Implications of Privacy Risks in IT and Operations Virginie Hupé Strategist, Trustworthy Computing Microsoft Corporation.

Slides:



Advertisements
Similar presentations
Considerations in an Outsourced / Cloud World ARMA Information Management Symposium Bill Wilson, Chief Privacy Technologist.
Advertisements

Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Copyright Security-Assessment.com 2006 Protecting The Data Data security, compliance, disclosure requirements and what can happen if you get it wrong Presented.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Security Controls – What Works
Information Security Policies and Standards
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Cloud Usability Framework
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer.
Cloud computing Tahani aljehani.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
Copyright 2013 FUJITSU LIMITED. AGENDA Mitigation Considerations 4. Data Security – Examples and Application 2. Data Security Life-Cycle 1 1. Data Management.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Technological Security Implementation and Privacy Protection.
[Name / Title] [Date] Effective Threat Protection Strategies.
General Awareness Training
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Xiaoyue Jiu, Fola Oyediran, Eboni Strawder | Group 10
Dell Connected Security Solutions Simplify & unify.
WSV323. CSO/CIO department Regulation translated to control objectives Infrastructure Support Control objectives turned into control activities.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Javier Salido, CIPP Sr. Program Manager Trustworthy Computing Group Microsoft Corporation SESSION CODE: SIA337.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
The State of Computer & Data Security in Corporations Independent Survey.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Cloud Computing Use Case Draft v2.
Microsoft and Symantec
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Privacy Lessons from Other Industries Chris Zoladz, CIPP, Vice President, Information Protection Marriott International, President, International Association.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Information Security and Privacy in HRIS
Clouding with Microsoft Azure
Understanding The Cloud
DATA SECURITY FOR MEDICAL RESEARCH
Data Minimization Framework
VIRTUALIZATION & CLOUD COMPUTING
Understanding best practices in classifying sensitive data
Introduction to Cloud Computing
San Francisco IIA Fall Seminar
MICROSOFT AZURE ISV PROFILE: ONEBE
Computer Science and Engineering
Microsoft Data Insights Summit
Cloud Computing for Wireless Networks
Presentation transcript:

Implications of Privacy Risks in IT and Operations Virginie Hupé Strategist, Trustworthy Computing Microsoft Corporation

AGENDA Presentation objectives The privacy landscape Trends and associated privacy risks Practical solutions and controls to remediate What about the cloud Conclusion

Presentation objectives Get an understanding of current and upcoming privacy trends and associated risks Discuss some practical solutions and controls to remediate the risks

THE PRIVACY LANDSCAPE

Critical to Business Success: External 5

What is Privacy Privacy allows individuals to determine how (and to what extent) their personal information will be collected, used and shared with others.

Privacy in Internal Audit Internal auditors are uniquely positioned to evaluate an organization’s privacy framework and identify the significant risks with the appropriate recommendations for their mitigation.

Differing Business Views What are the key business drivers to data protection within your organization? Data Source: October 2007 Ponemon Institute Study 8% 24% 64% 83% 26% 48% 64% 36% 23%

Why do we care? Privacy compliance is critical to business success –Evolving business models require greater use of data –Consumers demanding accountability –Lower risk, greater trust, and protection for brand and business reputation Impact of a privacy incident –Company image suffers –Lost revenue –Cost per privacy incident –16 million Americans were victims of ID theft in 2006

Impact of a privacy incident Companies spent nearly $6.65 million on average to recover from lost / stolen corporate data. Average cost of a data breach: $202 per lost customer record Breaches involving malicious acts are more expensive than breaches from negligence Data Source: Annual data breach Ponemon Institute Study

IT Governance and Data Governance IT focuses on the technology infrastructure, the network, the computers, the software, etc. DG focuses on the data that lives within that technology infrastructure ITG focuses on the “pipes,” DG focuses on the “water” in the pipes* *Thomas, G. “Alpha Males and Data Disasters. The case for Data Governance”

TRENDS AND ASSOCIATED PRIVACY RISKS

Trends and associated privacy risks Data breach –Impact of breach notification –Data exposure Outsourcing of sensitive information to third parties –Limited control over protection of the information –Outsourcing of outsourced processes Mobile and remote workforce –Authentication challenges –Challenges to protect data

Trends and associated privacy risks Cybercrime –Loss of sensitive information Mobile devices –Lost laptop, primary cause of data breaches –Challenges to control or identify data stored P2P File Sharing –Increased risk of malware –Loss of sensitive information Cloud Computing –Discussed later

Data Governance is not for IT …. only DG involves detailed knowledge about the data life cycle: –Collecting –Updating –Processing –Storing –Transferring –Deleting

Data Governance Lifecycle Collection In Person Online From 3 rd Party Storage Structured Databases Unstructured Data Electronic Databases Backup Usage In Applications By Employees, Marketers Shared with 3 rd Parties Retention/ Destruction Archive Destruction Framework for Data Governance People Policy Process Technology 16

PRACTICAL SOLUTIONS AND CONTROLS TO REMEDIATE

A robust governance framework Policy Management Compliance Management Internal Communications People & Business Enablement Risk Management

