InfoSecChat

Fox In The Hen House? (1 of 3)
Could you spot the fox in your hen house? Protect your sensitive data from insider threats.
   8 years ago
#InfoSecChatCloud Security ChatLet's talk Cloud Security- The benefits, the bias, and your burning questions.
   8 years ago
#InfoSecChatFox In The Hen House? (2 of 3)Could you spot the fox in your hen house? Protect your sensitive data from insider threats.
IBM Security
Q3: How do I find my sensitive data in the first place, so I can start protecting it?
Luis Casco-Arias
there are several methods, but first you have to define what is sensitive/critical to the org
Leslie Wiggins
A3: Finding sensitive data is an ongoing activity -- not once and done (because data is dynamic, distributed and in demand .. and moving all the time)
Andy Land
A3: Need a concerted effort by your team and some automation. Lots of great tools including @IBMSecurity Guardium.
Luis Casco-Arias
Once categories are defined, then you could use organizational memory or automatic discovery tools
Leslie Wiggins
A3: Finding sensitive data manually is impractical - error prone, expensive and time consuming
Datapipe
If you're using an MSP, they should provide analytics or have monitoring/scanning services to help you locate sensitive data. Otherwise there are third-party tools to help. But it's important to maintain use. This is an ongoing battle.
Cindy Compert,CIPT/M
a3 a Privacy Impact Assessment is a good place to start + lots of tools
Leslie Wiggins
A3: It's important to have automated discovery and classification - across all repositories where sensitive data lurks (DB, apps, big data, etc)
IBM Security
Also, check out our ebook on #InsiderThreat to learn more: ibm.co/1RDWloF
Andy Land
@LeslieW66749952 So key is using tools built for the job.
John Martin
One has to identify all assets, which have value and then assess them.
Luis Casco-Arias
right... it is not enough to discover once... since data moves and changes all the time.
Kevin G. Joseph
It is so important not to have dozens of security products that don't talk to each other. When investing in security, businesses need to look for a comprehensive security program that increases visibility and integrates seamlessly.
Cindy Compert,CIPT/M
a3 Don't forget data in flight that is never stored! big trend in #cognitive
Leslie Wiggins
You are right John, That's where automated discovery and classification comes into play.
Luis Casco-Arias
besides is not enough just to find the data, but also who has access, how they access... the idea is to identify risk and do something to reduce it.
Andy Land
@CCBigData Privacy is a big consideration when taking on classifying sensitive data.
Datapipe
Employing role-based access is very helpful.
Luis Casco-Arias
a strategy for classification is also important... you do not want to boil the ocean
Leslie Wiggins
Last question was just posted, as we are going to start wrapping up.
Navroop Mitter
not only is once and done not the right approach, value is often created by combining distinct pieces of data in distinct repositories. We have to start looking at what value may come if different pieces of information are brought together.
Leslie Wiggins
Please respond to the question, and then join us for Part II in this discussion
Leslie Wiggins
On 1/28 at 2pm est!
IBM Security
Q2: What data is considered sensitive data?
Christina F Thompson
A2: Basically anything you don't want anyone else to have access to (cust data, patient data, etc)
Andy Land
A2: Lots of answers to this one. If bad guys want it, then sensitive. Clearly regulations dictated things like PII. @IBMSecurity
Luis Casco-Arias
any information that is critical to run the business, including protecting your customer/employee/partner data
Cindy Compert,CIPT/M
a2 It depends on the org- how you classify.. should be decided by the business, legal, compliance, privacy office, etc..
Leslie Wiggins
A2: IP-oriented data counts too - like email comms, proprietary product info, Intellectual property, manufacturing info, etc
Kevin G. Joseph
Two Types of #Data: 1) Data someone wants 2) Everything else... important to find #CriticalAssets, prioritize them and lock them down!
Andy Land
The key for your organization is knowing what data is sensitvie for your business. I talked to a lot of customers where this is fuzzy. @IBMSecurity
Leslie Wiggins
A2: Compromised sensitive data leads to brand erosion, legal action, negative attention in the news, etc.
Cindy Compert,CIPT/M
@LeslieW66749952 Good point. Orgs really struggle with PII due to conflicting privacy regulations, esp. multinationals.
Datapipe
Ask yourself: Is all customer/client data you have critical? Don't hold onto extraneous information that could compromise a customer if you don't need to.
Leslie Wiggins
@CCBigData And now there's the European regulation that's going into effect - impacting more organizations
Christina F Thompson
A2: Great blog on Data Privacy, specifically, go to securityintelligence... from 1/28
Andy Land
@CCBigData This is really tough for multi-nationals operating all over the world. Sensitive data is everywhere.
Cindy Compert,CIPT/M
@LeslieW66749952 EU #GDPR will be a massive change to privacy as far as sensitive data, consent, & profiling
Cindy Compert,CIPT/M
a2 @AndylandTx Yes it's a governance issue & cloud makes it even more interesting!
John Martin
Anything you deem is valuable to you and others including organisations you either work for or are associated with.
Navroop Mitter
problem w/ solely relying on pre-classification of data as either worthy or necessitating protection is that sometimes dots can only be connected going backwards. Desire to limit what we secure often stems from experiences w/ poor security UX.
IBM Security
Q4: How do you recognize someone misusing credentials?
Luis Casco-Arias
need a way to identify abnormal/suspicious behavior in real time
Andy Land
A4: Lots of exciting work in this area like outlier detection, user behavioral analytics, and tools to mitigate entitlements creep.@IBMSecurity
Christina F Thompson
A4: i. Go through discovery and classification exercise
Luis Casco-Arias
or to check abuse of privileges, which may be beyond the access controls of the platform
Cindy Compert,CIPT/M
#machinelearning and #cognitive alerting on suspicious activities
Leslie Wiggins
A4: Support entitlement reporting and create security policies for who should be able to access what
Kevin G. Joseph
1) #Prevent through understating behavior based capabilities of applications and users, 2) #Detect through #anomalies in behavior and 3) #Respond to those anomalies by quarantining systems and apps!
Andy Land
A4: We @IBMSecurity are really seeing a tight intersection of Data Security with Identity and Access Management. We have to look at and monitor users and know what data is sensitive.
Cindy Compert,CIPT/M
also correlate with other security events such as network server identity etc
IBM Security
Also, check out this great piece of research by the IBM XForce team on inside threat: ibm.co/1N7FdiP
Luis Casco-Arias
today, the only way is to leverage analytics, not only to identify misuse, but predict misuse
Leslie Wiggins
A4: Monitoring, with real-time analytics, can help you spot anomalies & suspicious behavior & kick it 4 review or block access 2 data in real-time
Datapipe
If only an alarm went off when someone was misusing credentials. Though that wouldn't be good for jumpy folks.
Andy Land
At the end of the day it comes down to what the user can access. What level of privileges does the access give them. And does your company know that they have that access.@IBMSecurity
Luis Casco-Arias
predicting misuse requires knowledge beyond the data interface to contextual data.. great case for cognitive