Encryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE

Similar documents
NNIT Cybersecurity. A new threat landscape requires a new approach

Updates within Network Security and Privacy Risk Management

How To Protect Your Organization From Insider Threats

Advanced Threats: The New World Order

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Gold Lock Desktop White Paper

Securing Data Today. Ulf Mattsson CTO Protegrity ulf.mattsson [at] protegrity.com

IoT Security Concerns and Renesas Synergy Solutions

10 Smart Ideas for. Keeping Data Safe. From Hackers

The Evolution of the Enterprise And Enterprise Security

Using End User Device Encryption to Protect Sensitive Information

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Logging In: Auditing Cybersecurity in an Unsecure World

Compliance in 5 Steps

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

A HELPING HAND TO PROTECT YOUR REPUTATION

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Enterprise Data Protection

Stop advanced targeted attacks, identify high risk users and control Insider Threats

TRITON AP-ENDPOINT STOP ADVANCED THREATS AND SECURE SENSITIVE DATA FOR ROAMING USERS

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Don't Be The Next Data Loss Story

Smartcrypt Encryption Key Management

An introduction to Cryptosoft

The Future of the Advanced SOC

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

AB 1149 Compliance: Data Security Best Practices

ITAR Compliance Best Practices Guide

CyberArk Privileged Threat Analytics. Solution Brief

Skoot Secure File Transfer

External Supplier Control Requirements

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Assumption of Breach: A New Approach to Cyber Security

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Information Security Services

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

SIEM is only as good as the data it consumes

Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits

Cyber Security. John Leek Chief Strategist

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

Defending Against Cyber Attacks with SessionLevel Network Security

2012 Endpoint Security Best Practices Survey

CYBER SECURITY INFORMATION SHARING & COLLABORATION

After the Attack. The Transformation of EMC Security Operations

G-Cloud Definition of Services Security Penetration Testing

7 VITAL FACTS ABOUT HEALTHCARE BREACHES.

Content Security: Protect Your Network with Five Must-Haves

I ve been breached! Now what?

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Symantec DLP Overview. Jonathan Jesse ITS Partners

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Phone: Fax:

Associate Prof. Dr. Victor Onomza Waziri

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Risk & Innovation in Cybersecurity Investments. Sponsored by Lockheed Martin

White paper. Why Encrypt? Securing without compromising communications

Secure Cloud Computing

Mitigating and managing cyber risk: ten issues to consider

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Evolution Of Cyber Threats & Defense Approaches

Where Data Security and Value of Data Meet in the Cloud

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Data Centric Security

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Cybersecurity. Are you prepared?

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Security and Privacy

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

Nine Network Considerations in the New HIPAA Landscape

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Application Delivery in PCI DSS Compliant Environments

Two Approaches to PCI-DSS Compliance

Building a Comprehensive Mobile Security Strategy

Effective End-to-End Cloud Security

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

Transcription:

Encryption Doesn t Always Protect Your Data Presented by: Joe Sturonas PKWARE

Agenda Threat Landscape Security Risks Public/Private Keys Digital Signing and Authentication Use Case Q&A

Threat Landscape

2015 Data Breach Stats Data security events increased by 38% Intellectual property theft increased 56% 2016 Global State of InfoSec Survey Price Waterhouse Cooper $400 million estimated losses from 700 million compromised records 2015 Verizon Data Breach Report Data breaches in healthcare totaled over 112 million records in 2015 Forbes

Threat Landscape Evolution Identity Theft Resource Center

InfoSec Landscape Advanced Persistent Threat Detection Networks Devices Intrusion Detection Data Leakage Prevention Security Gateways Application Firewalls Full Disk Encryption Applications Information DATA CENTRIC PROTECTION Identity & Access Management Access Control Intrusion Detection Incident & Event Management DNS Security VPN Antivirus Firewalls Mobile Device Management Mobile Application Management Antimalware Endpoint DLP Access Brokers Network Access Control Stateful Pocket Inspection

Potential Effects of Sensitive Data Exposure The Three Elements of a Breach 1 They have to get in 3 They have to get it out 2 They have to get to the information

IoT (Things, and a lot of them)

What happens when InfoSec fails?

Cyber Defense Matrix Sounil Yu - RSA Conference 2016

Security Risks

Encryption and Privacy Encryption empowers individuals and organizations to take their privacy into their own hands Protects usernames/passwords, EHR, PII, etc. Protects against thieves, snoops and idiots

TSI External attackers, rogue employees, etc. Three letter agencies, the insider threat Users, admins, basically everyone

Risks Thieves represent the highest cost in terms of dollars lost and money spent Snoops represent the lowest cost in terms of dollars lost but have the potential to heavily damage reputation and brand Idiots represent mistakes made by everyone that results in sensitive information exposure Risks: Financial penalties Brand reputation Customer confidence Intellectual property

Risks Thief Thief Snoop Idiot Snoop Idiot Thief

Thieves

Snoops

Idiots

Idiots

Public/Private Key Cryptography

Public/Private Keys Public Key Encrypting data Authenticating data Private Key Decrypting data Signing data

Symmetric Encryption

Asymmetric Encryption Sender encrypts data using each recipient s public key Each recipient decrypts with their private key

Hybrid Cryptosystem for Unstructured Data

Protecting Structured Data Encrypt sensitive fields without having to encrypt the entire database. Length Preserving & Format Preserving (length + format) Cryptography API Cryptography API

Digital Signing and Authentication

Digital Signing

Digitally Signing Data

Authenticating Data

Use Case

Use Case Challenge: Cost Cost effective and reliable solution that would be consistent over several years Data centric security Requirement for persistent authentication and digital encryption Leverage existing infrastructure Find a solution that would work within the existing infrastructure Solution: Cost Maximum reuse of existing infrastructure combined with mature, proven software Data centric security Encryption provides the customer with the level of security and confidence required Leverage existing infrastructure Integrated into the existing network, and MFT solution Encryption Benefits Efficiently manage the disparate platforms used by member banks Minimal disruption on implementation due to reuse of existing infrastructure Helped overcome future cost concerns by providing an option allowing member banks to change their computing environments without impacting the overall cost of the solution Fulfilled the essential requirements surrounding security of the cheque files being transferred

Q & A