Information Classification:
|
|
|
- Amberlynn Annabella Jordan
- 10 years ago
- Views:
Transcription
1 Information Classification: First Step to Effective Information Security" Sylvia C. Diaz, MS, MBA, CIPP/US! Associate Director, Information Governance" Biogen Idec"
2 A little bit about me" Sylvia C. Diaz, MS, MBA, CIPP/US Associate Director, Information Governance " " Vast experience in information governance in the Pharmaceutical and Biotech industries. " " Currently at Biogen Idec I am providing oversight for the transformation of the Information Governance function by evolving information management practices, implementing information classification and developing an enterprise content and information governance strategy. [email protected] 2"
3 Who Is Biogen Idec?" FOUNDED IN! 1978! LEADERS IN MS RESEARCH! ONE OF THE WORLD S LEADING BIOTECHNOLOGY COMPANIES! HEADQUARTED IN CAMBRIDGE MA! 3"
4 Agenda" Our Information Classification initiative" A proactive approach to understanding our data" The journey to identify, classify and secure sensitive information" Lessons learned" " 4"
5 Top Reasons for Information Classification" User engagement and raise awareness that information has value" Security awareness and proper handling" Information protection and data loss prevention" Compliance with laws and regulations" 5"
6 Information Classification Initiative - Why?" Information Classification is foundational to protecting our information assets" 6"
7 Our Classification Journey Classification Schema! Developed Information Classification Schema*" Business Objectives" Confidentiality" Integrity" Availability" Impact" Scale" Low" Moderate" High" Implementation" Policy" Process" Automation" *Source: Gartner (December 2011)" Public" Internal " Secret" Keep it simple" No more than 3 4 levels" Provide examples " 7"
8 Our Classification Journey The Policy! Developed Information Classification Policy! It is short" Handling guidelines" Non-prescriptive" No reference to technology, departments & data types " Establish responsibilities:" Employee (creator, receiver and user of the information)" Departments" Management" 8"
9 Our Classification Journey The Tool! Files Documents Collaboration Platforms Policy does not work alone" Can t rely on users to classify manually" Maintain current business process" Easy to configure and deploy" High impact, low effort" Reach different platforms" Classify multitude of file formats" 9"
10 Our Classification Journey The Tool" Data Classification Across the Enterprise" Message Classification for Microsoft Outlook! Classification for Microsoft Office! Classification for Desktop! Message Classification for Microsoft OWA! 10"
11 Our Classification Journey The Tool" Go for Flexibility!" PUBLIC INTERNAL CONFIDENTIAL Metadata One click classification! Easy to configure and deploy! Maintain current business processes! Based on user roles, departments, etc.! Apply flexibility in policy creation! Persistent metadata! Bulk classification! Interface with DLP tools! 11"
12 Our Outcome" Cultivate an information protection culture" Prompt users to stop, think and identify" Instill the business value of information" PII PCI FINANCIAL IP EXPORT Confidently share sensitive information Enhance data loss prevention (DLP)" Implement data governance policies" 12"
13 Lessons Learned" Communication and training are key!" Engage employees and management. " Classification policy needs to be in place." Emphasize the Why behind the policy." Keep classification schema simple. " Flexible tool." 13"
14 Questions" Thank You!" 14"
Setting Up Outlook on Workstation to Capture Emails
Setting Up Outlook on Workstation to Capture Emails Setting up Outlook to allow email to pass directly to M-Files requires a number of steps to assure that all of the data required is sent to the correct
TITUS Data Security for Cloud Email Identify and Control Sensitive Data Sent to the Cloud
Business Brief TITUS Data Security for Cloud Email Identify and Control Sensitive Data Sent to the Cloud Nine out of 10 businesses cite security as the top obstacle for cloud adoption. - IDC Control Data
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively
RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively Arrow ECS DLP workshop, Beograd September 2011 Marko Pust [email protected] 1 Agenda DLP in general What to expect from
User Driven Security. 5 Critical Reasons Why It's Needed for DLP. TITUS White Paper
User Driven Security 5 Critical Reasons Why It's Needed for DLP TITUS White Paper Information in this document is subject to change without notice. Complying with all applicable copyright laws is the responsibility
Compliance and Security Solutions
Content-aware Compliance and Security Solutions for Microsoft SharePoint SharePoint and the ECM Challenge The numbers tell the story. According to the consulting firm Doculabs, 80 percent of the information
Background. Liwei Ren. Trend Micro
Securing Your Data for the Journey to the Clouds Liwei Ren, Ph.D, Trend Micro April, 2015, SNIA DSI 2015, Santa Clara, California Copyright 2011 Trend Micro Inc. 1 Background Liwei Ren Research interests
Email Message Classification user guide
Email Message Classification user guide Introduction Email message classification tags each email used within the authority with one of three classifications chosen by a user dependant on the content of
Export the address book from the Blackberry handheld to MS Outlook 2003, using the synchronize utility in Blackberry Desktop Manager.
