SlideShare a Scribd company logo
InfoSec
Innovations
The Hidden
enemy within
DAN HOUSER CISSP-ISSAP CISA CISM
SECURITY STRATEGY & ARCHITECTURE LEAD
INFOSEC INNOVATIONS
IANAL
© 2018 - InfoSec Innovations LLC, Trogdor Heavy Industries LLC
InfoSec
Innovations
About me
 Information Security Practitioner in Ohio since 2000
 Focus on Identity, Privacy, Crypto, Architecture & Supply Chain
 Practice Lead, Security Strategy & Architecture, InfoSec Innovations
 Fortune 500 Banking, Finance, Insurance, Retail, Healthcare, Logistics
+ Higher Ed, NGO
 Board of Directors, (ISC)² for 6 years
InfoSec
Innovations
Obligatory iceberg slide
Visible
________________
Hidden
InfoSec
Innovations
With your forgiveness…
To frame our discussion,
several slides of things you likely
already know.
Mea culpa
InfoSec
Innovations
Hidden
dangers
Gaps In Knowledge
 Endpoints & Network
CIS Top 20 1 & 2 – Hardware & Software Inventory
 Insular IT
 CIO mission in conflict with CISO’s
 Unsupported / unpatched software
 IoT, Shadow IT & Cloud
 Digital Certificates
 Distance – Field offices, stores, pharmacies
 Hidden Vulnerabilities
 Insider Threat
 Information Explosion Eclipsing Data Management
 Unstructured Data Risks Exceed ROI
InfoSec
Innovations
Knowledge of self:
Not a new concept
“If you know the enemy and know
yourself, you need not fear the result of a
hundred battles…
If you know neither the enemy nor
yourself, you will succumb in every
battle.”
― Sun Tzu, The Art of War
InfoSec
Innovations
Knowledge of self
You can’t manage what you can’t measure.
- Peter Drucker
You cannot manage what you do not know.
- Anon
InfoSec
Innovations
Data Explosion
Corporate Data Doubles Every 18 Months -IDC
Data Growth is the Largest Datacenter Challenge –
Gartner
The Buildout of the Internet of Things will cause a doubling
of human information every 12 hours. - IBM
Entering the era of the digital industrial economy – Peter
Sondergaard
InfoSec
Innovations
Unstructured Data
Source: The Human Element– Creative Commons
eMail
Memos & Documents
Spreadsheets
Images, Videos & Sounds
Presentations
Generated by every employee
Contains Intellectual Property
Business Records [IANAL]
Images courtesy Microsoft by Unknown Author, licensed under CC BY-SA
InfoSec
Innovations
Unstructured
Data
 Difficult to Classify &
Manage
 Difficult to Govern
 No set structure
 What is in your unstructured
data repository?
 Trash or Treasure?
Source: BigRedCloud – Creative Commons
InfoSec
Innovations
Information explosion
 Data without ability to analyze
is data without forseeable value
 All the risk & cost
 Likely zero benefit
 AI / Big Data/ Machine
Learning… Will it close the gap?
InfoSec
Innovations
Unstructured data risk & data value
Time Bomb Intellectual Property
Waste
Corporate
Execution
Value
High Risk
Low Risk
Risk
¢ $$$$
InfoSec
Innovations
DATA DUPLICATION
A Parable
Widget-tech enters market to
manage healthcare data
Determines ROI, Determines Risk
Launches business
Gathers & Manages Data
RISK
REWARD
InfoSec
Innovations
DATA DUPLICATION
A Structured data
Parable
PHI REVENUE
InfoSec
Innovations
Janet sees a new market opportunity
By enriching the data, more reward!
PHI REVENUE
PHI
REVENUE
DATA DUPLICATION
A STRUCTURED DATA PARABLE
InfoSec
Innovations
Gary sees even more opportunity!
By enriching the data, more reward!
PHI REVENUE
PHI
REVENUE
PHI
REVENUE
DATA DUPLICATION
A STRUCTURED
DATA PARABLE
InfoSec
Innovations
DATA DUPLICATION
Sure more revenue, but at what risk?
InfoSec
Innovations
PHI
DATA DUPLICATION
AN UNSTRUCTURED DATA RESULT
InfoSec
Innovations
PHI
DATA DUPLICATION
AN UNSTRUCTURED DATA RESULT
PHI
InfoSec
Innovations
PHI
DATA DUPLICATION
AN UNSTRUCTURED DATA RESULT
PHI
PHI
InfoSec
Innovations
Database extracts reused many times, giving excess PII downstream
Database  spreadsheet  database  spreadsheet  report
