SlideShare a Scribd company logo
Client name
ELCA for
Date
Data Governance Event –
6th February 2018 – Geneva - Warwick Hôtel
Keep your data safe and be compliant via a 360° approach
Nagib Aouini – Head of Cyber Security / Blockchain
Agenda
― Why data breaches will continue to occur
― What is Data Governance
― How to comply with regulations with an effective data governance
program
― 360° Data Security Approach
― Q&A
5
6
1
2
3
4
1
Data breaches stories
©copyright 2017
–Texte
Story #1
Bad identity management practices
Event Data Governance - Feb 6th - Geneva 4
©copyright 2017
–Texte
Event Data Governance - Feb 6th - Geneva 5
©copyright 2017
–Texte
Event Data Governance - Feb 6th - Geneva 6
https://baffle.io/the-threat/equifax-breach/
Story #1
Failed to implement a WAF
and vulnerability mgt
©copyright 2017
–Texte
Event Data Governance - Feb 6th - Geneva 7
©copyright 2017
How those breaches can happen
Source http://blog.wallix.com/uber-hack-pam
• The data of 57 million users has been stolen from Uber.
• Malicious intruders managed to gain access to a GitHub private coding site used by some Uber software
engineers, find AWS credentials, and use them to steal private data.
Story #2
Failed to implement
Two-Factor and Privileged ID Mgt
Event Data Governance - Feb 6th - Geneva 8
©copyright 2017
–Texte
Event Data Governance - Feb 6th - Geneva 9
©copyright 2017
–Texte
Event Data Governance - Feb 6th - Geneva 10
Story #3
Ransomware attack
©copyright 2017
–Texte
Threats to Healthcare IT systems
Event Data Governance - Feb 6th - Geneva11
– Data stolen from a bank quickly becomes
useless once the breach is discovered and
passcodes are changed
– Data from the healthcare industry, which
includes both personal identities and medical
histories, can live a lifetime
– Healthcare IT and apps use are secured only
with simple username / password with no
password policy enforced
– Managing access control and putting strong
security controls is challenging in healthcare
environment because of “Need to work”
principle (emergency access, doctors needs
access to HER …)
This data can be used to launch
Spear phising scams, Identity theft, social engineering
frauds ---
©copyright 2017
–Texte
Use case study : Protecting a medical information system and electronic health record
Event Data Governance - Feb 6th - Geneva
Problem: privacy and control of data shall be
ensured and data center hosted outside Switzerland
is a serious risk for such information, but also
unauthorized access (because of leaked credential).
?
Challenge: Development of a medical portal accross
Switzerland allowing hospitals, doctors and patients
to access medical information hosted on a CRM or
Web app portal (even fat client via Citrix). This portal
contains patient data that is protected by Swiss law
12
Login credentials are lost or stolen, resulting
in unauthorized access to patient record.
Malicious hackers can target physicians via
spear-phishing attack to get credentials.
©copyright 2017
Mentality must evolved
Event Data Governance - Feb 6th - Geneva 13
3
What is Data Governance
Event Data Governance - Feb 6th - Geneva14
©copyright 2017
–Texte
Data Management Program Drivers
Event Data Governance - Feb 6th - Geneva 15
 Need to share and integrate data with external partners
 Alignment with Business Strategy supporting innovation
 Allow the business to identify opportunities being more agile
 Need to cope with different kinds of business built over time with specific priorities and
different subsidiaries
 Rather independent departments/subsidiaries with own processes
 Part of the tools not shared or used differently
 Tools continuously changing
 Control the risk
 Responsibility of the company towards shareholders, customers an authorities (*)
 Information lifecycle must be very well controlled
 The company must be able to provide consistent and reliable information
*: Example: General Data Protection Regulation (Regulation (EU) 2016/679), FINMA Circular 2008/21 “Operational Risks – Banks“,
EU Regulation 73-2010 Aeronautical Data and Information Quality, Solvency II Directive 2009/138/EC ,
©copyright 2017
–Texte
Data Governance
Event Data Governance - Feb 6th - Geneva 16
Data Governance: decision making and oversight process that prioritizes investments, allocates
resources and measures results to insure that data being managed is leveraged to support
business needs
■ Goals:
1. Enable an organisation to manage its data as an asset
2. To sponsor, track, and oversee the delivery of data management projects and services
3. Define, approve, communicate and implement principles, policies, procedures,
metrics, tools, and responsibilities for data management
4. To manage and resolve data related issues
 Data Governance is more than Data Quality, Policies, Standards.
