Enterprise Risk Management Outbound Content Compliance and what you should know… Jim Noble (aka

Slides:



Advertisements
Similar presentations
Kit Robinson Director Data Loss Prevention and HIPAA.
Advertisements

IT Security Policy Framework
Northside I.S.D. Acceptable Use Policy
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
Voice over the Internet Protocol (VoIP) Technologies… How to Select a Videoconferencing System for Your Agency Based on the Work of Watzlaf, V.M., Fahima,
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Security Training Lunch ‘n Learn. Agenda  Threat Analysis  Legal Issues  Threat Mitigation  User Security  Mobile Security  Policy Enforcement.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Security Controls – What Works
Lisa Farmer, Cedo Vicente, Eric Ahlm
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
General Awareness Training
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Protection from internal threats: Evolution of DLP or Who sets trends.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
What is FORENSICS? Why do we need Network Forensics?
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
C8- Securing Information Systems
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
E-Detective Decoding Centre (EDDC) Offline Decoding & Reconstruction Solution Decision Group
E-Detective Ethernet LAN Interception System (with Real-Time Content Reconstruction) Decision Group
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Falcongaze SecureTower: field experience
© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.
Security fundamentals Topic 9 Securing internet messaging.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Identity Awareness and Data Loss Prevention Effective DLP David Miller Sr. Director, Security Products October 15, 2009.
Compliance for IBM Connections Cinthia Shields Director, Business Development-IBM Partner Manager
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Securing Information Systems
Introduction to Barracuda IM Firewall
Chapter 3: IRS and FTC Data Security Rules
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Comodo Dome Data Protection
Presentation transcript:

Enterprise Risk Management Outbound Content Compliance and what you should know… Jim Noble (aka

Outbound Content Compliance The study of outbound data, leaving a network or enterprise, to determine where risk exists. New industry – recognized in ’05 by Gartner, IDC, & Forrester Many different names… depending on the analyst

Other names Forrester – Information Leak Prevention Meta Group – Content Filtering Gartner – Outbound Content Compliance IDC – Outbound Content Compliance

A security professional’s view of Enterprise Risk Deployed Controls Technical controls (~85%) Policy, procedure, & guidelines (98%) Functional Audits with true verification (75%) Weaknesses Security is focused on the technology, not the business Privacy issues cause legal “quagmires” Business Compliance & Audit don’t speak the same language as Information Technology & Security Traffic flowing outbound is normally unfettered

Why OCC gaining visibility? Business is increasingly coming under fire to comply with new privacy regulations HIPAA, GLBA, Sarbanes Oxley, CB1386, & now other state legislation Why do I care? If you work for a company that is required to comply with these regulations, you need to pay attention If you are an INFOSec or other IT staffer, you need to learn to identify solutions for compliance

But we have… Firewalls IDS/IPS Anti-Virus & Anti-Spam AAA Solutions Policy, Procedures, & Guidelines Change Control Etc…

The external threat is reduced Most Companies are located here in their Risk Lifecycle OCC provides visibility of existing controls and aids in Audit / Verification

Technical Controls Most controls are to prevent outside attacks

The Problem: Lack of effective visibility to confidential & inappropriate content flowing across the network. The risk & results can be significant: Loss of confidential company information – Financials, strategic marketing plans, executive communications – Customer lists, Intellectual Property Leakage of regulated, private customer information – SSNs, CCNs, other account information Substantially reduced employee productivity Increased legal exposure due to transmissions of offensive material Damage to critical systems by insider attacks And much more…

Would You Know If… A trusted employee pasted confidential acquisition information into a webmail message & sent it to your competitor? An employee downloaded attack tools to their work computer with the intention of stealing your customer’s private data? An employee posted your confidential data on or some other Internet posting site like Yahoo! Finance? An employee is using a P2P client & is inadvertently exposing your proprietary information to millions of other P2P users?

What’s Needed… A solution that can passively monitor the CONTENT of all outbound Internet traffic Should analyze & identify the pertinent content at risk Should focus on business data / risk Focus on Legislative compliance to identify business risk Ability to “write” custom rules for identifying specific content Should have standard reporting mechanisms Should have the ability to perform same intelligent analysis on stored data Should match user identity to events Should integrate with Forensics tools for investigations

So, how does it work? TCP Re-assembly engine Linguistics engine Decoders for: http ftp smtp & imap IM & Chat (MSN, AOL, Yahoo) P2P Applications telnet VNC And many more…

Intelligent Content Monitoring

Event Category Groups Information Privacy and ComplianceManager Structured & Unstructured Data CA Driver’s License Credit Card Number PHI - Protected Health Information Personal Information Social Security Number Confidential Disgruntled Employee Information Hiding Research Mergers & Acquisitions Resignation Encrypted – PGP Encrypted – S/MIME Encrypted – SSH Capture All Instances IM & Chat Postings Mailing Lists Web-mail P2P File Share AcceptableUseManager Unstructured Data Adult Conflict Gambling Games Racism Shopping Sports Substance Abuse Trading Violent Acts Weapons P2P Research Capture All Instances IM & Chat Mailing Lists P2P File Share Postings Web-mail PreventiveSecurityManager Structured and Unstructured Data Hacker Research Impending Threats Backdoors Keylogger Root Activity Suspicious FTP Suspicious HTTP Response Suspicious SUID root Preparation for Attack Log Wiping Code NMAP SAM Cracking Sniffer Code Stack Smashing Code Suspicious VNC Session Suspicious Activity Unauthorized Access Attempts: FTP, General, IMAP, POP

Deployment Examples

Value & Benefits Identifies Information Loss, Identity Theft & Corporate Espionage Assists regulatory compliance SOX, GLBA, HIPAA, CA SB 1386/AB 1950 Reduces liability of inappropriate use Identifies rogue protocol usage Reduces unethical & wasteful network use

The Irony In order to protect the consumer’s privacy, there has to be an invasion of privacy within the enterprise “Outbound Content Compliance” is an emerging market in Information Security Solutions They are already in place at Schools Hospitals Public & Private Corporations Financial Organizations, & any other heavily legislated organizations

Warnings Read your organization’s Acceptable Usage Policy (AUP), “No Expectation of Privacy” clauses are the norm. If you’ve just received a new AUP to sign, it is likely that a type of this product is being deployed or has been deployed Assume you are being watched 100% of the time Anonym.OS - kaos.theory security.research TOR – Onion Routing - Roger Dingledine and Nick Mathewson

Case Study

Case Study Corporate Espionage Situation: Company in Computer storage industry, who was involved in several acquisition opportunities suspected individuals were leaking sensitive information to its competitors CSO believed a competitor (with whom they were involved in a multimillion dollar litigation suit) had connected with executives inside the company & were leaking sensitive proprietary trade, technology & client data to that competitor What They did: Led by the CSO, the Corporate Governance officer & the Corporate Counsel, the company installed a content monitoring platform to identify certain content & place it in the proper context. Goal: Identify where the sensitive information was leaking out of the organization.

Case Study Corporate Espionage The Results: Within a few days of installing Vericept, the client confirmed the information leak, who was involved & quantified the magnitude of the exposure. Items identified by Vericept: o An employee ing the entire customer list to the competition o A top executive with access to sensitive business plans negotiating for a new job with a competitor o An employee looking for system exploits on the network applications & systems for the competitor to use The Return on Investment: The CSO said that the Solution paid for itself several times over within the first two months. The platform is required to “go live” on the new networks the day that any acquisition is finalized

Demo

Future Features o Desktop Control o SSL Decryption o Integration with existing Firewalls, IDS/IPS, & other technical controls o Further integration with forensics tools

Questions Jim Noble (aka