Www.searchinform.ru Comprehensive DLP Solutions in Large Geographically Dispersed Companies.

Slides:



Advertisements
Similar presentations
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Advertisements

© HIPAA Continuity Planners HIPAA Mandates a PLAN! (beyond hardware and software) Presented in Partnership with.
Emergency & Event Communications RMAUG August 8, 2007 Linda Collins, Mutare Software.
SECAM Systems Product Presentation SECAM Systems © 2010.
«Knowledge is power». DO YOU KNOW WHAT’S GOING ON IN YOUR COMPANY? LanAgent «Knowledge is power»
THE INSIDER THREAT AND DATA LOSS PREVENTION CSCE 727.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Practical Aspects of DLP System Deployment
Security Controls – What Works
1. Failure is when users do not feel they get what they paid for. 2. Failure is when the overall organization fails to adopt the solution.
SECURITY CONSIDERATIONS FOR COMPUTER PERSONNEL Tom Richards, Steve Guynes and Wayne Spence April 12, 2010.
1 Copyright © 2014 PPM 2000 Inc. SINGAPRORE, AUGUST 2014 Denis O’Sullivan, CPP INCIDENT MANAGEMENT TECHNOLOGY CHALLENGES.
Session 3 – Information Security Policies
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
Data Loss Prevention in the Banking Industry.
National Public Health Performance Standards Local Assessment Instrument Essential Service:3 Inform, Educate, and Empower People about Health Issues.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Continuity of Operations Planning COOP Overview for Leadership (Date)
Outline  Company Profile  Services Provided  Assets  System Schema  Risk Categories  Technical Risks and Mitigation  Summary.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Intrusion Detection MIS ALTER 0A234 Lecture 11.
Marketing of Information Security Products. The business case for Information Security Management.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
HIPAA COMPLIANCE WITH DELL
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Stepped Up ERM Teresa McKay Director, Defense Finance and Accounting Service ASMC Washington Chapter September 17, 2008.
Established expertise FIATA 8th October 2012 Overview of Loss Prevention Issues 2012 Helen Arabanos TT Club.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
Internal Audit Department Mission The mission of the Internal Audit Department is to promote economy, efficiency, effectiveness and accountability through.
The State of Computer & Data Security in Corporations Independent Survey.
Pedigree: Network-wide Protection Against Enterprise Data Leaks Team: Nick Feamster, Assistant Professor, School of CS Anirudh Ramachandran, PhD candidate,
CU – Boulder Security Incidents Jon Giltner. Our Challenge.
KENTUCKY: POLICIES & PRACTICE Preventing, Detecting, and Investigating Test Security Irregularities: A Comprehensive Guidebook On Test Security For States.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
Finding and Applying for Jobs in the Federal Government 1.
Privacy Act United States Army (Managerial Training)
Slide 4-1 UNIT 4: INCIDENT COMMAND SYSTEM GENERAL STAFF FUNCTIONS AND APPLICATIONS.
Data Loss and Prevention: Securing Hospitals from Data Breach through End Point Security NJHIMSS Security, Privacy and Compliance Taskforce Tom Bartiromo.
AUDITING BUSINESS CONTINUITY PROGRAMS AND PLANS What to Look For Presented by: Tommye White, CBCP, DRP Chuck Walts, CBCP, CRP.
DLP Solutions in Large Geographically Dispersed Companies.
EMS Seminar #4 – Disaster Preparedness Joseph Ip BSc (Hon), MSc, MD VGH Emergency May 28, 2002.
HR SECURITY  EGBERT PESHA  ALLOCIOUS RUZIWA  AUTHER MAKUVAZA  SAKARIA IINOLOMBO
Strategic National Stockpile Points of Dispensing (PODs)
New Hanover County Schools Managing Crisis Events
Team 1 – Incident Response
Data Minimization Framework
Wisconsin Department of Public Instruction
Introduction to the Federal Defense Acquisition Regulation
RESOURCES FOR REAL ESTATE AGENTS RESOURCES FOR TITLE AGENTS
of DLP System Deployment
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture
MFIRS 1 Basic Module.
Detecting, reporting & investigating data breaches under GDPR
Organisational NRW Management
Data Loss Prevention in Office 365
Emergency & Event Communications Linda Collins, Mutare Software
Employee Cybersecurity Program
UD PCI GUIDELINES A guide for compliance with PCI DSS and the University of Delaware Payment Card Program ALWAYS Process payments immediately using a solution.
Presentation transcript:

Comprehensive DLP Solutions in Large Geographically Dispersed Companies

Company Structure Company Tree Structure

Information Security in a Company There is an Information Security Department in every company's branch office managed by its CEO and Head Office Information Security Department. In a geographically dispersed environment efficient control of branch offices becomes a number one priority. However, average employees should not be the only target. Information security officers should also be controlled. Such comprehensive control ensures overall adherence to the information security standards and policies accepted in the Head Office. Establishing such control practices is a primary challenge of the Head Office Information Security Department.

Data Leak Channels Comprehensive Control of All Branch Offices’ Data Channels Most Common Data Leakage Channels Monitoring employees contacts in and outside a company allows getting some idea of their inner motives: - In-time discovery of resignation plans; - Monitoring employee response to managers instructions; - Being aware of the real employee loyalty situation or - Unhealthy atmosphere in a company; - Tracking employee activities during working hours; - Responding to employees illegal actions in the network. Employees Contacts in and outside the Company

Information Security in a Company Setting up DLP alerts is an extremely important aspect of information security. Should an incident (i.e. information security violation) occur, the system will immediately send a notification to information security officers. Setting up DLP alerts is a primary objective of Head Office Information Security Department. Alerts set up and approved by the Head Office should be used and strictly adhered to at all branch offices.

DLP Alerts Information security officers working at branch offices must respond to all notifications about information security breaches. Alerts 1,2, and 3 should not be altered or deleted by information security officers working at branch offices.

DLP Alerts Branch offices may create their own alerts (e.g. 1.1, 1.2, 2.1, etc.) taking into account some local peculiarities. Should such alerts be applicable to other offices, they may be declared obligatory by the Head Office. Information security officers working in the Head Office should monitor the process of handling alerts in branch offices.

Information Security in a Company A Comprehensive DLP Solution Allows the Following: common information security standards throughout the company, saving on personnel training and system deployment, cutting maintenance costs, access to consolidated data on security incidents.

Information Security Perimeter SearchInform Information Security Perimeter allows detecting data leaks through е-mail, ICQ, Skype, removable media (USB/CD), and printed documents. It can also find sensitive data-at-rest where they don't belong.

Alerts for all possible data leak channels monitored by SearchInform Information Security Perimeter are tuned at the Head Office. They will be used by all branches throughout the company, which gives information security officers an excellent possibility of multi-level information control. SearchInform Information Security Perimeter allows a new level of data loss prevention in a company. Information Security Perimeter