It is about aligning Data Management with Corporate Needs and Strategy, to
optimize its results and to control risks
©copyright 2017
–Texte
DMBOK Data Management Framework
Event Data Governance - Feb 6th - Geneva 17
• A framework for understanding comprehensively
and see relationships between Data Management
components
• The 11 functions (knowledge areas) depend on
one another and need to be aligned
• Ideas and concepts will be applied differently
based on organization industry, culture, maturity
level, strategy, vision and challenges it is facing
3
How to comply with regulations
Event Data Governance - Feb 6th - Geneva18
©copyright 2017
–Texte
Applicable regulations : GDPR
Event Data Governance - Feb 6th - Geneva 19
Replaces and extends European Directive 95/46/EC from
May 25th 2018
Applies to controllers or processors established in the Union
Applies to controllers or processors not established in the Union
where the processing activities relate to the offering of goods or
services to data subjects in the Union; or the monitoring of their
behaviour as far as their behaviour takes place within the Union.
©copyright 2017
–Texte
GDPR roles and entity
20Event Data Governance - Feb 6th - Geneva
©copyright 2017
–Texte
Applicable regulations Swiss Federal Data Protection Act
Event Data Governance - Feb 6th - Geneva 21
The revised DPA is announced for the end of 2018
Needs to be harmonised with EU standards. The Federal
Council has adopted a DPA revision process in Sept.
2017 and released a draft version of the future DPA
Apply to controllers and processors established in
Switzerland
©copyright 2017
–Texte
Data privacy framework by ELCA
Event Data Governance - Feb 6th - Geneva 22
Governance
Operational processes
Legal & compliance
Data privacy policies Data privacy roles &
responsibilities
Data privacy training
& awareness
External criteria
tracking
Inventory of personal
data & data transfers
Respect of the data
subjects’ rights
Data breach
management
Protection of
Personal data
Monitoring of new
operational practices
Data privacy notices Contractual clausesData Privacy Risk
Assessments
Data privacy by
design and by default
Data privacy audits
©copyright 2017
–Texte
FINMA controls
Event Data Governance - Feb 6th - Geneva 23
#1 Governance
#1 Client Identifying data
CID
#3 Location & Access to
Data
#4 Security standards for
IT & Tech
#5 Selection, monitoring
and training of employee
with access to CID
#5 Identifying and
controlling risks related to
the confidentiality of CID
#7 Confidentiality of CID :
risk mitigation
#8 Incidenty related to
the confidentiality of CID,
internal /external comm
#9 Outsourcing providers
and large projects in
regard to CID
Client Identification
Data (CID)
Event Data Governance - Feb 6th - Geneva24
Direct CID Indirect CID
CID
©copyright 2017
Sharepoint compliant platform with SIQ
Sharepoint Farm
Sharepoint user
SSOAccess management
SecurityIQ
SailPointIIQ
Exchange AD
Admin
Client
Business
Interface
Report
And Audit
Indexing
Services
General UI
Supervisor
SIQ
admin
Auditor
User
SailPointRESTAPI
Event
Handler
SQL SecurityIQ
Cluster
Indexing
Server
SecurityIQ
Agent : Permission + Data
classification + Activity Monitor
SailPoint IQ Service
SharePoint
SailPoint IQ Service
SharePoint
Event Data Governance - Feb 6th - Geneva 25
©copyright 2017
How manage CID data in a Sharepoint and being compliant
#5 Identifying and
controlling risks related to
the confidentiality of CID
#1 Client Identifying data
CID
Need to know principle
CID Discovery and tagging
#3 Location & Access to
Data
Who access what ?
Event Data Governance - Feb 6th - Geneva 26
©copyright 2017
–Texte
What is a CASB ?