Challenges to Effective Data Governance Aligning different view points and priorities: –How and when to use data –Just compliance vs. a more comprehensive approach to privacy and information security Translating governance policies and compliance requirements into actual controls –Lack of common language or framework of reference between IT and privacy, legal, HR and finance Continuously changing meaning of “reasonable security”

The Four Principles Honor policies throughout the information lifecycle Minimize risk of data misuse Minimize impact of data loss Demonstrate effectiveness of data protection policies and measures

First Data Protection Principle Honor policies throughout the information lifecycle –Private data is tagged with policy associated classification and attributes –Where appropriate, mechanisms enable individuals to access, understand and manage their private data as well as the policies pertaining to it

Second Data Protection Principle Minimize risk of data misuse or unauthorized modification –Permanently tag sensitive data with governing attributes such as policies, access and usage history, and contractual terms of use –Enforce role-based access to and use of sensitive data –Restrict data access and usage rights by people and processes to the minimum –Set and enforce clear data retention policies

Third Data Protection Principle Minimize impact of data loss –Routinely search to uncover hidden caches of private data (leakage) –Encrypt sensitive data while in storage and in transit, on all devices and across all connections

Fourth Data Protection Principle Demonstrate the effectiveness of data protection policies and measures –Produce an audit trail detailing access and use of private data in addition to the governing policies and controls. –Monitor and analyze patterns of usage and access of private data to identify and respond to emerging control threats

How can technology help InformationProtection Auditing and reporting Identity and Access control Secure Infrastructure Safeguards against malware and intrusions Safeguards against unauthorized access to personal info Protect data while on the net Protect systems from evolving threats Protect personal information from unauthorized access or use Provide management controls for identity, access and provisioning Protect sensitive personal information in structured databases Protect sensitive personal information in unstructured documents, messages and records, through encryption Monitor to verify integrity of systems and data Monitor to verify compliance with business processes 25

Gap Analysis toolInformationProtection Auditing and reporting Identity and Access control Secure Infrastructure Collect Update Process Delete Transfer Storage 1 st Principle 2 nd Principle 3 rd Principle 4 th Principle 26

About the Gap Analysis Requires significant amount of work –Reserve for most sensitive information Requires proper classification and tagging of information: –Impact/sensitivity level (HBI, MBI, LBI) –Associated with compliance source (SoX, GLBA, EDPD, HIPAA, PCI, Internal policy, etc.) Requires you take action to bridge the gap: –It is the beginning of a process

Steps to Gap Analysis Process Define purpose of flow and data elements involved Model flow: –Construct a diagram of the systems involved –Match flow to information lifecycle phases Determine the Gap and mitigation –How do current technology elements in each of the technology groups meet the principles of data protection? –Determine gaps and mitigation Implement mitigation Validate Define flow purpose Model Flow Determine Gap and Mitigation ActAct Validate

WHAT ABOUT THE CLOUD?

NIST Delivery Models SaaS, Software as a Service “…applications running on a cloud infrastructure and accessible from various client devices through a thin client interface such as a Web browser.” Examples: Hotmail, Microsoft Online Services SaaS, Software as a Service “…applications running on a cloud infrastructure and accessible from various client devices through a thin client interface such as a Web browser.” Examples: Hotmail, Microsoft Online Services PaaS, Platform as a Service “…to deploy onto the cloud infrastructure consumer-created applications using programming languages and tools supported by the provider.” Example: Windows Azure IaaS, Infrastructure as a Service “…provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.“ Example: Amazon EC2

Look at the Forest …. Does the cloud provider have a comprehensive SIMS? –Are they certified or plan to be certified? ISO SAS 70 Type I and Type 2 Ask to see independent third party attestations or plans for these –Check what is certified: certification of the platform does not imply certification of the whole stack

Look at the Forest …. (cont) Understand how provider complies with applicable laws –Laws applicable to you and to them –Will this be enough for overall compliance with your organization’s policies as well? –How will your organization demonstrate compliance? Keep in mind that in the eyes of your employee, customer, partner or shareholder; you are responsible for sensitive data

Look at the Forest …. (cont) Your cloud provider is another type of outsourcing partner –What can you learn from your organization’s previous outsourcing practices that applies to the cloud? Last but not least, what if the worst should happen? The B word (breach) …. –What is the notification process? –What actions do you need to take? Before and after

Then look at the Trees …. Will your provider be housing multiple tenants on the same box? –How will your provider prevent other customers from accessing your data? Does your provider check for viruses and other malware? What happens if they find it? Secure Infrastructure

Then look at the Trees …. (cont) How does provisioning work? –How do you add, change and revoke access rights and accounts? Chances are someone in your cloud provider’s staff would be able to see your data –How is the provider mitigating this risk? –If there is unauthorized access, how does your provider find out? What happens then? Identity and Access control

Then look at the Trees …. (cont) Can you or your provider encrypt sensitive data that is moved to the cloud? –In transit? –While in storage? How can you prevent data loss (creeping out of the cloud) –Rights management, encryption? InformationProtection

Then look at the Trees …. (cont) What kind of reporting can your provider deliver? –Is it useful to you? Auditing and reporting

QUESTIONS?