SlideShare a Scribd company logo
ILLYAS KOOLIYANKAL CISO - ADX
Information Leakage –  A Knowledge Based Approach
Introduction Some real life examples Existing Security Mechanisms? Best Approach towards Protection Protection Mechanisms Technology behind DLP Case Study Summary
Why Data is a Priority? Indirect Costs $1.5M $15/record Opportunity Costs $7.5M $75/record Direct Costs $5.0M $50/record Cost of Data Breaches $140/record Source:  Ponemon Institute SVB Alliant Leakage of confidential/ proprietary information  Un patched vulnerabilities  Insider attacks  Spyware  Phishing attacks  Malicious Code  Spam  Denial of Service attacks  Fraud  Keystroke loggers  52% 24% 18% 14% 10% 4% 4% 4% 2% 2% What do you consider to pose the biggest current threat to your organization’s  overall security? (multiple responses) Source: Merrill Lynch survey of 50 North American CISOs, July 2006
70% - loss caused by insiders 23% of loss is from malicious intent 92% use email to send confidential data 55% use portable devices to take confidential data out of the workplace every week Some stats
Top Leakage concerns of customers
A serious Concern Now? More mobility, flexibility  Criminals Business impact – Reputation, monitory, growth, … Legal and Regulatory compliances International standards like ISO 27001 Personally…
A researcher, who accidentally sends a new product formula to hundreds of partners OR A junior member of the finance team who unknowingly exposes the company’s unannounced financial results to the public
A Hard-working, loyal employee who takes home his laptop or a USB drive for the weekend to get work done and Accidentally leaves it on the subway as he runs to greet his children at the end of a long workweek “ Internal risk that can lead to data loss are real.”
Data Leakage - Boundary Employees (remote workers, mobile workers) Business Partners (Suppliers, outsourcers, consultants) Customers Hackers Contractors Temporaries Visitors Digital Business Cyber-crime SOURCE: FORRESTER RESEARCH Employees Sensitive Data Competitors
Existing Security Devices/Solutions?
Data - Concerns
Holistic Approach People  Process  Technology
Develop and implement fool proof processes in overall business environment (Information –at all stages/states) Staff Awareness and support Implement appropriate technology to assist the users and the organization to protect the data efficiently and without business interruption.
Information leaked by Internal/Authorized users Performance issues. False Positives and False Negatives User Resistance & Org Culture of Trust, openness Impact to the normal business operations? Challenges!
Business requires information easily and seamlessly Existing security solutions and tools-limited capability Huge amount of sensitive data; unwanted/outdated data Is it Easy?
Approach it as a business problem, not   technical. Formulate a comprehensive strategy for Data protection  Develop a classification policy Analyze various data sources and data, classify it, and conduct detailed risk assessment. Identify and select an appropriate technical solution for DLP How can you protect?
How can you protect? State of the Data– in motion, at rest, in use. Develop/Decide on the policies to be applied based on the sensitivity and classification Apply light weight policies and train the users to be more careful Actions – Controls (Log, Alert, Justification, block, etc) Monitor and Fine Tune Approach it phase by phase – Begin with log only, analyze the events and tighten the controls slowly and steadily.
Data At Rest Data classification Device control Content control Application control  Transaction Data Direct Database Access Access via Applications Web applications Web services Communication Channels Data In Motion Outgoing communications Internal communications Databases and documents Monitoring and enforcement Courtesy: www.PortAuthorityTech.com The Landscape Databases Transaction Applications Data Storage  (SAN and NAS) Servers, Endpoints Employees (Honest & Rogue ) Customers & Criminals Accidental,  Intentional and  Malicious Leaks Employees (Honest & Rogue) Employees (Honest & Rogue)
Lets you secure the data you know you need to protect Automate the discovery and understanding of the data you don’t know By securing all your information—from the datacenter to the network endpoints—you protect it through all phases of its lifecycle—at rest, in motion, and in use—and ensure its confidentiality and integrity. What DLP offer?
Identify and Classify data in motion, at rest, and in use Dynamically apply the desired type and level of control, including the ability to perform mandatory access control that can’t be circumvented by the user Monitors multiple channels for specific inbound and outbound content DLP Products may differs based on these . How Does DLP Work?
Through  Deep content inspection  Contextual security analysis of transaction  (attributes of originator, data object, medium, timing, recipient/destination, etc.)  With a centralized management framework.  The systems are designed to detect and prevent the unauthorized use and transmission of confidential information How?
Capabilities
Data Protection What is the User Doing With It? Read, Write, Print, Move,  Burn, Copy/Paste, Upload, etc . Where Did the Data Come From? (What Classification?) Where Is the Data Going? What is the Policy regarding  Actions to be taken? Devices Applications Networks 1 4 2 3
Reduce Your Risk Audit, Notify,  Quarantine, Block Encrypt … Reduce Risk Enable enforcement policy Quarantine suspicious messages Create audit trail of all communications to substantiate compliance Reduce violations to  required levels Enforce Learn Define Metrics Use pre-defined policies or create custom policies Learn critical information using information fingerprinting service Monitor Monitor communication channels  Reporting of matches against policies and information fingerprints Tune policies Assess Risk Courtesy: www.PortAuthorityTech.com
Information Leakage is a serious concern to organizations and individuals Approach has to be holistic addressing through People, Process and Technology DLP technology addresses Data in motion, rest and at use. Summary
Classification Policy, Information about  Data and Data Source, Classify those, Select DLP Solution, Develop Policies and Test, Apply, Monitor, Fine Tune, Awareness Action – Log, Alert, Justify, Block etc.. Resistance, Org Culture, Performance, huge amount of known/unknown data etc are some of the obstacles. Start with light weight policies and gradually tighten it once the awareness and adaptability is achieved Information Leakage Prevention is an ongoing process