Export the address book from the Blackberry handheld to MS Outlook 2003, using the synchronize utility in Blackberry Desktop Manager. Revised 2/25/07 Creating a New Contacts Folder in Outlook Open Outlook
Whitepaper. Identifying, Classifying, and Protecting Personally Identifiable Information in Google Drive (Docs) Introduction.
Whitepaper Identifying, Classifying, and Protecting Personally Identifiable Information in Google Drive (Docs) The Enterprise Guide To Securing Sensitive Data In Google Drive At a Glance Intended Audience:
BEING MOBILE WITH WINDOWS 8.1
www.realdolmen.com BEING MOBILE WITH WINDOWS 8.1 OCTOBER 28, 2014 SLIDE 1 SPEAKERS INTRO #Name: D Hoker Gino #Function: Technology Expert #Email: [email protected] #Twitter: @GinoDH #Blog: #Mobile:
IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk
Amir Jaibaji - Product Management Program Director IBM Information Lifecycle Governance IBM Unstructured Data Identification & Management An on ramp to reducing information costs and risk Enterprise big
Implementing Active Directory Rights Management Services with Exchange and SharePoint
Course 50403B: Implementing Active Directory Rights Management Services with Exchange and SharePoint Course Details Course Outline Module 1: Why Rights Management? This module provides an overview of Microsoft
Data Protection McAfee s Endpoint and Network Data Loss Prevention
Data Protection McAfee s Endpoint and Network Data Loss Prevention Dipl.-Inform. Rolf Haas Principal Security Engineer, S+, CISSP [email protected] January 22, 2013 for ANSWER SA Event, Geneva Position Features
Data Classification Technical Assessment
Data Classification Update: February 13th, 2015 Statement of Confidentiality This Confidential Information is being provided to Customer ABC as a deliverable of this consulting engagement. The sole purpose
Symantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
RightsWATCH. Data-centric Security.
RightsWATCH. Data-centric Security. Rui Melo Biscaia, Watchful Software www.watchfulsoftware.com Director of Product Management [email protected] The Perimeter Paradigm Well Meant Insider
How to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
Symantec Enterprise Vault for Microsoft Exchange
Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry
To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified.
