SlideShare a Scribd company logo
Data Security Trends and ObservationsTony LockFreeform Dynamics Ltdtony@freeformdynamics.comApril, 2010www.freeformdynamics.com
AgendaBusiness Drivers Influencing IT SecurityProtecting DataThe Future of Encryption
Today, business want to…Reduce costsLeverage existing investmentsRationalise infrastructure / Reduce power consumption ‘Optimise everything’!Increase agilityAccess information on demandSupport new business initiatives quickly & effectivelyManage riskLegal & regulatory / Security and privacyContinuity / resilienceProtect brandBe good corporate citizensGovernance / External obligationsRetain Customer trust and satisfaction
Encryption and Key Management     4043372030755980512726843227940121734585012 7154539691420762 597242857594404736383206 864822559884522781272859586310783041215189039722995842274740595660911438608619370523665877168914807728150100036532892988233489229168412298957399856995916007784076516717934157958922080355531822072807338276962545494762362555017379346840089604010135260723134336771684303126571878448235124194684200289197340444389979954931395248708578295236216355137975564230921803957049782011111357
Why is security important?
New risksExternal annoyances (Spam, virus, Drive by web infections, general Phishing, etc.)Targeted crime (Hackers, Targeted phishing etc.)Third parties inside the firewall breaching securityStaff breaching security by designStaff / Third parties breaching security by accident – Information leakage
Well Protected?
To what degree do you consider these specific risks during business planning?
Has regulatory compliance been a specific driver in the following areas?
Generally speaking, when you add everything up, how is your spending on IT risk related investments such as security and information management changing?
AgendaBusiness Drivers Influencing IT SecurityProtecting DataThe Future of Encryption
Security “culture”
How easy is it to control the potential security risk arising from the proliferation of confidential data across different machines and locations?
How important are the following when considering the need to secure confidential information?
What is holding “Data Security” back?Link to lack of accurate knowledge
Mixed IT infrastructure deployed
Who has “access” to data, especially those with escalated privileges
Who is using each service and who should be?
Encryption. where used, is deployed piecemeal not across all systems
Lack of process to manage solutions
Lack of awareness that solutions are now available for a wide range of challengesThe role of Encryption and Key ManagementToday encryption has been implemented in a piecemeal fashionBit by bitNo central management or strategyKey management left to individuals or groupsEncryption will, ultimately, be rolled out to address all of the highlighted risk areasKey desktops and laptopsStorage arraysMobile DevicesProblems will occurAnd very, very visibly
AgendaBusiness Drivers Influencing IT SecurityProtecting DataThe Future of Encryption
Moving “Data Security” and encryption Forward? Define who is responsible for security

More Related Content

PPTX
what is data security full ppt
PPTX
Aspects of data security
PPTX
Data Security Explained
PPTX
Data security
PPTX
Is6120 data security presentation
DOCX
Data Security
PPTX
Seclore: Information Rights Management
PPTX
In data security
what is data security full ppt
Aspects of data security
Data Security Explained
Data security
Is6120 data security presentation
Data Security
Seclore: Information Rights Management
In data security

What's hot (20)

PDF
Data Security
PDF
Cybersecurity 101 - Auditing Cyber Security
PPTX
Data security
PDF
Personal Data Protection in Indonesia
PPT
apsec 7 Golden Rules Data Leakage Prevention / DLP
PPTX
information security technology
PPTX
Information security group presentation ppt
PPT
Information Security Management. Security solutions copy
PDF
Data Security
PPT
Information Security Management.Introduction
PPT
Information Technology Security A Brief Overview 2001
DOCX
The CIA Triad - Assurance on Information Security
PPT
Information Security
PDF
Bridging the Data Security Gap
PPTX
20100224 Presentation at RGIT Mumbai - Information Security Awareness
PPT
What is IRM? bright talk
PPTX
Data Governance Solutions With Seclore and Stash
PDF
Brochure Imperva Vormetric
PDF
Information Rights Management (IRM)
PDF
Cross border - off-shoring and outsourcing privacy sensitive data
Data Security
Cybersecurity 101 - Auditing Cyber Security
Data security
Personal Data Protection in Indonesia
apsec 7 Golden Rules Data Leakage Prevention / DLP
information security technology
Information security group presentation ppt
Information Security Management. Security solutions copy
Data Security
Information Security Management.Introduction
Information Technology Security A Brief Overview 2001
The CIA Triad - Assurance on Information Security
Information Security
Bridging the Data Security Gap
20100224 Presentation at RGIT Mumbai - Information Security Awareness
What is IRM? bright talk
Data Governance Solutions With Seclore and Stash
Brochure Imperva Vormetric
Information Rights Management (IRM)
Cross border - off-shoring and outsourcing privacy sensitive data
Ad

Viewers also liked (16)