More Related Content

PPTX
Information Leakage & DLP
PPT
apsec 7 Golden Rules Data Leakage Prevention / DLP
PPT
Data Leakage Presentation
PDF
Dlp notes
PDF
Data Leakage Prevention - K. K. Mookhey
PDF
The Definitive Guide to Data Loss Prevention
PDF
DLP Data leak prevention
PDF
Protecting Intellectual Property and Data Loss Prevention (DLP)
Information Leakage & DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
Data Leakage Presentation
Dlp notes
Data Leakage Prevention - K. K. Mookhey
The Definitive Guide to Data Loss Prevention
DLP Data leak prevention
Protecting Intellectual Property and Data Loss Prevention (DLP)

What's hot (20)

PDF
My article about DLP Web Conference from RnD Express
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
PPT
Data loss prevention (dlp)
PDF
Big Data for Security
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PDF
En msft-scrty-cntnt-e book-protectyourdata
PPT
Ch12
PDF
Wp security-data-safe
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PPT
PPTX
Ciso Platform Webcast: Shadow Data Exposed
PPTX
Humans Are The Weakest Link – How DLP Can Help
PPTX
Monitoring security in the externalised organisation (Auscert 2013)
PPTX
Data Loss Prevention
PDF
Insecure magazine - 51
PPTX
Data Loss Prevention
PDF
Big Data Dectives
PDF
The Rise of Data Ethics and Security - AIDI Webinar
PDF
2010 za con_stephen_kreusch
PDF
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
My article about DLP Web Conference from RnD Express
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data loss prevention (dlp)
Big Data for Security
Technology Overview - Symantec Data Loss Prevention (DLP)
En msft-scrty-cntnt-e book-protectyourdata
Ch12
Wp security-data-safe
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Ciso Platform Webcast: Shadow Data Exposed
Humans Are The Weakest Link – How DLP Can Help
Monitoring security in the externalised organisation (Auscert 2013)
Data Loss Prevention
Insecure magazine - 51
Data Loss Prevention
Big Data Dectives
The Rise of Data Ethics and Security - AIDI Webinar
2010 za con_stephen_kreusch
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Ad

Similar to Information Leakage - A knowledge Based Approach (20)

