homeland security - strengthening the weakest link

18
Licensed under the Creative Commons Attribution License Danny Lieberman [email protected] http://www.controlpolicy.com/ Home(land) Security - Strengthening the weakest link

Upload: software-associates

Post on 18-Dec-2014

284 views

Category:

Documents


1 download

DESCRIPTION

In the Data security at home workshop we will discuss what happens when files come home and when removable devices and notebooks owned by your employees go to work. We will help clarify the threats and understand the issues of home (land) security and how to get your employees to practice what your preach

TRANSCRIPT

Page 1: Homeland Security - strengthening the weakest link

Licensed under the Creative Commons Attribution LicenseDanny Lieberman

[email protected] http://www.controlpolicy.com/

Home(land) Security -Strengthening the weakest link

Page 2: Homeland Security - strengthening the weakest link

A true story

Chief economist of a central bank was exploited by criminal elements who

cyberstalked his child to rig forex rates.

The names have been changed to protect the innocent.

Page 3: Homeland Security - strengthening the weakest link

Agenda

• Introduction and welcome• What is data security• Defining the problem• Data in motion• Cyberstalking• Blogging• Security countermeasures

Page 4: Homeland Security - strengthening the weakest link

What the heck is data security?

• Security– Ensure we can survive & add value

• Physical, information, systems, people

• Data security– Protect data directly in all realms

Page 5: Homeland Security - strengthening the weakest link

Defining the problem

• Threat scenarios– Front-door for

data theft– Back-door for

malware, Trojans

– Cyberstalking– Blogging

Page 6: Homeland Security - strengthening the weakest link

Data in motion - 1990

• Company centric– 1 Company phone– 1 Company mail account– Unconnected PC at home

• Floppy disk may infect office with virus

• Limited capacity fordata theft

Page 7: Homeland Security - strengthening the weakest link

Data in motion - 2010

• Employee centric– Office PC– Office servers– Home PCs– Mobile devices– Flash drives– Web 2.0 services– VPN

Page 8: Homeland Security - strengthening the weakest link

Cyberstalking

• What you know– Impersonation on Facebook – Crime of anonymity, stealth, intimidation

Page 9: Homeland Security - strengthening the weakest link

Cyberstalking

• What you don't know– One of the fastest growing crimes in US– 40% of computer crime caseload at

NYPD

Page 10: Homeland Security - strengthening the weakest link

Cyberstalking

• When it enters the office:– Threatens employee targeted in

execution of a crime• May make hostile workplace

– Becomes a liability to management and shareholders

Page 11: Homeland Security - strengthening the weakest link

Here's the problem with blogs(*)

Social media databases

Billions of messages

1. Employees blog at work and home

2. Blog archive, no-delete policy of public services like Google

3. > 100M blog databases

4. Scanned by organized crime, competitors, terrorists

5. Messages analyzed with data mining, SNA

6. Rich source of trade secrets when analyzed

7. Identity thieves, scams, spams, cyberstalking, social engineering

8. Most offices don't have social media control policies

(*)Mac Ulsch – Managing Risk in a Hostile World

Page 12: Homeland Security - strengthening the weakest link

Security countermeasure - management

• Corporate culture– A little fear in the workplace is not a bad

idea (Andy Grove)

• Everyone signs AUP• Managers teach

Page 13: Homeland Security - strengthening the weakest link

The AUP

• For example:– “The AUP applies to laptops, PDA’s and

smart-phones even when you’re out of the office”

• No downloads• No offensive content • Physical, password and email/web

security

Page 14: Homeland Security - strengthening the weakest link

Security countermeasure - monitoring

• Network DLP – Monitor for policy violations

• To protect staff and customers against unlawful disclosure of personal records

• Loss/abuse of assets

– Fidelis, Symantec, Websense

Page 15: Homeland Security - strengthening the weakest link

Security countermeasure – point of usage

• Agent DLP– Central data security policies

• Device control• Site control• Content inspection• Encryption on demand

– Notebook PC– Blackberry– Citrix server

• Verdasys,McAfee DLP

Page 16: Homeland Security - strengthening the weakest link

Coming attractions

• Oct 1: Home(land) security• Oct 8: SME data security• Oct 15: Business process & security• Oct 22: A holistic approach to risk

management

http://www.controlpolicy.com/workshops

Page 17: Homeland Security - strengthening the weakest link

Learn more

• Presentation materials and resourceshttp://www.controlpolicy.com/workshops/data-security-workshops/

Page 18: Homeland Security - strengthening the weakest link

Why?

“I don't need data security, we outsource our IT to one of the big banks”

“It's never happened to us before”

“You can't estimate asset value”

“We encourage risk taking”

“I don't take risks”

True quotes from real people