SlideShare a Scribd company logo
1 of 33
Download to read offline
Threat Ready Data:
Protect data from the Inside
and the Outside
Amit Walia
Senior Vice President, General Manager
Data Integration & Security
April 23, 2015
Current State – Threat ready…Really?
2010
2011
2012
2013
2014
Industry: Healthcare
ID Theft is Even More Pervasive
44%Of all data breaches are in
Healthcare
From Identity Theft Resource Center
90%Have experienced a breach
in the last 2 years
2013 ID Experts data security survey of 91 healthcare organizations
38%Have experienced > 5 breach
incidents in
the last 2 years
20-50XMedical identities are more valuable
than financial identities
Industry: Retail
The Real Cost of a Data Breach
Retail data breaches makes the headlines
Customer Loyalty and Revenue Declines
Stolen data used to defraud the retail company
Jobs of C-level leaders are at stake
2014 was the year of retail data breaches
Number of stolen records continue to increase
Industry: Financial Services
Impacted Not Only by Direct Breach, But Also Retail Breaches
45%Of financial services have been hit
2014 Economic Crime Survey by PWC of 5000 senior executives in 99
countries
$200MCard replacement cost of Target
data breach
$40MCard replacement cost of smaller
banks for 4M cards from Target
and Neiman Marcus breaches
Industry: Public Sector
•  73% of DBA’s can view all data, increasing risk of breach
•  50% say data has been compromised or stolen by
malicious insider such as a privileged user
•  The cost of a breach averages $5.5 million
per organization
Data Breach: Internal Breaches and Growing
Challenges
Ponemon Institute May 2012
Data Breach: Is Not IF But WHEN
Data is the new OIL….and everyone
wants to steal it!
Why?
Data Breach: Shouldn’t we Focus on Protecting
the Data?
Host
Endpoint Network Devices
Application
Data
Do You Know the Most Critical Data to Protect?
What Level of Protection Is Required?
Against Outsiders?
Against Insiders?
BUT…
?What has changed?
13
“We’ve moved beyond just protecting endpoints and networks. APTs combined with trends like mobility, cloud, and outsourcing require us to
have security as close to the data as possible– independent of devices, applications, databases, storage platforms, and network topologies.
We need companies like Informatica, who understand data deeply, to take a more active role in helping us to secure information.” –CISO/
CRO, leading global bank
1. Traditional Security Architectures are
Insufficient
2. Data Proliferation Is Inevitable
Is the risk
greater
out here? Or in here?
Data Points to Internal Users
Inside the Firewall
•  Accidental
•  Rogue employee
•  Criminal activity
•  Opportunistic
3. Insiders with privileged access
4. Interpretation of the Law
How do you define and enforce data residency?
?Where are the risks?
Where is your sensitive/private data that
should be protected?
Do you know its RISK exposure?
“…only 26 percent (CEOs) say they have identified
which types of data they hold are the most
attractive to hackers…”
Washington Post, 2014
N=1587, Source: Ponemon Research, May 2014
13%
20%
15%16%
30%
19%
45%
27%
42%
26%
23% 24%
ROW EMEA North America
Yes, All Data Yes, Most Data Yes, Some Data No
Do you know where your structured sensitive
and confidential data resides?
Primary Research of 1500+ enterprise customers
validates key pain points
19
Source: Ponemon Institute June 2014; 1,587 Global IT and Security practitioners in 16 countries
You Need Insights to Manage Your Sensitive Data
Risks
Do you have this information to prioritize your security investments?
Where Is
Your
Sensitive
Data?
Where Is Its
Residency?
Where Is
It Going?
Is It
Protected?
What Are
The
Regulations
That Apply?
Who Has
Access To
It?
What Is Its
Cost If
Stolen?
Data-Centric Security Intelligence & Analytics
Security approach that focuses on gaining
insights about the data context to enable cost-
effective data security controls, complementing
security solutions that focus on protecting the
network perimeter, endpoints, and infrastructure.
Focus security investments on high risk data assets
Data Centric Security: 2 Key Components
DATA SECURITY
CONTROLS
PERSISTENT MASKING
DYNAMIC MASKING
VALIDATION & AUDIT
ARCHIVE
DATA SECURITY
INTELLIGENCE
DISCOVERY
CLASSIFICATION
PROLIFERATION ANALYSIS
RISK ASSESSMENT
REDUCE RISK
OF SENSITIVE DATA EXPOSURE
Data-Centric Security Maturity Model
DISCOVER
Classification
Proliferation
ANALYZE
Exposure
Risk
LDAP
IAM
DAM/DAP
DLP
SIEM
DETECT
Access
Controls
User Activity
Controls
Remediation
PROTECT ORCHESTRATE
Block
Alert
Mask
Archive
Encrypt
Tokenize
MONITOR
Baselines
Usage Patterns
Behavioral
Anomalies
PREDICT
Threats
Behaviors
COLLECT &
CORRELATE
Informatica Data Security
Keep Data Safe Throughout Its Lifecycle
Data	
  Security	
  
