BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATION’S MOST CRITICAL ASSETS.

Slides:



Advertisements
Similar presentations
Network Systems Sales LLC
Advertisements

BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATIONS MOST CRITICAL ASSETS.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
OPTIMIZE YOUR DATA LOSS PREVENTION INVESTMENT FOR BOTTOM LINE RESULTS.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Social Engineering Jero-Jewo. Case study Social engineering is the act of manipulating people into performing actions or divulging confidential information.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
OPTIMIZE YOUR DATA LOSS PREVENTION INVESTMENT FOR BOTTOM LINE RESULTS.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Security & PCI Compliance The Future of Electronic Payments Security & PCI Compliance Greg Grant Vice President – Managed Security Services.
LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:
Network security policy: best practices
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
1 Data Strategy Overview Keith Wilson Session 15.
Website Hardening HUIT IT Security | Sep
Optimize Your Data Protection Investment for Bottom Line Results.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
S/W Project Management
Trimble Connected Community
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Using Taxonomies Effectively in the Organization v. 2.0 KnowledgeNets 2001 Vivian Bliss Microsoft Knowledge Network Group
Bruce Hallas Director Marmalade Box Ltd. UK Business Comparison of Information Security Incidents & Financial Impact Corporate UK SME UK 25% ↓ in number.
David N. Wozei Systems Administrator, IT Auditor.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
BREAKING DOWN MISCONCEPTIONS ABOUT DLP. BEW GLOBAL’S DLP EXPERTISE Global Support in 130 countries Manage DLP Solutions in 22 Countries Daily Management.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Knowledge Management with a Purpose Velocity & Variability aka Lean Six Sigma Gary Jones Dir, Service Operations.
Using Taxonomies Effectively in the Organization KMWorld 2000 Mike Crandall Microsoft Information Services
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Changing World of Endpoint Protection
Protecting Business Assets While Enabling Performance Addressing Risk Management and Customer Retention.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Strategies for Knowledge Management Success SCP Best Practices Showcase March 18, 2004.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Risk Identification and Risk Assessment
State of Georgia Release Management Training
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
© 2003 Six Sigma Academy0 The Roles of Six Sigma Champion Workshop.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Info-Tech Research Group1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
CMMI Certification - By Global Certification Consultancy.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Fourth Dimension Technologies
Segmap Solutions Mapping segments.
Working at a Small-to-Medium Business or ISP – Chapter 8
Security Standard: “reasonable security”
BEW GLOBAL’S DLP EXPERTISE
CCNET Managed Services
Program Control Services – Overview
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
<offer name> with Microsoft 365 Business Secure Deployment
Comodo Dome Data Protection
Presentation transcript:

BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATION’S MOST CRITICAL ASSETS

BEW GLOBAL’S DLP EXPERTISE Global Support in 130 countries Manage DLP Solutions in 22 Countries Daily Management of 1,000,000+ Users Deployed 400+ DLP Projects Completed 500+ Assessments Localized Chinese DLP Practice (2011) 1st Managed DLP Services Provider (2008) VENDOR RECOGNITIONS Symantec Master Specialization DLP Partner RSA’s Only Authorized Managed DLP Partner Websense Certified TRITONs – More than any other partner, 10 Olympians & 5 Gladiators

BEW GLOBAL SERVICES BEW GLOBAL’S CORE DIFFERENTIATORS Methodology based on the cornerstones of ISO Plan-Do-Check-Act Leverage our proven Quality Management System (QMS) to drive continuous improvement Reduce risk and increase operational efficiencies

SECURITY CONTINUUM

BEW Global works in cooperation with customers to plan, implement and maintain a Critical Asset Protection Program (CAPP) that clearly defines what assets are deemed most important to the customer organization based on revenue, income, reputation and core operational impact.. BEW GLOBAL’S PROVEN APPROACH

REALISTIC SCOPE, MEASUREABLE RESULTS Through a comprehensive interview and information gathering process, BEW Global works with the customer to develop a realistic Critical Asset Protection Program ( CAPP ) scope that defines the assets as well as the core attributes of those assets in regards creation, storage, usage and transmission.

