the x factor in data centric security
TRANSCRIPT
![Page 1: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/1.jpg)
The X-Factor in Data-Centric Security
Webinar, Tuesday July 14th 2015
![Page 2: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/2.jpg)
2WEBINAR: “The X-Factor in Data"
*The Insider Threat SpotlIght Report
Tuesday July 14th 2015
![Page 3: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/3.jpg)
3
Introductions & “House Rules” A Data-Centric Approach Is Required For Security Today Are You Controlling Information Disclosure? RightsWATCH Live Demo Questions & Answers
Agenda
WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015
![Page 4: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/4.jpg)
4
Heidi SheyHeidi serves Security & Risk Professionals in solutions for data security and privacy and for security architecture and operations. Her research focus is on data discovery and classification, secure file sharing and collaboration, cybersecurity and privacy topics such as policy and regulatory concerns, biometrics, and consumer security.
Rui Melo BiscaiaRui serves as the Director of Product Management for Watchful Software, and is responsible for the company's product direction and go-to-market
Introductions
WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015
![Page 5: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/5.jpg)
5
You are muted centrally. You don’t need to mute/unmute yourself
This webinar is being recorded. The recording will be available tomorrow at www.watchfulsoftware.com
The Q&A session will be at the end
You are welcomed to enter questions anytime, using the Chat feature in the GoToWebinar Control Panel
Some “House Rules”
WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015
![Page 6: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/6.jpg)
6
Introductions & “House Rules” A Data-Centric Approach Is Required For Security Today Are You Controlling Information Disclosure? RightsWATCH Live Demo Questions & Answers
Agenda
WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015
![Page 7: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/7.jpg)
A Data-Centric Approach Is Required For Security TodayHeidi Shey, Senior Analyst
![Page 8: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/8.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 8
Yesterday’s approach to data security
![Page 9: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/9.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 9
…is insufficient for today’s reality
![Page 10: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/10.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 10
…is insufficient for today’s reality›Your employees get work done in different ways
Source: Forrester’s Business Technographics Global Telecom And Mobility Workforce Survey, 2014
![Page 11: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/11.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 11
…is insufficient for today’s reality›Your employees get work done in different ways
Source: Forrester’s Business Technographics Global Telecom And Mobility Workforce Survey, 2014
52% of information workers use multiple devices for work
![Page 12: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/12.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 12
…is insufficient for today’s reality›Your data is everywhere
![Page 13: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/13.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 13
…is insufficient for today’s reality›The threat landscape has changed
Nation state
sponsoredHactivist Cybercriminal Insiders
![Page 14: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/14.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 14
…is insufficient for today’s reality
![Page 15: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/15.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 15
are actually aware of or understand their company’s data use/handling policies
say they follow security policies
…is insufficient for today’s reality›Your employees have varying attitudes about data
51%
Source: Forrester's Business Technographics Global Devices And Security Workforce Survey, 2014
56%
![Page 16: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/16.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 16
Defense in depth is a good concept
Defense
![Page 17: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/17.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 17
…but often turns into expense in depth
![Page 18: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/18.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 18
Causes of expense in depth
Lack of an overarching strategy
![Page 19: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/19.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 19
Causes of expense in depth
Lack of an overarching strategy
Insufficient due diligence; feature/capability overlap and redundancy
![Page 20: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/20.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 20
Causes of expense in depth
Lack of an overarching strategy
Insufficient due diligence; feature/capability overlap and redundancy
Difficulty integrating different solutions; too many silos
![Page 21: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/21.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 21
It’s time for a data-centric strategyPut your controls closer to the data
![Page 22: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/22.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 22
Forrester’s data security and control framework
DefineData discovery Data classification
![Page 23: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/23.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 23
Forrester’s data security and control framework
DefineData discovery Data classification
![Page 24: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/24.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 24
Forrester’s data security and control framework
DefineData discovery Data classification
DissectData intelligence Data analytics
![Page 25: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/25.jpg)
© 2015 Forrester Research, Inc. Reproduction Prohibited 25
Forrester’s data security and control framework
DefineData discovery Data classification
DissectData intelligence Data analytics
DefendAccess Inspect Dispose Kill
![Page 26: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/26.jpg)
© 2014 Forrester Research, Inc. Reproduction Prohibited 26
Source: Forrester’s April 2014 “TechRadar™: Data Security, Q2 2014”
• Restrict and strictly enforce access control to data.
• Monitor and identify abnormal patterns of network or user behavior.
• Block exfiltration of sensitive data.
• Render successful theft of data harmless.
Why these 20 technologies?