Event Data Governance - Feb 6th - Geneva 27
…
Visibility
who is using which app and
which data is stored where
Data Loss Prevention
handle information according
to its specificities (ciphering,
tokenization)
Threat protection
detects malware stored in the
cloud and suspect behaviours
Compliance
ensure compliance with specific
industry regulations
©copyright 2017
How CASB could help for GDPR/FINMA compliance
Event Data Governance - Feb 6th - Geneva 28
Identifying personal data
Controlling the flow of personal data
Maintaining data residency and sovereignty
Monitor Risky Activity
Identify Shadow IT
#4 Security standards for
IT & Tech
Two-factor + Encryption
#7 Confidentiality of CID :
risk mitigation
Encryption + Tokenization
#8 Incidenty related to the
confidentiality of CID,
internal /external comm
Shadow IT + Policy violation
©copyright 2017
Example : Protect patient data in CRM Online
Event Data Governance - Feb 6th - Geneva 29
1 - Physicians save a
new contact
2 – CASB intercept the request
and encrypt field before
leaving the enteprise network
3 – Contact is
encrypted and stored
in CRM online. But
user can still see it in
clear
Cloud ProviderHealthcare
ZRITOI POIUYRW
uiiwoow@Hotmail.com
290900202
290909020
289898992
ZRITOI POIUYRW
Home Maker
Noiowp Poowioiw
OUIOIOp Poisowoow
Switzerland
BORIS GUNTERBERG
BORIS GUNTERBERG
DIANE GUNTERBERG
KLAUS GUNTERBERG
SWITZERLAND
“ZRITOI”
“POIUYRW”
“Female”
“Wiioiopp Ppwoioiosyoo”
“3”
“990909-9090-0020”
Hardware
Security M
odule
2a – Encryption Key stays under your sole control and
managed in Switzerland
©copyright 2017
–Texte
SAML / RADIUS
Perimeter Web Application Firewall LDAP / DB / Active Directory
Proxy request
ELCARD / CloudTRUST
appliance
Protecting Healthcare IT systems with ELCARD / CloudTrust
Event Data Governance - Feb 6th - Geneva
SAML 2 SSO / Trust
30
#4 Security standards for
IT & Tech
Two-factor + Encryption
2
360° Data Security Approach
―Identify sensitive, valuable or regulated
data (CID). Provide a mean to
authenticate user based on claims.
―Segregate data to avoid spills
―Authorize access based on data
classification and user or device via
claims
―Protect critical data automatically with
right management and powerful access
control model (like ABAC)
―Audit data activity for full visibility
32
Identify
Segregate
Authorize
Protect
Audit
360° approach
©copyright 2017
–Texte
Discover your sensitive Data
Event Data Governance - Feb 6th - Geneva 33
©copyright 2017
–Texte
Data classification
34
©copyright 2017
–Texte
Onion approach for data security
Protect Data
Detect Data Breach
Track Data Usage
Discover Data
Sensitive
Data
Block data access / encrypt /
mask data
Detect data breach or
accidental data breach/use
Track data export / move of
sensitive data
Discover / classify your
sensitive data
35
©copyright 2017
Data lifecycle and cloud challenge
Event Data Governance - Feb 6th - Geneva
• Generation : trust data ?
• Collection : Which data ?
• Storage : where ?
• Usage : who use it ?
• Sharing : Is it allowed
• Archive : How long ?
• Removal : Definitive ?
36
©copyright 2017
Where is my data ?