Single source  53 extracts  hundreds of further extracts
Local & snapshot databases used instead of authoritative references
Data sync & freshness errors
Results:
 Risk
 Upset customers
 Bad Decisions
 $$$$
DATA DUPLICATION ASSESSMENT
InfoSec
Innovations
Data Knowledge
 Where is the Data?
 Who has access to it?
 How is the business using it?
 What is Important? Private?
Sensitive? Public?
 What makes it important /
private / sensitive?
 What has integrity? What is stale?
 Who is accessing it the most?
Least?
 What is the value of the data?
 What is the governing data retention
policy?
 Is the data storage in compliance with data
retention policy?
 Is it authoritatively sourced?
 Is it a system of reference? System of
record?
 How are conflicts resolved?
 How is it governed?
 Is the cost and risk of the data worth more
than the value of the data?
Do we know where all our Intellectual Property is,
and are we protecting it?
InfoSec
Innovations
GDPR Bringing Focus
 Six Principles of GDPR
 Lawfulness, fairness and transparency
 Purpose limitations
 Data minimization
 Accuracy
 Storage limitations
 Integrity and confidentiality
InfoSec
Innovations
Chasing the same data dragon
 2002: Where are all the places we’re displaying SSN?
 2003: Where is all our financial reporting data for SOX?
 2004: Do we have EU privacy data? Where is it? Is it protected?
 2008: Where is all our payment card information?
 2009: How are we protecting our payment card information? (Repeat annually)
 2010: Do we have HIPAA data? Where? Is it protected?
 2011: What do you mean a breach grabbed account data? Where? What?
 2012: Wait, we have to protect Employee ID just like SSN? OMG that’s everywhere!
 2013: Is all our payment card data encrypted?
 2014: Shoot, what do you mean we have mag stripe data? Tokenize it!
 2015: Wait, we found more healthcare data?
 2016: Our 3rd
party was breached? What data are we sending to third parties?!?
 2017: GDPR is coming, what!? 4% of revenue!?!? Find the EU data!
 How many times are we going to go through the same process,
looking for specific types of data, before we start creating a
generalized practice for data mapping and governance?
InfoSec
Innovations
Knowledge of self
& Data Breach
You cannot manage
what you do not know
You cannot lose
what you do not have
InfoSec
Innovations
Gaining control of the hidden data
• Scan for privacy data and intellectual property
• Map & classify the data
• Normalize metadata
• Gain insights to data storage, use, data flows & provenance
• Legal & Privacy evaluation
Insights
• Evaluate storage compliance & access controls
• Live the retention & privacy policy
• Enact information classification
• Tokenize, redact, delete, encrypt
• Migrate data from unsafe zones and into safe harbor
Protect
InfoSec
Innovations
Gaining control of the hidden data
• Engage data owners and data guardians with data
insights & classification
• Establish processes for data governance
• Attestation & validation by data owners
• Establish KPIs
Operate
• Reporting
• Periodic Re-scan
• Event Monitoring
• Feedback loop to drive process improvements
Govern
InfoSec
Innovations
Getting started
 There is no magic bullet, it’s hard work.
 Knowledge of self always pays, ask the hard questions to find the
hidden risks in your network, apps, data flows, processes, facilities
 Create a plan & roadmap
 Where are we? Knowledge of Self
 Where are we going? Vision
 How are we going to get there? Roadmap & series of
projects
 How do we define success so we will know we’ve arrived? KPIs
 Find and map data flows, determine how data moves
 Scan for private data in unstructured sources and rogue databases
 Create tactical data protection methods & capabilities
InfoSec
Innovations
Questions?
Contact info:
Dan.houser@gmail.com
@SecWonk
© 2017 InfoSec Innovations LLC