PPTX
Data Security - English
PPTX
Data Privacy and Protection Presentation
PPTX
Data protection ppt
PDF
Big Data Security and Governance
PPTX
12 commandments of defensive driving
PPT
Driver Training
PPT
Data protection act
PPS
Introduction to Data Protection and Information Security
PPTX
Road safety defensive driver`s driving training mannual
PDF
Big Data Security with Hadoop
PPTX
Database security
PDF
Data security and Integrity
PPTX
INFORMATION SECURITY
PPTX
Data security in cloud computing
PPTX
Big data ppt
Data Security - English
Data Privacy and Protection Presentation
Data protection ppt
Big Data Security and Governance
12 commandments of defensive driving
Driver Training
Data protection act
Introduction to Data Protection and Information Security
Road safety defensive driver`s driving training mannual
Big Data Security with Hadoop
Database security
Data security and Integrity
INFORMATION SECURITY
Data security in cloud computing
Big data ppt
Ad

Similar to Data security strategies and drivers (20)

PDF
Encrypt-Everything-eB.pdf
PPTX
Rothke rsa 2013 - deployment strategies for effective encryption
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PPTX
E5 rothke - deployment strategies for effective encryption
PDF
Your're Special (But Not That Special)
PDF
2013 global encryption trends study
PDF
Encrytpion information security last stand
PPTX
WBN_Securing Your IBM i_E_250300003.pptx
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PPT
DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings
PDF
Data_Security_Guide_Everything_You_Need_to_Know.pdf
PPTX
How To Plan Successful Encryption Strategy
PDF
2010 Annual Study: U.S. Enterprise Encryption Trends Report
PPT
Threats And Countermeasures
PDF
Importance of Data Encryptions for Organizations | USCSI®
PDF
The Growing Importance of Data Encryption in IT Security.pdf
PDF
Charting Your Path to Enterprise Key Management
PDF
Encryption: Who, What, When, Where, and Why It's Not a Panacea
PDF
iaetsd Using encryption to increase the security of network storage
PPTX
Encryption in Cyber Security with detailed
Encrypt-Everything-eB.pdf
Rothke rsa 2013 - deployment strategies for effective encryption
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
E5 rothke - deployment strategies for effective encryption
Your're Special (But Not That Special)
2013 global encryption trends study
Encrytpion information security last stand
WBN_Securing Your IBM i_E_250300003.pptx
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
DSS @Arrow_Inspiration_Roadshow_2013_Symantec_Extends_Encryption_Offerings
Data_Security_Guide_Everything_You_Need_to_Know.pdf
How To Plan Successful Encryption Strategy
2010 Annual Study: U.S. Enterprise Encryption Trends Report
Threats And Countermeasures
Importance of Data Encryptions for Organizations | USCSI®
The Growing Importance of Data Encryption in IT Security.pdf
Charting Your Path to Enterprise Key Management
Encryption: Who, What, When, Where, and Why It's Not a Panacea
iaetsd Using encryption to increase the security of network storage
Encryption in Cyber Security with detailed

More from Freeform Dynamics (19)

PPTX
Big data and analytics
PPTX
Big Data in Context
PPTX
The consumerisation of IT (11 oct 2011)
PPTX
A view from above the clouds (14 Oct 2011)
PPT
Bcs consumerisation
PPT
Cloud computing in context
PPT
Cloud Computing/SaaS opportunity
PPT
Enterprise Mobility Strategy
PPTX
Service Management 2009
PPT
Virtualization Licensing Lottery
PPTX
SOA Benefits Revisited
PPT
Optimising The Use Of IT
PPT
Intelligent BI
PPT
Green - The Reader Perspective
PPT
IT's role in enterprise power management
PPT
The Joy Of Bits
PPTX
Recovery Management
PPT
Positioning And Understanding Virtualisation
PPTX
Asset Management
Big data and analytics
Big Data in Context
The consumerisation of IT (11 oct 2011)
A view from above the clouds (14 Oct 2011)
Bcs consumerisation
Cloud computing in context
Cloud Computing/SaaS opportunity
Enterprise Mobility Strategy
Service Management 2009
Virtualization Licensing Lottery
SOA Benefits Revisited
Optimising The Use Of IT
Intelligent BI
Green - The Reader Perspective
IT's role in enterprise power management
The Joy Of Bits
Recovery Management
Positioning And Understanding Virtualisation
Asset Management

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
KodekX | Application Modernization Development
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Electronic commerce courselecture one. Pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
sap open course for s4hana steps from ECC to s4
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KodekX | Application Modernization Development
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Programs and apps: productivity, graphics, security and other tools
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation_ Review paper, used for researhc scholars
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Electronic commerce courselecture one. Pdf
cuic standard and advanced reporting.pdf
Building Integrated photovoltaic BIPV_UPV.pdf

