Presentation is loading. Please wait.

Presentation is loading. Please wait.

BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATIONS MOST CRITICAL ASSETS.

Similar presentations


Presentation on theme: "BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATIONS MOST CRITICAL ASSETS."— Presentation transcript:

1 BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATIONS MOST CRITICAL ASSETS

2 SYMANTEC DLP COMPONENTS Endpoint Prevent Symantec Data Loss Prevention Endpoint Prevent monitors files downloaded to local drives; transferred over , IM, Web or FTP; copied to USB, CompactFlash®, SD, or other removable media; burned to CD/DVD; copied or pasted; captured via Print Screen; and printed or faxed electronically. With Symantec Data Loss Prevention, you can monitor and block: Instant messages sent to a partner containing confidential M&A information Web mail with product plans attached going to a competitor Customer lists being copied to USB or other removable media devices containing PII sent via hosted security services Source code that is copied to a local drive Mobile devices for sent containing confidential data Product design documents being burned to CD/DVD Price lists being printed or faxed to a competitor WHAT WE WILL COVER TODAY What is a Critical Asset Protection Program Data Loss Prevention Governance Use Cases Avoiding Common Pitfalls Open Q&A

3 Managed Services Consulting Services Technical Services Product Solutions Security Assessments Training Services ABOUT BEW GLOBAL Focused Expertise Global Service Delivery Founded 2002 Quality Management SOLUTION OFFERINGS

4 BEW GLOBALS DLP EXPERTISE Global Support in 130 countries Manage DLP Solutions in 22 Countries Daily Management of 1,000,000+ Users Deployed 400+ DLP Projects Completed 500+ Assessments Localized Chinese DLP Practice (2011) 1st Managed DLP Services Provider (2008) VENDOR RECOGNITIONS Symantec Master Specialization DLP Partner RSAs Only Authorized Managed DLP Partner Websense Certified TRITONs – More than any other partner, 10 Olympians & 5 Gladiators

5 BEW Global works in cooperation with customers to plan, implement and maintain a Critical Asset Protection Program (CAPP) that clearly defines what assets are deemed most important to the customer organization based on revenue, income, reputation and core operational impact.. BEW GLOBALS PROVEN APPROACH

6 REALISTIC SCOPE, MEASUREABLE RESULTS Through a comprehensive interview and information gathering process, BEW Global works with the customer to develop a realistic Critical Asset Protection Program ( CAPP ) scope that defines the assets as well as the core attributes of those assets in regards creation, storage, usage and transmission.

7 CRITICAL ASSET LIFECYCLE MAPPING Critical Asset Creation The point in time when the asset is created. This could be the first swipe of a credit card, the initial lines of code for a new application or the acquisition of a new VM Cluster. Today, asset creation can be the product of multiple groups or systems. Critical Asset Storage Once the asset has been created the asset is stored. For intangible assets this may be in RAM, on a hard disk, NAS, SharePoint or other types of data storage. Tangible assets like servers, routers or laptops may be racked in a datacenter, placed in a remote office closet or placed on a home office desk. Critical Asset Use Protecting the critical assets becomes a more manageable endeavor by mapping the authorized usage characteristics of the assets within the CAPP scope, and then applying the optimal combination of people, process and technology. Critical Asset Transmission The transmission threat vector is utilized for authorized operations. Assessing how critical asset information is shared within and outside the organization provides key insight to the required protection mechanisms necessary to protect against inadvertent or malicious asset exposure.