Intelligence	
  
Data	
  Protec2on	
  with	
  
Data	
  Masking	
  
Secure	
  Tes2ng	
  with	
  
Test	
  Data	
  
Management	
  
Safely	
  Retain	
  and	
  
Dispose	
  with	
  Data	
  
Archive	
  
DISCOVER
CLASSIFY
ANALYZE
MONITOR
MANAGE RISK
DYNAMIC MASKING
PERSISTENT MASKING
COMPLY
SUBSET
GENERATE
MAINTAIN
MASK TEST DATA
RETIRE LEGACY
APPLICATIONS
MANAGE RETENTION
COMPLY
REDUCE COSTS
OPTIMIZE
PERFORMANCE
What is it?
•  Gather insights from data context
and metadata to deliver location and
risk analytics
•  Leverages information from existing
data management and security
solutions
It answers:
•  Where is my sensitive data?
•  Is it protected?
•  What country is it resident in?
•  Where is it proliferating?
•  Who has access to it?
•  Who uses it?
•  What is its value if stolen?
•  What is my risk?
Data Security Intelligence: Understand Risks
A ‘single pane of glass' to
continuously monitor sensitive data
stores and their risks
•  Enterprise-wide sensitive data
risk analytics
•  Sensitive data classification &
discovery
•  Proliferation analysis
•  Policy-based alerting
•  Integrates data security
information from 3rd parties:
•  Data stores
•  Data owners
•  Classification
•  Protection status
Secure@Source Overview
Informatica Data Privacy and Test Data Mgmt
Solution Architecture
Production
Dev
Test
Train
Informatica Dynamic
Data Masking
Informatica
Test Data
Management
Informatica
Data Subset
Informatica Persistent
Data Masking
Sensitive Data
Discovery
Users
Production Support
CRM
Custom
Billing
ERP
Packaged
EDW
Data Privacy
Compliance Validation
Synthetic Test Data
Informatica
Test Data Generation
Apply Persistent Data Masking
Protect Sensitive Information in Test & Dev
Masked Values
5992-9989-1333-5429
3724-6743-8000-2421
Masked Values
5992-9989-1333-5429
3724-6743-8000-2421
Development
Masked Values
5992-9989-1333-5429
3724-6743-8000-2421
Shuffle
Substitution
Skewing
Credit Card
Informatica Persistent
Data Masking
Testing
Training
Apply Dynamic Data Masking
Protect Sensitive Information in Production
(Sr. Analyst)
Original Values
5992-9989-1333-5429
3724-6743-8000-2421
Masked Values
1234-6789-1000-4422
2233-6789-3456-5555
Custom Application
(IT Administrator)
Masked Values
xxxx-xxxx-xxxx-0093
xxxx-xxxx-xxxx-7658
National ID
Credit Card
Blocking
Informatica Dynamic
Data Masking
(Offshore Support)
Why Informatica?
Thinking Data First: The Intelligent Data Platform Uniquely
Addresses Data Security Challenges
Intelligent Data Platform
Data Intelligence
Metadata meets machine learning
Data Infrastructure
Industry leading data integration, profiling, masking, complex event processing across all sources, anywhere
Define Once. Deploy Anywhere.
On-premise or in cloud
Data
Warehouse
Transactional
Applications
CRM ERP HR FIN
Big
Data
Unstructured
Semi-Structured
Real-time
Events
Mainframe
Systems
Cloud, Social,
Partner Data
Enterprise
Applications
Platform for Universal Data Access
We have successfully LOWER
RISKS, REDUCE COSTS, and
PROTECT SENSITIVE DATA for
600+ customers…
We have been are building off a strong foundation -
Strong showing at RSA 2013, 2014, and 2015
Informatica won awards at Product Award reception at RSA 2013, 2014 & 2015
•  Gold Award for Best New Security Product - Informatica Secure@Source
•  Gold Award for Database Security, Data Leakage Prevention/Extrusion Prevention -
Informatica Dynamic Data Masking
•  Bronze Award for New Product - Informatica Cloud Test Data Management
Threat Ready
-
It’s In Your
Hands
THANK YOU