CONTENT TYPES

USE CASE: DLP PRE-PROJECT STATE Organization Overview: Manufacturing firm of 30,000 employees operating in 50 countries globally DLP Scope: Protection of Intellectual Property (General) DLP Primary Issue: Lack of staff and buy-in from business owners who handle critical assets Application Management: Most information security tools operated and “managed” by IT or networks Policy Governance: No internal resources with any experience with DLP policy construction Incident Triage: Lean staff of Infosec staff already buried by SIEM and other tools output Event Management: Informal event management process with little feedback to the business Reporting and Metrics: Zero customized reports. Very little business analysis provided Status: Charged with implementing DLP to protect Critical Assets, specifically product IP

INTELISECURE QUALITY MANAGEMENT SYSTEM

USE CASE: POST-PROJECT STATE Organization Overview: Defined specific business units to initiate program DLP Scope: Focused on 3 specific product lines linked to highest revenue & earnings DLP Primary Goal: Identification of unauthorized movement of specific elements of IP Application Management: Operated by a combination of IT, messaging & desktop management teams Policy Governance: 100% customized policies based on data collected from business unit Incident Triage: Daily review of incidents by BEW Global Intelisecure Managed Services team Event Management: Incidents meeting severity criteria routed to business unit for investigation Reporting and Metrics: Behavioral pattern analysis leading to preventive actions Status: R&D teams have high-level of confidence in ability to identify leakage of IP

PITFALL 1: NO PLAN OF ATTACK

5 Pieces of DLP Advice You Can’t Afford to Ignore 17 PITFALL 2: FAILURE TO ENGAGE THE BUSINESS

5 Pieces of DLP Advice You Can’t Afford to Ignore 18 PITFALL 3: INADEQUATELY TRAINED RESOURCES

DATA LOSS PROTECTION PITFALLS: Missing the Target – False Sense of Security Mis-configured Tap or Port Span Problem Missing segments of network traffic or protocols Solution Comprehensive test plan that maps to in scope business processes and related data types transmitted from various network locations to ensure all relevant data streams are being captured. Encryption – The Masked Data Problem Analysis of data DID NOT take place prior to encryption. Solution Comprehensive test plan that proves ALL DLP data assessment takes place prior to the gateway encryption & implement managed “test” DLP policies that identify encrypted transmissions as part of the test plan. Misfire of Network Discovery Scans Problem Locations of sensitive data never targeted by the organization for scanning due to lack of an effective policy governance process. Solution Identify potential data stores by discussing the DLP program with staff to understand process. Network versus Endpoint Discovery Problem Running DAR scans using a combo of network & endpoint without thinking about which policy types & detection methods are not the same. Solution Prior to acquiring DLP solution, have an understanding of the data types that make up your target environment & then, decide on scanning method..

The Pandora’s Box of DLP Environment Assessment Staying in Contact User Performance Impacts Network/System Performance Impacts Problem No rigorous endpoint environment assessment prior to the selection of the application & enablement. Solution Address age of environment, performance capabilities, technical & human issues, & load of applications, in conjunction with education on the DLP endpoints. Problem Failure to monitor endpoint population & their frequency of “checking-in” to the management server with validated results. Solution Phased deployment of endpoint with validation via test plan on initial success of ALL agents & on- going endpoint agent health reports. Problem Implementing same policies for network based & endpoint assessments without testing or modification. Solution Utilize a comprehensive test plan outlining specific metrics (time to open files, open/send s, open applications) prior to deployment. Problem Failure to calculate & measure the impact of endpoint policy traffic across wide & local area network connections. Solution Thorough assessment of endpoint policies that addresses all of the concerns including policy design requirements, timing, frequency & delivery methods. DATA LOSS PROTECTION PITFALLS:

BEW GLOBAL IS THE CHOICE OF MARKET LEADERS CLIENTS INCLUDE UNIVERSITIESINSURANCE HEALTHCARE FINANCE TOP 50

BEW GLOBAL IS THE CHOICE OF MARKET LEADERS CLIENTS INCLUDE MANUFACTURINGOIL & GAS RETAIL/ENTERTAINMENT

Questions?