Data Security Today: Challenges

About This Presentation
Title:

Data Security Today: Challenges

Description:

Japan's Personal Information Protection Law ... Sarbanes-Oxley Act ... 19% of consumer affected by a data breach terminate their ... – PowerPoint PPT presentation

Number of Views:50
Avg rating:3.0/5.0

less

Transcript and Presenter's Notes

Title: Data Security Today: Challenges


1
Data Security Today Challenges Requirements
Rob MacIntosh West Coast Sales Manager robert.maci
ntosh_at_utimaco.com 480-726-0020
2
Todays Challenges 1. Information Leakage and
Data Loss on the Rise
3
Todays Challenges 2. Increasing Frequency of
Data Breaches
  • Over 20 high profile breaches in the last 12-18
    months.
  • Since 2005 More than 97 million records
    containing sensitive personal information were
    involved in security breaches. (Source
    www.privacyrights.org/ar/ChronDataBreaches.htm,
    11/2006)
  • Every 53 seconds a laptop is stolen (Source
    http//www.usatoday.com/tech/news/computersecurity
    /2006-11-19-lockdown-laptop_x.htm)
  • 90 of companies detected security breaches in
    last 12 months(Source Federal Bureau of
    Investigation, 2006)

4
The Need for Data Security 3. Data Security
Regulations enforce Proper Protection
5
Todays Challenges 4. Growing Business Impact of
Data Breaches
19 of consumer affected by a data breach
terminate their relationship with the offending
company and 40 consider a termination
Average cost percompromised record 182
54 Customer Costs
30 Incremental Costs
16 Productivity Costs
  • Lost employee productivity
  • Unbudgeted legal, audit and accounting fees
  • Notification of customers
  • Free or discounted service to customers
  • Call center expenses
  • Public and investor relations
  • Internal investigations
  • Brand damage
  • Loss of existing customers
  • Recruiting new customers

Source Ponemon Institute, Cost of Data Breaches,
2006
6
Data Security 2.0 Requirements1. Safeguard Your
Data not just the Infrastructure
  • Cross-company processes
  • Open IT Infrastructures
  • Bad guys may be within the company perimeter
    already
  • Data-level protection
  • Safeguard the end point and the individual
    transaction
  • Firewalls and Security Gateways protect the
    company perimeter
  • Let the good guys in, keep the bad guys out
  • Closed shop with own policies, and rules

7
Data Security 2.0 Requirements2. Shift from a
Tool Mindset to an Integrated Approach
  • Integration instead of pure best-of-breed
  • Transparency and manageability
  • Reduces costs by decreasing the burden for
    end-users and administrators
  • Proprietary point security solutions
  • No central policy management enforcement
  • Difficult for users and administrators
  • Costly and often not scalable

8
Data Security 2.0 Requirements3. Embrace a 360
Approach to Data Security
9
Thank You.
Write a Comment
User Comments (0)