To Catch A Thief: Preventing the Next Fortune 500 Data Breach



Similar documents
Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Building a Security Program that Protects an Organizations Most Critical Assets

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

BUILDING A SECURITY PROGRAM THAT PROTECTS AN ORGANIZATION S MOST CRITICAL ASSETS

INFORMATION PROTECTION

SM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager

UP L13: Leveraging the full protection of SEP 12.1.x

Breach Found. Did It Hurt?

Walter Bogorad, Lead Architect Aman Manik, Principal Product Manager. Secure File Sharing Using Norton Zone powered by Symantec

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Securing the endpoint and your data

BYOD: No Longer "If" but "How" Justin Martin Regional Product Manager Greg Slade Director Product Management

Secure Your Mobile Workplace

Data loss prevention and endpoint security. Survey findings

Symantec DLP Overview. Jonathan Jesse ITS Partners

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Your is outsourced to the Cloud and Mobile, Are You protecting it with Encryption? Wolf Schreiner

Symantec Enterprise Vault.cloud Giovanni Alberici

Unified Security, ATP and more

DATA LEAKAGE PREVENTION IMPLEMENTATION AND CHALLENGES

Secure Your with Encryption as a Service

#ITtrends #ITTRENDS SYMANTEC VISION

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

IBM QRadar Security Intelligence April 2013

Cyber intelligence in an online world

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Data Loss Prevention: Data-at-Rest vs. Data-in-Motion

Protecting the Infrastructure: Symantec Web Gateway

Securing and protecting the organization s most sensitive data

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

Web Protection for Your Business, Customers and Data

74% 2014 SIEM Efficiency Survey Report. Hunting out IT changes with SIEM

For your eyes only - Encryption and DLP Erkko Skantz

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

1518 Best Practices in Virtualization & Cloud Security with Symantec

Better Together: Microsoft Office 365 & Symantec Office 365

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

IBM Security QRadar Vulnerability Manager

WEBSENSE TRITON SOLUTIONS

FIVE PRACTICAL STEPS

Strengthen security with intelligent identity and access management

End to End Security do Endpoint ao Datacenter

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

IBM Digital Analytics Benchmark. Black Friday Report 2013

Symantec Mobile Security

On and off premises technologies Which is best for you?

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

The Benefits of an Integrated Approach to Security in the Cloud

Reducing the cost and complexity of endpoint management

HIGH-RISK USER MONITORING

White Paper. BD Assurity Linc Software Security. Overview

Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats

Altiris Client Management Suite

You ll learn about our roadmap across the Symantec and gateway security offerings.

Symantec Endpoint Encryption Deployment Best Practices and Roadmap

Storage management and business continuity strategy and futures

SolarWinds. Packet Analysis Sensor Deployment Guide

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Lessons learned: Sinkholing the Zeroaccess botnet. Ross Gibb. Attack Investigations Team Symantec Security Response.

What Your Network s Missing: The Network TAP And 7 Ways To Leverage It

A Buyer's Guide to Data Loss Protection Solutions

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

On the Radar: CipherCloud

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Applying IBM Security solutions to the NIST Cybersecurity Framework

Altiris Business Unit Review. Greg Butterfield Group President, Altiris Business Unit

Baseline Security Strategy. January 17, 2013

Security strategies to stay off the Børsen front page

The New PCI Requirement: Application Firewall vs. Code Review

Incident Response. Six Best Practices for Managing Cyber Breaches.

Reducing Risk Through Effective Certificate Management

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Chief Security Strategist Symantec Public Sector

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

High-Risk User Monitoring

How To Secure Your System From Cyber Attacks

Data Loss Prevention with Platfora Big Data Analytics

Insider Threat Control: Using a SIEM signature to detect potential precursors to IT Sabotage. CERT Insider Threat Center

Data Security: Fight Insider Threats & Protect Your Sensitive Data

eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success

Advanced Threat Protection with Dell SecureWorks Security Services

Preemptive security solutions for healthcare

Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant

Information & Asset Protection with SIEM and DLP

Cisco Advanced Services for Network Security

IBM Endpoint Manager for Core Protection

IBM Security QRadar Risk Manager

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

2012 Endpoint Security Best Practices Survey

Safeguarding the cloud with IBM Dynamic Cloud Security

Advanced Threats: The New World Order

Symantec Endpoint Protection

How Does Fax over IP Work?

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

Transcription:

To Catch A Thief: Preventing the Next Fortune 500 Data Breach Rob Eggebrecht President and CEO, BEW Global John Ochman Manager, Security Operations, BD To Catch A Thief: Preventing the Next Fortune 500 Data Breach 1

Who is BEW Global? Internationally recognized leader in critical asset protection Founded in 2002 DLP Expertise Symantec Master Specialization DLP Partner 1st Managed DLP services provider (2008) Manage DLP solutions in 22 countries Daily management of 1,000,000+ users Global support in more than 130 countries Completed 500+ assessments Deployed 400+ DLP projects 2

