450 likes | 518 Views
Data Security: In a Post Snowdon World. Dvana Limited Dr Katherine Bean. Introduction. d v A na Dr Katherine Bean. Three Key Parts. Introduction Current situation Practical solution Summary. Considerations. Transmission method Ease of access Storage type
E N D
Data Security: In a Post Snowdon World Dvana Limited Dr Katherine Bean
Introduction dvAna Dr Katherine Bean
Three Key Parts Introduction Current situation Practical solution Summary www.dvana.com
Considerations Transmission method Ease of access Storage type Scope of availability www.dvana.com
Opening Our Eyes The one thing that the Edward Snowdon revelations did, was to show us that our worst fears, were a reality! www.dvana.com
Current Situation Where We Are Now dvAna
Safe & Sound www.dvana.com
Hope www.dvana.com
Fear www.dvana.com
Reality www.dvana.com
Reality www.dvana.com
Reality www.dvana.com
Passwords Easy to crack Required for everything Difficult to make strong Hard to remember Assume a trusted environment Last millennium’s technology www.dvana.com
Email Widely deployed Essential for business Direct access to employees Vector for malware User acceptance of everything Hard to control www.dvana.com
Physical Access Who should be allowed access Where should the access be from How should the access be permitted When are they permitted access Why do they need access www.dvana.com
Remote Access Location access is permitted from Who has access Why do they need this access www.dvana.com
Bring Your Own Device • Weather app in German spy case • Data use on premises • Ownership • Device • Data • Control of device on & off premises • Responsibility • Device • Data www.dvana.com
Administrative Access Widely available All encompassing Why is this true! www.dvana.com
Users Greatest vulnerability Not security motivated Indifferent to security needs www.dvana.com
Hackers Looking to make money Actively looking for weaknesses Targeting at random Everyone looks interesting www.dvana.com
Government / Spy Agencies Motivation variable Actively looking for weaknesses Targeting everyone Everyone looks interesting www.dvana.com
Solution How to Move Forward dvAna
Overview • Applicable to • Digital data • Physical data • Large businesses • Small businesses • Provides a complete framework • Scalable in scope www.dvana.com
Breached Your security will be breached Accept it and move on www.dvana.com
DUMP Delete Uninstall Map activities Permanently archive www.dvana.com
Delete Duplicates Copies of copies Files you just might need Files you never needed Temporary files All the digital dross you can find www.dvana.com
Uninstall Toolbars without exception Web browsers Auto install junk wear Legacy versions of frameworks Google desktop iTunes and all phone programs Everything that is not part of the job www.dvana.com
Map Activities Find minimum data set Determine user activities Required resources Identify personnel Document everything in detail www.dvana.com
Permanently Archive • Devise archiving strategy • Find archive candidates • Archive the data for: • Online access • Permanent offline storage • Archives are read-only to everyone www.dvana.com
STOP Secure Transfer Organize Processes & procedures www.dvana.com
Secure • Restrict data access: • With account restrictions • Compartmentalization • Minimum touch updating • Restrict system access: • Physical security • Smart card style tokens • Access supervision www.dvana.com
Transfer • Activities: • To appropriate locations • Eliminate duplication • Simplify • Control to appropriate personnel • Physical media to secure locations www.dvana.com
Organize Allocate roles Determine responsibilities Adhere to processes & procedures Deploy resources Solicit feedback Be rigorous www.dvana.com
Processed & Procedures Rigorous Robust Universally adopted Comprehensive Fit for purpose Not unnecessarily burdensome www.dvana.com
BAR Backup Action book Recovery plan www.dvana.com
Backup Online and offline Disaster recovery Business continuity Frequent and up to date Comprehensive On and off site www.dvana.com
Action Book • Choose scenarios • Determine action • Choose the trigger • Who can make the call • How long do you have • Consequences: • To make the action • To fail to make the action www.dvana.com
Recovery Plan Kept up-to-date Always available Tested regularly Everyone knows their role Comprehensive Business lifeline www.dvana.com
Summary Call to Action dvAna
Present • Cybercrime is big business • Date is accessed all over the place • Current methods are: • Antiquated • Ineffective • Providing a false sense of security www.dvana.com
Future Prepare for inevitable data breach Always have a Plan-B Compartmentalise Restrict access www.dvana.com
Next Week Discuss Security In Detail With Your Senior Management www.dvana.com
Questions dvAna www.dvana.com Dr Katherine Bean