Event Data Governance - Feb 6th - Geneva 37
Not stored here
©copyright 2017
–Texte
Always Protected
38
Data
in
Use
Data in
Motion
Data
at
Rest
Source : Microsoft
 Database Encryption
 Credential Encryption
 HSM Key Vaulting
 Anonymization / Tokenization /
Obfuscation
 Network / Server control
 Physical Media Control
 Archive / Destruction
• Privileged Access Management
• Privileged Account
Monitoring
• Workstation Hardening
• Application Access Control
• Data
classification/labelling/tagging
• Removal/media control
• Export control
• Perimeter Security – WAF
• Network traffic
monitoring/blocking L3-L 7 – WAF
• Web application Firewall – L7
• Data collection and classification
• Remote Access
©copyright 2017
–Texte
Classification with SailPoint SecurityIQ
39
©copyright 2017
–Texte
Example with Azure SQL Data classification
40
©copyright 2017
–Texte
Protect your sensitive Data
Event Data Governance - Feb 6th - Geneva 41
©copyright 2017
–Texte
Securing data is challenging
Event Data Governance - Feb 6th - Geneva 42
Business
Partners
Outsourcers
Layer 1: The Back Office
Layer 2:The Front Office
Layer 3: External Extended Enterprise
PDA’s
Mobile Media
Data
Processors
Desktops Laptops
On site
Contractors
Independent
Agents
3rd Party
Analytics
Log Files
Teleworkers
HR/Employee
Reports and
Extracts
3rd Party
Services
Outsourced
Backup
On site
Auditors
FTP
SAN/Shares
CustomersEmail
Portals
Files
Office
Data
Databases
CRM
Billing
Business
Systems
Trading
MortgageWarehouse
Treasury
Applications
Backup
DR
&
Test
©copyright 2017
–Texte
Tokenization
Event Data Governance - Feb 6th - Geneva 43
Tokenization
TokenOriginal Data
Personally identifiable
information
Token Management Data Token
Mr ID | IV | Timestamp | Index
etc
Xe
John Doe ID | IV | Timestamp | Index
etc
JPOwui Oisiypz
01/02/78 ID | IV | Timestamp | Index
etc
24/02/99
 Tokenization Replace live data after capture, after a database lookup
 Encryption still needed for initial data capture & to live data in “Vault”
 Encryption and Tokenization can be used together
 Performance of Token Lookup needs to be considered
Mr John Doe
01/02/78
Xe JPOwui Oisiypz
24/02/99
©copyright 2017
–Texte
Audit access to your sensitive Data
Event Data Governance - Feb 6th - Geneva 44
©copyright 2017
–Texte
All consolidated Logs
Event Data Governance - Feb 6th - Geneva 45
Source : Microsoft
Detect Security Breaches by identiying anormal
user behavior and usage patterns.
Collect near-real time user and devices information
by applying geo-patterns
Present dashboard with Risk and alert with policy
violation to enable pattern detection
©copyright 2017
–Texte
Don’t ask your CISO to protect against
data breach but rather ask him to
prepare to react to a data breach46

More Related Content

PDF
Secure custody of digital assets - IDC Security conference
PDF
SPUnite17 Microsoft Cloud Deutschland
PDF
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
PPTX
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
PDF
MMV Webinar 2. GDPR Insights. January 2018
PPTX
Cross domain autonomous cooperation cross-domain autonomous cooperation
PDF
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
PDF
Block chain health record
Secure custody of digital assets - IDC Security conference
SPUnite17 Microsoft Cloud Deutschland
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
MMV Webinar 2. GDPR Insights. January 2018
Cross domain autonomous cooperation cross-domain autonomous cooperation
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
Block chain health record

What's hot (20)

PPTX
Cisco on Distributed Ledgers & Blockchain
PPTX
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
PDF
Block Chain Record Management
PDF
Protective Monitoring
PDF
Future Blockchain Applications and Solutions
PPTX
Globally Scalable Mobile Digital ID using IEEE P1451.99
PDF
Barcelona presentationv6
PPTX
Privacy for IoT with XMPP
PDF
Digital Asset Management Ltd - Madrid Presentation - Club Financiero
PPTX
GDPR Part 1: Quick Facts
PDF
Worry free security breach - Gemalto
PPTX
The future of data security and blockchain
PDF
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
PDF
CSPA Keynote: BLOCKCHAIN for Enterprise
PDF
IBM - Blockchain Explained - Introduction for Business
PDF
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
PDF
HDI - Blockchain White Paper
PPTX
Cannabis Technology
PPTX
Xanadu Based Blockchain Integration System Development
PDF
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Cisco on Distributed Ledgers & Blockchain
IEEE Standards Impact in IoT and 5G, Day 1, Session 1 - Introduction & Overview
Block Chain Record Management
Protective Monitoring
Future Blockchain Applications and Solutions
Globally Scalable Mobile Digital ID using IEEE P1451.99
Barcelona presentationv6
Privacy for IoT with XMPP
Digital Asset Management Ltd - Madrid Presentation - Club Financiero
GDPR Part 1: Quick Facts
Worry free security breach - Gemalto
The future of data security and blockchain
Supply Chain Management on the blockchain with Iot, Azure, BigchainDB, VueJS
CSPA Keynote: BLOCKCHAIN for Enterprise
IBM - Blockchain Explained - Introduction for Business
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
HDI - Blockchain White Paper
Cannabis Technology
Xanadu Based Blockchain Integration System Development
Blockchain Defined Perimeter (BDP) - Maximum cybersecurity for critical syste...