Who is Becton, Dickinson and Company? Global medical technology company Founded in 1897 Focus on improving drug delivery and advancing drug discovery Enhancing the quality and speed of diagnosing infectious diseases and cancers Three worldwide business segments: BD Medical, BD Diagnostics, BD Biosciences ~30,000 employees in over 50 countries FY13 revenues in excess of $8 billion Global Research Segment Research Triangle Park, NC 3

Session Agenda 1 2 3 BD and Critical Asset Protection Designing and Operating BD s DLP Program Attempted Intellectual Property Theft 4

Data Protection Concerns and Programmatic Needs Top priority: protection of intellectual property Existing tools: SIEM Worked well for certain bits and bytes, not content and context Gap identified: inability to describe IP to existing systems Evaluate potential options with a consulting engagement To Catch A Thief: Preventing the Next Fortune 500 Data Breach SYMANTEC VISION 2014 5

Develop Policy Governance Establish information content and context criteria to accurately detect, monitor and protect critical assets Identify Content Monitor Channels Target Community Identify key risks and sensitive information to set the baseline for custom policy creation DLP data elements and identifiers Keywords and expressions, pattern types Business specific and sensitive files Identify critical asset movement routes internal and external to the organizational network Determine DLP data elements and identifiers Threat vector analysis: data in motion, data in use, data at rest Usage, transmission, and storage methods/vehicle Identify people and systems authorized and unauthorized to access and handle sensitive data elements Managers / Leaders Administrators Partner / Customers Competitors 6

Designing the Critical Asset Protection Program Leveraging Symantec DLP First, reached out to HR, Legal, various business units Goal: identify and target specific areas of highly-valued intellectual property Second, reached out to different business regions Goal: make sure DLP system compliant with different regions regulations Forged relationships with key business unit executives to gain buy-in for program development * Consider pitfalls companies encounter when designing DLP programs To Catch A Thief: Preventing the Next Fortune 500 Data Breach SYMANTEC VISION 2014 7

Narrowing the Scope Identified greatest risk areas based on revenue, income, reputational impact Narrowed down scope after research Sought volunteer for program Business unit volunteered after John described DLP solution 8

Deploying and Operating BD s DLP Program 9

Deploying the DLP Technology Globally Full global rollout of Symantec DLP 22,000 endpoints Deployed DLP in motion, in use, at rest Data at rest targets were defined at end of rollout Expected rollout 12 to 18 months In reality, 9 months start to finish Deployed technology while John s team collected policy information Began with early adopters, then expanded To Catch A Thief: Preventing the Next Fortune 500 Data Breach SYMANTEC VISION 2014 10

Deployment Timeline Hardware ordered Oct. 2012 Install hardware/software early 2013 FBI arrest early June 2013 Contact signed end of Sept. 2012 Interview early adopters for policy creation beginning Oct. 2012 Go live early May 2013 11

The Attempted Intellectual Property Theft 12

Identification of Suspicious Activity Single user with numerous endpoint infractions Downloading of sensitive documents and storage on USB device High network activity by the same user Notification to Becton Dickinson for follow up To Catch A Thief: Preventing the Next Fortune 500 Data Breach SYMANTEC VISION 2014 13

Incident Response Process Internal investigation Worked with business unit management, HR, and internal legal council Notified local authorities who contacted federal officials FBI arrest To Catch A Thief: Preventing the Next Fortune 500 Data Breach SYMANTEC VISION 2014 14

Key Takeaways Streamlined business processes Greater insight into information flow Prevented theft Strong buy-in from the business 15

Tell us what you thought! Session Survey Please take a few minutes to fill out the short session survey available on the mobile app the survey will be available shortly after the session ends. Watch for and complete the more extensive post-event survey that will arrive via email a few days after the conference. To download the app, go to https://vision2014.quickmobile.com or search for Vision 2014 in the itunes or Android stores. 16

To Learn More About DLP Wednesday, May 7th 9:00 AM Hands-on Tour of DLP Lab 4:30 PM The Balancing Act Between Security and the Business Thursday, May 8th 9:00 AM Solving the Mystery of Data Ownership Lab 10:15 AM The Future of DLP: Vision & Roadmap 11:30 AM Hands-on Tour of DLP Lab 17

To Catch A Thief: Preventing the Next Fortune 500 Data Breach SYMANTEC VISION 2014 18

Discoveries from the DLP Program 19

Discoveries Addressing Business Requirements Consultant downloading sensitive design documents to USB DNA sequencing Macintosh Windows Desktop/Laptop Management Issue 2000 machine gap Office 365 Change security standard policy Change from may monitor to does monitor Active Directory Groups HR versus Security Policy and Reporting needs Span Ports multiple security tools require same traffic Lesson learned: Buy with future needs in mind To Catch A Thief: Preventing the Next Fortune 500 Data Breach SYMANTEC VISION 2014 20

Avoiding Common Pitfalls A New Way of Thinking Old vs. New Technology professionals well-versed in IS, using bits and bytes technology New challenges require different paradigm Content and context thinking DLP requires different business units to be involved to help describe IP DLP is visible to end users, unlike firewalls or IDS/IPS 21

Thank you! Rob Eggebrecht robert@bewglobal.com John Ochman john_ochman@bd.com Copyright 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. To Catch A Thief: Preventing the Next Fortune 500 Data Breach 22