1 / 10

DLP

DLP. Mgr. Marek Zeman Tatra banka, a.s. R easons, why we want to secure data. Limit risks like bad publicity, loss of strategic customers, loss of competitive intelligence prevent legal action. D ata types. Data in motion Data at rest (files systems, databases and other storage)

radley
Download Presentation

DLP

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DLP Mgr. Marek Zeman Tatra banka, a.s.

  2. Reasons, why we want to secure data • Limit risks like • bad publicity, • loss of strategic customers, • loss of competitive intelligence • prevent legal action

  3. Data types • Data in motion • Data at rest (files systems, databases and other storage) • Data at the endpoint

  4. What we want to Secure • Comprehensive channels coverage • webmail, disk, periphery • Enforcement • Content inspection • RegExp, MetaLanguage, FingerPrints, Templates,… • Accuracy • decrease false positives and undetected leaks • Source protection • special DB like HR, Financil DB,...

  5. Priority • Easy to management • Easy to update • All phases without impact to our employees • Support multi workstation environment (SW distribution)

  6. SW requirements • Exceptions • Customization • Support all OS environments and SW

  7. Additional requirements • Regulatory compliance (PCI DSS) • Co-operation with existing solutions

  8. Prerequisites • baseline – TB policies

  9. Plan • SW selection • Procurement • Pilot • Installation to all environments • setup base set of rules in quiet mode • setup process for incidents reduction, phase 1 • dissemination system to all people , phase 2 • Exception setting • Phase 1 – warning setup • Phase 2 – standard DLP

  10. ?

More Related