Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP



Similar documents
CA Technologies Data Protection

Guide to Successful Data Loss Prevention Risk Reduction: Part 1

INFORMATION PROTECTION

Chief Security Strategist Symantec Public Sector

Jeff Warson, GCIH, SCPS, CISSP, CCSK Sr. Principal Security Strategist Symantec Corpora5on

SM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Symantec DLP Overview. Jonathan Jesse ITS Partners

On and off premises technologies Which is best for you?

Practical DLP Deployment

Symantec Consulting Services

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

The SDN Opportunity. Erik Papir Director, Global Technical Marketing & Competitive Intelligence HP Networking May 2014

Altiris Asset Management Suite 7.0

Simplify and Automate IT

Archiving with Enterprise Vault Bruno Ritter

#ITtrends #ITTRENDS SYMANTEC VISION

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

IBM QRadar Security Intelligence April 2013

How To Improve Your Network Security

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Simplify and Automate IT

Symantec to Acquire Clearwell Systems, Inc. May 19, 2011

Securing Healthcare Data on Mobile Devices

Q1 Labs Corporate Overview

To Catch A Thief: Preventing the Next Fortune 500 Data Breach

Find the needle in the security haystack

Websense Data Security Solutions

Intelligent Information Management: Archive & ediscovery

Managing PHI in the Cloud Best Practices

Data Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy

Embracing Complete BYOD Security with MDM and NAC

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Mobile App Management:

AirWatch Solution Overview

ITIL and Altiris ServiceDesk. Joseph Carson, Sr. Product Manager October 21, 2009

Gartner Magic Quadrant Sources and Disclaimer

Mobilize your Enterprise in 60 Minutes!

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

MobileIron and Samsung Value Proposition

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Product Strategy Update OTM SIG Conference

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

McAfee Data Protection Solutions

Best Practices for a BYOD World

Data Loss Prevention and HIPAA. Kit Robinson Director

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Enterprise Identity Management Reference Architecture

Technical Note. ForeScout MDM Data Security

Symantec Asset Management Suite 7.6 powered by Altiris technology

BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATION S MOST CRITICAL ASSETS

Protecting ip Data From Loss and theft: The ShorTeST PaTh To PrevenTion and risk reduction

A Buyer's Guide to Data Loss Protection Solutions

ForeScout MDM Enterprise

Jonas Vercruysse Technical Pre-sales February Endpoint Management IBM Corporation

<Insert Picture Here> Oracle Identity And Access Management

6 Things To Think About Before Implementing BYOD

Whitepaper. Security Best Practices for Evaluating Google Apps Marketplace Applications. Introduction. At a Glance

Smarter Infrastructure Instrumented, Interconnected, Intelligent... Patterns of Innovation

Building a Security Program that Protects an Organizations Most Critical Assets

LANDesk Data Analytics

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Amazon Web Services (AWS) A Secure and Scalable Platform for Global Enterprises. Tim Bixler Sr. Manager, Solutions Architecture

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Proactive Performance Management for Enterprise Databases

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Firewall Testing Methodology W H I T E P A P E R

FileNet and SharePoint Better Together. Tom Moen Channel Development Manager

The Impact of HIPAA and HITECH

Symantec Asset Management Suite 7.5 powered by Altiris technology

Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013

Web Security Gateway Solutions

Devising a Server Protection Strategy with Trend Micro

Best Practices for DLP Implementation in Healthcare Organizations

White paper. Five Key Considerations for Selecting a Data Loss Prevention Solution

Key Benefits of Microsoft Visual Studio Team System

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Devising a Server Protection Strategy with Trend Micro

The ForeScout Difference

What is Security Intelligence?

Cisco EnergyWise and CA ecosoftware: Deliver Energy Optimization for the Data Center

IAN MASSINGHAM. Technical Evangelist Amazon Web Services

Recognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership

Amazon.com, Inc. and its affiliates. All rights reserved.

Altiris Client Management Suite

What s new in AM 9.30 Accelerating business outcomes

FROM PRODUCT TO PLATFORM

The power of collaboration: Accenture capabilities + Dell solutions

IBM Tivoli Netcool Configuration Manager

Five Tips to Ensure Data Loss Prevention Success

Unified Security, ATP and more

ORACLE MANAGED FILE TRANSFER

HP BladeSystem Advantage over Cisco s UCS

Enterprise Archiving Simplified

Protecting the Infrastructure: Symantec Web Gateway

Transcription:

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC

Agenda 1 What DLP is and its purpose 2 Challenges for a sustainable data protection program 3 Common attributes in a successful implementation 4 Achieve greater risk reduction

What is Data Loss Prevention (DLP)? Definition: Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer. (1) Where is your confidential data? How is it being used? How best to prevent its loss? (1) http://whatis.techtarget.com/definition/data loss prevention DLP

Protect what s Important Customer Information Company Information Credit Card Info Intellectual Property Medical Records M&A and Strategy SSNs and Government IDs Internal Auditing Financials HR Records

