the x factor in data centric security

45
The X-Factor in Data- Centric Security Webinar, Tuesday July 14 th 2015

Upload: watchful-software

Post on 15-Apr-2017

195 views

Category:

Software


2 download

TRANSCRIPT

Page 1: The X Factor in Data Centric Security

The X-Factor in Data-Centric Security

Webinar, Tuesday July 14th 2015

Page 2: The X Factor in Data Centric Security

2WEBINAR: “The X-Factor in Data"

*The Insider Threat SpotlIght Report

Tuesday July 14th 2015

Page 3: The X Factor in Data Centric Security

3

Introductions & “House Rules” A Data-Centric Approach Is Required For Security Today Are You Controlling Information Disclosure? RightsWATCH Live Demo Questions & Answers

Agenda

WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015

Page 4: The X Factor in Data Centric Security

4

Heidi SheyHeidi serves Security & Risk Professionals in solutions for data security and privacy and for security architecture and operations. Her research focus is on data discovery and classification, secure file sharing and collaboration, cybersecurity and privacy topics such as policy and regulatory concerns, biometrics, and consumer security.

Rui Melo BiscaiaRui serves as the Director of Product Management for Watchful Software, and is responsible for the company's product direction and go-to-market

Introductions

WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015

Page 5: The X Factor in Data Centric Security

5

You are muted centrally. You don’t need to mute/unmute yourself

This webinar is being recorded. The recording will be available tomorrow at www.watchfulsoftware.com

The Q&A session will be at the end

You are welcomed to enter questions anytime, using the Chat feature in the GoToWebinar Control Panel

Some “House Rules”

WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015

Page 6: The X Factor in Data Centric Security

6

Introductions & “House Rules” A Data-Centric Approach Is Required For Security Today Are You Controlling Information Disclosure? RightsWATCH Live Demo Questions & Answers

Agenda

WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015

Page 7: The X Factor in Data Centric Security

A Data-Centric Approach Is Required For Security TodayHeidi Shey, Senior Analyst

Page 8: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 8

Yesterday’s approach to data security

Page 9: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 9

…is insufficient for today’s reality

Page 10: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 10

…is insufficient for today’s reality›Your employees get work done in different ways

Source: Forrester’s Business Technographics Global Telecom And Mobility Workforce Survey, 2014

Page 11: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 11

…is insufficient for today’s reality›Your employees get work done in different ways

Source: Forrester’s Business Technographics Global Telecom And Mobility Workforce Survey, 2014

52% of information workers use multiple devices for work

Page 12: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 12

…is insufficient for today’s reality›Your data is everywhere

Page 13: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 13

…is insufficient for today’s reality›The threat landscape has changed

Nation state

sponsoredHactivist Cybercriminal Insiders

Page 14: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 14

…is insufficient for today’s reality

Page 15: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 15

are actually aware of or understand their company’s data use/handling policies

say they follow security policies

…is insufficient for today’s reality›Your employees have varying attitudes about data

51%

Source: Forrester's Business Technographics Global Devices And Security Workforce Survey, 2014

56%

Page 16: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 16

Defense in depth is a good concept

Defense

Page 17: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 17

…but often turns into expense in depth

Page 18: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 18

Causes of expense in depth

Lack of an overarching strategy

Page 19: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 19

Causes of expense in depth

Lack of an overarching strategy

Insufficient due diligence; feature/capability overlap and redundancy

Page 20: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 20

Causes of expense in depth

Lack of an overarching strategy

Insufficient due diligence; feature/capability overlap and redundancy

Difficulty integrating different solutions; too many silos

Page 21: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 21

It’s time for a data-centric strategyPut your controls closer to the data

Page 22: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 22

Forrester’s data security and control framework

DefineData discovery Data classification

Page 23: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 23

Forrester’s data security and control framework

DefineData discovery Data classification

Page 24: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 24

Forrester’s data security and control framework

DefineData discovery Data classification

DissectData intelligence Data analytics

Page 25: The X Factor in Data Centric Security

© 2015 Forrester Research, Inc. Reproduction Prohibited 25

Forrester’s data security and control framework

DefineData discovery Data classification

DissectData intelligence Data analytics

DefendAccess Inspect Dispose Kill

Page 26: The X Factor in Data Centric Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 26

Source: Forrester’s April 2014 “TechRadar™: Data Security, Q2 2014”

• Restrict and strictly enforce access control to data. 

• Monitor and identify abnormal patterns of network or user behavior. 

• Block exfiltration of sensitive data. 

• Render successful theft of data harmless.

Why these 20 technologies?

