Data Loss Prevention: A Holistic Approach. Sam D Amore, Principal Information Technology Security Office The Vanguard Group (www.vanguard.



Similar documents
How To Manage Security On A Networked Computer System

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Secure any data, anywhere. The Vera security architecture

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

They Did What?!? How Your End Users Are Putting You At Risk

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Did you know your security solution can help with PCI compliance too?

Enterprise Security Solutions

Protecting Regulated Information in Cloud Storage with DLP

NAC at the endpoint: control your network through device compliance

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

The Netskope Active Platform

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

The Protection Mission a constant endeavor

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

Intel Enhanced Data Security Assessment Form

A Buyer's Guide to Data Loss Protection Solutions

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

Information Blue Valley Schools FEBRUARY 2015

SANS Top 20 Critical Controls for Effective Cyber Defense

Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide

Managed Services. Business Intelligence Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Small and Midsize Business Protection Guide

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Don't Be The Next Data Loss Story

The Impact of HIPAA and HITECH

McAfee Endpoint Protection Products

Protecting personally identifiable information: What data is at risk and what you can do about it

5 Steps to Advanced Threat Protection

Proven LANDesk Solutions

The Cost Benefits of a Hybrid Approach to Security

Supplier Information Security Addendum for GE Restricted Data

The ForeScout Difference

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

A Global IT Managed Service Provider

Cloud Backup and Recovery for Endpoint Devices

Newcastle University Information Security Procedures Version 3

Getting Started Guide

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

End-user Security Analytics Strengthens Protection with ArcSight

SOOKASA WHITEPAPER CASB SECURITY OVERVIEW.

May Palo Alto Networks 232 E. Java Drive Sunnyvale, CA

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

How To Protect Your Data From Theft

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

POSTAL REGULATORY COMMISSION

State of South Carolina Policy Guidance and Training

I D C A N A L Y S T C O N N E C T I O N

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Security Overview Enterprise-Class Secure Mobile File Sharing

Readiness Assessments: Vital to Secure Mobility

HTTPS Inspection with Cisco CWS

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

The Cloud App Visibility Blindspot

Security Services. 30 years of experience in IT business

How To Secure Your System From Cyber Attacks

74% 96 Action Items. Compliance

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

ForeScout MDM Enterprise

Top Four Considerations for Securing Microsoft SharePoint

Information Security Policy

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Sample Data Security Policies

Transcription:

Data Loss Prevention: A Holistic Approach Sam D Amore, Principal Information Technology Security Office The Vanguard Group (www.vanguard.com)

Agenda Vanguard Background Challenges Solution: A Layered, Integrated Approach Policy Governance Technology

Vanguard Background A broad and diverse client base with over $1.5 trillion in U.S.-based fund assets A broad lineup of investment products that includes more than 160 mutual funds, commingled trusts, and ETFs Vanguard s average expense ratio was 0.23% at EOY 2009 compared with the fund industry average of 1.19% More than 12,500 U.S. employees based at headquarters in Malvern, Pennsylvania; Scottsdale, Arizona; and Charlotte, North Carolina Shareholder, employee, and company information is a critical asset Most employees work with sensitive information in one form or another

Challenges Provide employees with secure access to sensitive information (PII) they need to do their jobs, while eliminating excessive access Provide access to large teams of employees to maintain world-class client support Service our clients efficiently and effectively while balancing information security and accessibility Use diverse technologies and platforms including mobile devices without losing control of how information is used Leverage technology to facilitate cross-product, cross-service marketing and support for our clients International and cross-national operations subject to differing regulations Minimize data duplication

Solution: A Layered, Integrated Approach

POLICY Code of Ethics / Employee Agreement Information Security Policy Information Ownership/Stewardship Policy Information Classification Standard Electronic Communications Policy Personal Devices Policy Social networking guidance

Information Ownership Policy All business information has a designated owner Responsible for classification Ultimately accountable for user and application information access IT Data Stewards Responsible for where and how data is stored and accessed Business Data Stewards Represent owners Employees Adhere to standards and guidelines