More Related Content

PDF
Classification-HowToBoostInformationProtection
PDF
Data Security in the Insurance Industry: what you need to know about data pro...
PDF
Data theft in india (K K Mookhey)
PDF
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
PPT
Information security management v2010
PDF
Better to Ask Permission? Best Practices for Privacy and Security
PDF
Understanding the Data You Have Before Applying a Governance Strategy
Classification-HowToBoostInformationProtection
Data Security in the Insurance Industry: what you need to know about data pro...
Data theft in india (K K Mookhey)
Trusted Data Ecosystems(信頼できるデータエコシステム):アイデンティティに価値を見出す
Information security management v2010
Better to Ask Permission? Best Practices for Privacy and Security
Understanding the Data You Have Before Applying a Governance Strategy

Similar to The Hidden Enemy Within - Why Ungoverned Data is Such a Big Problem (20)

PPTX
Running with Scissors: Balance between business and InfoSec needs
PPTX
Transform Banking with Big Data and Automated Machine Learning 9.12.17
PDF
Cybersecurity Threats - NI Business Continuity Forum
PPT
Main Menu
PPT
Cobit 2
PDF
Big Data LDN 2017: Applied AI for GDPR
PDF
Dataguise hortonworks insurance_feb25
PDF
Safeguarding Sensitive Data with Encryption
PDF
Data compliance - get it right the first time (Full color PDF)
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PDF
Information Security for Small Business
PDF
Information Security for Small Business
PDF
IS and the Innovator's Dilemma DCass_Final
PPTX
Information security for small business
PPTX
Aligning Application Security to Compliance
PPTX
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
PPTX
BREACHED: Data Centric Security for SAP
PPTX
Cloud Storage and Security: Solving Compliance Challenges
PDF
Basic of Information Security
Running with Scissors: Balance between business and InfoSec needs
Transform Banking with Big Data and Automated Machine Learning 9.12.17
Cybersecurity Threats - NI Business Continuity Forum
Main Menu
Cobit 2
Big Data LDN 2017: Applied AI for GDPR
Dataguise hortonworks insurance_feb25
Safeguarding Sensitive Data with Encryption
Data compliance - get it right the first time (Full color PDF)
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Information Security for Small Business
Information Security for Small Business
IS and the Innovator's Dilemma DCass_Final
Information security for small business
Aligning Application Security to Compliance
FS-ISAC APAC Summit 2017 Singapore - Of Crown Jewels and Data Assets
BREACHED: Data Centric Security for SAP
Cloud Storage and Security: Solving Compliance Challenges
Basic of Information Security
Ad

More from Dan Houser (20)

PPT
MFA, 42 & Compliance - Answers to the Wrong Questions
PPTX
Protect passwords - User Awareness Training
PPTX
Cryptography Overview Presentation circa 2005
PPTX
RSA2003: Forget Firewalls - early Zero Trust
PPTX
Digital Deception: Raising the Stakes on Hackers
PPT
RSA2008: Sins of our Fathers, for which we still are punished
PPTX
Now More than Ever: Ethics in Cybersecurity
PPT
RSA 2005 H&T: Die Script Kiddie! Die, Die, Die!
PPTX
Crypto in the Real World - ISACA 10-Jan-2008
PPT
Power Up your LinkedIn Profile, Effectively Highlight your Branc
PPTX
My Baby Done Bad Crypto - My Sweet Baby Done Me Wrong
PPTX
The Death of Best-of-Breed - Leveraging Cloud for Security Transformation
PPTX
2024 Security Outlook & Essential Security Practices
PPTX
Hacking and Armoring Identity Ecosystems: When MFA Isn't Good Enough Any Longer
PPTX
Driving Change and Resilience: Aligning Cybersecurity with Organizational St...
ODP
2013 (ISC)² Congress: This Curious Thing Called Ethics
PPTX
Securing Big Data and the Grid
PPT
RSA2008: What Vendors Won’t Tell You About Federated Identity
PPT
The Challenges & Risks of New Technology: Privacy Law & Policy
PPT
Perimeter Defense in a World Without Walls
MFA, 42 & Compliance - Answers to the Wrong Questions
Protect passwords - User Awareness Training
Cryptography Overview Presentation circa 2005
RSA2003: Forget Firewalls - early Zero Trust
Digital Deception: Raising the Stakes on Hackers
RSA2008: Sins of our Fathers, for which we still are punished
Now More than Ever: Ethics in Cybersecurity
RSA 2005 H&T: Die Script Kiddie! Die, Die, Die!
Crypto in the Real World - ISACA 10-Jan-2008
Power Up your LinkedIn Profile, Effectively Highlight your Branc
My Baby Done Bad Crypto - My Sweet Baby Done Me Wrong
The Death of Best-of-Breed - Leveraging Cloud for Security Transformation
2024 Security Outlook & Essential Security Practices
Hacking and Armoring Identity Ecosystems: When MFA Isn't Good Enough Any Longer
Driving Change and Resilience: Aligning Cybersecurity with Organizational St...
2013 (ISC)² Congress: This Curious Thing Called Ethics
Securing Big Data and the Grid
RSA2008: What Vendors Won’t Tell You About Federated Identity
The Challenges & Risks of New Technology: Privacy Law & Policy
Perimeter Defense in a World Without Walls
Ad

