The document discusses how data loss prevention (DLP) has become a business imperative due to rising data breaches and threats. It examines a study which found that 45% of respondents felt DLP improved their credibility with business leaders. The document outlines the costs of data breaches and emphasizes that DLP can help security executives be viewed as strategic partners rather than just technical advisers.
The document discusses how data loss prevention (DLP) has become a business imperative due to rising data breaches and threats. It examines a study which found that 45% of respondents felt DLP improved their credibility with business leaders. The document outlines the costs of data breaches and emphasizes that DLP can help security executives be viewed as strategic partners rather than just technical advisers.
The document discusses how data loss prevention (DLP) has become a business imperative due to rising data breaches and threats. It examines a study which found that 45% of respondents felt DLP improved their credibility with business leaders. The document outlines the costs of data breaches and emphasizes that DLP can help security executives be viewed as strategic partners rather than just technical advisers.
The document discusses how data loss prevention (DLP) has become a business imperative due to rising data breaches and threats. It examines a study which found that 45% of respondents felt DLP improved their credibility with business leaders. The document outlines the costs of data breaches and emphasizes that DLP can help security executives be viewed as strategic partners rather than just technical advisers.
threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. Once considered the con- cern solely of regulated nancial services and healthcare organizations, companies across all industries are focusing on managing their data loss risk. As a result, C-level executives are turn- ing to IT security to protect condential data such as intellectual property (IP) and personally identi- able information (PII). DLP programs are emerging as the most effective solution. Security executives who use DLP as the cornerstone of their infor- mation security strategy are reaping signicant tangible and intangible benets; not only are they keeping their company out of the headlines, but they are also getting a seat at the table with their business peers. This research paper examines the ndings from a new study on DLP by Symantec . The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data. Symantec surveyed more than 130 CISOs, VPs, directors and managers responsible for the evaluation, selection, deployment and governance of their organizations DLP solution. The study reveals that nearly half of the respondents believe they have improved their credibility with peers in other busi- ness units by implementing DLP. Key ndings: Improved boardroom credibilityForty-ve percent of survey respondents say that DLP programs improved their credibility with peers in other business units, leading to more effective business leaders. Increased executive visibilityEighty-nine percent of respondents say that their organiza- tions DLP initiative originated from the top, either to demonstrate compliance or because manage- ment requested it. 1 Five DLP Tips from Security Executives Five DLP Tips from Security Executives DATA LOSS PREVENTION: WHAT YOUR COLLEAGUES ARE SAYING ABOUT IT AND HOW THEY TAKE ACTION 2 Five DLP Tips from Security Executives Increased awareness of data loss risk Fifty-two percent of respondents companies launched a data protection plan because they had either experienced data loss or felt such an event was imminent. The Priority: Protect Business Data Some of the top IT security issues troubling enter- prises today have also become pressing business concerns. As industries grow more competitive and markets expand across the globe, C-level executives worry that intellectual property (IP), trade secrets and other strategic information is more likely to suffer unauthorized access or even theft, blunting an organizations ability to inno- vate and maintain a competitive edge. Business leaders are also plagued by the fear that when a data breach happens to a partner or competitor, the same thing could happen to them, complete with the negative publicity and high cost that stems from dealing with such an incident. Mean- while, regulatory pressure from governments and industries continues to mount as enterprises are mandated to strictly guard customer and employee privacy, keeping data protection top of mind in the C-suite. However, while the threat of a data breach is a serious concern for enterprises today, the need to protect data also presents an opportunity for CISOs to be viewed as more strategic contributors to the business rather than technical advisers (how they are traditionally viewed). However, since protect- ing data involves safeguarding both a companys crucial corporate assets and its reputation, CISOs have a chance to work with business users to develop strategies that protect data while lending credibility to their roles as strategic partners. In fact, the survey conducted by Symantec shows that of the 130 respondents, 45 percent say their DLP program increased their credibility with peers in other business units. Data loss is a very real and very serious issue, says Tim Matthews, senior director, Data Loss Prevention, Symantec. And DLP is the safest investment you could make. The High Cost of Doing Nothing to Protect Your Data Business leaders have opened their eyes to the need to protect data at a time when risks are higher than ever. This is in part due to the preva- lence of advanced threats that are increasingly dif- cult to detect and thwart. Users are more mobile than ever, leveraging consumer devices that arent owned or managed by the company to access cor- porate data. Greater access from more endpoints means employees create additional vectors for threats to inltrate the corporate network and for crucial data to be stolen. In addition, attackers are growing more mature and patient, planting more sophisticated malware inside organizations. The risk of data theft is also increasing because of changes in the way employees do their jobs today. In the race to be as productive as possible, users often dont stop to consider whether they are working with condential data, or whether they are treating condential data with the cor- rect level of protection. Patient records are saved to a thumb drive; customer data is transferred to a laptop so an employee can work from home; unreleased product plans are emailed to personal webmail. While these actions may be uninten- tional, they still can expose sensitive information to unauthorized access. In fact, well-mean- ing insiders continue to cause the majority of breaches; the latest Cost of a Data Breach study nds that negligence was responsible for 39 percent of all data-loss incidents, with system glitches accounting for another 24 percent. Add to these threats the ongoing risk of malicious insiders stealing data, and it becomes clear that doing nothing isnt a strategy. Not only does unprotected data expose a com- pany to a possible breach, the fallout from such an event can threaten the viability of a business. According to the Cost of a Data Breach study, the average cost of a breach hit $5.5 million in 2011. These costs involve responding to breach notication laws, which are pervasive and man- date a rapid response, as well as lost business opportunities. Whats more, customer condence and the overall reputation of a company