Ad

Similar to Keep your data safe and be compliant via a 360° approach (20)

PDF
CWIN17 New-York / earning the currency of trust
PPTX
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
PPTX
WSDFSDFDFSDFSDFSDFDSFSDGGGGSGASGDDGGDGDSGSG
PPTX
Gdpr action plan - ISSA
PPTX
The GDPR and its requirements for implementing data protection impact assessm...
PPTX
BigID GDPR Compliance Automation Webinar Slides
PDF
Big Data LDN 2017: Applied AI for GDPR
PPTX
PAP_Clico_160617_security operation center
PDF
Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü
PDF
Data- and database security & GDPR: end-to-end offer
PDF
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
PDF
eu-market-access-gdpr-fundamentals-by-risk-associates
PPTX
GDPR: the IBM journey to compliance
PDF
Good Practices and Recommendations on the Security and Resilience of Big Data...
PPTX
Security best ways to protect your intellectual capital
PDF
Appointing a Data Protection Officer under the GDPR
PPTX
EMS GDPR Generic_Overview Deck_June 2017.pptx
PDF
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
PPTX
GDPR How to get started?
PDF
SFScon19 - Giuliana Viviano - Big Data e Data Analytics
CWIN17 New-York / earning the currency of trust
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
WSDFSDFDFSDFSDFSDFDSFSDGGGGSGASGDDGGDGDSGSG
Gdpr action plan - ISSA
The GDPR and its requirements for implementing data protection impact assessm...
BigID GDPR Compliance Automation Webinar Slides
Big Data LDN 2017: Applied AI for GDPR
PAP_Clico_160617_security operation center
Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü
Data- and database security & GDPR: end-to-end offer
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
eu-market-access-gdpr-fundamentals-by-risk-associates
GDPR: the IBM journey to compliance
Good Practices and Recommendations on the Security and Resilience of Big Data...
Security best ways to protect your intellectual capital
Appointing a Data Protection Officer under the GDPR
EMS GDPR Generic_Overview Deck_June 2017.pptx
Sharp Cookie Advisors legal_botar_ai_dataskydd_gdpr
GDPR How to get started?
SFScon19 - Giuliana Viviano - Big Data e Data Analytics
Ad

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
A Presentation on Artificial Intelligence
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Empathic Computing: Creating Shared Understanding
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
A Presentation on Artificial Intelligence
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Empathic Computing: Creating Shared Understanding
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Diabetes mellitus diagnosis method based random forest with bat algorithm
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Approach and Philosophy of On baking technology
NewMind AI Monthly Chronicles - July 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Per capita expenditure prediction using model stacking based on satellite ima...

Keep your data safe and be compliant via a 360° approach

  • 1. Client name ELCA for Date Data Governance Event – 6th February 2018 – Geneva - Warwick Hôtel Keep your data safe and be compliant via a 360° approach Nagib Aouini – Head of Cyber Security / Blockchain
  • 2. Agenda ― Why data breaches will continue to occur ― What is Data Governance ― How to comply with regulations with an effective data governance program ― 360° Data Security Approach ― Q&A 5 6 1 2 3 4
  • 4. ©copyright 2017 –Texte Story #1 Bad identity management practices Event Data Governance - Feb 6th - Geneva 4
  • 5. ©copyright 2017 –Texte Event Data Governance - Feb 6th - Geneva 5
  • 6. ©copyright 2017 –Texte Event Data Governance - Feb 6th - Geneva 6 https://baffle.io/the-threat/equifax-breach/ Story #1 Failed to implement a WAF and vulnerability mgt
  • 7. ©copyright 2017 –Texte Event Data Governance - Feb 6th - Geneva 7
  • 8. ©copyright 2017 How those breaches can happen Source http://blog.wallix.com/uber-hack-pam • The data of 57 million users has been stolen from Uber. • Malicious intruders managed to gain access to a GitHub private coding site used by some Uber software engineers, find AWS credentials, and use them to steal private data. Story #2 Failed to implement Two-Factor and Privileged ID Mgt Event Data Governance - Feb 6th - Geneva 8
  • 9. ©copyright 2017 –Texte Event Data Governance - Feb 6th - Geneva 9
  • 10. ©copyright 2017 –Texte Event Data Governance - Feb 6th - Geneva 10 Story #3 Ransomware attack
