This website uses cookies. By continuing to browse this website, you accept our use of cookies and our Cookie Policy. Close
Thursday, Nov 19, 2020

Webinar - A Technical Blueprint for Data Protection

Share

What’s the point of deploying DLP if you don’t implement the ‘P’? That’s where Robert Mechler, our Principal Security Strategist and I start the discussion. Among many topics, we also discuss the role of dynamic data protection and the nine essentials for data protection success.

Here’s a preview of what we’ll discuss in our upcoming A Technical Blueprint for Data Protection webinar next week.

Webinar - A Technical Blueprint for Data Protection

Time to rethink data protection

Faced with a deluge of data, enterprises are being forced to rethink data protection. Here are the facts: Almost 90% of all data was created in the last two years; people generate 2.5 quintillion bytes of data each day; and unstructured data is a problem for 95% of businesses.

Moreover, this data is expanding across emerging channels, particularly in the cloud. And with many people still working from home during the pandemic, security professionals are also having to rethink the way data is protected on personal laptops and home networks.

The traditional enterprise response is a static ‘one size fits all’ threat-centric security strategy: allow users to perform everyday tasks, like printing a doc, engaging by email or using a USB stick – but prohibit them from riskier tasks, like using cloud applications or uploading content to a portal.

That static strategy worked well when everyone operated within the confines of an enterprise perimeter. However, now that people work from just about anywhere, a static approach just doesn't go far enough.

A real-world example: a user tries to save a presentation to a flash drive. A static, threat-centric solution isn’t sure if this is good or bad, and defaults to block the action. With no insight into broader context, friction increases. A high volume of flagged activities like these overwhelms security teams, while legitimate threats remain hidden and can more easily infiltrate the network.

User-centric frictionless security

In response, enterprises are replacing this broad, sweeping approach to security with individualized, adaptive data policies that don’t slow employees down. Dynamic data protection applies monitoring and enforcement controls that adapt to changes in human behavior.

A behavior-centric analytics engine correlates data to compile a risk score for each user, with risk levels driven up and down automatically according to behavior. Changes in risk levels drive different customized outcomes, whether it is allowing, auditing or blocking the action. The result? You triage fewer alarms, reduce investigation time and deter data loss events.

Nine steps to data protection success

Robert and I also walk through the nine steps enterprises should take to balance productivity against security. In the discussion, we drill into each one in depth. Those of you who are interested  can also explore each step in our Infographic or by reading the ‘Practical Executive’s Guide to Data Loss Prevention’ White Paper.

One of the preliminary steps is to create a risk profile. First, state the risks you want to mitigate and list out the types of data they pertain to. Then, define the networks, endpoints, and cloud channels where that data could be lost along with the controls you currently use to secure them.

Another vital step we discussed is to map each data type to its impact. This way you can prioritize your responses and keep security resources focused where they’re most eff­ective.

Beyond that, we also discuss how to identify a data incident response by channel, establishing an incident workflow and defining team responsibilities.

Once your network data protection is in place, a monitoring period will let you identify activity patterns and set a baseline to determine normal user behavior. What you’ve learned in monitoring mode will give you the level of confidence you need to transition into blocking mode for high-risk events, or in accordance with your incident response plan.

Whether you take a traditional approach or augment your security with risk-adaptive data protection, the webinar’s nine steps will guide you to success.

Register for next week’s webinar here on BrightTalk or click on the green Register Here button to the right.

About the Author

Ankur Chadda

Ankur serves as Principal Solutions Manager for the company. He brings over 20 years of experience in the technology industry and leads the product marketing efforts for data protection solutions leveraging his UEBA startup experience where he helped global enterprises implement behavior...