HOW TO AVOID DATA BREACHES

11
HOW TO AVOID DATA BREACHES

description

HOW TO AVOID DATA BREACHES. Agenda. A data breach is the intentional or unintentional release of secure information to an untrusted environment. U.S. Cost of a Data Breach reached $214 per compromised record and averaged $7.2 million per data breach event.* - PowerPoint PPT Presentation

Transcript of HOW TO AVOID DATA BREACHES

Page 1: HOW TO AVOID  DATA BREACHES

HOW TO AVOID DATA BREACHES

Page 2: HOW TO AVOID  DATA BREACHES

2

AgendaA data breach is the intentional or unintentional release of secure information to an untrusted environment

• U.S. Cost of a Data Breach reached $214 per compromised record and averaged $7.2 million per data breach event.*

• The number of breaches caused by negligence, such as

not securing data properly, increased slightly to 41 percent, and averaged $196 per record, the survey said*

*Ponemon survey

Page 3: HOW TO AVOID  DATA BREACHES

3

DATA NEED TO BE PROTECTED

There are more and more privacy regulations and more enforceable every day

• European Data Protection Directive 95/46/EC• Australian privacy act• French CNIL (Commision nationale de l’informatique et des libertés)• USA 49 CFR Part 512• USA AESC Code of Conduct on Data Protection

Page 4: HOW TO AVOID  DATA BREACHES

4

DISCOVER SENSITIVE DATA AND TABLE RELATIONSHIPS

Page 5: HOW TO AVOID  DATA BREACHES

5

DEFINE ANONYMIZATION RULES

Page 6: HOW TO AVOID  DATA BREACHES

6

ASSIGN RULES TO SENSITIVE DATA

Page 7: HOW TO AVOID  DATA BREACHES

7

ADAPTABLE DATA ANONYMIZATION RULES

Database with sensitive data

258369147741852963Don StewardABCD

Generated fictive data & from file

Value in DB

999999999999999999Zzz ZzzzzzZzzz

Masked Data

12346789987654321Phil ClaeysVisa

Unauthorized userTester

12346789987654321Phil ClaeysVisa

Masked Data

Unauthorized userOutsourcingAuthorized user

Business analyst

ADAPTABLE ANONYMIZATION RULES

Page 8: HOW TO AVOID  DATA BREACHES

8

VALIDATE ANONYMIZATION

RULES

MASKING

OTHER…

LIST

GENERATE

D

Production copy Production copy anonymized

Page 9: HOW TO AVOID  DATA BREACHES

9

REUSABLE ANONYMIZATION RULES

Page 10: HOW TO AVOID  DATA BREACHES

10

MODIFICATION OF ANONYMIZATION RULE

Page 11: HOW TO AVOID  DATA BREACHES

11

THANK YOU