More Related Content

What's hot

The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big DataNicolas Morales
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data EraPieter De Leenheer
 
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
Customer Intelligence_ Harnessing Elephants at Transamerica    Presentation (1)Customer Intelligence_ Harnessing Elephants at Transamerica    Presentation (1)
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)Vishal Bamba
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research Druva
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsDruva
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...TrustArc
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 

What's hot (20)

The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Data Governance in the Big Data Era
Data Governance in the Big Data EraData Governance in the Big Data Era
Data Governance in the Big Data Era
 
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
Customer Intelligence_ Harnessing Elephants at Transamerica    Presentation (1)Customer Intelligence_ Harnessing Elephants at Transamerica    Presentation (1)
Customer Intelligence_ Harnessing Elephants at Transamerica Presentation (1)
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
DLP
DLPDLP
DLP
 
The state of data privacy with dimensional research
The state of data privacy with dimensional research The state of data privacy with dimensional research
The state of data privacy with dimensional research
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Big Data Security and Governance
Big Data Security and GovernanceBig Data Security and Governance
Big Data Security and Governance
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Security bigdata
Security bigdataSecurity bigdata
Security bigdata
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 

Viewers also liked

Data masking - addressing PII exposure risks in the cloud
Data masking - addressing PII exposure risks in the cloud Data masking - addressing PII exposure risks in the cloud
Data masking - addressing PII exposure risks in the cloud Virginia Mushkatblat
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesTrish McGinity, CCSK
 
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...Splunk
 
Business Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceBusiness Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceCapgemini
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Cloudera, Inc.
 
Informatica Cloud Winter 2016 Release Webinar
Informatica Cloud Winter 2016 Release WebinarInformatica Cloud Winter 2016 Release Webinar
Informatica Cloud Winter 2016 Release WebinarInformatica Cloud
 
User and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solutionUser and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solutionYolanta Beresna
 
Informatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud
 
Informatica Products and Usage
Informatica Products  and UsageInformatica Products  and Usage
Informatica Products and UsageBigClasses Com
 
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)Amazon Web Services
 

Viewers also liked (10)

Data masking - addressing PII exposure risks in the cloud
Data masking - addressing PII exposure risks in the cloud Data masking - addressing PII exposure risks in the cloud
Data masking - addressing PII exposure risks in the cloud
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
Infosecurity Europe 2016: Detect Insider and Advanced Threats by Leveraging M...
 
Business Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceBusiness Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and Compliance
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Informatica Cloud Winter 2016 Release Webinar
Informatica Cloud Winter 2016 Release WebinarInformatica Cloud Winter 2016 Release Webinar
Informatica Cloud Winter 2016 Release Webinar
 
User and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solutionUser and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solution
 
Informatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar Slides
 
Informatica Products and Usage
Informatica Products  and UsageInformatica Products  and Usage
Informatica Products and Usage
 
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
AWS re:Invent 2016: IAM Best Practices to Live By (SAC317)
 

Similar to Threat Ready Data: Protect Data from the Inside and the Outside

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...infoLock Technologies
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsSolarWinds
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOnRamp
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionGianmarco Ferri
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Hortonworks
 

Similar to Threat Ready Data: Protect Data from the Inside and the Outside (20)

Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Microsoft 365 Compliance
Microsoft 365 ComplianceMicrosoft 365 Compliance
Microsoft 365 Compliance
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
Classification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtectionClassification-HowToBoostInformationProtection
Classification-HowToBoostInformationProtection
 
Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25Dataguise hortonworks insurance_feb25
Dataguise hortonworks insurance_feb25
 

More from DLT Solutions

WebLogic 12c & WebLogic Mgmt Pack
WebLogic 12c & WebLogic Mgmt PackWebLogic 12c & WebLogic Mgmt Pack
WebLogic 12c & WebLogic Mgmt PackDLT Solutions
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access ManagementDLT Solutions
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingDLT Solutions
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security OptionDLT Solutions
 
Replicate data between environments
Replicate data between environmentsReplicate data between environments
Replicate data between environmentsDLT Solutions
 
