What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.

Slides:



Advertisements
Similar presentations
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Advertisements

1 SANS Technology Institute - Candidate for Master of Science Degree 1 Automating Crosswalk between SP 800, 20 Critical Controls, and Australian Government.
IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
Course: e-Governance Project Lifecycle Day 1
BalaBit Shell Control Box
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Security Controls – What Works
Information Security Policies and Standards
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Compliance in Office 365 Edge Pereira Sandy Millar From Avanade Australia OSS304.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
“Mitigating Offshoring Risks in a Global Business Environment“
Protect critical information with a smart information-based-risk management strategy. Prepared by: Firas Mohamed Taher.
Dell Connected Security Solutions Simplify & unify.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
WSV323. CSO/CIO department Regulation translated to control objectives Infrastructure Support Control objectives turned into control activities.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Security considerations for mobile devices in GoRTT
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
The Changing World of Endpoint Protection
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Presentation to the CIO PREPARED BY: JOSHUA SMITH, GARY FAULKNER, BRANDON VAN GUILDER, AND ERIC RUSCH.
Pro-active Security Measures
Aligning Ethics Communication & Training With Business Priorities and Compliance Risks Willow Misty Parks Graduate Assistant Anderson School of Management.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Company: Cincinnati Insurance Company Position: IT Governance Risk & Compliance Service Manager Location: Fairfield, OH About the Company : The Cincinnati.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Albany Bank Corporation Security Incident Management Program.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Identity Awareness and Data Loss Prevention Effective DLP David Miller Sr. Director, Security Products October 15, 2009.
Maciej Pęciak Robert Dąbroś
Strategies in the Game of
Understanding DATA LOSS PREVENTION
Information Security Program
Data Minimization Framework
Regulatory Compliance
Microsoft 365 Get help with regulatory compliance
Current ‘Hot Topics’ in Information Security Governance Auditing
Cyber Protections: First Step, Risk Assessment
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Holistic Approach to Information Security
Cyber security Policy development and implementation
IS Risk Management Framework Overview
By: Dorian Lockhart Wilston Johnston
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Microsoft Data Insights Summit
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal policies and controls? Are insiders creating vulnerabilities? Are intruders gaining access and removing data? Competitive Advantage Are insiders putting the organization at risk? Are you better able to protect your customers’ and partners’ data?

Data Loss is Expensive $204 Per Consumer Record $600 Billion IP Theft a Year Globally Across all industries, data loss is challenging

C OST OF D ATA B REACHES A VERAGE T OTAL P ER -I NCIDENT C OST Ponemon Institute 5 th Annual US Cost of Data Breach Study

C OST OF D ATA B REACHES C OST PER C OMPROMISED R ECORD Ponemon Institute 5 th Annual US Cost of Data Breach Study

Complexities Where is the Data “The big issue is knowing where the information is in the first place.“ John Geater Bridging the gap between RCM and Data Protection

Data Identification Actionable Auditing Policy Design Policy Implementation WEBSENSE Data Discover WEBSENSE Data Monitor Quick Start Services Policy Tuning Services Deployment Services Product Evaluation  How is my data used?  Where is my data going?  Is it violating my policies or external regulations?  How is it leaving?  Where is my data?  How much is there?  Is it at risk?  How do I enforce inline with business processes?  How do I extend policies across the network and to remote workers?

 Executive level sponsorship and involvement to successfully protect data, change business processes and shape employee behavior  Cross-functional teams of business, legal and technical staff focused on a comprehensive program to reduce risk across the enterprise  A prioritized approach - confidential data has many forms and many locations - target the most critical data first  A trained Incident Response Team (IRT)  Clearly defined roles, responsibilities, and procedures  Employee education to enforce data protection policies

DLP Analysis Who are your users? Who are the data stakeholders? Who should/not use your data? Data What type of data do you have? Where is your data located? What is the value of your data? What communication channels are in use? What are your data security policies? What are good/bad data processes? People Process

Accuvant: Complete Data Protection Protection and Compliance Phased deployment path to complete data protection Block unauthorized devices Encrypt laptops Monitor and secure all data routes Discover and Classify Data Audit and Forensics

Architectural-level examination of the enterprise environment Assess current state of data security Focus on industry best practices and applicable regulations (e.g., PCI, HIPAA, GLBA, SOX) Identify potential enterprise risks and exposures Propose opportunities for improvement and mitigation Utilize DLP kit for data monitoring and analysis Understand your organization’s current exposure to data loss and then design a DLP strategy

Control Framework Policy and Awareness Assessments Audit Treat Risks Improve Controls Automate Controls Risk Assessment Partners/ Customers Regulations World Class Expertise  Business Need:  Understand risks to the business with regard to credit card information residing on laptops across the company.  Solution:  Accuvant found over 240,000 files containing credit card numbers and 70,000 sensitive files identified and tagged  Delivered detailed findings report (e.g., end users had sensitive information sprawled throughout disk drives)  Reduced risk by having end users delete or encrypt the sensitive files identified  Implemented a new security education program Case Study – Fortune 500 Retailer

Control Framework Policy and Awareness Assessments Audit Treat Risks Improve Controls Automate Controls Risk Assessment Partners/ Customers Regulations World Class Expertise  Business Need:  Driven by compliance requirements associated with SB 1386, Personally Identifiable Information (PII)  Driven by a State of CA Mandate tied specifically to Medi-Cal data  Solution:  Accuvant assisted with the vendor evaluation and proof of concept  Data lifecycle management was performed to locate critical data assets and create sensitive data classification levels  Data discovery exercise was completed to identify unknown data stores and develop data ownership matrix  Implemented a DLP solution with a phased approach, starting with network, endpoints and then data shares Case Study – Largest County in US

World Class Experience - Mature, very well-rounded team - Combining Information Security expertise with RCM focus - Insight into multi-vendor solutions - Industry known – authors and speakers Why Accuvant