMaclear LLC
 

Semelhante a Raleigh ISSA: "Optimize Your Data Protection Investment for Bottom Line Results" by BEW Global (20)

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Digital Transformation
Digital Transformation Digital Transformation
Digital Transformation
 
Oracle big data and rtd v5
Oracle big data and rtd v5Oracle big data and rtd v5
Oracle big data and rtd v5
 
Medical Clinic - Daragh O Brien
Medical Clinic - Daragh O BrienMedical Clinic - Daragh O Brien
Medical Clinic - Daragh O Brien
 
Dev ops
Dev opsDev ops
Dev ops
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?
 
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation:  Cloud Computing and Compliance For RIAsAdvisorAssist Presentation:  Cloud Computing and Compliance For RIAs
AdvisorAssist Presentation: Cloud Computing and Compliance For RIAs
 
value and implications of master data management.pptx
value and implications of master data management.pptxvalue and implications of master data management.pptx
value and implications of master data management.pptx
 
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
 
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
THE GOOD, THE BAD, THE DATA - Artificial Intelligence and Robotic Process Aut...
 
The Analytics COE positioning your business analytics program for success
The Analytics COE   positioning your business analytics program for successThe Analytics COE   positioning your business analytics program for success
The Analytics COE positioning your business analytics program for success
 
Project office automation whitepaper
Project office automation whitepaperProject office automation whitepaper
Project office automation whitepaper
 
Enterprise software delivery
Enterprise software deliveryEnterprise software delivery
Enterprise software delivery
 
Data summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data opsData summit connect fall 2020 - rise of data ops
Data summit connect fall 2020 - rise of data ops
 
COVID-19 Impact on Analytics Teams
COVID-19 Impact on Analytics TeamsCOVID-19 Impact on Analytics Teams
COVID-19 Impact on Analytics Teams
 
Identity Management: Risk Across The Enterprise
Identity Management: Risk Across The EnterpriseIdentity Management: Risk Across The Enterprise
Identity Management: Risk Across The Enterprise
 
Dlp Methodology
Dlp MethodologyDlp Methodology
Dlp Methodology
 
InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings  InDefend-Integrated Data Privacy Offerings
InDefend-Integrated Data Privacy Offerings
 
Information Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data ConundrumInformation Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 

Mais de Raleigh ISSA

Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh ISSA
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account securityRaleigh ISSA
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014Raleigh ISSA
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...Raleigh ISSA
 
April 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesApril 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesRaleigh ISSA
 
March 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secMarch 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secRaleigh ISSA
 
March 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesMarch 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesRaleigh ISSA
 
February 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesFebruary 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesRaleigh ISSA
 
2014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 20142014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 2014Raleigh ISSA
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
2013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 20132013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 2013Raleigh ISSA
 
2013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 20132013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 2013Raleigh ISSA
 
2013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 20132013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 2013Raleigh ISSA
 
2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith PiguesRaleigh ISSA
 
2013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 20132013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 2013Raleigh ISSA
 
2013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 20132013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 2013Raleigh ISSA
 
2013-04 Raleigh ISSA Chapter Updates April 2013
2013-04 Raleigh ISSA Chapter Updates April 20132013-04 Raleigh ISSA Chapter Updates April 2013
2013-04 Raleigh ISSA Chapter Updates April 2013Raleigh ISSA
 
2013-02 Raleigh ISSA Chapter Updates February 2013
2013-02 Raleigh ISSA Chapter Updates February 20132013-02 Raleigh ISSA Chapter Updates February 2013
2013-02 Raleigh ISSA Chapter Updates February 2013Raleigh ISSA
 
2013-03 Raleigh ISSA Chapter Updates March 2013
2013-03 Raleigh ISSA Chapter Updates March 20132013-03 Raleigh ISSA Chapter Updates March 2013
2013-03 Raleigh ISSA Chapter Updates March 2013Raleigh ISSA
 
2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework 2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework Raleigh ISSA
 

Mais de Raleigh ISSA (20)

Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...
 
