Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the...

21
Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau Canadian Data Loss and Compliance Specialist

Transcript of Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the...

Page 1: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

Crime and CarelessnessGaps that enable the theft of your most

sensitive data

Ryan Boudreau – Canadian Data Loss and Compliance Specialist

Page 2: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

2

Symantec™ Global Intelligence Network Identifies more threats, takes action faster & prevents impact

Copyright © 2009 Symantec Corporation. All rights reserved. 2

Information ProtectionPreemptive Security Alerts Threat Triggered Actions

Global Scope and ScaleWorldwide Coverage 24x7 Event Logging

Rapid Detection

Attack Activity• 240,000 sensors

• 200+ countries

Malware Intelligence• 130M client, server,

gateways monitored

• Global coverage

Vulnerabilities• 32,000+ vulnerabilities

• 11,000 vendors

• 72,000 technologies

Spam/Phishing• 2.5M decoy accounts

• 8B+ email messages/day

• 1B+ web requests/day

Austin, TXMountain View, CA

Culver City, CA

San Francisco, CA

Taipei, Taiwan

Tokyo, Japan

Dublin, IrelandCalgary, Alberta

Chengdu, China

Chennai, India

Pune, India

Alexandria, VA

Reading, England

Sydney, AU

Page 3: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

3

Sources of a Breach

Copyright © 2009 Symantec Corporation. All rights reserved. 3

OrganizedCriminal

WellMeaningInsider

Malicious Insider

Page 4: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

4

Anatomy of a Breach

Copyright © 2009 Symantec Corporation. All rights reserved. 4

> Exfiltration

> Capture

> Discovery

> Incursion

Page 5: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

5

Security Market Drivers

Incursion

Copyright © 2009 Symantec Corporation. All rights reserved. 5

192% growth in spam from 2007 to 2008

In 2008, Symantec documented 5,471 vulnerabilities, 80% of which were easily exploitable

90% of incidents would not have happened if systems had been patched

In 2008 we found 75,000 active bot-infected computers per

day, up 31% from 2007

Page 6: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

6Copyright © 2009 Symantec Corporation. All rights reserved. 6

91% of records compromised in 2008 involved organized crime targeting corporate information

81% of attacked companies were non-compliant in PCI

67% of breaches were aided by insider negligence

Security Market Drivers

Discovery

Page 7: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

7Copyright © 2009 Symantec Corporation. All rights reserved. 7

Security Market Drivers

Capture

285 million records were stolen in 2008, compared to 230 million between 2004 and 2007

Credit card detail accounts for 32% of all goods advertised on underground economy servers

IP theft costs companies $600 billion globally

Page 8: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

8Copyright © 2009 Symantec Corporation. All rights reserved. 8

Security Market Drivers

Exfiltration

“Gov’t Posts Sensitive List Of US Nuclear Sites” Associated Press

“Goldman May Lose Millions From Ex-Worker’s Code Theft”July 7 (Bloomberg), Goldman Sachs

“2 Men Accused Of Swiping CC Numbers” July 2 (Bloomberg), KPHO.com

“Royal Air Force Embarrassed By Yet Another Sensitive Data Loss”May 25, UK News

Page 9: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

9

Prelude to a Breach

Copyright © 2009 Symantec Corporation. All rights reserved. 9

1

Poorly ProtectedInfrastructure

Page 10: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

10

Prelude to a Breach

Copyright © 2009 Symantec Corporation. All rights reserved. 10

2

Lack ofIT Policies

Page 11: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

11

Prelude to a Breach

Copyright © 2009 Symantec Corporation. All rights reserved. 11

3

Poorly ProtectedInformation

Page 12: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

12

Prelude to a Breach

Copyright © 2009 Symantec Corporation. All rights reserved. 12

4

Poorly ManagedSystems

Page 13: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

13Copyright © 2009 Symantec Corporation. All rights reserved. 13

3

Symantec™ Data LossPrevention Suite

Protect theInformation

Page 14: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

14Copyright © 2009 Symantec Corporation. All rights reserved. 14

• Discover where sensitive information

resides

• Monitor how data is being used

• Protect sensitive information from

loss

3

Symantec™ Data LossPrevention Suite

Protect theInformation

Page 15: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

Mission statement of traditional security

1515

Mission: Deploy countermeasures to

protect the containers of crucial assets

Perimeter security

Anti-malware

DRM + Encryption

ThreatsAssets

Page 16: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

So what’s wrong with this picture?

1616

Mission: Deploy countermeasures to

protect the containers of crucial assets

Perimeter security

Anti-malware

Access controls

ThreatsAssets

Traditional infosec seeks to protect

the containers of crucial assets and

largely ignores protection of the data itself

Today’s threat landscape is massively

more complex and diverse than the

infoscape battlefield we have been

trained to defend

Page 17: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

Data Loss Prevention answers these

three crucial questions

DATA LOSS PREVENTION (DLP)

DISCOVER PROTECTMONITOR

17

How best to

prevent its loss?

How is it

being used?

Where is your

confidential data?

Page 18: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

Key DLP Requirements

MANAGE

• Find data wherever it is

stored

• Create inventory of

sensitive data

• Manage data clean up

• Understand how data is

being used

• Understand content

and context

• Gain enterprise-wide

visibility

• Gain visibility into policy

violations

• Proactively secure data

• Prevent confidential

data loss

DISCOVER PROTECTMONITOR

• Define unified policy across enterprise

• Detect content accurately

• Remediate and report on incidents

18

Page 19: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

Key DLP Requirements

MANAGE

• Find data wherever it is

stored

• Create inventory of

sensitive data

• Manage data clean up

• Understand how data is

being used

• Understand content

and context

• Gain enterprise-wide

visibility

• Gain visibility into policy

violations

• Proactively secure data

• Prevent confidential

data loss

DISCOVER PROTECTMONITOR

• Define unified policy across enterprise

• Detect content accurately

• Remediate and report on incidents

19

Page 20: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

Protect

information

proactively

Automate review

of entitlements

Identify threats in

real time

Integrate security

operations

Prevent data

exfiltration

Stop targeted

attacks

How to Stop Data Breaches

Page 21: Crime and Carelessness - SecTor DLP presentation... · Crime and Carelessness Gaps that enable the theft of your most sensitive data Ryan Boudreau –Canadian Data Loss and Compliance

In Conclusion

• Threat agents behind breach

– Hackers

– Well-meaning insiders

– Malicious insiders

• Primary risk factors leading to breach

– Extensive internal exposure of confidential data

– Failure to identify theft from malicious insiders

– Poor protection against exfiltration of confidential data

• How do I know if I am at risk? Answer these questions

– Do I know if there are signs of incursion into my perimeter?

– Where is my data? Where is it going?

– What are my biggest points of exposure of crucial data?

21 21