Data security strategies and drivers

  • 1. Data Security Trends and ObservationsTony LockFreeform Dynamics Ltdtony@freeformdynamics.comApril, 2010www.freeformdynamics.com
  • 2. AgendaBusiness Drivers Influencing IT SecurityProtecting DataThe Future of Encryption
  • 3. Today, business want to…Reduce costsLeverage existing investmentsRationalise infrastructure / Reduce power consumption ‘Optimise everything’!Increase agilityAccess information on demandSupport new business initiatives quickly & effectivelyManage riskLegal & regulatory / Security and privacyContinuity / resilienceProtect brandBe good corporate citizensGovernance / External obligationsRetain Customer trust and satisfaction
  • 4. Encryption and Key Management 4043372030755980512726843227940121734585012 7154539691420762 597242857594404736383206 864822559884522781272859586310783041215189039722995842274740595660911438608619370523665877168914807728150100036532892988233489229168412298957399856995916007784076516717934157958922080355531822072807338276962545494762362555017379346840089604010135260723134336771684303126571878448235124194684200289197340444389979954931395248708578295236216355137975564230921803957049782011111357
  • 5. Why is security important?
  • 6. New risksExternal annoyances (Spam, virus, Drive by web infections, general Phishing, etc.)Targeted crime (Hackers, Targeted phishing etc.)Third parties inside the firewall breaching securityStaff breaching security by designStaff / Third parties breaching security by accident – Information leakage
  • 8. To what degree do you consider these specific risks during business planning?
  • 9. Has regulatory compliance been a specific driver in the following areas?
  • 10. Generally speaking, when you add everything up, how is your spending on IT risk related investments such as security and information management changing?
  • 11. AgendaBusiness Drivers Influencing IT SecurityProtecting DataThe Future of Encryption
  • 13. How easy is it to control the potential security risk arising from the proliferation of confidential data across different machines and locations?
  • 14. How important are the following when considering the need to secure confidential information?
  • 15. What is holding “Data Security” back?Link to lack of accurate knowledge
  • 17. Who has “access” to data, especially those with escalated privileges
  • 18. Who is using each service and who should be?
  • 19. Encryption. where used, is deployed piecemeal not across all systems
  • 20. Lack of process to manage solutions
  • 21. Lack of awareness that solutions are now available for a wide range of challengesThe role of Encryption and Key ManagementToday encryption has been implemented in a piecemeal fashionBit by bitNo central management or strategyKey management left to individuals or groupsEncryption will, ultimately, be rolled out to address all of the highlighted risk areasKey desktops and laptopsStorage arraysMobile DevicesProblems will occurAnd very, very visibly
  • 22. AgendaBusiness Drivers Influencing IT SecurityProtecting DataThe Future of Encryption
  • 23. Moving “Data Security” and encryption Forward? Define who is responsible for security
  • 24. How should policy be set?
  • 25. IT, The Businessand Security partners
  • 26. Set how to create / handle security Procedures? 
  • 28. Encryption and key management
  • 29. Make as transparent as possible to users
  • 30. Ensure staff know what is permitted in data security management
  • 31. Until these are addressed, change will be difficult and risks will not be managedProcess, process, processProcessDefine Processes for securityTry to standardise on solutionsMake sure everyone understands security threats and the consequencesMake sure that routines / procedures are in place to manage all aspects of securityEspecially for mobile / home workers.Create a feeling of responsibility for securityTrain / Train / Train / Communicate
  • 32. Overall mix of concerns relating to adoption of latest technologies and working practicesEncryption can help address these issues
  • 33. The Future of EncryptionUse of Encryption will spread, and soon
  • 35. Storage, Desktops, Mobile Devices, Applications
  • 36. Data at Rest, Data in Motion
  • 37. Ultimately encryption will become “expected”
  • 38. The importance of key management will be recognised
  • 39. But not to begin with
  • 40. Education will be required or “incidents will happen”
  • 41. Standards (ISO 7498-2, ISO 17799 etc.) are important
  • 42. But customers will need to move before all standards are finalised and in place.
  • 43. Best practice / experience is valued along with advice on where to start.Where to start with Securing Enterprise Data?Know where data is stored, who is using it and why
  • 44. Storage platforms / Desktops / Applications / Networks
  • 45. Combine asset management / identity / encryption and key management
  • 46. Define roles and responsibilities for data governance
  • 47. Create policies for data management and security
  • 49. And make sure everyone understands and follows them
  • 50. Audit data access and alteration
  • 52. Personal / Device / Service / Application
  • 53. Get good Management Procedures in place, especially for encryption key managementThank You!Any Questions?Tony LockFreeform Dynamics Ltdtony@freeformdynamics.comApril, 2010www.freeformdynamics.com

Editor's Notes

  • #8: RM – this slides covers the same topics as slide 6, should they be together?
  • #13: RM – starting to get statistic overload by this point!
  • #16: RM – this overlaps with slide 16, maybe rephrase the two as one focused on the goal and the other on barriers to deployment
  • #17: RM – I like the first bullet, but it feels like a sweeping statement, are you going to provide more context – seems we have jumped from fairly generic stats to very specific predictions
  • #22: RM – This is an important messaging slide, need to make sure these points get across. The best practices point is important and the fact that experience with early (high security) adopters like banks sets Thales and it’s partners up very well to take crypto to the mainstream. Is it possible to say more about timing and ordering of technology adoption – like storage before application level protection. What about role of standards and other critical success factors?