Recently uploaded (20)

PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Cloud computing and distributed systems.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The AUB Centre for AI in Media Proposal.docx
Machine learning based COVID-19 study performance prediction
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Encapsulation_ Review paper, used for researhc scholars
sap open course for s4hana steps from ECC to s4
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Mobile App Security Testing_ A Comprehensive Guide.pdf
Programs and apps: productivity, graphics, security and other tools
The Rise and Fall of 3GPP – Time for a Sabbatical?
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

The Hidden Enemy Within - Why Ungoverned Data is Such a Big Problem

  • 1. InfoSec Innovations The Hidden enemy within DAN HOUSER CISSP-ISSAP CISA CISM SECURITY STRATEGY & ARCHITECTURE LEAD INFOSEC INNOVATIONS IANAL © 2018 - InfoSec Innovations LLC, Trogdor Heavy Industries LLC
  • 2. InfoSec Innovations About me  Information Security Practitioner in Ohio since 2000  Focus on Identity, Privacy, Crypto, Architecture & Supply Chain  Practice Lead, Security Strategy & Architecture, InfoSec Innovations  Fortune 500 Banking, Finance, Insurance, Retail, Healthcare, Logistics + Higher Ed, NGO  Board of Directors, (ISC)² for 6 years
  • 4. InfoSec Innovations With your forgiveness… To frame our discussion, several slides of things you likely already know. Mea culpa
  • 5. InfoSec Innovations Hidden dangers Gaps In Knowledge  Endpoints & Network CIS Top 20 1 & 2 – Hardware & Software Inventory  Insular IT  CIO mission in conflict with CISO’s  Unsupported / unpatched software  IoT, Shadow IT & Cloud  Digital Certificates  Distance – Field offices, stores, pharmacies  Hidden Vulnerabilities  Insider Threat  Information Explosion Eclipsing Data Management  Unstructured Data Risks Exceed ROI
  • 6. InfoSec Innovations Knowledge of self: Not a new concept “If you know the enemy and know yourself, you need not fear the result of a hundred battles… If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art of War
  • 7. InfoSec Innovations Knowledge of self You can’t manage what you can’t measure. - Peter Drucker You cannot manage what you do not know. - Anon
  • 8. InfoSec Innovations Data Explosion Corporate Data Doubles Every 18 Months -IDC Data Growth is the Largest Datacenter Challenge – Gartner The Buildout of the Internet of Things will cause a doubling of human information every 12 hours. - IBM Entering the era of the digital industrial economy – Peter Sondergaard
  • 9. InfoSec Innovations Unstructured Data Source: The Human Element– Creative Commons eMail Memos & Documents Spreadsheets Images, Videos & Sounds Presentations Generated by every employee Contains Intellectual Property Business Records [IANAL] Images courtesy Microsoft by Unknown Author, licensed under CC BY-SA
  • 10. InfoSec Innovations Unstructured Data  Difficult to Classify & Manage  Difficult to Govern  No set structure  What is in your unstructured data repository?  Trash or Treasure? Source: BigRedCloud – Creative Commons
  • 11. InfoSec Innovations Information explosion  Data without ability to analyze is data without forseeable value  All the risk & cost  Likely zero benefit  AI / Big Data/ Machine Learning… Will it close the gap?
  • 12. InfoSec Innovations Unstructured data risk & data value Time Bomb Intellectual Property Waste Corporate Execution Value High Risk Low Risk Risk ¢ $$$$
  • 13. InfoSec Innovations DATA DUPLICATION A Parable Widget-tech enters market to manage healthcare data Determines ROI, Determines Risk Launches business Gathers & Manages Data RISK REWARD
  • 15. InfoSec Innovations Janet sees a new market opportunity By enriching the data, more reward! PHI REVENUE PHI REVENUE DATA DUPLICATION A STRUCTURED DATA PARABLE
  • 16. InfoSec Innovations Gary sees even more opportunity! By enriching the data, more reward! PHI REVENUE PHI REVENUE PHI REVENUE DATA DUPLICATION A STRUCTURED DATA PARABLE