  • 11. ©copyright 2017 –Texte Threats to Healthcare IT systems Event Data Governance - Feb 6th - Geneva11 – Data stolen from a bank quickly becomes useless once the breach is discovered and passcodes are changed – Data from the healthcare industry, which includes both personal identities and medical histories, can live a lifetime – Healthcare IT and apps use are secured only with simple username / password with no password policy enforced – Managing access control and putting strong security controls is challenging in healthcare environment because of “Need to work” principle (emergency access, doctors needs access to HER …) This data can be used to launch Spear phising scams, Identity theft, social engineering frauds ---
  • 12. ©copyright 2017 –Texte Use case study : Protecting a medical information system and electronic health record Event Data Governance - Feb 6th - Geneva Problem: privacy and control of data shall be ensured and data center hosted outside Switzerland is a serious risk for such information, but also unauthorized access (because of leaked credential). ? Challenge: Development of a medical portal accross Switzerland allowing hospitals, doctors and patients to access medical information hosted on a CRM or Web app portal (even fat client via Citrix). This portal contains patient data that is protected by Swiss law 12 Login credentials are lost or stolen, resulting in unauthorized access to patient record. Malicious hackers can target physicians via spear-phishing attack to get credentials.
  • 13. ©copyright 2017 Mentality must evolved Event Data Governance - Feb 6th - Geneva 13
  • 14. 3 What is Data Governance Event Data Governance - Feb 6th - Geneva14
  • 15. ©copyright 2017 –Texte Data Management Program Drivers Event Data Governance - Feb 6th - Geneva 15  Need to share and integrate data with external partners  Alignment with Business Strategy supporting innovation  Allow the business to identify opportunities being more agile  Need to cope with different kinds of business built over time with specific priorities and different subsidiaries  Rather independent departments/subsidiaries with own processes  Part of the tools not shared or used differently  Tools continuously changing  Control the risk  Responsibility of the company towards shareholders, customers an authorities (*)  Information lifecycle must be very well controlled  The company must be able to provide consistent and reliable information *: Example: General Data Protection Regulation (Regulation (EU) 2016/679), FINMA Circular 2008/21 “Operational Risks – Banks“, EU Regulation 73-2010 Aeronautical Data and Information Quality, Solvency II Directive 2009/138/EC ,
  • 16. ©copyright 2017 –Texte Data Governance Event Data Governance - Feb 6th - Geneva 16 Data Governance: decision making and oversight process that prioritizes investments, allocates resources and measures results to insure that data being managed is leveraged to support business needs ■ Goals: 1. Enable an organisation to manage its data as an asset 2. To sponsor, track, and oversee the delivery of data management projects and services 3. Define, approve, communicate and implement principles, policies, procedures, metrics, tools, and responsibilities for data management 4. To manage and resolve data related issues  Data Governance is more than Data Quality, Policies, Standards. It is about aligning Data Management with Corporate Needs and Strategy, to optimize its results and to control risks
  • 17. ©copyright 2017 –Texte DMBOK Data Management Framework Event Data Governance - Feb 6th - Geneva 17 • A framework for understanding comprehensively and see relationships between Data Management components • The 11 functions (knowledge areas) depend on one another and need to be aligned • Ideas and concepts will be applied differently based on organization industry, culture, maturity level, strategy, vision and challenges it is facing
  • 18. 3 How to comply with regulations Event Data Governance - Feb 6th - Geneva18
  • 19. ©copyright 2017 –Texte Applicable regulations : GDPR Event Data Governance - Feb 6th - Geneva 19 Replaces and extends European Directive 95/46/EC from May 25th 2018 Applies to controllers or processors established in the Union Applies to controllers or processors not established in the Union where the processing activities relate to the offering of goods or services to data subjects in the Union; or the monitoring of their behaviour as far as their behaviour takes place within the Union.