PDF
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
PPTX
626 Information leakage and Data Loss Prevention Tools
PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
PPTX
Data Leakage Prevention
PPTX
Ciso round table on effective implementation of dlp & data security
PDF
IRJET- Data Leak Prevention System: A Survey
PDF
5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf
PPTX
Comprehensive Data Leak Prevention
PDF
Dean carey - data loss-prevention - atlseccon2011
PDF
05.05.2021-webinar-presentation-experts-series-How-to-Switch-to-a-Better-DLP.pdf
PDF
Data security or technology what drives dlp implementation
PDF
Data Leakage Prevention (DLP)
PPT
Data Loss During Downsizing
PPTX
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
PDF
SCI Data Security Beyond DLP SCI Data Security Beyond DLP
PPTX
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
PPTX
The 3 Phased Approach to Data Leakage Prevention (DLP)
PDF
Data Loss Prevention (DLP): Protecting Your Sensitive Data
PDF
A Comparative Study of the Approach Provided for Preventing the Data Leakage
PDF
Protection and defense against sensitive data leakage problem within organiza...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
626 Information leakage and Data Loss Prevention Tools
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Leakage Prevention
Ciso round table on effective implementation of dlp & data security
IRJET- Data Leak Prevention System: A Survey
5 Important Data Leakage Prevention Methods to Protect Sensitive Information.pdf
Comprehensive Data Leak Prevention
Dean carey - data loss-prevention - atlseccon2011
05.05.2021-webinar-presentation-experts-series-How-to-Switch-to-a-Better-DLP.pdf
Data security or technology what drives dlp implementation
Data Leakage Prevention (DLP)
Data Loss During Downsizing
nullcon 2011 - Enterprise Paradigm for Controlling Data Leakage
SCI Data Security Beyond DLP SCI Data Security Beyond DLP
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
The 3 Phased Approach to Data Leakage Prevention (DLP)
Data Loss Prevention (DLP): Protecting Your Sensitive Data
A Comparative Study of the Approach Provided for Preventing the Data Leakage
Protection and defense against sensitive data leakage problem within organiza...
Ad

More from Global Business Events - the Heart of your Network. (20)

PDF
CIO Agenda_Booklet John Funnell (2)
PDF
Richard Davies CIO Deutsche Post DHL
PPTX
Mobile – Adoption and Adaption in 2012
PPTX
Why physical security just isn’t enough, Sending the heavies into virtualized...
PPT
Graham Benson - CIO - M&M Direct presentation
PPT
The Communicating Information Officer
PPTX
Greening DECC - The CIO as Champion
CIO Agenda_Booklet John Funnell (2)
Richard Davies CIO Deutsche Post DHL
Mobile – Adoption and Adaption in 2012
Why physical security just isn’t enough, Sending the heavies into virtualized...
Graham Benson - CIO - M&M Direct presentation
The Communicating Information Officer
Greening DECC - The CIO as Champion

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Big Data Technologies - Introduction.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Cloud computing and distributed systems.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PDF
KodekX | Application Modernization Development
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
Teaching material agriculture food technology
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Unlocking AI with Model Context Protocol (MCP)
Dropbox Q2 2025 Financial Results & Investor Presentation
Big Data Technologies - Introduction.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Cloud computing and distributed systems.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
KodekX | Application Modernization Development
Understanding_Digital_Forensics_Presentation.pptx
Teaching material agriculture food technology
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)

