Keeping The Right Doors Open

  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Keeping The Right Doors Open as PDF for free.

More details

  • Words: 670
  • Pages: 32
Keeping the right doors open

The secure external sharing of information

22nd May 2008

Why is everyone talking about DLP?

DLP Data leak prevention ILP Information leak prevention CMF Content management and filtering OCC Outbound content compliance Slide 2 of 32

Scientist takes secret designs to competition

Copyright 2008 Quocirca Ltd

The reasons rarely mentioned

Business processes Mobile working Competitive advantage Slide 3 of 32

Copyright 2008 Quocirca Ltd

Drivers for web-enabling applications

Sponsored by:

400 European enterprises, Oct 2007 Slide 4 of 32

Copyright 2008 Quocirca Ltd

Users of web-enabled applications

Sponsored by:

400 European enterprises, Oct 2007 Slide 5 of 32

Copyright 2008 Quocirca Ltd

Percentage of employees working remotely at some point during the week 0%

20%

40%

60%

80%

100%

Overall Utility

Telecomms and Media Finance Industrial

Public Sector Healthcare Retail > 75% Sponsored by:

Slide 6 of 32

51%-75%

25%-50%

<25%

315 European respondents from enterprises > 1000 employees – March 2008 Copyright 2008 Quocirca Ltd

Numbers of individuals accessing IT

Sponsored by:

1,200 European and US small and mid-sized businesses, 2006 Slide 7 of 32

Copyright 2008 Quocirca Ltd

Number of employees

Use of laptops

Sponsored by:

Percentage of laptops 1,200 European and US small and mid-sized businesses, 2006

Slide 8 of 32

Copyright 2008 Quocirca Ltd

21st C businesses thrive on open networks

Slide 9 of 32

Copyright 2008 Quocirca Ltd

Compliance and disclosure

Slide 10 of 32

Copyright 2008 Quocirca Ltd

Cost of data leakage

Direct

Indirect Slide 11 of 32

Copyright 2008 Quocirca Ltd

Not a new problem 1980s

Corporate IT Firewall

Print and fax FTP Email Web

IM Blogs, wikis, RSS Social networks/virtual worlds

Slide 12 of 32

2008 Copyright 2008 Quocirca Ltd

The distraction of incoming threats

Corporate IT Firewall

viruses worms spyware Junk email adware

Phishing Slide 13 of 32

Copyright 2008 Quocirca Ltd

External threats

Slide 14 of 32

Copyright 2008 Quocirca Ltd

The problem with employees

Carelessness Stupidity

Malice Slide 15 of 32

Plants Copyright 2008 Quocirca Ltd

Carelessness

Slide 16 of 32

Copyright 2008 Quocirca Ltd

Stupidity

Slide 17 of 32

Copyright 2008 Quocirca Ltd

Malice Money Coercion Ideology

Slide 18 of 32

Copyright 2008 Quocirca Ltd

Plants

Slide 19 of 32

Copyright 2008 Quocirca Ltd

Ignoring the insider threat

Desire to trust

Provide access

Weak policy Deny

Slide 20 of 32

Avoid bad press

Copyright 2008 Quocirca Ltd

What should we be doing?

There is no silver bullet….

Slide 21 of 32

Copyright 2008 Quocirca Ltd

Focus on end point, content and people Security People

Content

Servers and end points

Network Time Slide 22 of 32

Copyright 2008 Quocirca Ltd

Educating people …… Responsibility for mobile device security

Nov 2005, online 2036 respondents 50% UK, 25% Europe, 25% US

Slide 23 of 32

Copyright 2008 Quocirca Ltd

...... is problematic Attitude to responsibility

Nov 2005, online 2036 respondents 50% UK, 25% Europe, 25% US Slide 24 of 32

Copyright 2008 Quocirca Ltd

Managing content Bcbcbbbbbbzcxbccvbb Cvbcbcbccbzbbbzbbbb bbbbbzbzbcbbbbzbbzb Cbbbbbbbjjghjhgjgfjgh Jhgjghwewesdfsdfsfsff mbnmnvfghdfcxshghjj jjtyjyyjyyghjhgghjghjg Bcbcbbbbbbzcxbccvbb Cvbcbcbccbzbbbzbbbb bbbbbzbzbcbbbbzbbzb Cbbbbbbbjjghjhgjgfjgh Jhgjghwewesdfsdfsfsff mbnmnvfghdfcxshghjj jjtyjyyjyyghjhgghjghjg Bcbcbbbbbbzcxbccvbb Cvbcbcbccbzbbbzbbbb bbbbbzbzbcbbbbzbbzb Cbbbbbbbjjghjhgjgfjgh Jhgjghwewesdfsdfsfsff mbnmnvfghdfcxshghjj jjtyjyyjyyghjhgghjghjg

Bcbcbbbbbbzcxbccvbb Cvbcbcbccbzbbbzbbbb bbbbbzbzbcbbbbzbbzb Cbbbbbbbjjghjhgjgfjgh Jhgjghwewesdfsdfsfsff mbnmnvfghdfcxshghjj jjtyjyyjyyghjhgghjghjg Bcbcbbbbbbzcxbccvbb Cvbcbcbccbzbbbzbbbb bbbbbzbzbcbbbbzbbzb Cbbbbbbbjjghjhgjgfjgh Jhgjghwewesdfsdfsfsff mbnmnvfghdfcxshghjj jjtyjyyjyyghjhgghjghjg Bcbcbbbbbbzcxbccvbb Cvbcbcbccbzbbbzbbbb bbbbbzbzbcbbbbzbbzb Cbbbbbbbjjghjhgjgfjgh Jhgjghwewesdfsdfsfsff mbnmnvfghdfcxshghjj jjtyjyyjyyghjhgghjghjg

Print Email Copy Print screen Copy screen Slide 25 of 32

Copyright 2008 Quocirca Ltd

Formulate and enforce policy

Users

Policy

Content

Recruitment

Slide 26 of 32

Copyright 2008 Quocirca Ltd

Managing end-points

Slide 27 of 32

Copyright 2008 Quocirca Ltd

USB-mania

Slide 28 of 32

Copyright 2008 Quocirca Ltd

Beyond the USB

Slide 29 of 32

Copyright 2008 Quocirca Ltd

End of life

Slide 30 of 32

Copyright 2008 Quocirca Ltd

But remember why networks need to be open in the first place

Business processes Mobile working Competitive advantage Slide 31 of 32

Copyright 2008 Quocirca Ltd

Conclusions

Thank you Bob Tarzey Quocirca www.quocirca.com

Free reports from Quocirca:

-Information Security for SMBs -Web enabled applications and the internet -The distributed business index - Plus many more….. All at www.quocirca.com Slide 32 of 32

Copyright 2008 Quocirca Ltd

Related Documents

The Doors
October 2019 13
The Doors
November 2019 19
Doors
April 2020 26
Doors
May 2020 35