TO: UAN CLIENTS FROM: UAN STAFF DATE: OCTOBER 8, 2008 SUBJECT: Steps for Initial Setup of Microsoft Outlook To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to
E-Notebook SQL13.0 Desktop Migration and Upgrade Guide
E-Notebook SQL13.0 Desktop Migration and Upgrade Guide Last Modified: October 09, 2012 TABLE OF CONTENTS 1 Introduction... 3 2 Software Requirements... 3 2.1 Single User... 3 2.2 Remote (Shared Database
Installing and Configuring Microsoft Dynamics Outlook Plugin to Use with ipipeline MS CRM
Installing and Configuring Microsoft Dynamics Outlook Plugin to Use with ipipeline MS CRM Downloading 1. Download zip file for your version of Outlook (32-bit or 64-bit) and save to computer. (This is
S A G E P A S T E L P A R T N E R V E R S I O N 1 2 V e r s i o n 1 2. 1 T r a i n i n g M a n u a l L e s s o n 6
V e r s i o n 1 2. 1 T r a i n i n g M a n u a l L e s s o n 6 [ Lesson 6 ] Advanced Functions: Utility Menu [ Learning Outcomes ] In this lesson, you are going to discover the Advanced Functions that
External Authentication with Windows 2012 R2 Server with Remote Desktop Web Gateway Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2012 R2 Server with Remote Desktop Web Gateway Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010
User Guide: Introduction to AWS-SAL
D.C. Solution Factory Inc. 2013 D.C. Solution Factory Inc. All rights reserved. This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site
Symantec DLP Overview. Jonathan Jesse ITS Partners
Symantec DLP Overview Jonathan Jesse ITS Partners Today s Agenda What are the challenges? What is Data Loss Prevention (DLP)? How does DLP address key challenges? Why Symantec DLP and how does it work?
Livelink ECM edocs Suite Roadmap
Livelink ECM edocs Suite Roadmap Wednesday October 24 th,2007 Larry Roy Director, Product Management edocs Suite Open Text Corporation John Lee Director, Product Management Legal Solutions Open Text Corporation
Exporting from FirstClass
Exporting from FirstClass Create a folder on the desktop of your workstation Label the folder Export Inside the Export folder create three additional folders and label them Email Export Contacts Export
Egress Switch Reader. User Guide 2.3
Egress Switch Reader User Guide 2.3 November 2015 Confidentiality statement This document contains information confidential and proprietary to Egress Software Technologies. It shall not be disclosed in
Setting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
User Guide Microsoft Exchange Remote Test Instructions
User Guide Microsoft Exchange Remote Test Instructions University of Louisville Information Technology 1.1 Who Should Use It This guide is intended for University of Louisville Faculty and Staff participating
DataCove. Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users)
Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users) System Requirements: Windows XP, Vista or 7 Outlook 2007 or 2010 32 bit Editions 1GB of RAM Microsoft.NET Framework
Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Managing millions of mailboxes for thousands of customers worldwide, Enterprise Vault, the industry leader in email and content archiving, enables
HP Records Manager. Release Notes. Software Version: 8.1. Document Release Date: June 2014
HP Records Manager Software Version: 8.1 Release Notes Document Release Date: June 2014 Software Release Date: June 2014 Legal Notices Warranty The only warranties for HP products and services are set
Veritas Enterprise Vault for Microsoft Exchange Server
Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email
How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On
Load Balancing Exchange 2010 OWA for External Access using WebMux Published: April 2011 Information in this document, including URL and other Internet Web site references, is subject to change without
Ekran System List of Frequently Asked Questions
Ekran System List of Frequently Asked Questions User Activity Monitoring Where can I perform user activity monitoring? User activity monitoring is performed via the Ekran System Monitor. It provides an
Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security. Titus White Paper
Titus and Cisco IronPort Integration Guide Improving Outbound and Inbound Email Security Titus White Paper Information in this document is subject to change without notice. Complying with all applicable
Overview of Active Directory Rights Management Services with Windows Server 2008 R2
Overview of Active Directory Rights Management Services with Windows Server 2008 R2 Student Manual Module 5: Information Rights Management on Server Applications Information in this document, including
EV 10.0.3 Feature Briefing
EV 10.0.3 Feature Briefing Exchange Server 2013 OWA Support This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the
The Future of Census Bureau Operations
The Future of Census Bureau Operations Version 1.0 April 25, 2013 The Future of Census Bureau Operations Page ii [This page intentionally left blank] The Future of Census Bureau Operations Page iii Document
Introduction to Business Process
Introduction to Business Process Microsoft Office SharePoint Server 2007 provides many features that can help you integrate and streamline your business processes: Browser-based forms created by using