  • 20. ©copyright 2017 –Texte GDPR roles and entity 20Event Data Governance - Feb 6th - Geneva
  • 21. ©copyright 2017 –Texte Applicable regulations Swiss Federal Data Protection Act Event Data Governance - Feb 6th - Geneva 21 The revised DPA is announced for the end of 2018 Needs to be harmonised with EU standards. The Federal Council has adopted a DPA revision process in Sept. 2017 and released a draft version of the future DPA Apply to controllers and processors established in Switzerland
  • 22. ©copyright 2017 –Texte Data privacy framework by ELCA Event Data Governance - Feb 6th - Geneva 22 Governance Operational processes Legal & compliance Data privacy policies Data privacy roles & responsibilities Data privacy training & awareness External criteria tracking Inventory of personal data & data transfers Respect of the data subjects’ rights Data breach management Protection of Personal data Monitoring of new operational practices Data privacy notices Contractual clausesData Privacy Risk Assessments Data privacy by design and by default Data privacy audits
  • 23. ©copyright 2017 –Texte FINMA controls Event Data Governance - Feb 6th - Geneva 23 #1 Governance #1 Client Identifying data CID #3 Location & Access to Data #4 Security standards for IT & Tech #5 Selection, monitoring and training of employee with access to CID #5 Identifying and controlling risks related to the confidentiality of CID #7 Confidentiality of CID : risk mitigation #8 Incidenty related to the confidentiality of CID, internal /external comm #9 Outsourcing providers and large projects in regard to CID
  • 24. Client Identification Data (CID) Event Data Governance - Feb 6th - Geneva24 Direct CID Indirect CID CID
  • 25. ©copyright 2017 Sharepoint compliant platform with SIQ Sharepoint Farm Sharepoint user SSOAccess management SecurityIQ SailPointIIQ Exchange AD Admin Client Business Interface Report And Audit Indexing Services General UI Supervisor SIQ admin Auditor User SailPointRESTAPI Event Handler SQL SecurityIQ Cluster Indexing Server SecurityIQ Agent : Permission + Data classification + Activity Monitor SailPoint IQ Service SharePoint SailPoint IQ Service SharePoint Event Data Governance - Feb 6th - Geneva 25
  • 26. ©copyright 2017 How manage CID data in a Sharepoint and being compliant #5 Identifying and controlling risks related to the confidentiality of CID #1 Client Identifying data CID Need to know principle CID Discovery and tagging #3 Location & Access to Data Who access what ? Event Data Governance - Feb 6th - Geneva 26
  • 27. ©copyright 2017 –Texte What is a CASB ? Event Data Governance - Feb 6th - Geneva 27 … Visibility who is using which app and which data is stored where Data Loss Prevention handle information according to its specificities (ciphering, tokenization) Threat protection detects malware stored in the cloud and suspect behaviours Compliance ensure compliance with specific industry regulations
  • 28. ©copyright 2017 How CASB could help for GDPR/FINMA compliance Event Data Governance - Feb 6th - Geneva 28 Identifying personal data Controlling the flow of personal data Maintaining data residency and sovereignty Monitor Risky Activity Identify Shadow IT #4 Security standards for IT & Tech Two-factor + Encryption #7 Confidentiality of CID : risk mitigation Encryption + Tokenization #8 Incidenty related to the confidentiality of CID, internal /external comm Shadow IT + Policy violation
  • 29. ©copyright 2017 Example : Protect patient data in CRM Online Event Data Governance - Feb 6th - Geneva 29 1 - Physicians save a new contact 2 – CASB intercept the request and encrypt field before leaving the enteprise network 3 – Contact is encrypted and stored in CRM online. But user can still see it in clear Cloud ProviderHealthcare ZRITOI POIUYRW uiiwoow@Hotmail.com 290900202 290909020 289898992 ZRITOI POIUYRW Home Maker Noiowp Poowioiw OUIOIOp Poisowoow Switzerland BORIS GUNTERBERG BORIS GUNTERBERG DIANE GUNTERBERG KLAUS GUNTERBERG SWITZERLAND “ZRITOI” “POIUYRW” “Female” “Wiioiopp Ppwoioiosyoo” “3” “990909-9090-0020” Hardware Security M odule 2a – Encryption Key stays under your sole control and managed in Switzerland
