SPEAKER BLITZ GINA SCINTA Senior Solutions Architect SafeNet.

Slides:



Advertisements
Similar presentations
14 September Digital Investigations With the proliferation of devices, do organisations really know where their most sensitive data is held? Companies.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
© Peter Readings Data Leakage Pete Readings CISSP.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
The twenty-four/seven database Oracle Database Security David Yahalom Senior database consultant
Dell Compellent and SafeNet KeySecure
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Security for Today’s Threat Landscape Kat Pelak 1.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
SPEAKER BLITZ ERIC BROWN Senior Systems Engineer NICK JAVANOVIC DoD Regional Sales Manager.
Peeling Back the Layers of an Ogre (or for those who like boring titles – Where is Our Confidential Data Hiding?) Harvard Townsend IT Security Officer.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
GREATER THAN EVER. TODAY, RISK OF DATA FALLING IN THE WRONG HANDS IS QUITE OFTEN THIS RISK IS NOT FROM EXTERNAL ATTACKERS. IT COMES FROM WITHIN.
FIT3105 Security and Identity Management Lecture 1.
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
Persuasive Presentation Vins Chacko. Portable Storage Product Pocket-sized and light weight Can Carry on your key chain Encrypt portion of drive with.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Information Security Technological Security Implementation and Privacy Protection.
Mike Hager Enterprise Security Advisor Unisys Corporation It’s All About The Data.
General Awareness Training
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Protection of Relations Within Large Datasets1 Protection of Relations Within Large Datasets Mgr. Boleslav Bobčík, T-Systems Czech Republic, a.s.
Security considerations for mobile devices in GoRTT
Kevin Casady Hanna Short BJ Rollinson.  Centralized and Structured collection of data stored in a computer system  An electronic filing system  Easy.
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Leveraging Information to Detect and Prevent Insider Attacks Phoram Mehta Senior.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Secure Data Sharing What is it Where is it What is the Risk – Strategic > What Policy should be enforced > How can the process be Audited > Ongoing Process.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Sensitive Metric Collection and Reporting System Michael Aiello Hanning Gao Martin Goldberg Michael Sosonkin Jason Woloz.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Securing Data with Strong Encryption and Access Controls Blair Semple Storage Security Evangelist Network Appliance Sept 12, 2007.
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Chap1: Is there a Security Problem in Computing?.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Safe’n’Sec IT security solutions for enterprises of any size.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
2013 Cost of Data Breach Survey: Global Analysis Ponemon Institute (2013) 1.
Chapter 5: Protecting Security of Assets. Classifying and Labeling Assets Defining sensitive data Defining classifications Defining data security requirements.
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
SafeNet The Foundation of Information Security Zen and the Art of Data Protection Preparing for the Evolution Adel Hajrasuliha – Regional Account Manager.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Technology and Business Continuity
Policy Development Milan Adams.
Dell Compellent and SafeNet KeySecure
Juniper Software-Defined Secure Network
Threat Landscape for Data Security
Backup and restoration of data, redundancy
Anatomy of a Large Scale Attack
DATA LOSS PREVENTION Mr. Collins Oduor.
Protect Your Ecommerce Site From Hacking and Fraud
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

SPEAKER BLITZ GINA SCINTA Senior Solutions Architect SafeNet

Gina Scinta Senior Solutions Architect

State of Data Security Security professionals believe they will suffer a breach. *Based on a SafeNet Survey of 230 security professionals. © SafeNet Proprietary Recognition that if perimeters failed, high value data would not be safe.

Breach Level Index © SafeNet Proprietary ,364,275,7171 RECORDS STOLEN Since 2013 Organization BreachedDate BreachedRecords Breached LocationSource of BreachType of Breach IRS 7/22/20141,400,000USAccidental LossIdentity Theft GSA 2/13/ ,000USAccidental LossIdentity Theft Pentagon 3/13/ ,000USMalicious OutsiderExistential Data Dept. of Energy 7/22/ ,179USMalicious OutsiderIdentity Theft US Troops Stationed in South Korea 6/8/ ,000 South Korea Malicious OutsiderIdentity Theft IRS 3/18/201420,000USAccidental LossIdentity Theft VFW 3/4/201455,000USMalicious OutsiderIdentity Theft FDA 10/15/201314,000USMalicious OutsiderIdentity Theft VA 1/17/2014 5,351USAccidental LossIdentity Theft

Ground Zero of the Breach Epidemic © SafeNet Proprietary PII or CBI SBU Confidential Classified Mission System Owner CFO Network Administrators System Administrators Backup Administrators Storage Administrators Outsourcing Vendors DR Storage Administrators Tape Courier Storage Repair/ Service Staff Storage Who Has Access to Sensitive Data? 50–80% of Attacks Originate behind the Firewall (Source: FBI) Nuisance Account Access Financial Access Identity Theft Existential Data Accidental Loss Hacktivist Malicious Insider Malicious Outsider State Sponsored

Data Breach Fallout Cost associated with retroactively protecting data Cost of investigating the source of the breach Cost of what happens with the compromise data Cost of damaged reputation

A New Mindset is Needed!  Sole Perimeter Security is No Longer Enough  Insider Threat is Greater Than Ever  Breaches Will Happen and We Must Prepare Differently DATA IS THE NEW PERIMETER! Control User Access Protect Data in the Cloud Encrypt Data at Rest Encrypt Data at Rest Protect Data in Transit Control Offsite User Access Store & Manage Crypto Keys

WHERE are your KEYS? Protect What Matters, Where it Matters WHERE is your DATA? WHO is Accessing your DATA? © SafeNet Proprietary