April 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesApril 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slides
 
March 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secMarch 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info sec
 
March 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesMarch 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slides
 
February 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesFebruary 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slides
 
2014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 20142014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 2014
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
2013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 20132013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 2013
 
2013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 20132013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 2013
 
2013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 20132013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 2013
 
2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues
 
2013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 20132013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 2013
 
2013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 20132013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 2013
 
2013-04 Raleigh ISSA Chapter Updates April 2013
2013-04 Raleigh ISSA Chapter Updates April 20132013-04 Raleigh ISSA Chapter Updates April 2013
2013-04 Raleigh ISSA Chapter Updates April 2013
 
2013-02 Raleigh ISSA Chapter Updates February 2013
2013-02 Raleigh ISSA Chapter Updates February 20132013-02 Raleigh ISSA Chapter Updates February 2013
2013-02 Raleigh ISSA Chapter Updates February 2013
 
2013-03 Raleigh ISSA Chapter Updates March 2013
2013-03 Raleigh ISSA Chapter Updates March 20132013-03 Raleigh ISSA Chapter Updates March 2013
2013-03 Raleigh ISSA Chapter Updates March 2013
 
2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework 2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework
 

Raleigh ISSA: "Optimize Your Data Protection Investment for Bottom Line Results" by BEW Global