8 CONTENT TYPES

9 SAMPLE CAPP PROGRAM SCOPE CRITICAL ASSET MANAGEMENT CONCERNS

10 SAMPLE CAPP PROGRAM SCOPE TARGET DATA ELEMENTS:

11 SAMPLE CAPP PROGRAM SCOPE SERVICE MILESTONE TIMELINE MilestoneDescriptionTarget Date Data Loss Prevention System Technical Install Data Loss Prevention system technically installed, tested and prepared to monitor all communications Complete Critical Asset Protection Program Implemented Resources in place to manage Critical Asset Protection application, policies, triage incidents, develop analytics, and work with business to remediate events 07/2013 Critical Asset Protection Program Kick-off Actively monitor production traffic with first crafted production policies targeted at specific data elements/client information ensuring data is going to the correct clients 07/2013 Critical Asset Protection System and Program Tuning Working with the business to review incidents and leverage data to improve policy accuracy within the Critical Asset Protection system 08/2013 Policy Accuracy Target – 90% + Tuning the Critical Asset Protection policies to the point of 90% or greater accuracy on outbound communications, allowing for initial testing of prevention controls 09/2013 Blocking Pilot – Select User Group Identification of first user group set-up for blocking or quarantine of unauthorized communications flagged by the DLP system 09/2013 Blocking – Full Production roll-out Phased roll-out of remaining business units to be included within the blocking and quarantine scope of the Critical Asset Protection system 09/2013 Phase # 1 Completion Program in place for constant refinement of policies as the business evolves, communication with business units on violations, business analytics delivered, and unauthorized communications blocked 09/2013

12 USE CASE: DLP PRE-PROJECT STATE Organization Overview:Manufacturing firm of 30,000 employees operating in 50 countries globally DLP Scope: Protection of Intellectual Property (General) DLP Primary Issue: Lack of staff and buy-in from business owners who handle critical assets Application Management: Most information security tools operated and managed by IT or networks Policy Governance: No internal resources with any experience with DLP policy construction Incident Triage: Lean staff of Infosec staff already buried by SIEM and other tools output Event Management: Informal event management process with little feedback to the business Reporting and Metrics: Zero customized reports. Very little business analysis provided Status: Charged with implementing DLP to protect Critical Assets & IP

13 APPLICATION SUPPORT & INTEGRATION Primary System DLP Management = Human Resource / Expertise Requirements Integrated System Management = Cross Department Collaboration Processes Health Check & System Validation Management = System Resource Requirements Vendor Management = Primary and Integrated Technology Vendor Relationships

14 POLICY & RULE GOVERNANCE Who requests rules & policy requirements? Are business owners engaged? Who reviews rule requests? Criteria for approved rule? Whats the process for converting a rule request into a policy? Whos responsible for converting a rule into technical policy? Do they have technical policy authoring expertise? What is the formal policy development process? First drafts rarely work as expected! Is there a process to relay production policy metrics to stakeholders?

15 WORKFLOW DEVELOPMENT & MANAGEMENT Who develops & manages policy buckets? False positive, inbound partner, outbound employee Who defines thresholds that determine response rules for each bucket? Are 10 SSNs a high, medium or low severity incident? Who designs & sets the policy response triggers? Malicious, Inadvertent, Suspicious, above threshold. Triage response options: Human notification System notification (auto) Hybrid? Whos responsible for building alerts, alarms & notifications? Has business been engaged on event management? Who manages the DLP policy & rules repository? Why recreate the wheel?

16 Who reviews volume & yield of incidents & events? Whats the review frequency? How are events/incidents routed? Who owns the incident/event? How does DLP fit in overall incident/event management process? Can this be mapped to DLP system? What metrics are developed to measure success of rules & related policy? Who s responsible for developing metrics? Revision of rules based on quality of policy results. Who manages policy optimization process? How will integrated systems be tied together to yield valued info? Secure mail, web gateway, GRC, SIEM INCIDENT TRIAGE & EVENT MANAGEMENT

17 BUSINESS ANALYTICS Who develops reports? Are DLP system generated reports adequate? Who drives report requirements? Requestors, Reviewers, others? Do they have the expertise with 3 rd party reporting tools? Are the metrics valuable & driving meaningful change? Report accuracy tied into QA process?

