Using End User Device Encryption to Protect Sensitive Information



Similar documents
Guidelines on use of encryption to protect person identifiable and sensitive information

Vs Encryption Suites

For your eyes only - Encryption and DLP Erkko Skantz

PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.

DRAFT Standard Statement Encryption

Excerpt of Cyber Security Policy/Standard S Information Security Standards

SecureAge SecureDs Data Breach Prevention Solution

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

A Guide to Managing Microsoft BitLocker in the Enterprise

PGP Whole Disk Encryption Implementation

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

How Endpoint Encryption Works

Aegis Padlock for business

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Symantec File Share Encryption Quick Start Guide Version 10.3

CRYPTAS it-security GmbH

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Chapter 4 Application, Data and Host Security

Healthcare Compliance Solutions

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

White Paper: Whole Disk Encryption

Data Security Considerations for Research

Encryption Made Simple for Lawyers

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd.

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Data Protection: From PKI to Virtualization & Cloud

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

INFORMATION SECURITY FOR YOUR AGENCY

Comprehensive Endpoint Security

Securing Data at Rest ViSolve IT Security Team

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

Key Management Interoperability Protocol (KMIP)

System Security Plan University of Texas Health Science Center School of Public Health

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Managing BitLocker Encryption

A Strategic Approach to Enterprise Key Management

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

STANDARD 3-8 WORKING DAYS

= AUDIO. The Importance of Mobile Device Management in HIT. An Important Reminder. Mission of OFMQ 12/9/2015

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

ECONOMY WORKING DAYS STANDARD 3-8 WORKING DAYS

efolder White Paper: HIPAA Compliance

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Overview of the HIPAA Security Rule

Internet threats: steps to security for your small business

EnCase Forensic Product Overview

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

CPSC 467b: Cryptography and Computer Security

How Drive Encryption Works

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Technical White Paper BlackBerry Security

Data Breaches and the Encryption Safe Harbor. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

The CIO s Guide to HIPAA Compliant Text Messaging

Secure SSL, Fast SSL

White Paper How Noah Mobile uses Microsoft Azure Core Services

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

BUY ONLINE FROM:

IT Networking and Security

Big Data, Big Security:

How To Protect Your Endpoints From Attack

Storage, backup, transfer, encryption of data

Protecting personally identifiable information: What data is at risk and what you can do about it

Navigating Endpoint Encryption Technologies

Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities

HIPAA Security Alert

White Paper: Librestream Security Overview

FileCloud Security FAQ

Cyber Self Assessment

Secure User Guide

Encryption Buyers Guide

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes

Protecting Your Data On The Network, Cloud And Virtual Servers

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Solutions for Encrypting Data on Tape: Considerations and Best Practices

A practical guide to IT security

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Transcription:

Using End User Device Encryption to Protect Sensitive Information April 29, 2015 Mel Jackob, CISSP, GSEC, eplace Solutions, Inc. William Ewy, CIPP/US, eplace Solutions, Inc.

William Ewy, BSEE, CIPP/US Host Privacy and Data Security Practice Manager, eplace Solutions, Inc. International Privacy Manager at Agilent Technologies Various positions in Marketing and Quality with Hewlett-Packard in California, Hong Kong, and Beijing 4

Mel Jackob, CISSP, GSEC, CISA, MCT eplace Solutions Inc. Senior Cyber Security Consultant eplace Solutions, Inc. Director of IT/Cyber Security at L-3 Communications Senior Cyber Security Consultant at Microsoft Senior Lead Security Engineer at NMCI 5

Loss prevention services and information for cyber insurance policyholders 1 2 3 4 5 6 Legal Compliance Materials: regulatory summaries, sample policies, procedures, plans, and agreements Risk Assessment Guides: step-by-step procedures to lower risk Email List: monthly newsletter, privacy and data security tips, and Data Security Alerts Specialist Support: by phone or email Training & Awareness Programs: online courses, bulletins, and webinars Handling Data Breaches: summary of breach notification requirements, sample incident response plans, etc. 6

The basics of static encryption Device encryption technologies/considerations Examples of available hardware and softwarebased solutions Conclusions 7