Streamline it management
Streamline it managementStreamline it management
Streamline it managementDLT Solutions
 
Consolidate and prepare for cloud efficiencies
Consolidate and prepare for cloud efficienciesConsolidate and prepare for cloud efficiencies
Consolidate and prepare for cloud efficienciesDLT Solutions
 
Red Hat Software Defined Storage
Red Hat Software Defined StorageRed Hat Software Defined Storage
Red Hat Software Defined StorageDLT Solutions
 
Openshift Container Platform
Openshift Container PlatformOpenshift Container Platform
Openshift Container PlatformDLT Solutions
 
Red Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationRed Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationDLT Solutions
 
Red Hat JBoss Data Virtualization
Red Hat JBoss Data VirtualizationRed Hat JBoss Data Virtualization
Red Hat JBoss Data VirtualizationDLT Solutions
 
How to Upgrade Hundreds or Thousands of Databases
How to Upgrade Hundreds or Thousands of DatabasesHow to Upgrade Hundreds or Thousands of Databases
How to Upgrade Hundreds or Thousands of DatabasesDLT Solutions
 
Why Upgrade to Oracle Database 12c?
Why Upgrade to Oracle Database 12c?Why Upgrade to Oracle Database 12c?
Why Upgrade to Oracle Database 12c?DLT Solutions
 
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersCross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersDLT Solutions
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat ReportsDLT Solutions
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Deploying and Managing Red Hat Enterprise Linux in Amazon Web Services
Deploying and Managing Red Hat Enterprise Linux in Amazon Web ServicesDeploying and Managing Red Hat Enterprise Linux in Amazon Web Services
Deploying and Managing Red Hat Enterprise Linux in Amazon Web ServicesDLT Solutions
 
Implementing BIM for Owners
Implementing BIM for OwnersImplementing BIM for Owners
Implementing BIM for OwnersDLT Solutions
 
Autodesk Infrastructure Solutions for Government Agencies
Autodesk Infrastructure Solutions for Government AgenciesAutodesk Infrastructure Solutions for Government Agencies
Autodesk Infrastructure Solutions for Government AgenciesDLT Solutions
 

More from DLT Solutions (20)

WebLogic 12c & WebLogic Mgmt Pack
WebLogic 12c & WebLogic Mgmt PackWebLogic 12c & WebLogic Mgmt Pack
WebLogic 12c & WebLogic Mgmt Pack
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
 
Replicate data between environments
Replicate data between environmentsReplicate data between environments
Replicate data between environments
 
Streamline it management
Streamline it managementStreamline it management
Streamline it management
 
Consolidate and prepare for cloud efficiencies
Consolidate and prepare for cloud efficienciesConsolidate and prepare for cloud efficiencies
Consolidate and prepare for cloud efficiencies
 
Red Hat Software Defined Storage
Red Hat Software Defined StorageRed Hat Software Defined Storage
Red Hat Software Defined Storage
 
Openshift Container Platform
Openshift Container PlatformOpenshift Container Platform
Openshift Container Platform
 
Red Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationRed Hat JBOSS Data Virtualization
Red Hat JBOSS Data Virtualization
 
Red Hat JBoss Data Virtualization
Red Hat JBoss Data VirtualizationRed Hat JBoss Data Virtualization
Red Hat JBoss Data Virtualization
 
How to Upgrade Hundreds or Thousands of Databases
How to Upgrade Hundreds or Thousands of DatabasesHow to Upgrade Hundreds or Thousands of Databases
How to Upgrade Hundreds or Thousands of Databases
 
Why Upgrade to Oracle Database 12c?
Why Upgrade to Oracle Database 12c?Why Upgrade to Oracle Database 12c?
Why Upgrade to Oracle Database 12c?
 