  • 1. OPTIMIZE YOUR DATA LOSS PREVENTION INVESTMENT FOR BOTTOM LINE RESULTS
  • 2. DATA LOSS PREVENTION EXPERTISE Providing DLP Since 2002 Completed 500+ Assessments Deployed 400+ DLP Projects Manage 40+ DLP Solutions in 22 Countries Provide Daily Management of 1,000,000+ Users Globally Q U I C K FA C T S Symantec Master Specialization DLP Partner RSA’s Only Authorized Managed DLP Partner 1st Managed DLP Services Provider (2008) Localized Chinese DLP Practice (2011) Global Support in 130 countries Data Mining, Custom Policies, & Scripting
  • 3. MARKET EVOLUTION - 2005/2006 GARTNER RESULTS BEW Global forms partnership with Vericept in 2002. At the time of this report, BEW had 38 deployments of Vericept in the US and UK. BEW Global and Vontu form a partnership. BEW Global is the first Vontu reseller. Vidius changes name to PortAuthority and accelerates product development and US presence. Reconnex enters market with forensics approach.
  • 4. MARKET EVOLUTION - 2007 GARTNER RESULTS Websense acquires PortAuthority. ($80M) Trend Micro acquires Provilla, October 2007. Raytheon acquires Oakley Networks, October 2007. Tablus touted for exceptional data-at-rest capabilities. “Grid Worker”
  • 5. MARKET EVOLUTION - 2008 GARTNER RESULTS Vontu acquired by Symantec. ($350M) Tablus acquired by RSA. ($40M Approx.) McAfee acquires Reconnex for network DLP ($46M) and Onigma ($20M) for Host DLP. Verdasys and Fidelis announce strategic partnership.
  • 6. MARKET EVOLUTION - 2009 GARTNER RESULTS CA acquires Orchestria, January 2009. GTB struggles to gain a significant customer base. Palisade Systems and Code Green Networks target SMB DLP market. Workshare late entry into DLP market lacks functionality. Vericept acquired by Trustwave.
  • 7. MARKET EVOLUTION - 2010 GARTNER RESULTS Symantec releases 10.5 and DataInsight to enhance DAR capabilities. RSA releases 8.0 with enhanced endpoint capabilities. Strategic partnership with Varonis. Websense releases 7.5 with upgraded management interface. Claims DLP in 30-minutes…. McAfee releases 9.0 with greater integration with network and host DLP into ePO console.
  • 8. MARKET EVOLUTION - 2011 GARTNER RESULTS
  • 9. MARKET EVOLUTION - 2013 GARTNER RESULTS
  • 10. BEW GLOBAL METHODOLOGY Risk Assessment ASSESS QUANTIFY IMPLEMENT OPTIMIZE REVIEW BEW GLOBAL‟S CORE DIFFERENTIATORS Methodology based on the cornerstones of ISO Plan-Do-Check-Act Leverage our proven Quality Management System (QMS) to drive continuous improvement Reduce risk and increase operational efficiencies
  • 11. USE CASE: DLP PRE-PROJECT STATE Organization Overview: Medical Device & Pharmaceutical Manufacturer, 40,000 employees globally DLP Scope: Protection of Intellectual Property (General) DLP Primary Issue: Customer overwhelmed with inaccurate incident data, no meaningful information Application Management: Operated and managed by IT Security with limited input from business. Policy Governance: Failure to use a lifecycle software development process for policy construction Incident Triage: Infrequently reviewed by IT with little to no review by business owners. Event Management: Hard to accomplish due to large # of false positives. No “gold nuggets.” Reporting and Metrics: Zero customized reports. No relevant business analysis provided. Status: System generates 25,000 incidents/day / 750,000 incidents/month
  • 12. APPLICATION SUPPORT & INTEGRATION Primary System DLP Management = Human Resource / Expertise Requirements Integrated System Management = Cross Department Collaboration Processes Health Check & System Validation Management = System Resource Requirements Vendor Management = Primary and Integrated Technology Vendor Relationships
  • 13. POLICY & RULE GOVERNANCE Who requests rules & policy Who reviews rule requests? What‟s the process for requirements? converting a rule request into a Criteria for approved rule? policy? Are business owners engaged? Who‟s responsible for converting What is the formal policy a rule into technical policy? development process? Is there a process to relay production policy metrics to Do they have technical policy First drafts rarely work as stakeholders? authoring expertise? expected!
  • 14. WORKFLOW DEVELOPMENT & MANAGEMENT Who develops & manages policy Who defines thresholds that “buckets”? Who designs & sets the policy determine response rules for response triggers? each “bucket”? False positive, inbound partner, outbound employee Malicious, Inadvertent, Are 10 SSNs a high, medium or Suspicious, above threshold. low severity incident? Who‟s responsible for building Triage response options: Who manages the DLP policy & alerts, alarms & notifications? Human notification rules repository? System notification (auto) Has business been engaged on Hybrid? Why recreate the wheel? event management?
  • 15. INCIDENT TRIAGE & EVENT MANAGEMENT Who reviews volume & yield of How are events/incidents How does DLP fit in overall incidents & events? routed? incident/event management process? What‟s the review frequency? Who owns the incident/event? Can this be mapped to DLP system? What metrics are developed to Revision of rules based on quality How will integrated systems be measure success of rules & of policy results. tied together to yield valued info? related policy? Who manages policy optimization Secure mail, web Who „s responsible for developing process? gateway, GRC, SIEM metrics?
  • 16. BUSINESS ANALYTICS Who drives report requirements? Requestors, Reviewers, others? Who develops reports? Do they have the expertise with 3rd party reporting tools? Are DLP system generated reports adequate? Are the metrics valuable & driving meaningful change? Report accuracy tied into QA process?
  • 17. APPLICATION MANAGEMENT PITFALL Inadequately Trained Infrastructu re Resources Inadequate Planning & Resources  Problem: Current IT infrastructure management is often inadequately trained for planning, deployment and ongoing operational management of DLP operation system. (Oracle vs. SQL, etc.)  Solution: Better internal planning & cross functional involvement. In addition to outsourced 3rd party management of on premise solution or fully managed cloud-based delivery. This provides you with instance expertise reducing the need for staffing and providing higher availability.