18 USE CASE: POST-PROJECT STATE Organization Overview : Defined specific business units to initiate program DLP Scope : Focused on 3 specific product lines linked to highest revenue & earnings DLP Primary Goal: Identification of unauthorized movement of specific elements of IP Application Management: Operated by a combination of IT, messaging & desktop management teams Policy Governance: 100% customized policies based on data collected from business unit Incident Triage: Daily review of incidents by Intelisecure Managed Services team Event Management: Incidents meeting severity criteria routed to business unit for investigation Reporting and Metrics: Behavioral pattern analysis leading to preventive actions Status: R&D teams have high-level of confidence in ability to identify leakage of IP

19 QMS SAMPLE QUARTERLY REPORT

20 PITFALL 1: NO PLAN OF ATTACK

21 5 Pieces of DLP Advice You Cant Afford to Ignore 21 PITFALL 2: FAILURE TO ENGAGE THE BUSINESS

22 5 Pieces of DLP Advice You Cant Afford to Ignore 22 PITFALL 3: INADEQUATELY TRAINED RESOURCES

23 DATA LOSS PROTECITON PITFALLS: MISSING THE TARGET – FALSE SENSE OF SECURITY Mis-configured Tap or Port Span Problem Missing segments of network traffic or protocols Solution Comprehensive test plan that maps to in scope business processes and related data types transmitted from various network locations to ensure all relevant data streams are being captured. Encryption – The Masked Data Problem Analysis of data DID NOT take place prior to encryption. Solution Comprehensive test plan that proves ALL DLP data assessment takes place prior to the gateway encryption & implement managed test DLP policies that identify encrypted transmissions as part of the test plan. Misfire of Network Discovery Scans Problem Locations of sensitive data never targeted by the organization for scanning due to lack of an effective policy governance process. Solution Identify potential data stores by discussing the DLP program with staff to understand process. Network versus Endpoint Discovery Problem Running DAR scans using a combo of network & endpoint without thinking about which policy types & detection methods are not the same. Solution Prior to acquiring DLP solution, have an understanding of the data types that make up your target environment & then, decide on scanning method..

24 THE PANDORAS BOX OF DLP Environment Assessment Staying in Contact User Performance Impacts Network/System Performance Impacts Problem No rigorous endpoint environment assessment prior to the selection of the application & enablement. Solution Address age of environment, performance capabilities, technical & human issues, & load of applications, in conjunction with education on the DLP endpoints. Problem Failure to monitor endpoint population & their frequency of checking-in to the management server with validated results. Solution Phased deployment of endpoint with validation via test plan on initial success of ALL agents & on- going endpoint agent health reports. Problem Implementing same policies for network based & endpoint assessments without testing or modification. Solution Utilize a comprehensive test plan outlining specific metrics (time to open files, open/send s, open applications) prior to deployment. Problem Failure to calculate & measure the impact of endpoint policy traffic across wide & local area network connections. Solution Thorough assessment of endpoint policies that addresses all of the concerns including policy design requirements, timing, frequency & delivery methods. DATA LOSS PROTECITON PITFALLS:

25 BEW GLOBAL IS THE CHOICE OF MARKET LEADERS CLIENTS INCLUDE MANUFACTURINGOIL & GAS RETAIL / ENTERTAINMENT TOP 100 GLOBAL

26 BEW GLOBAL IS THE CHOICE OF MARKET LEADERS CLIENTS INCLUDE UNIVERSITIESINSURANCE HEALTHCARE FINANCE TOP 50

27 UPCOMING WEBINARS For more information visit BUILDING A CRITICAL ASSET PROTECTION PROGRAM 1pm EST TECHNICAL DEMO SERIES: Symantec 1pm EST TECHNICAL DEMO SERIES: RSA 1pm EST TECHNICAL DEMO SERIES: Websense 1pm EST TECHNICAL DEMO SERIES: McAfee 1pm EST

28 QUESTIONS?


Download ppt "BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATIONS MOST CRITICAL ASSETS."

Similar presentations


Ads by Google