C Compert Ibm
C Compert Ibm
C Compert Ibm
June 8, 2016
Notices and Disclaimers
Copyright © 2016 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission
from IBM.
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM.
Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of
initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS
DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE
USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY.
IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided.
Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice.
Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers
have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary.
References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries
in which IBM operates or does business.
Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials
and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or
their specific situation.
It is the customer’s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and
interpretation of any relevant laws and regulatory requirements that may affect the customer’s business and any actions the customer may need to take to comply with such
laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law
2 IBM Security 2
Agenda
3 IBM Security 3
Times have changed…
4 IBM Security
Security & Privacy: Strategic Imperative
Medical records
2-6% 3-14%
worth 10X Credit Post-breach
Cards customer loss rates
Security spend % of
IT varies based on
IoT strategic importance
Mobile 2/3 of Corporate
Directors blame
New CEO for a breach.
Delivery
Cloud
Channels
5 IBM Security
It’s all Big Data: IoT, Analytics, Cognitive, Cloud
6 IBM Security
Security Cost/Risk
7 IBM Security
Best Practices
1. Learn the Language
9 IBM Security
Two Different Languages
Install app
Install app
Sources: http://laws-lois.justice.gc.ca/PDF/P-8.6.pdf
http://dia-installer.de/shapes/Flowchart/index.html.en
10 IBM Security
2. Be Prepared- Security & Privacy by Design
11 IBM Security
3. Know and Share the Rules
12 IBM Security
4. Have a (good) Treasure Map
13 IBM Security
Data-Centric Maturity Model
We even know
where our
We have valuable data is
protected our when it’s in motion
data in proportion
We actually to its value
know where all Our data’s
We use best of our data is We’ve protected
practices in protected our even for
We protect our protecting our data We’ve figured most valuable Mobile
Maturity
Time
14 IBM Security
Business Risk – Critical data are the “Crown Jewels”
Crown Jewels
An organization’s most sensitive or business
critical information.
Average enterprise’s
critical data is less than 2%
Today, many organizations are not aware
of what their Crown Jewel information is,
where it resides, who has access to it,
Value of publicly traded corporations
estimated to be intellectual property
Source: U.S. President’s 2006 Economic
70%
or how it is protected. Report to Congress
15 IBM Security
The level of security is determined by the value of data
% of Sensitive
Data type Security
Data
CRITICAL
Secure Communication, Separate Network, Backup Security, DATA
Enterprise
Physical Isolation, Real-time Response to 100% of Incidents, 0.01-0.1%
Critical
Insider Monitoring
Personally identifiable information (PII), or Sensitive Personal Information (SPI),Health Insurance Portability and Accountability Act (HIPAA);,
International Traffic in Arms Regulations (ITAR)
16 IBM Security
5 steps to a Critical Data Protection Program
What are crown Where are they? What is required to How to plan, design How to manage
jewels? How are they used? protect critical data? and implement? critical data
protection?
Understand overall data Understand data Establish baseline Plan and prioritize Develop governance
security strategy environment, security requirements technical and business framework, risk metrics
infrastructure and for crown jewels process transformations and monitoring
Determine data protection
lifecycle processes
objectives Assess current data Design and implement
Perform iterative security processes and solutions that protect Periodically validate
Develop organizational
discovery, analysis and controls critical data, enable data protection strategy
data model / taxonomy
classification access and align to and methodology
Determine gaps and
business growth
identify solutions
objectives
Supported by:
Consulting Method | Industry-specific Data Models | Global Consulting Expertise | IBM Data Security Research
IBM Guardium, StoredIQ, DLP and other leading data protection technologies
17 IBM Security
Discover your Crown Jewels: Automate
18 IBM Security
Sensitive Data Discovery- Files- Example
19 IBM Security
5. Protect Your Treasure
20 IBM Security
Organizations Need a Comprehensive Enterprise-wide
Approach to Data Security and Compliance
Understand and define Assess Monitor database Help protect
Manage access
sensitive data vulnerabilities activity sensitive data
Automate detection Automate database Provide essential Help protect data – Manage and enforce
of sensitive data and vulnerability safeguards to protect in both production & privileges enterprise-
enterprise data and configuration high value databases non-production, both wide
relationships change detection across structured &
heterogeneous unstructured - from
environments unauthorized use
Capabilities: Capabilities: Capabilities: Capabilities: Capabilities:
Discovery, classification,
vulnerability assessment,
entitlement management
Encryption, masking,
and redaction
Compliance automation
and auditing
ANALYTICS
22 IBM Security
6. Hide the Critical Parts With Invisible Ink
23 IBM Security
Data Obfuscation Terminology
Original Value
4536 6382 9896 5200
Masking Redaction
The ability to desensitize sensitive information The process of obscuring part of a text for
and make it unreadable from original form while security purposes.
preserving format and referential integrity The ability to replace real data with substitute
it is a one way algorithm – ie. No unmasking data characters like (*)
SDM – Static Data Masking
DDM – Dynamic Masked Value Redacted Value
Data Masking
4212 5454 6565 7780 4536 6382 **** ****
Tokenization Encryption
The process of substituting a “token” which can The process of encoding data in such a way
be mapped to the original value that only authorized individuals can read it by
Token is a non-sensitive equivalent which has no decrypting the encoded data with a key
extrinsic value
Format Preserving Encryption (FPE) is a special
Must maintain a mapping between the tokens and form of encryption
the original values
24 IBM Security
7. Ensure the Rulers are Informed
25 IBM Security
Build a Bridge..
26 IBM Security
Project Execution – Managing Steady State Data Risk (iDNA ) TM
What vulnerabilities or
compliance issues do
we have?
27 IBM Security
Establish security as an immune system
Privileged identity management Application scanning Entitlements and roles Access management
28 IBM Security
Security as an Immune System
Global Threat Intelligence
Antivirus
Endpoint patching and management
Malware protection
Incident and threat management Transaction protection
Firewalls Device management
Sandboxing Content security
Virtual patching
Network visibility
Fraud protection
Log, flow and
data analysis Criminal detection
Security
Application scanning Intelligence Anomaly detection
Application security Vulnerability
management assessment
Incident
response
29 IBM Security
Where Next?
The next era of security
31 IBM Security
Questions to ask yourself
4. What do we do next?
32 IBM Security
33 IBM Security
THANK YOU
FOLLOW US ON:
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
Start the Conversation..
35 IBM Security