can take a serious hit once a breach is publicized. Having to bounce back from a data breach event is a struggle best avoided. Data loss is a very real and very serious issue. And DLP is the safest investment you could make. TIM MATTHEWS, SENIOR DIRECTOR, DATA LOSS PREVENTION, SYMANTEC 3 Five DLP Tips from Security Executives DLP as a Strategic Business Initiative Results from the Symantec survey show that data protection is indeed growing in strategic impor- tance, as the vast majority of respondents (89 percent) say that their companys data protection plan originated from the top; either to demonstrate compliance or because management requested it. And data theft is not an idle threatmore than half (52 percent) of respondents companies launched a data protection plan because they had either experienced data loss or felt such an event was imminent. Of those survey respondents at compa- nies that performed a risk assessment or proof of concept before installing a data protection solution, 82 percent found at least some sensitive data was at risk of unauthorized access or breach. DLP solutions are increasingly being used to protect the crown jewelsIP, product blueprints, source code, nancial documents, trade secrets, quarterly projections and so on. An organizations ability to compete in the marketplace and remain innovative is often dependent upon safeguarding such information, and thus doing so is a strategic imperative. DLP is also an effective way to protect regulated data and reduce business risk. Five DLP Tips from Your Colleagues DLP is more than just a security tool, its a business process for managing risk, which affects every department in your company that touches conden- tial data. Therefore, DLP strategies require consul- tative input from CISOs to ensure the correct solutions are put in place and best practices are followed. In fact, DLP solutions are most effective when CISOs work with business users to identify and prioritize sensitive or condential data, and apply policies to how it should be treated. Symantecs survey respondents, who all have experience evaluating and deploying DLP solu- tions, recommend the following best practices for a successful DLP implementation: 1Clearly dene your DLP requirements. Its important to understand how a DLP solu- tion will integrate with your unique environ- ment (cloud, mobile, endpoints, network and storage). Dont rely solely on paper evaluations and lab demos. Put DLP solutions through the paces in a production environment. 2Build a business case for your DLP pro- gram. DLP vendors can perform risk assess- ment to identify which critical data is leaving your network and thus is vulnerable to theft. The results, for example, quantied data loss risk, will arm you with a compelling business case to gain funding and support from key business stakeholders. Run the risk assessment and use the results to craft a strategy; dont [attempt to] boil the ocean with the tool, one survey respondent says. The technology is great, but its the processes built around it that are essential to success. 3Understand the total cost of ownership of DLP solutions. One survey respondent advises: You evaluate all vendors and dont pick one that is the least costly. In addition to up-front software license costs, its important to factor in hardware, maintenance, installation and stafng. Ninety percent of the effort of running a DLP program is reviewing and remediating data loss incidents. Among survey respondents, 50 percent say that their DLP deployment costs are in line with the amount budgeted, and the majority of respondent companies dedicate one or less employee to DLP once the solution is up and running. 4Deploy DLP in waves to get quick wins. Attempting to deploy DLP across all of your users and systems simultaneously can be overwhelming and potentially disruptive to your business. Survey respondents recom- mend deploying DLP in stages: Develop a roadmap that starts with your highest-risk areas rst and get some quick wins under your belt. Start out slow with a small number of key compliance policies enabled rst, and do not attempt to block content from leaving your company until you are sure that the policies have been tuned to eliminate false positives, one respondent advises. The technol- ogy is great, but its the processes built around it that are essential to success. SURVEY RESPONDENT 4 Five DLP Tips from Security Executives Questions to Ask Before You Deploy DLP To set yourself up for success, CISOs say its important to understand what data is condential to your business, how data owners want to respond to incidents and the overall corporate culture. Here are ve questions to ask before you deploy DLP: n What data do you need to protect? Companies store hundreds of terabytes, even petabytes, of data. Understand what is condential to your business and prioritize the most critical data rst. Dont try to boil the oceanthats a surere way to kill your DLP project before it even starts. n What is your corporate culture? Its critical to understand your organization and tailor your DLP program to t within the corpo- rate culture. You want to be seen as caring mother not big brother. n Do you have buy-in from business stakeholders? Data loss is not just a security issue, its a business process that touches everyone from HR and legal to engineering and sales. Getting business-data owners involved early on will help you gain their support when it comes time to deploy and manage your DLP program. n How are you going to roll out DLP? CISOs recommend starting slow and steady. First, monitor where data is stored and how its being used. Once youve identied broken business processes and high-risk users, then you can start remediating data loss incidents. Next, turn on automated notications to educate users about security policiesthis dramatically cuts down repeat offenses. And prevent users from accidentally or maliciously leaking information by quarantining, encrypting and blocking outbound communications. 5Prepare for broken business policies. Before deploying DLP, enterprises are advised to determine how best to deal with bro- ken policies, what methods will be used to prioritize and remediate them and how to keep those policies current as the business changes. Other DLP best practices mentioned by survey respondents include using DLP to edu- cate business units on the risks that exist and getting buy-in from business units and support from top executives before deploying. Conclusion Increased mobility and greater access to data are removing hurdles for employees to be as productive as possible and drive the business forward, but those trends also present a number of data protection challenges. Whether the goal is to comply with privacy regulations or protect condential data, understanding how best to prevent data from falling into the wrong hands is a business imperative. Recognizing the challenges and developing a long-term, sustainable data protection strat- egy that has the support of top executives and business units as well as the IT department is the best way to maximize risk reduction in a manner thats quick and doesnt tax resources. Choosing the right DLP solution helps enterprises develop and enforce better business practices regarding how to treat sensitive data as an integral part of a comprehensive security program. DLP solutions also help drive change across the organization and elevate the CISOs role to become a strategic partner to the business. Under- standing how best to prevent data from falling into the wrong hands is a business imperative.