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersCross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling Computers
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat Reports
 
DLT Portal
DLT PortalDLT Portal
DLT Portal
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Deploying and Managing Red Hat Enterprise Linux in Amazon Web Services
Deploying and Managing Red Hat Enterprise Linux in Amazon Web ServicesDeploying and Managing Red Hat Enterprise Linux in Amazon Web Services
Deploying and Managing Red Hat Enterprise Linux in Amazon Web Services
 
Implementing BIM for Owners
Implementing BIM for OwnersImplementing BIM for Owners
Implementing BIM for Owners
 
Autodesk Infrastructure Solutions for Government Agencies
Autodesk Infrastructure Solutions for Government AgenciesAutodesk Infrastructure Solutions for Government Agencies
Autodesk Infrastructure Solutions for Government Agencies
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Threat Ready Data: Protect Data from the Inside and the Outside

  • 1.
  • 2. Threat Ready Data: Protect data from the Inside and the Outside Amit Walia Senior Vice President, General Manager Data Integration & Security April 23, 2015
  • 3. Current State – Threat ready…Really? 2010 2011 2012 2013 2014
  • 4. Industry: Healthcare ID Theft is Even More Pervasive 44%Of all data breaches are in Healthcare From Identity Theft Resource Center 90%Have experienced a breach in the last 2 years 2013 ID Experts data security survey of 91 healthcare organizations 38%Have experienced > 5 breach incidents in the last 2 years 20-50XMedical identities are more valuable than financial identities
  • 5. Industry: Retail The Real Cost of a Data Breach Retail data breaches makes the headlines Customer Loyalty and Revenue Declines Stolen data used to defraud the retail company Jobs of C-level leaders are at stake 2014 was the year of retail data breaches Number of stolen records continue to increase
  • 6. Industry: Financial Services Impacted Not Only by Direct Breach, But Also Retail Breaches 45%Of financial services have been hit 2014 Economic Crime Survey by PWC of 5000 senior executives in 99 countries $200MCard replacement cost of Target data breach $40MCard replacement cost of smaller banks for 4M cards from Target and Neiman Marcus breaches
  • 8. •  73% of DBA’s can view all data, increasing risk of breach •  50% say data has been compromised or stolen by malicious insider such as a privileged user •  The cost of a breach averages $5.5 million per organization Data Breach: Internal Breaches and Growing Challenges Ponemon Institute May 2012
  • 9. Data Breach: Is Not IF But WHEN
  • 10. Data is the new OIL….and everyone wants to steal it! Why?
  • 11. Data Breach: Shouldn’t we Focus on Protecting the Data? Host Endpoint Network Devices Application Data Do You Know the Most Critical Data to Protect? What Level of Protection Is Required? Against Outsiders? Against Insiders? BUT…
  • 13. 13 “We’ve moved beyond just protecting endpoints and networks. APTs combined with trends like mobility, cloud, and outsourcing require us to have security as close to the data as possible– independent of devices, applications, databases, storage platforms, and network topologies. We need companies like Informatica, who understand data deeply, to take a more active role in helping us to secure information.” –CISO/ CRO, leading global bank 1. Traditional Security Architectures are Insufficient
  • 14. 2. Data Proliferation Is Inevitable
  • 15. Is the risk greater out here? Or in here? Data Points to Internal Users Inside the Firewall •  Accidental •  Rogue employee •  Criminal activity •  Opportunistic 3. Insiders with privileged access
  • 16. 4. Interpretation of the Law How do you define and enforce data residency?
  • 17. ?Where are the risks?
  • 18. Where is your sensitive/private data that should be protected? Do you know its RISK exposure? “…only 26 percent (CEOs) say they have identified which types of data they hold are the most attractive to hackers…” Washington Post, 2014 N=1587, Source: Ponemon Research, May 2014 13% 20% 15%16% 30% 19% 45% 27% 42% 26% 23% 24% ROW EMEA North America Yes, All Data Yes, Most Data Yes, Some Data No Do you know where your structured sensitive and confidential data resides?
  • 19. Primary Research of 1500+ enterprise customers validates key pain points 19 Source: Ponemon Institute June 2014; 1,587 Global IT and Security practitioners in 16 countries
  • 20. You Need Insights to Manage Your Sensitive Data Risks Do you have this information to prioritize your security investments? Where Is Your Sensitive Data? Where Is Its Residency? Where Is It Going? Is It Protected? What Are The Regulations That Apply? Who Has Access To It? What Is Its Cost If Stolen?