Information Classification Standard Defines minimum controls for each classification level Public Internal Use Only Confidential Highly Confidential Covers data in all formats Electronic Hardcopy Portable devices Removable media

GOVERNANCE Enterprise Data Governance Council Ultimate arbiter of decisions about Vanguard information Senior management from different business areas Approve strategies Data Governance Program Team Working group on behalf of Governance Council Implement strategies Manage operational projects DLP Oversight Team Drives high-level control objectives for endpoint controls

TECHNOLOGY Workstation Activity Endpoint Controls Outbound e-mail Filtering Printing Secure multi-functional devices Mobile Devices Hardened Platform

More Than Data Loss Prevention (DLP) Multi-tool Strategy E-Mail content filtering End-user environment agents Additional network coverage The focus is user behavior, so awareness is part of the effort Key issues in selecting tools Alignment with other initiatives

E-Mail Content Filtering Scan and Route Deliver normally Block (with return message to sender) Hold & review Deliver securely via Integration with secure e-mail system Private Encryption How do you know what s in a privately encrypted ZIP file?

Protecting the End-user Environment Where the action is Insider threats Staff misuse or abuse Malware Removable media Advantages Control information in unencrypted formats (before file encryption, before SSL) Monitor activity that never leaves the workstation (hardware, printing, off-site use) Challenges Jurisdictional boundaries Diversity of business use and technology

Endpoint Control Rule Examples (1/3) Removable media Block or encrypt data to RM Block burning of CD/DVDs Restrict decryption to managed computers Allow portable encryption by exception only No device dependencies/vulnerabilities Control introduction of executable files Block execution of software from USB Confirm execution of software on CD External data transfer Require justification for all external uploads Exempt trusted sites Control activity on off-site laptops

Endpoint Control Rule Examples (2/3) Printing Control printing of sensitive files Control all off-site printing File controls Examine content and control user activity based on profile and business authorizations Control clipboard, uploads and other risky functions based on data in play Web 2.0 Block editing of Wikipedia entries Provide read-only access to Facebook Disable email functions embedded in websites (such as Google Reader)

Endpoint Control Rule Examples (3/3) Special users Step up controls for seasonal workers and contractors Provide exceptions tailored to business requirements Software control Control downloads of executables Block unauthorized applications Restrict privileged applications by group

Endpoint Control & Role-Based Access (RBAC) Most controls are applied globally, to all users and computers For targeted controls, rather than singling out individual users, leveraging RBAC allows rules and controls to be applied based on user roles RBAC allows changes to be driven by HR events Having an independent endpoint control ensures that privileged users are subject to the same controls as everyone else

Many Audiences, Many Benefits Tactical security groups Malware detection Environments groups Off-site / cloud computing workstations Business areas Specific audit issues Employee awareness Governance departments Increase compliance Provide guidance IT operations groups Software control System management and insight on real usage, leading to better service

Monitoring the Network Mobile devices Blackberry devices (BES) Managing nonstandard mobile usage (development environments) Use of personal devices Non-production systems Guest systems and networks Rogue systems New technology Specialized appliances Non-compliant devices MacOS and other Apple devices Legacy systems

Tool Selection DLP is a buzzword. Solutions often don t prevent anything Detection or intervention? Find a system that provides flexible enforcement options Blocking is a sure way to frustrate your users use sparingly Communicate with users to provide real-time guidance just when they need it the most Prompts visible to users should only use business language (not codes or technical terms) Forrester, Burton, and Gartner had different views on tools Select tools based on the threats in your environment E-Mail Internet uploads Rich Web applications (W2.0) Instant messaging Mobile devices Removable media Rogue wireless Remote access systems

Alignment with other security initiatives Who is personally responsible for how information is handled? What applications actually are used? Can you trust them? What s really going on at the endpoint? Who can access your information? Privileged user monitoring Information ownership Software control Incident management Intrusion detection Enterprise DRM Awareness External service provider management How effectively do you respond when something goes wrong? Do your users have the information they need to make good decisions? Can your admin users evade monitoring? Do you have sufficient separation of duties? What are the security postures and practices of your providers?

Thank You Sam D Amore Principal www.vanguard.com