Data Centric Security - Information Technology and Management

Data Centric Security:
The Village Idiot lives in the
Castle
Michael A. Davis
Chief Executive Officer
Savid Technologies, Inc.
http://www.savidtech.com
Copyright ©2011Savid Technologies, Inc. All Rights Reserved
Who am I?
» Michael A. Davis
– CEO of Savid Technologies
• IT Security, Risk Assessment, Penetration Testing
– Speaker
• Blackhat, Defcon, CanSecWest, Toorcon, Hack In The Box
– Open Source Software Developer
• Snort
• Nmap
• Dsniff
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
About Savid
»
»
»
»
»
»
»
Founded in 2003
Chicago & DC Offices
Think Tank of security professionals
Diverse set of IT skills
Unique, agile combination of expertise
Cater to the special security needs of our clients
We love what we do and will work hard to meet our
clients’ needs
Our focus is unique, high-end solutions. We do NOT
provide “cookie-cutter” solutions because our clientele
do not have “cookie-cutter” problems.
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Author
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
InformationWeek Contributor
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Where we got our data
» April 2010 Survey
» Over 1,000 security professionals
» Follow-up Interviews with Fortune 1000
CSO/CISOs
» 229 Companies with a security breach
» Wide Variety of industries
– Financial
– Healthcare
– Business Services
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Agenda
» We have been trying to solve the wrong
problem
» Trends that you cannot seem to protect
against
» 5 Rules in Deploying DLP – Don’t follow
them and you will fail
» Questions
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
The External Attack is Dead
» Data is sent outside the organization after
an attack
» No one focuses on what happens “after
they break in”
» How do I reduce the time to react to an
incident?
» How do I know how far they got?
» Who do I notify?
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
What People Think of Security
Internal Network
The Firewall will protect us!
The Big Bad Internet
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
What is everyone concerned with?
Source: Savid/Information Week Data Survey, 2010
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Complexity is everywhere
Services
FS Applications
Applications
Storage
Collaboration
Security
IDS
AV/Spyware
Content Filtering
Business
intelligence/
Analytical
applications
Identity Management
Network & Systems
Management
Management Vendors
Vulnerability Assessment
Regulatory Compliance
Application
integration
Monitoring
Firewalls
Dynamic Provisioning
Application
development
tools
Management
Database
OS
Hardware
platform
Anti-Spam
Computer
Network
Storage
Source: CA, 2009
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Say Sorry 46 different ways
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
What is Data Centric Security?
» Policies/Process are based on data type
» Technical Controls work at the data level
– Not protocol
– Not port
» Data Controls can be anywhere
– Not just the perimeter
» Threat based Security evolves too quickly
– How often do your data types change?
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
What got you here won’t get you
there
» It is all about the data!
» Data Centric Security must replace threat
focused security
» Focus on the Four W’s
– Where
– What
– Who
– Why
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
People are essential
» 24% of enterprises are “very confident”
about data classification
Source: Savid/Information Week Data Survey, 2010
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
How do we control this data?
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
People are Data Owners
» People own data, not things
» It should not be IT!
» Security Projects without business is
worthless
» Understand the culture
– Don’t use tech words
» Get marketing involved
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
There is too much data!
» Growing amount of data was top growth
concern for increased vulnerability
» Up from 17% of respondents to 33%, a
52% increase
» Deperimeteratization is taking hold
– Starbucks is your news corner office
– Social Media is staying
– Facebook is not a marketing tool, it is an
attack platform
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Where to start
» Establish a data classification schema
» It will be iterative – be dynamic
» Do not use Military structure – Use your
own
Source: Savid/Information Week Data Survey, 2010
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
I want DLP – Now what?
» Rule #1 – Strategy – You are not deploying DLP
» Decide on the desired result, develop a plan,
and monitor progress
» Align DLP programs with overall data protection
strategy – Must span enterprise
» 42% of organizations have IT manage the data
» 57% say the business determines the value
» Look for leaders, not silver bullets
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Rule #2 – People are essential
» 24% of enterprises are “very confident”
about data classification
Source: Savid/Information Week Data Survey, 2010
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Rule #2 – People are Data Owners
» People own data, not things
» It should not be IT!
» DLP without business is worthless
» Understand the culture
– Don’t use tech words
» Get marketing involved
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Rule #3 – Know thy data
» Establish a data classification schema
» It will be iterative – be dynamic
» Do not use Military structure – Use your
own
Source: Savid/Information Week Data Survey, 2010
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Rule #4 – Don’t think this is just
about DLP
» Focus on enabling business processes
– This is your link to the business impact
» You must consider the various business
processes that support the use of DLP
technology
» Event management, event classification,
business unit remediation, incident
response, reporting, and system
operations
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Rule #4
» Ensure that you scope the entire
enterprise
» It is all about Data Security
– Data in Motion
– Data at Rest
– Data at the endpoint
» What about Identities?
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Rule #5 – Walk toward prevention
» DLP is not a set and forget it
» Continuously tune policies
» Be iterative and involve the core
stakeholders
– Shows more value while reducing risk
– Proactive communication is key
» Gradually turn on prevention
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Don’t forget..
» Ensure that you scope the entire
enterprise
» It is all about Data Security
– Data in Motion
– Data at Rest
– Data at the endpoint
» What about Identities?
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved
Conclusion
» Thank you
» Michael A. Davis
mdavis@savidtech.com
(708) 243-2850
» Questions?
Copyright ©2011 Savid Technologies, Inc. All Rights Reserved