05.05.2021-webinar-presentation-experts-series-How-to-Switch-to-a-Better-DLP.pdf

ngvson 23 views 40 slides Aug 18, 2024
Slide 1
Slide 1 of 40
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40

About This Presentation

webinar-presentation-experts-series-How-to-Switch-to-a-Better-DLP


Slide Content

How to Switch to a Better DLP:
Protecting Assets and Enabling Business, Securely
Tom Stringer, Director Field Sales Engineering
Digital Guardian

Tom Stringer –Dir Field Sales Engineering
▪Sales Engineering Director, N.
Amer. East. Manages a team of
Sales Engineers
▪6 years with DG, 20+ years working
with Software Security vendors
▪Wears many hats including
supporting Pre-sales opportunities
in the North East and Canada
▪Previously with Proofpoint and
Websense

Bill Bradley –Director of Marketing, Digital Guardian
▪Leads Product Marketing for
Digital Guardian
▪20+ years of Marketing & Sales
Experience
•Field Sales, Competitive Analysis,
Product Marketing & Management
▪Previously at Rapid7 and General
Electric

Agenda
Why Your Current DLP May Be Holding You Back (And How to Sell
the Upgrade)
How to Show Return on Security Investment...Quickly!
Enterprise DLP Without the Complexity
Digital Guardian Data Protection Platform
Q&A

Every Business Is At Risk
Just one recent example
US Indicts Man Behind Shopify Insider Breach | Digital Guardian

Business Initiatives + Protecting Data
▪Can you still achieve the goals you set
out for when your organization started
its data protection program?
▪What compromises due to technology
limitations must you make?
▪What is the impact of doing nothing?

Business Initiatives + Protecting Data
Common Goals
1.Protect sensitive data, meet
compliance requirements
2.Support the business, share
decision making responsibilities
3.Identify risks or gaps
4.Enable secure growth

Imagine Simplified Data Protection
Only
Office Suite
XLSX
DOCX
PPTX
Only
Save / Email
Operations File TypesApplicationsPersona
Well trained
Motivated
Accurate
Interactions
Click on the ribbon

Reality has it differently ...
versus
Office Suite
XLSX
DOCX
PPTX
versus
Save / Email
Operations File TypesApplicationsPersona
Well trained
Motivated
Accurate
Interactions
Click on the ribbonNot motivated
Compromised
Disgruntled
Untrained
Stressed
Sloppy
100s100s100s
Automation /
Custom Prompts
versus versus
Databases
heterogenous
Filesystems
heterogenous
Cloud
Repositories
heterogenous
Endpoint OS
heterogenous

Ok, I’m interested in a new approach. Now what?
▪Planning
▪Goals
▪Build Consensus

Ok, I’m interested in a new approach. Now what?
▪Visibility First = Metrics
•Gather data to share with business units and
stakeholders, data owners
•Share withthem the data they need to make
informed policy decisions
•Useful to track improvements and show ROI
▪Provide Risk based policy recommendations
•Not all data is the same
•Leverage existing experience and best practices

Start here –Identify Objectives
▪Be Prepared, research internally.
•Requirements?
•Compliance, Intellectual Property, Insider threat
▪PCI, PII, PHI, ITAR…
▪Identify data egress channels that are of primary concern
•Typical USB, Cloud storage, email, webmail
•Do your homework and find *all* the escape routes
▪Leverage Available Resources

Start here –Engaging DLP Providers
▪Have use cases in mind to make it real
▪Was there an incident that we don’t want to see happen again?
•Have people become too free using webmail or USB with sensitive data
•Was a recent employee departure found too late that they had printed
out confidential information?
•Was there malicious code or ransomwarethat is thought to have
accessed sensitive data?
▪If you’re prepared to discuss a specific issue, you're likely to have
a better experience than if you have overly generalized
discussions

5 Phase Approach for DLP Success
Insight Baseline Educate Act Assess

Stage 1: Insight
Identify Existing
Behavior & Define
Acceptable
Behavior
Insight Baseline Educate Act Assess

Trade Secrets / Intellectual Property
Customer Data
Engineering Drawings
PHI/PII Data
Credit Card Data
Source Code
Unstructured Data
Email
Discover
Data
Burn to
CD
DVD
Send
To
Printer
File
Encrypt
View
&
Open
USB
Devices
Save to
Local
Drive
Cut
&
Paste
Print
Screen
Delete
&
Recycle
Classified
Files
Launch
unapproved
Applications
Cloud
Application
Network
Upload
Attach
To
Email
Lost or
Stolen
Laptop
DG DATA Centric Approach –DAR, DIU, DIM
Visibility, Discovery, Classification, Audit & Control