  • 18. POLICY GOVERNANCE PITFALL No Plan of Attack Inadequate Planning & Resources  Problem: A survey of 50 DLP customers in 2010 said 83% of firms did not consider the overall DLP system cycle & the necessary resources for optimal system usage prior to solution acquisition. Inadequate or lack of resources leads to poor policy construction & unmanageable incidents.  Solution: A well thought out DLP scope with a supporting policy governance process that is VERY inclusive of business unit input as well as involvement with the triage & event management process. There must be people budgeted for any DLP project as well as preparation for business unit buy-in.
  • 19. POLICY GOVERNANCE PITFALL Failure to Engage the Business Stuck in the IT Department • Problem: A survey of 50 DLP customers in 2010 said 76% of firms stated the DLP system technical management & daily operations were the responsibility of a group directly involved with IT. In these cases it is very rare to find heavy involvement from business owners directly involved with the creation & usage of the data targeted for protection. • Solution: Designation of a primary business owner of the DLP solution, in conjunction with technical management, is the best recipe for success on the front-end planning phase of the project. Without direct & serious involvement from the business, it is very likely that the entire DLP will never get more than mediocre results.
  • 20. POLICY GOVERNANCE PITFALL Lack of Rule Customization Inaccuracy of Out-of-Box (OOB) Policies • Problem: The reliance of organizations to use OOB policies as the primary detection criteria for their DLP scope. In many cases data identifiers in OOB policies may never capture unique attributes of a organizations information targets, yielding a combination of false positives and false negatives which lead to an unmanageable incident yield. • Solution: Prior to enabling ANY managed production policies, it is highly recommended to select one primary data criteria to focus initial efforts. Once agreed upon, use business process mapping to capture how the data is used and stored, obtain examples, and then construct policies based on the collected data.
  • 21. DATA-IN-MOTION PITFALLS: M i s s i n g t h e Ta r g e t – F a l s e S e n s e o f S e c u r i t y Mis-configured Tap Encryption – The Misfire of Network Network versus or Port Span Masked Data Discovery Scans Endpoint Discovery Problem Problem Problem Problem Missing segments of Analysis of data DID not Locations of sensitive Running DAR scans network traffic or protocols take place prior to data never targeted by using a combo of encryption. the organization for network & endpoint Solution Comprehensive scanning due to lack of without thinking about test plan that maps to in Solution an effective policy which policy types & scope business processes Comprehensive test plan governance process. detection methods are and related data types that proves ALL DLP data not the same. transmitted from various assessment takes place Solution network locations to prior to the gateway Identify potential data Solution ensure all relevant data encryption & implement stores by discussing the Prior to acquiring DLP streams are being managed “test” DLP DLP program with staff solution, have an captured. policies that identify to understand process. understanding of the encrypted transmissions data types that make up as part of the test plan. your target environment & then, decide on scanning method. .
  • 22. DATA-IN-MOTION (ENDPOINT) PITFALLS: T h e P a n d o r a ‟s B o x o f D L P Environment Staying in User Performance Network/System Assessment Contact Impacts Performance Impacts • Problem • Problem • Problem • Problem No rigorous endpoint Failure to monitor Implementing same Failure to calculate & environment endpoint population & policies for network measure the impact of assessment prior to the their frequency of based & endpoint endpoint policy traffic selection of the “checking-in” to the assessments without across wide & local application & management server testing or modification. area network enablement. with validated results. connections. • Solution • Solution • Solution • Solution Address age of Phased deployment of Utilize a Thorough assessment environment, performa endpoint with comprehensive test of endpoint policies nce validation via test plan plan outlining specific that addresses all of capabilities, technical & on initial success of metrics (time to open the concerns including human issues, & load ALL agents & on- files, open/send policy design of applications, in going endpoint agent emails, open requirements, timing, fr conjunction with health reports. applications) prior to equency & delivery education on the DLP deployment. methods. endpoints.
  • 24. USE CASE –POST PROJECT STATE Organization Overview: Medical Device & Pharmaceutical Manufacturer, 40,000 employees globally DLP Scope: Focused on 3 specific product lines linked to highest revenue & earnings DLP Primary Goal: Identification of unauthorized movement of specific elements of IP Application Management: Operated by a combination of IT, messaging & desktop management teams Policy Governance: 100% customized policies based on data collected from business unit Incident Triage: Daily review of incidents by Information Security Event Management: Incidents meeting severity criteria routed to business unit for investigation Reporting and Metrics: Behavioral pattern analysis leading to preventive actions Status: R&D teams have high-level of confidence in ability to identify leakage of IP.
  • 25. BEW GLOBAL SALES CONTACT Cole Harter Regional Account Manager 720.775.6984 | charter@bewglobal.com BEW GLOBAL HQ BEW GLOBAL EMEA BEW GLOBAL APAC 5613 DTC Parkway 3 Albany Court 520 Oxford Street Suite 810 Albany Park Level 23, Tower 1 Greenwood Village, CO 80111 Camberley GU16 7QR Bondi Junction USA England Sydney 2022 (ph) +1 720 227 0990 (ph) +44 (0) 845 481 0882 (ph) +61 (2) 9513 8800 (fax) +1 720 227 0984 (fax) +44 (0) 871 714 2170 (fax) +61 (2) 9513 8888 www.bewglobal.com www.bewglobal.com www.bewglobal.com

Notas do Editor

  1. No IT/IS/PMO coordination – treating DLP like an install rather than a project.
  2. No project mgmt… no project team…
  3. Treating DLP like a less powerful and invasive tool…
  4. User MRN / Healthcare, banking and account number, and State Data Privacy examples.