Citrix and Windows Servers
Installing Communicator on Citrix and Windows Servers C Installing Communicator on C. Citrix and Windows Servers This appendix describes how to install ShoreTel Communicator for Windows on Citrix and Windows
White Paper. Managing Risk to Sensitive Data with SecureSphere
Managing Risk to Sensitive Data with SecureSphere White Paper Sensitive information is typically scattered across heterogeneous systems throughout various physical locations around the globe. The rate
Hosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows Mobile Phone ActiveSync setup & configuration Section 3 - Apple iphone
System requirements for ICS Skills ATS
System requirements for ICS Skills ATS A system requirements check verifies that the computer fulfils the requirements to run ICS Skills Automated tests. There are 4 possible checks that can be made prior
A Buyer's Guide to Data Loss Protection Solutions
A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense
harmon.ie Delivers the Business Value of Office 365 Migrations
harmon.ie Delivers the Business Value of Office 365 Migrations Congratulations on your move to SharePoint Online and the Office 365 cloud. With Office 365 you will reap the benefits of flexibility and
Least Privilege in the Data Center
Least Privilege in the Data Center avecto.com avecto.com 1 Introduction Removing excess administrator privileges is considered to be one of the most essential risk mitigation strategies for organizations
10 Building Blocks for Securing File Data
hite Paper 10 Building Blocks for Securing File Data Introduction Securing file data has never been more important or more challenging for organizations. Files dominate the data center, with analyst firm
HP TeamSite Developer - Training Agenda
HP TeamSite Developer - Training Agenda Course Outline This course covers the skills and knowledge needed for students to be able to use TeamSite to create and edit content, use FormsPublisher forms and
1. Has your command deployed an Enterprise Content Management (ECM) application? Yes, but we do not have TRIM deployed in ECM mode.
ECM Questions USPACOM 1. Has your command deployed an Enterprise Content Management (ECM) application? Yes, but we do not have TRIM deployed in ECM mode. a. If Yes, please answer the questions below: 1)
Top Four Considerations for Securing Microsoft SharePoint
Top Four Considerations for Securing by Chris McCormack, Product Marketing Manager, Sophos is now the standard for internal and external collaboration and content management in much the same way Microsoft
Securing Microsoft Exchange 2010 With VeriSign Authentication Services
BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH VERISIGN AUTHENTICATION SERVICES Symantec Business Guide Securing Microsoft Exchange 2010 With VeriSign Authentication Services Best Practices for
DFS Configuration and Best Practices Nasuni Corporation Natick, MA
Nasuni Corporation Natick, MA Windows Distributed File System (DFS) Windows Distributed File System (DFS) is a technology with which most Windows administrators are already familiar. DFS allows administrators
The biggest challenges of Life Sciences companies today. Comply or Perish: Maintaining 21 CFR Part 11 Compliance
S E P T E M B E R 2 0 1 3 Comply or Perish: The biggest challenges of Life Sciences companies today are maintaining a robust product pipeline and reducing time to market while complying with an increasing
Hosted Microsoft Exchange Client Setup & Guide Book
Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync
Symantec Enterprise Vault for Microsoft Exchange Server
Symantec Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving performance and users can enjoy
Lessons from the field: Implementing Information Governance and Records Management with Microsoft SharePoint
Lessons from the field: Implementing Information Governance and Records Management with Microsoft SharePoint Veli-Matti Vanamo - Principal Consultant at Ignia - 12 Year SharePoint Veteran (there should
Securing Microsoft Exchange 2010 with Symantec SSL Certificates
BUSINESS GUIDE: SECURING MICROSOFT EXCHANGE 2010 WITH SYMANTEC SSL CERTIFICATES Symantec Business Guide Securing Microsoft Exchange 2010 with Symantec SSL Certificates Best Practices for Securing Your
Whitepaper. Advanced Threat Hunting with Carbon Black
Advanced Threat Hunting with Carbon Black TABLE OF CONTENTS Overview Threat Hunting Defined Existing Challenges and Solutions Prioritize Endpoint Data Collection Over Detection Leverage Comprehensive Threat
Data Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution
DiskBoss - Data Management Solution DiskBoss provides a large number of advanced data management and analysis operations including disk space usage analysis, file search, file classification and policy-based
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
HGC SUPERHUB HOSTED EXCHANGE EMAIL
HGC SUPERHUB HOSTED EXCHANGE EMAIL OUTLOOK 2010 MAPI MANUALLY SETUP GUIDE MICROSOFT HOSTED EXCHANGE V2013.5 Table of Contents 1. Get Started... 1 1.1 Start from Setting up an Email account... 1 1.2 Start
What does email Management Mean to You?