Information Leakage - A knowledge Based Approach

  • 2. Information Leakage – A Knowledge Based Approach
  • 3. Introduction Some real life examples Existing Security Mechanisms? Best Approach towards Protection Protection Mechanisms Technology behind DLP Case Study Summary
  • 4. Why Data is a Priority? Indirect Costs $1.5M $15/record Opportunity Costs $7.5M $75/record Direct Costs $5.0M $50/record Cost of Data Breaches $140/record Source: Ponemon Institute SVB Alliant Leakage of confidential/ proprietary information Un patched vulnerabilities Insider attacks Spyware Phishing attacks Malicious Code Spam Denial of Service attacks Fraud Keystroke loggers 52% 24% 18% 14% 10% 4% 4% 4% 2% 2% What do you consider to pose the biggest current threat to your organization’s overall security? (multiple responses) Source: Merrill Lynch survey of 50 North American CISOs, July 2006
  • 5. 70% - loss caused by insiders 23% of loss is from malicious intent 92% use email to send confidential data 55% use portable devices to take confidential data out of the workplace every week Some stats
  • 6. Top Leakage concerns of customers
  • 7. A serious Concern Now? More mobility, flexibility Criminals Business impact – Reputation, monitory, growth, … Legal and Regulatory compliances International standards like ISO 27001 Personally…
  • 8. A researcher, who accidentally sends a new product formula to hundreds of partners OR A junior member of the finance team who unknowingly exposes the company’s unannounced financial results to the public
  • 9. A Hard-working, loyal employee who takes home his laptop or a USB drive for the weekend to get work done and Accidentally leaves it on the subway as he runs to greet his children at the end of a long workweek “ Internal risk that can lead to data loss are real.”
  • 10. Data Leakage - Boundary Employees (remote workers, mobile workers) Business Partners (Suppliers, outsourcers, consultants) Customers Hackers Contractors Temporaries Visitors Digital Business Cyber-crime SOURCE: FORRESTER RESEARCH Employees Sensitive Data Competitors
  • 13. Holistic Approach People Process Technology
  • 14. Develop and implement fool proof processes in overall business environment (Information –at all stages/states) Staff Awareness and support Implement appropriate technology to assist the users and the organization to protect the data efficiently and without business interruption.
  • 15. Information leaked by Internal/Authorized users Performance issues. False Positives and False Negatives User Resistance & Org Culture of Trust, openness Impact to the normal business operations? Challenges!
  • 16. Business requires information easily and seamlessly Existing security solutions and tools-limited capability Huge amount of sensitive data; unwanted/outdated data Is it Easy?
  • 17. Approach it as a business problem, not technical. Formulate a comprehensive strategy for Data protection Develop a classification policy Analyze various data sources and data, classify it, and conduct detailed risk assessment. Identify and select an appropriate technical solution for DLP How can you protect?
  • 18. How can you protect? State of the Data– in motion, at rest, in use. Develop/Decide on the policies to be applied based on the sensitivity and classification Apply light weight policies and train the users to be more careful Actions – Controls (Log, Alert, Justification, block, etc) Monitor and Fine Tune Approach it phase by phase – Begin with log only, analyze the events and tighten the controls slowly and steadily.
  • 19. Data At Rest Data classification Device control Content control Application control Transaction Data Direct Database Access Access via Applications Web applications Web services Communication Channels Data In Motion Outgoing communications Internal communications Databases and documents Monitoring and enforcement Courtesy: www.PortAuthorityTech.com The Landscape Databases Transaction Applications Data Storage (SAN and NAS) Servers, Endpoints Employees (Honest & Rogue ) Customers & Criminals Accidental, Intentional and Malicious Leaks Employees (Honest & Rogue) Employees (Honest & Rogue)
  • 20. Lets you secure the data you know you need to protect Automate the discovery and understanding of the data you don’t know By securing all your information—from the datacenter to the network endpoints—you protect it through all phases of its lifecycle—at rest, in motion, and in use—and ensure its confidentiality and integrity. What DLP offer?
  • 21. Identify and Classify data in motion, at rest, and in use Dynamically apply the desired type and level of control, including the ability to perform mandatory access control that can’t be circumvented by the user Monitors multiple channels for specific inbound and outbound content DLP Products may differs based on these . How Does DLP Work?
  • 22. Through Deep content inspection Contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination, etc.) With a centralized management framework. The systems are designed to detect and prevent the unauthorized use and transmission of confidential information How?
  • 24. Data Protection What is the User Doing With It? Read, Write, Print, Move, Burn, Copy/Paste, Upload, etc . Where Did the Data Come From? (What Classification?) Where Is the Data Going? What is the Policy regarding Actions to be taken? Devices Applications Networks 1 4 2 3
  • 25. Reduce Your Risk Audit, Notify, Quarantine, Block Encrypt … Reduce Risk Enable enforcement policy Quarantine suspicious messages Create audit trail of all communications to substantiate compliance Reduce violations to required levels Enforce Learn Define Metrics Use pre-defined policies or create custom policies Learn critical information using information fingerprinting service Monitor Monitor communication channels Reporting of matches against policies and information fingerprints Tune policies Assess Risk Courtesy: www.PortAuthorityTech.com
  • 26. Information Leakage is a serious concern to organizations and individuals Approach has to be holistic addressing through People, Process and Technology DLP technology addresses Data in motion, rest and at use. Summary
  • 27. Classification Policy, Information about Data and Data Source, Classify those, Select DLP Solution, Develop Policies and Test, Apply, Monitor, Fine Tune, Awareness Action – Log, Alert, Justify, Block etc.. Resistance, Org Culture, Performance, huge amount of known/unknown data etc are some of the obstacles. Start with light weight policies and gradually tighten it once the awareness and adaptability is achieved Information Leakage Prevention is an ongoing process

Editor's Notes

  • #21: to create a comprehensive solution that guards against the risk posed by insiders.