to catch a thief: preventing the next fortune 500 data breach catch a thief... · to catch a thief:...

22
John Ochman Manager, Security Operations, BD Rob Eggebrecht President and CEO, BEW Global To Catch A Thief: Preventing the Next Fortune 500 Data Breach To Catch A Thief: Preventing the Next Fortune 500 Data Breach 1

Upload: others

Post on 12-Mar-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

John Ochman Manager, Security Operations, BD

Rob Eggebrecht President and CEO, BEW Global

To Catch A Thief: Preventing the Next Fortune 500 Data Breach

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 1

Page 2: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014 SYMANTEC VISION 2014

Who is BEW Global?

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 2

• Internationally recognized leader in critical asset protection

– Founded in 2002

• DLP Expertise

– Symantec Master Specialization DLP Partner

– 1st Managed DLP services provider (2008)

– Manage DLP solutions in 22 countries

– Daily management of 1,000,000+ users

– Global support in more than 130 countries

– Completed 500+ assessments

– Deployed 400+ DLP projects

Page 3: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014 SYMANTEC VISION 2014

Who is Becton, Dickinson and Company?

• Global medical technology company

– Founded in 1897

– Focus on improving drug delivery and advancing drug discovery

– Enhancing the quality and speed of diagnosing infectious diseases and cancers

• Three worldwide business segments: BD Medical, BD Diagnostics, BD Biosciences

• ~30,000 employees in over 50 countries

• FY13 revenues in excess of $8 billion

• Global Research Segment – Research Triangle Park, NC

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 3

Page 4: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Session Agenda

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 4

BD and Critical Asset Protection 1

Designing and Operating BD’s DLP Program 2

Attempted Intellectual Property Theft 3

Page 5: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Data Protection Concerns and Programmatic Needs

• Top priority: protection of intellectual property

• Existing tools: SIEM

– Worked well for certain bits and bytes, not content and context

• Gap identified: inability to describe IP to existing systems

• Evaluate potential options with a consulting engagement

5 To Catch A Thief: Preventing the Next Fortune 500 Data Breach

Page 6: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

• Identify key risks and sensitive information to set the baseline for custom policy creation

• DLP data elements and identifiers

• Keywords and expressions, pattern types

• Business specific and sensitive files

• Identify critical asset movement routes internal and external to the organizational network

• Determine DLP data elements and identifiers

• Threat vector analysis: data in motion, data in use, data at rest

• Usage, transmission, and storage methods/vehicle

• Identify people and systems authorized and unauthorized to access and handle sensitive data elements

• Managers / Leaders

• Administrators

• Partner / Customers

• Competitors

Develop Policy Governance

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 6

Identify Content Monitor Channels Target Community

Establish information content and context criteria to accurately detect, monitor and protect critical assets

Page 7: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Designing the Critical Asset Protection Program Leveraging Symantec DLP

• First, reached out to HR, Legal, various business units

– Goal: identify and target specific areas of highly-valued intellectual property

• Second, reached out to different business regions

– Goal: make sure DLP system compliant with different regions’ regulations

• Forged relationships with key business unit executives to gain buy-in for program development

* Consider pitfalls companies encounter when designing DLP programs

7 To Catch A Thief: Preventing the Next Fortune 500 Data Breach

Page 8: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Narrowing the Scope

• Identified greatest risk areas based on revenue, income, reputational impact

• Narrowed down scope after research

• Sought volunteer for program

• Business unit volunteered after John described DLP solution

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 8

Page 9: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014 To Catch A Thief: Preventing the Next Fortune 500 Data Breach 9

Deploying and Operating BD’s DLP Program

Page 10: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Deploying the DLP Technology Globally

• Full global rollout of Symantec DLP

– 22,000 endpoints

• Deployed DLP in motion, in use, at rest

– Data at rest targets were defined at end of rollout

• Expected rollout 12 to 18 months

– In reality, 9 months start to finish

– Deployed technology while John’s team collected policy information

• Began with early adopters, then expanded

10 To Catch A Thief: Preventing the Next Fortune 500 Data Breach

Page 11: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Deployment Timeline

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 11

Contact signed end of Sept. 2012

Hardware ordered Oct. 2012

Interview early adopters for policy creation

beginning Oct. 2012

Install hardware/software early 2013

Go live early May 2013

FBI arrest early June 2013

Page 12: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014 SYMANTEC VISION 2014 To Catch A Thief: Preventing the Next Fortune 500 Data Breach 12

The Attempted Intellectual Property Theft

Page 13: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Identification of Suspicious Activity

• Single user with numerous endpoint infractions

• Downloading of sensitive documents and storage on USB device

• High network activity by the same user

• Notification to Becton Dickinson for follow up

13 To Catch A Thief: Preventing the Next Fortune 500 Data Breach

Page 14: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Incident Response Process

• Internal investigation

• Worked with business unit management, HR, and internal legal council

• Notified local authorities who contacted federal officials

• FBI arrest

14 To Catch A Thief: Preventing the Next Fortune 500 Data Breach

Page 15: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Key Takeaways

• Streamlined business processes

• Greater insight into information flow

• Prevented theft

• Strong buy-in from the business

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 15

Page 16: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Tell us what you thought!

Session Survey

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16

Please take a few minutes to fill out the short session survey available on the mobile app—the survey will be available shortly after the session ends. Watch for and complete the more extensive post-event survey that will arrive via email a few days after the conference.

To download the app, go to https://vision2014.quickmobile.com or search for Vision 2014 in the iTunes or Android stores.

Page 17: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

To Learn More About DLP

Wednesday, May 7th

• 9:00 AM – Hands-on Tour of DLP Lab

• 4:30 PM – The Balancing Act Between Security and the Business

Thursday, May 8th

• 9:00 AM – Solving the Mystery of Data Ownership Lab

• 10:15 AM – The Future of DLP: Vision & Roadmap

• 11:30 AM – Hands-on Tour of DLP Lab

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 17

Page 18: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014 18 To Catch A Thief: Preventing the Next Fortune 500 Data Breach

Page 19: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014 SYMANTEC VISION 2014 To Catch A Thief: Preventing the Next Fortune 500 Data Breach 19

Discoveries from the DLP Program

Page 20: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Discoveries

• Addressing Business Requirements

– Consultant downloading sensitive design documents to USB

– DNA sequencing

– Macintosh

• Windows Desktop/Laptop Management Issue

– 2000 machine gap

• Office 365

• Change security standard policy

– Change from ‘may monitor’ to ‘does monitor ’

• Active Directory Groups

– HR versus Security Policy and Reporting needs

• Span Ports – multiple security tools require same traffic

– Lesson learned: Buy with future needs in mind

20 To Catch A Thief: Preventing the Next Fortune 500 Data Breach

Page 21: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

SYMANTEC VISION 2014

Avoiding Common Pitfalls – A New Way of Thinking

• Old vs. New

– Technology professionals well-versed in IS, using bits and bytes technology

– New challenges require different paradigm

• Content and context thinking

• DLP requires different business units to be involved to help describe IP

• DLP is visible to end users, unlike firewalls or IDS/IPS

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 21

Page 22: To Catch A Thief: Preventing the Next Fortune 500 Data Breach Catch a Thief... · To Catch A Thief: Preventing the Next Fortune 500 Data Breach 16 Please take a few minutes to fill

Thank you!

Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice.

To Catch A Thief: Preventing the Next Fortune 500 Data Breach 22

Rob Eggebrecht

[email protected]

John Ochman

[email protected]