  • 30. ©copyright 2017 –Texte SAML / RADIUS Perimeter Web Application Firewall LDAP / DB / Active Directory Proxy request ELCARD / CloudTRUST appliance Protecting Healthcare IT systems with ELCARD / CloudTrust Event Data Governance - Feb 6th - Geneva SAML 2 SSO / Trust 30 #4 Security standards for IT & Tech Two-factor + Encryption
  • 32. ―Identify sensitive, valuable or regulated data (CID). Provide a mean to authenticate user based on claims. ―Segregate data to avoid spills ―Authorize access based on data classification and user or device via claims ―Protect critical data automatically with right management and powerful access control model (like ABAC) ―Audit data activity for full visibility 32 Identify Segregate Authorize Protect Audit 360° approach
  • 33. ©copyright 2017 –Texte Discover your sensitive Data Event Data Governance - Feb 6th - Geneva 33
  • 35. ©copyright 2017 –Texte Onion approach for data security Protect Data Detect Data Breach Track Data Usage Discover Data Sensitive Data Block data access / encrypt / mask data Detect data breach or accidental data breach/use Track data export / move of sensitive data Discover / classify your sensitive data 35
  • 36. ©copyright 2017 Data lifecycle and cloud challenge Event Data Governance - Feb 6th - Geneva • Generation : trust data ? • Collection : Which data ? • Storage : where ? • Usage : who use it ? • Sharing : Is it allowed • Archive : How long ? • Removal : Definitive ? 36
  • 37. ©copyright 2017 Where is my data ? Event Data Governance - Feb 6th - Geneva 37 Not stored here
  • 38. ©copyright 2017 –Texte Always Protected 38 Data in Use Data in Motion Data at Rest Source : Microsoft  Database Encryption  Credential Encryption  HSM Key Vaulting  Anonymization / Tokenization / Obfuscation  Network / Server control  Physical Media Control  Archive / Destruction • Privileged Access Management • Privileged Account Monitoring • Workstation Hardening • Application Access Control • Data classification/labelling/tagging • Removal/media control • Export control • Perimeter Security – WAF • Network traffic monitoring/blocking L3-L 7 – WAF • Web application Firewall – L7 • Data collection and classification • Remote Access
  • 40. ©copyright 2017 –Texte Example with Azure SQL Data classification 40
  • 41. ©copyright 2017 –Texte Protect your sensitive Data Event Data Governance - Feb 6th - Geneva 41
  • 42. ©copyright 2017 –Texte Securing data is challenging Event Data Governance - Feb 6th - Geneva 42 Business Partners Outsourcers Layer 1: The Back Office Layer 2:The Front Office Layer 3: External Extended Enterprise PDA’s Mobile Media Data Processors Desktops Laptops On site Contractors Independent Agents 3rd Party Analytics Log Files Teleworkers HR/Employee Reports and Extracts 3rd Party Services Outsourced Backup On site Auditors FTP SAN/Shares CustomersEmail Portals Files Office Data Databases CRM Billing Business Systems Trading MortgageWarehouse Treasury Applications Backup DR & Test
  • 43. ©copyright 2017 –Texte Tokenization Event Data Governance - Feb 6th - Geneva 43 Tokenization TokenOriginal Data Personally identifiable information Token Management Data Token Mr ID | IV | Timestamp | Index etc Xe John Doe ID | IV | Timestamp | Index etc JPOwui Oisiypz 01/02/78 ID | IV | Timestamp | Index etc 24/02/99  Tokenization Replace live data after capture, after a database lookup  Encryption still needed for initial data capture & to live data in “Vault”  Encryption and Tokenization can be used together  Performance of Token Lookup needs to be considered Mr John Doe 01/02/78 Xe JPOwui Oisiypz 24/02/99
  • 44. ©copyright 2017 –Texte Audit access to your sensitive Data Event Data Governance - Feb 6th - Geneva 44
  • 45. ©copyright 2017 –Texte All consolidated Logs Event Data Governance - Feb 6th - Geneva 45 Source : Microsoft Detect Security Breaches by identiying anormal user behavior and usage patterns. Collect near-real time user and devices information by applying geo-patterns Present dashboard with Risk and alert with policy violation to enable pattern detection
  • 46. ©copyright 2017 –Texte Don’t ask your CISO to protect against data breach but rather ask him to prepare to react to a data breach46

Editor's Notes

  • #17: Oversight = supervision / that data being managed is leveraged to support business needs = les données sont utilisées pour supporter les besoins metier) / Enable = permettre
  • #18: Keep track of = suivre