Some Data Loss Prevention Use Cases Better Visibility Discover Data Theft Risk Reduction Legal and Regulatory Compliance

Features to Consider in a Data Loss Prevention Solution Office 365 ios Android USB Hard Drives Removable Storage Network Shares Print/Fax Cloud & Web Apps Unified Management Email Web FTP IM File Servers Exchange, Lotus SharePoint Databases Web Servers

Features to Consider in a Data Loss Prevention Solution Route Incidents to Right Responder High Severity of Incidents First Quick Detection & Response Visibility and Metrics Automation Integration High Accuracy & Low False Positives Multiple Detection Technologies Extensive Formats Localization Unified Management Flexibility Membership Granular Management Limit Data and Incident Access Exceptions Detect/Alert/Block Built in policies templates Alerts based on Risk and Severity

Who are the Main Players in the DLP Arena? Source: Gartner, Inc., Magic Quadrant for Content Aware Data Loss Prevention, Eric Ouellet, December 12, 2013 This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Symantec. Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purposed

Recognize challenges for a sustainable data protection program

Implementing the DLP Product Suite Typical Customer Challenges Implementing the entire DLP suite without a plan ( I bought it all, I want to install it all; right now ) Not involving all affected areas of IT ( We are IT /Security and we don t need to engage others for our projects ) Not anticipating changing IT environment Database upgrades Migrations Email system upgrades Underestimating infrastructure needs and set up timeframes (unrealistic goals)

Developing the DLP Program Typical Customer Challenges Unclear or unfocused DLP program goals IT centered implementation with no Business Unit involvement Let s just see what happens approach Lack of knowledge about the information to protect (customer needs to define what is sensitive in their environment) No effort toward developing procedures for the long term

Operating a DLP Program Typical Customer Challenges Lack of resources Lack of data analysis No cooperation from business units Adhoc changes to policies and response rules Inability to show risk reduction progress (ROI)

Common attributes in a successful DLP implementation 13

Want success? Think differently. Traditional Approach Technology focused Incident and event centric Broad coverage approach Successful Approach People, Process, & Technology Comprehensive Prioritized and focused Typical Results Unpredictable Typical Results Predictable Technology Incomplete Scalable Inefficient Costly Technology Efficient Cost Effective People Process

Characteristics of Successful DLP Programs Architect / Design Executive Level Involvement Install Employee Education Technology Dedicated Experienced Resources Metrics Connection Trained Incident Response Team People Process Implement Prioritized Approach Optimize Operate Business Owner Involvement

How a comprehensive, clearly defined, business focused DLP program achieve greater risk reduction

Three Step Implementation Approach Plan for Success Target Most Sensitive Data First Begin Risk Reduction Begin Risk Reduction 17

Step 1: Plan for Success Assign a dedicated team to own project success Determine requirements, order and configure hardware Set expectations with proactive communication to employees Schedule training for System Administrator and Incident Response Team Select 1 2 key metrics for risk reporting Obtain executive buy in on initial roll out strategy

Step 2: Target Most Sensitive Data First Recommended Starting Points: Strategically add policies Network: High volume, high risk protocols and exit points Strategically add protocols and exit points Greatest Potential for Loss Strategically add repositories Storage: High access, highvolume repositories Endpoint: 19 Strategically add users and endpoints Users with access to highly sensitive data At risk employees

Step 3: Begin Risk Reduction 1000 Baseline Enable Lookups Remediation Refine Policies Notification Prevention/Protection 800 600 Enable Advanced Detection Employee and Business Unit Communication Refine Policies Identify Broken Business Processes Fix Broken Business Processes 400 200 0 Incidents Per Week Risk Reduction Over Time Business Unit Risk Scorecard Sender Auto Notification Business Unit Risk Scorecard Refine Policies Months 0 1 to 3 4 to 6 7 to 9 10 to 12 20

Visibility and Metrics Example (2) (2) Screenshots from Symantec Data Loss Prevention Solution 21

Keys to Success People & Process Engage business units and data owners to define data protection priorities Define and gain consensus on project goals and success metrics Determine awareness and communication program for DLP Focus initial deployment on 3 5 key policies Endpoint: target users with access to highly sensitive data and at risk employees (high turnover) Network: target high volume and high risk protocols (SMTP, HTTP, FTP) Storage: target high access, high volume repositories Train team prior to implementation Configure policies and define incident response workflow based on team capacity Regularly report results to key stakeholders and executives

Keys to Success DLP Technology Optimize system performance Filters, server management, scheduling scans and reports Precisely tune policies early Detection Technologies, Exceptions Automate to minimize resources Workflow, remediation, notification, prevention, protection, encryption Integrate with security infrastructure LDAP, encryption, messaging systems, forensics, SEMs

Data Loss Prevention Maturity Model (3) Increased Automation Lower TCO Greater Risk Reduction 5 4 Resource/ TCO 3 DLP Maturity 2 1 1 3 6 9 12+ (3) Based on Symantec DLP Maturity Model Time/Months

Thank you! Sebastian Brenner Sebastian_brenner@symantec.com Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.