  • 21. Data-Centric Security Intelligence & Analytics Security approach that focuses on gaining insights about the data context to enable cost- effective data security controls, complementing security solutions that focus on protecting the network perimeter, endpoints, and infrastructure. Focus security investments on high risk data assets
  • 22. Data Centric Security: 2 Key Components DATA SECURITY CONTROLS PERSISTENT MASKING DYNAMIC MASKING VALIDATION & AUDIT ARCHIVE DATA SECURITY INTELLIGENCE DISCOVERY CLASSIFICATION PROLIFERATION ANALYSIS RISK ASSESSMENT REDUCE RISK OF SENSITIVE DATA EXPOSURE
  • 23. Data-Centric Security Maturity Model DISCOVER Classification Proliferation ANALYZE Exposure Risk LDAP IAM DAM/DAP DLP SIEM DETECT Access Controls User Activity Controls Remediation PROTECT ORCHESTRATE Block Alert Mask Archive Encrypt Tokenize MONITOR Baselines Usage Patterns Behavioral Anomalies PREDICT Threats Behaviors COLLECT & CORRELATE
  • 24. Informatica Data Security Keep Data Safe Throughout Its Lifecycle Data  Security   Intelligence   Data  Protec2on  with   Data  Masking   Secure  Tes2ng  with   Test  Data   Management   Safely  Retain  and   Dispose  with  Data   Archive   DISCOVER CLASSIFY ANALYZE MONITOR MANAGE RISK DYNAMIC MASKING PERSISTENT MASKING COMPLY SUBSET GENERATE MAINTAIN MASK TEST DATA RETIRE LEGACY APPLICATIONS MANAGE RETENTION COMPLY REDUCE COSTS OPTIMIZE PERFORMANCE
  • 25. What is it? •  Gather insights from data context and metadata to deliver location and risk analytics •  Leverages information from existing data management and security solutions It answers: •  Where is my sensitive data? •  Is it protected? •  What country is it resident in? •  Where is it proliferating? •  Who has access to it? •  Who uses it? •  What is its value if stolen? •  What is my risk? Data Security Intelligence: Understand Risks
  • 26. A ‘single pane of glass' to continuously monitor sensitive data stores and their risks •  Enterprise-wide sensitive data risk analytics •  Sensitive data classification & discovery •  Proliferation analysis •  Policy-based alerting •  Integrates data security information from 3rd parties: •  Data stores •  Data owners •  Classification •  Protection status Secure@Source Overview
  • 27. Informatica Data Privacy and Test Data Mgmt Solution Architecture Production Dev Test Train Informatica Dynamic Data Masking Informatica Test Data Management Informatica Data Subset Informatica Persistent Data Masking Sensitive Data Discovery Users Production Support CRM Custom Billing ERP Packaged EDW Data Privacy Compliance Validation Synthetic Test Data Informatica Test Data Generation
  • 28. Apply Persistent Data Masking Protect Sensitive Information in Test & Dev Masked Values 5992-9989-1333-5429 3724-6743-8000-2421 Masked Values 5992-9989-1333-5429 3724-6743-8000-2421 Development Masked Values 5992-9989-1333-5429 3724-6743-8000-2421 Shuffle Substitution Skewing Credit Card Informatica Persistent Data Masking Testing Training
  • 29. Apply Dynamic Data Masking Protect Sensitive Information in Production (Sr. Analyst) Original Values 5992-9989-1333-5429 3724-6743-8000-2421 Masked Values 1234-6789-1000-4422 2233-6789-3456-5555 Custom Application (IT Administrator) Masked Values xxxx-xxxx-xxxx-0093 xxxx-xxxx-xxxx-7658 National ID Credit Card Blocking Informatica Dynamic Data Masking (Offshore Support)
  • 30. Why Informatica? Thinking Data First: The Intelligent Data Platform Uniquely Addresses Data Security Challenges Intelligent Data Platform Data Intelligence Metadata meets machine learning Data Infrastructure Industry leading data integration, profiling, masking, complex event processing across all sources, anywhere Define Once. Deploy Anywhere. On-premise or in cloud Data Warehouse Transactional Applications CRM ERP HR FIN Big Data Unstructured Semi-Structured Real-time Events Mainframe Systems Cloud, Social, Partner Data Enterprise Applications Platform for Universal Data Access
  • 31. We have successfully LOWER RISKS, REDUCE COSTS, and PROTECT SENSITIVE DATA for 600+ customers…
  • 32. We have been are building off a strong foundation - Strong showing at RSA 2013, 2014, and 2015 Informatica won awards at Product Award reception at RSA 2013, 2014 & 2015 •  Gold Award for Best New Security Product - Informatica Secure@Source •  Gold Award for Database Security, Data Leakage Prevention/Extrusion Prevention - Informatica Dynamic Data Masking •  Bronze Award for New Product - Informatica Cloud Test Data Management
  • 33. Threat Ready - It’s In Your Hands THANK YOU