Key technologies and their outlook

Page 27: The X Factor in Data Centric Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 27

Source: Forrester’s April 2014 “TechRadar™: Data Security, Q2 2014”

Key technologies and their outlook

• Discovery and classification• Sharing and collaboration• Data loss prevention• Rights management• Key management

Capabilities evolve, converge

Page 28: The X Factor in Data Centric Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 28

Benefits of a data centric strategy

Know your data

Page 29: The X Factor in Data Centric Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 29

Benefits of a data centric strategy

Know your data

Align security with

business initiatives

Page 30: The X Factor in Data Centric Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 30

Benefits of a data centric strategy

Know your data

Prioritize data controls

and investment

Align security with

business initiatives

Page 31: The X Factor in Data Centric Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 31

Benefits of a data centric strategy

Know your data

Prioritize data controls and investment

Align security with business

initiatives

Build a foundation for data security and privacy

culture

Page 32: The X Factor in Data Centric Security

© 2014 Forrester Research, Inc. Reproduction Prohibited 32

Benefits of a data centric strategy

Know your data

Prioritize data controls and investment

Align security with business

initiatives

Build a foundation for data security and privacy

culture

Transform data security and privacy

into a business differentiator

Page 33: The X Factor in Data Centric Security

33WEBINAR: “The X-Factor in Data"

What do you anticipate as your biggest challenge for a data-centric approach to security?

1. Data classification2. Budget; justification for investment3. Staffing constraints4. Prioritizing our investments5. Addressing compliance requirements

Poll

Tuesday July 14th 2015

Page 34: The X Factor in Data Centric Security

Introductions & “House Rules” A Data-Centric Approach Is Required For Security Today Are You Controlling Information Disclosure? RightsWATCH Live Demo Questions & Answers

34

Agenda

WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015

Page 35: The X Factor in Data Centric Security

Are you controlling information disclosure?Rui Melo Biscaia, Director of Product Management

Page 36: The X Factor in Data Centric Security

36WEBINAR: “The X-Factor in Data"

The sheer amount of data to protect is overwhelming Cloud, “BYO” and 3rd parties ultimately mean “Data has Left the Building” Data exists to be consumed, thus security MUST become Data-Centric Rendering your data useless is the strongest answer to the “not IF but WHEN” issue

Are you controlling information disclosure?

Tuesday July 14th 2015

Page 37: The X Factor in Data Centric Security

37WEBINAR: “The X-Factor in Data"

Need to locate, index, and catalogue data for better control

RightsWATCH: Discovers data files in repositories and tags it according to the

data toxicity Always analyses content, context and file attributes to discover

and classify every single data file, wherever the file resides

Forrester’s data security and control framework

Data discovery Data classification

Tuesday July 14th 2015

Page 38: The X Factor in Data Centric Security

38WEBINAR: “The X-Factor in Data"

Forrester’s data security and control framework (II)

Data intelligence Data analytics

Need to provide business and other contextual insights about data, while identifying changing threats to data and guides decision-making

RightsWATCH: Provides intelligent time access and content expiration

controls over data Delivers a comprehensive audit trail on who is doing, what,

when and how with data that is valuable to the business and to security

Tuesday July 14th 2015

Page 39: The X Factor in Data Centric Security

39WEBINAR: “The X-Factor in Data"

DisposeAccess

Forrester’s data security and control framework (III)

Inspect Kill

Need to ensure the right user gets access to the right data at the right time; understand patterns to identify risks; mitigate risk by discarding data; and ensure data can’t be used or sold

RightsWATCH: Applies the principle of least privilege, by enforcing RBAC over data Logs a comprehensive audit trail to mitigate the malicious internal user Delivers a proper classification tags for data disposal purposes Leverages encryption to devalue and/or remote “Kill” data

Tuesday July 14th 2015

Page 40: The X Factor in Data Centric Security

40

RightsWATCH is Data-centric Security

WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015

Page 41: The X Factor in Data Centric Security

Introductions & “House Rules” A Data-Centric Approach Is Required For Security Today Are You Controlling Information Disclosure? RightsWATCH Live Demo Questions & Answers

41

Agenda

WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015

Page 42: The X Factor in Data Centric Security

42

RightsWATCH Live Demo

WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015

Page 43: The X Factor in Data Centric Security

Introductions & “House Rules” A Data-Centric Approach Is Required For Security Today Are You Controlling Information Disclosure? RightsWATCH Live Demo Questions & Answers

43

Agenda

WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015

Page 44: The X Factor in Data Centric Security

The X-Factor in Data-Centric Security

Questions & Answers

Webinar, Tuesday July 14th 2015

Page 45: The X Factor in Data Centric Security

Thank You!Heidi Shey+1 [email protected]

Rui Melo Biscaia+351 21 714 5430

[email protected]