  • 21. InfoSec Innovations Database extracts reused many times, giving excess PII downstream Database  spreadsheet  database  spreadsheet  report Single source  53 extracts  hundreds of further extracts Local & snapshot databases used instead of authoritative references Data sync & freshness errors Results:  Risk  Upset customers  Bad Decisions  $$$$ DATA DUPLICATION ASSESSMENT
  • 22. InfoSec Innovations Data Knowledge  Where is the Data?  Who has access to it?  How is the business using it?  What is Important? Private? Sensitive? Public?  What makes it important / private / sensitive?  What has integrity? What is stale?  Who is accessing it the most? Least?  What is the value of the data?  What is the governing data retention policy?  Is the data storage in compliance with data retention policy?  Is it authoritatively sourced?  Is it a system of reference? System of record?  How are conflicts resolved?  How is it governed?  Is the cost and risk of the data worth more than the value of the data? Do we know where all our Intellectual Property is, and are we protecting it?
  • 23. InfoSec Innovations GDPR Bringing Focus  Six Principles of GDPR  Lawfulness, fairness and transparency  Purpose limitations  Data minimization  Accuracy  Storage limitations  Integrity and confidentiality
  • 24. InfoSec Innovations Chasing the same data dragon  2002: Where are all the places we’re displaying SSN?  2003: Where is all our financial reporting data for SOX?  2004: Do we have EU privacy data? Where is it? Is it protected?  2008: Where is all our payment card information?  2009: How are we protecting our payment card information? (Repeat annually)  2010: Do we have HIPAA data? Where? Is it protected?  2011: What do you mean a breach grabbed account data? Where? What?  2012: Wait, we have to protect Employee ID just like SSN? OMG that’s everywhere!  2013: Is all our payment card data encrypted?  2014: Shoot, what do you mean we have mag stripe data? Tokenize it!  2015: Wait, we found more healthcare data?  2016: Our 3rd party was breached? What data are we sending to third parties?!?  2017: GDPR is coming, what!? 4% of revenue!?!? Find the EU data!  How many times are we going to go through the same process, looking for specific types of data, before we start creating a generalized practice for data mapping and governance?
  • 25. InfoSec Innovations Knowledge of self & Data Breach You cannot manage what you do not know You cannot lose what you do not have
  • 26. InfoSec Innovations Gaining control of the hidden data • Scan for privacy data and intellectual property • Map & classify the data • Normalize metadata • Gain insights to data storage, use, data flows & provenance • Legal & Privacy evaluation Insights • Evaluate storage compliance & access controls • Live the retention & privacy policy • Enact information classification • Tokenize, redact, delete, encrypt • Migrate data from unsafe zones and into safe harbor Protect
  • 27. InfoSec Innovations Gaining control of the hidden data • Engage data owners and data guardians with data insights & classification • Establish processes for data governance • Attestation & validation by data owners • Establish KPIs Operate • Reporting • Periodic Re-scan • Event Monitoring • Feedback loop to drive process improvements Govern
  • 28. InfoSec Innovations Getting started  There is no magic bullet, it’s hard work.  Knowledge of self always pays, ask the hard questions to find the hidden risks in your network, apps, data flows, processes, facilities  Create a plan & roadmap  Where are we? Knowledge of Self  Where are we going? Vision  How are we going to get there? Roadmap & series of projects  How do we define success so we will know we’ve arrived? KPIs  Find and map data flows, determine how data moves  Scan for private data in unstructured sources and rogue databases  Create tactical data protection methods & capabilities