Digital Guardian Architecture offers Extensive Coverage
Continuous Event Logging, Automated Classification, User Awareness, Training, Controls &
Forensic Capture
Discovery & Identification
Content
Context
User
Enterprise Applications
File Name
Compiled Binary
File Image Name
MD5 hash
Network Operations
All Ports & Protocols
Secured & Unsecured Wireless
Physical & Virtual Adapters
Bluetooth, MTP, and IrDA, P2P
Email Operations
Send
Reply/to All
Forward
Whitelist/Blacklist of
Domains
Removable Media
USB
CD/DVD
Smartphone/Tablet
Manufacturer
Serial Number
Web Operations
Webmail
Social Media
NTU, FTP, Dropbox
Printing
Network
Local
PDF
Open
Write
Save
Delete
Copy/Move
Save As
Copy & Paste
Print Screen…
Data Operations

Insight Baseline Educate Act Assess
Stage 2: Baseline
Develop Baseline,
Models, and Policies

What Can DG Discover
▪Unusual Behaviors:
•Rarely touched file types
•Unusual work schedule
•Accessing inactive server
▪People or Entities Doing Things They Normally Don’t
▪Data Flows, Non-Standard Business Processes, etc.

Use Data to Establish the Baseline
▪Understand how Users
Handle Sensitive Data
▪Role or Group Based
Reporting

Use Data to Establish the Baseline
▪Start High and
Look for
Anomalies
▪Drill Down for
the Full Story

Use Data to Establish the Baseline
▪Start High and
Look for
Anomalies
▪Drill Down for
the Full Story

Understanding Non -Humans
▪Start High and
Look for
Anomalies
▪Drill Down for
the Full Story

Understanding Non -Humans
▪Start High and
Look for
Anomalies
▪Drill Down for
the Full Story

Understanding Non -Humans

Understanding Non -Humans

Stage 3: EDUCATE
Educate and Inform
on Smart Data Use
Insight Baseline Educate Act Assess

“Digital Guardian
offers us an
opportunity to not
only better protect
patient privacy, it
gives us better
insight into how our
own sensitive data
processes really
work.”
VP, IT Operations
Stage 3: EDUCATE

Stage 4: ACT
Enforce Acceptable
Behavior
Insight Baseline Educate Act Assess

Incident Categories, Types, & Severities
❖Unauthorized Access
❖Potential Malware
❖Improper Usage
❖Unsuccessful Attempt
❖Explained Anomaly
❖Insider Threat
❖Opportunistic
❖Outsider
❖Broken Business practice
❖Critical Impact
❖High Impact
❖Moderate Impact
❖Low Impact
Classification of Incidents enables the
prioritization of incident management
while enabling meaningful metrics

Stage 5: Assess
Ongoing Review of
Behavior and Risk
Continuous Policy Tuning
Insight Baseline Educate Act Assess

Lessons Learned from 100s of Implementations
▪Act Now, Start Small
▪Avoid Policy Paralysis
▪Engage the Business
▪Participate in the Process
▪Be Flexible and Adaptable

Digital Guardian Data Protection Platform
No Compromise Data Protection

Data is *Still* the Ultimate Target

Digital Guardian Platform
▪Analytics & Reporting
Cloud (ARC)
▪Endpoint Agent
▪Network Appliance
▪Applications
•Discover
•Classification
•DLP
•MDR
▪Management Console
3rd Party
Data Intelligence

Cloud-Delivered
(SaaS or Managed)
Federated
(Integrations, SDK, API’s)
Cross Platform
(Win, Mac & Linux)

Digital Guardian
Managed Security
Program
Digital Guardian
Software as a
Service (SaaS)

Why Digital Guardian
Cloud-Delivered
Powered by AWS, Digital Guardian
delivers simplified deployment, low
overhead, and elastic scalability for
increased return on your security spend.
Cross Platform
Coverage for your Windows,
macOS, or Linux operating
systems and all your applications,
both browser based and native.
Flexible Controls
Fine-grained controls,
ranging from log & monitor
to automated blocking, help
protect data before it's lost.
Deepest Visibility
We see everything that
happens to your organization’s
sensitive data.
No Policy, No Problem
Our “unknown risk” approach
enables you to see where
sensitive data is located, how it
flows, and where it is put at
risk -all without policies.
Comprehensive Classification
Only Digital Guardian provides
content, user, and context-
based data discovery and
classification.

Questions
39

Join Our Next Webinar
Learn How to Migrate to Digital Guardian
▪1:00 PM ET May 12
▪What does the DG DLP onboarding process look like?
▪Join DG to see how easily we can migrate you to DG
Data Loss Prevention.
Register Here: https://info.digitalguardian.com/webinar-data-protection-experts-series-2021.html
Tags