The Hidden Enemy Within - Risk of Unmanaged Data
The Hidden Enemy Within - Risk of Unmanaged Data
The Hidden Enemy Within - Risk of Unmanaged Data
enemy within
InfoSec
Innovations
Obligatory iceberg slide
Visible
________________
Hidden
InfoSec
Innovations
With your forgiveness…
Mea culpa
InfoSec
Innovations
Gaps In Knowledge
Endpoints & Network
CIS Top 20 1 & 2 – Hardware & Software Inventory
Insular IT
CIO mission in conflict with CISO’s
Hidden
InfoSec
Innovations
Knowledge of self
Data Explosion The Buildout of the Internet of Things will cause a doubling
of human information every 12 hours. - IBM
InfoSec
Innovations
Unstructured Data
eMail
Memos & Documents
Spreadsheets
Images, Videos & Sounds
Presentations
InfoSec
Innovations Images courtesy Microsoft by Unknown Author, licensed under CC BY-SA
Unstructured
Data
Difficult to Classify &
Manage
Difficult to Govern
No set structure
Trash or Treasure?
InfoSec
Innovations Source: BigRedCloud – Creative Commons
Information explosion
InfoSec
Innovations
Unstructured data risk & data value
High Risk
Time Bomb Intellectual Property
Risk
Corporate
Low Risk Waste Execution
InfoSec
Innovations
DATA DUPLICATION
A Structured data
Parable
PHI REVENUE
InfoSec
Innovations
DATA DUPLICATION
PHI
Janet sees a new market opportunity
PHI REVENUE
InfoSec
Innovations
DATA DUPLICATION
PHI
A STRUCTURED REVENUE
PHI
PHI REVENUE
InfoSec
Innovations
DATA DUPLICATION
Sure more revenue, but at what risk?
InfoSec
Innovations
DATA DUPLICATION
PHI
InfoSec
Innovations
DATA DUPLICATION
PHI
PHI
InfoSec
Innovations
DATA DUPLICATION
PHI
PHI
PHI
InfoSec
Innovations
DATA DUPLICATION ASSESSMENT
InfoSec
Innovations
Chasing the same data dragon
2002: Where are all the places we’re displaying SSN?
2003: Where is all our financial reporting data for SOX?
2004: Do we have EU privacy data? Where is it? Is it protected?
2008: Where is all our payment card information?
2009: How are we protecting our payment card information? (Repeat annually)
2010: Do we have HIPAA data? Where? Is it protected?
2011: What do you mean a breach grabbed account data? Where? What?
2012: Wait, we have to protect Employee ID just like SSN? OMG that’s everywhere!
2013: Is all our payment card data encrypted?
2014: Shoot, what do you mean we have mag stripe data? Tokenize it!
2015: Wait, we found more healthcare data?
2016: Our 3rd party was breached? What data are we sending to third parties?!?
2017: GDPR is coming, what!? 4% of revenue!?!? Find the EU data!
How many times are we going to go through the same process,
looking for specific types of data, before we start creating a
InfoSec generalized practice for data mapping and governance?
Innovations
Knowledge of self
& Data Breach
Insights
• Map & classify the data
• Normalize metadata
• Gain insights to data storage, use, data flows & provenance
• Legal & Privacy evaluation
Protect
• Live the retention & privacy policy
• Enact information classification
• Tokenize, redact, delete, encrypt
• Migrate data from unsafe zones and into safe harbor
InfoSec
Innovations
Gaining control of the hidden data
• Reporting
InfoSec
Innovations
Getting started
There is no magic bullet, it’s hard work.
Knowledge of self always pays, ask the hard questions to find the
hidden risks in your network, apps, data flows, processes, facilities
Create a plan & roadmap
Where are we? Knowledge of Self
Where are we going? Vision
How are we going to get there? Roadmap & series of projects
How do we define success so we will know we’ve arrived? KPIs
Find and map data flows, determine how data moves
Scan for private data in unstructured sources and rogue databases
Create tactical data protection methods & capabilities
InfoSec
Innovations
Questions?
Contact info:
[email protected]
@SecWonk
InfoSec
Innovations © 2017 InfoSec Innovations LLC