What does email Management Mean to You? by Tom Reding, CRM Principal, Information Governance [email protected] 352-212-2430 1 Tom Reding, CRM Principal, Information Governance Practice Tom Reding is a
GroupWise to PST Migrator
GWAVA Inc. GroupWise to PST Migrator Personal Archives and Live Data Migrator Version 2.0 GWAVA is a registered trade mark of GWAVA Inc, 100 Alexis Nihon, Suite 500, Saint Laurent, Quebec H4M 2P1 Retain
How To Handle A Threat From A Corporate Computer System
Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns
This guide provides all of the information necessary to connect to MoFo resources from outside of the office
REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your
Release Notes for Cisco IronPort Email Security Plug-in 7.3.1
Release Notes for Cisco IronPort Email Security Plug-in 7.3.1 Revised: September 18, 2013 Contents These release notes contain information critical to installing and running the Cisco IronPort Email Security
www.inovoo.com EMC APPLICATIONXTENDER 8.0 Real-Time Document Management
www.inovoo.com EMC APPLICATIONXTENDER 8.0 Real-Time Document Management 02 EMC APPLICATIONXTENDER 8.0 EMC ApplicationXtender (AX) is a web-based real-time document management system which stores, manages
Autodesk Navisworks 2015 Service Pack 3
Autodesk Navisworks 2015 Service Pack 3 Thank you for downloading Autodesk Navisworks 2015 Service Pack 3. This readme contains the latest information about the installation and use of the service pack.
INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace
INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
Hosted Microsoft Exchange 2013 Service. Getting Started Guide
Hosted Microsoft Exchange 2013 Service Getting Started Guide Welcome to IEDGE. Thank you for choosing IEDGE as your email service provider! We re glad you ve decided to join our community, and we re excited
Active Directory Infrastructure Design Document
Active Directory Infrastructure Design Document Written By Sainath KEV Microsoft MVP Directory Services Microsoft Author TechNet Magazine, Microsoft Operations Framework Microsoft Speaker - Singapore Document
Agenda. 2014 SAP AG or an SAP affiliate company. All rights reserved. 2
NextLabs: Beyond RBAC ABAC and Information Control Automation Tim Quan, Director - SAP Industries & Solutions, NextLabs March 2014 Agenda Common Challenges to Role Based Access Control (RBAC) Information
Installing Communicator on Citrix XenApp and Windows Servers
Appendix C Installing Communicator on Citrix XenApp and Windows Servers You can install ShoreTel Communicator for Windows on Citrix XenApp and Windows Servers to provide ShoreTel Communicator functionality
Installing and Configuring Windows Server 2008. Module Overview 14/05/2013. Lesson 1: Planning Windows Server 2008 Installation.
Installing and Configuring Windows Server 2008 Tom Brett Module Overview Planning Windows Server 2008 Installations Performing a Windows Server 2008 Installation Configuring Windows Server 2008 Following
Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions
Thirtyseven4 Endpoint Security (EPS) Upgrading Instructions Disclaimer: As with any software upgrade or new release, it is strongly encouraged to fully test the new build within your environment prior
RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief
RSA Solution Brief RSA Managing Data Loss the Lifecycle of Prevention Encryption Suite Keys with Uncover your risk, establish control. RSA Key Manager RSA Solution Brief 1 Executive Summary RSA Data Loss