Key technologies and their outlook
![Page 27: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/27.jpg)
© 2014 Forrester Research, Inc. Reproduction Prohibited 27
Source: Forrester’s April 2014 “TechRadar™: Data Security, Q2 2014”
Key technologies and their outlook
• Discovery and classification• Sharing and collaboration• Data loss prevention• Rights management• Key management
Capabilities evolve, converge
![Page 28: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/28.jpg)
© 2014 Forrester Research, Inc. Reproduction Prohibited 28
Benefits of a data centric strategy
Know your data
![Page 29: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/29.jpg)
© 2014 Forrester Research, Inc. Reproduction Prohibited 29
Benefits of a data centric strategy
Know your data
Align security with
business initiatives
![Page 30: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/30.jpg)
© 2014 Forrester Research, Inc. Reproduction Prohibited 30
Benefits of a data centric strategy
Know your data
Prioritize data controls
and investment
Align security with
business initiatives
![Page 31: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/31.jpg)
© 2014 Forrester Research, Inc. Reproduction Prohibited 31
Benefits of a data centric strategy
Know your data
Prioritize data controls and investment
Align security with business
initiatives
Build a foundation for data security and privacy
culture
![Page 32: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/32.jpg)
© 2014 Forrester Research, Inc. Reproduction Prohibited 32
Benefits of a data centric strategy
Know your data
Prioritize data controls and investment
Align security with business
initiatives
Build a foundation for data security and privacy
culture
Transform data security and privacy
into a business differentiator
![Page 33: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/33.jpg)
33WEBINAR: “The X-Factor in Data"
What do you anticipate as your biggest challenge for a data-centric approach to security?
1. Data classification2. Budget; justification for investment3. Staffing constraints4. Prioritizing our investments5. Addressing compliance requirements
Poll
Tuesday July 14th 2015
![Page 34: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/34.jpg)
Introductions & “House Rules” A Data-Centric Approach Is Required For Security Today Are You Controlling Information Disclosure? RightsWATCH Live Demo Questions & Answers
34
Agenda
WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015
![Page 35: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/35.jpg)
Are you controlling information disclosure?Rui Melo Biscaia, Director of Product Management
![Page 36: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/36.jpg)
36WEBINAR: “The X-Factor in Data"
The sheer amount of data to protect is overwhelming Cloud, “BYO” and 3rd parties ultimately mean “Data has Left the Building” Data exists to be consumed, thus security MUST become Data-Centric Rendering your data useless is the strongest answer to the “not IF but WHEN” issue
Are you controlling information disclosure?
Tuesday July 14th 2015
![Page 37: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/37.jpg)
37WEBINAR: “The X-Factor in Data"
Need to locate, index, and catalogue data for better control
RightsWATCH: Discovers data files in repositories and tags it according to the
data toxicity Always analyses content, context and file attributes to discover
and classify every single data file, wherever the file resides
Forrester’s data security and control framework
Data discovery Data classification
Tuesday July 14th 2015
![Page 38: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/38.jpg)
38WEBINAR: “The X-Factor in Data"
Forrester’s data security and control framework (II)
Data intelligence Data analytics
Need to provide business and other contextual insights about data, while identifying changing threats to data and guides decision-making
RightsWATCH: Provides intelligent time access and content expiration
controls over data Delivers a comprehensive audit trail on who is doing, what,
when and how with data that is valuable to the business and to security
Tuesday July 14th 2015
![Page 39: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/39.jpg)
39WEBINAR: “The X-Factor in Data"
DisposeAccess
Forrester’s data security and control framework (III)
Inspect Kill
Need to ensure the right user gets access to the right data at the right time; understand patterns to identify risks; mitigate risk by discarding data; and ensure data can’t be used or sold
RightsWATCH: Applies the principle of least privilege, by enforcing RBAC over data Logs a comprehensive audit trail to mitigate the malicious internal user Delivers a proper classification tags for data disposal purposes Leverages encryption to devalue and/or remote “Kill” data
Tuesday July 14th 2015
![Page 40: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/40.jpg)
40
RightsWATCH is Data-centric Security
WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015
![Page 41: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/41.jpg)
Introductions & “House Rules” A Data-Centric Approach Is Required For Security Today Are You Controlling Information Disclosure? RightsWATCH Live Demo Questions & Answers
41
Agenda
WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015
![Page 42: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/42.jpg)
42
RightsWATCH Live Demo
WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015
![Page 43: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/43.jpg)
Introductions & “House Rules” A Data-Centric Approach Is Required For Security Today Are You Controlling Information Disclosure? RightsWATCH Live Demo Questions & Answers
43
Agenda
WEBINAR: “The X-Factor in Data"Tuesday July 14th 2015
![Page 44: The X Factor in Data Centric Security](https://reader036.vdocuments.mx/reader036/viewer/2022062904/5876a0f21a28abd6508b50e5/html5/thumbnails/44.jpg)
The X-Factor in Data-Centric Security
Questions & Answers
Webinar, Tuesday July 14th 2015