Encryption is Not a Silver Bullet Cracking the encryption algorithm. Over time, algorithms become compromised. Because of this it is important to securely remove (digitally wipe or shred) sensitive information, even if encrypted, from devices when no longer needed. All software, including encryption, can have defects (e.g. bugs) and backdoors that can allow unauthorized access if discovered. 8

Data Security Basics Limit sensitive personal information collected to the minimum necessary as required by organizational purposes Encrypt all sensitive information stored on mobile devices (laptop PC, smartphone, tablet, USB stick, DVD, etc.) Completely destroy sensitive information when no longer needed 9

Cryptography Cryptography hides data from unauthorized individuals Collection of Software, Protocols, Algorithms and Keys Cryptosystems draw their strength from the Algorithms, the length and Randomness of the Keys used and other Mathematical factors 10

Cryptography Methods of Encryption Symmetric (Same key used to encrypt and decrypt) N(N-1)/2=Number of Keys Symmetric Encryption Algorithms Data Encryption Standard (DES) Triple-DES (3DES) Blowfish IDEA RC4,RC5, and RC6 Advanced Encryption Standard (AES) (128,192, and 256 bits) Asymmetric (Public, Private Keys) 11

What is Data Data is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected Users store data on variety of Endpoints Whatever form the Data takes, or means by which it is shared or stored, it should always be appropriately protected 12

Value of Data Security Protects information against various threats Ensures business continuity Minimizes financial losses and other impacts Optimizes return on investments Creates opportunities to do business safely Maintains privacy and compliance 13

Impact of Laptop Thefts www.privacyrights.org Average 50% of reported breaches involved laptop theft 14

Launch video Internet Attacks 15

Data Security Preserves CIA - Confidentiality Integrity Availability Making information accessible only to those authorized to use it Safeguarding the accuracy and completeness of information and processing methods Ensuring that information is available when required 16

Endpoint Encryption Strategies Full Disk Encryption How Software Disk Encryption Works How Hardware Disk Encryption Works File/Folder Encryption How File/Folder Encryption Works Removable Media Encryption How Removable Media Encryption Works 17

Full Disk Encryption Recovery Lost or forgotten passphrase Self Recovery (Computer is not Managed) Computer has not communicated with the management server with a set communication interval One time Password Data corruption resulting from hardware failure or other factors such as a data virus Preinstallation Media 18

Folder/File/Removable Media Encryption Recovery Options Lost or forgotten Certificate or Password Automatic Key Archiving for Recovery of Encrypted Data Recovery Certificate Have a backup copy of your data 19

Criteria for Selecting Endpoint Encryption Solution(s) Identify compliance requirements Conduct a risk assessment Specify requirements Expect to support multiple endpoint technologies Expect to provide training Thoroughly engineer the processes for endpoint encryption Test the encryption system and the procedures for user management 20

Criteria for Selecting Full Disk Encryption Products Device deployment Product management Compatibility Authentication service integration Key recovery Cryptography Self Destruct Mechanism 21

Leading Full Disk Encryption Products Check Point Full Disk Encryption McAfee Endpoint Encryption Microsoft BitLocker Drive Encryption Sophos SafeGuard Enterprise Symantec PGP Whole Disk Encryption WinMagic SecureDoc Disk Encryption Trend Micro 22

Conclusion Changes in the endpoint landscape have an impact on endpoint encryption architectures. Organizations must understand the business risk and compliance requirements regarding data theft and data loss and make choices to support a wide variety of devices. Solutions should support a heterogeneous infrastructure that may need to include full-disk encryption software, self-encrypting drives, file/folder encryption, smartphones and tablets, and personal storage devices 23

Mel Jackob, CISSP eplace Solutions, Inc. Senior Cyber Security Specialist Tel.: 559-261-9293 MJackob@eplaceinc.com William Ewy, CIPP/US eplace Solutions, Inc. Privacy and Security Practice Manager Tel.: 559-577-1252 WEwy@eplaceinc.com 25

Using End User Device Encryption to Protect Sensitive Information