Title: PREVENTION OF INSIDER THREATS TO INFORMATION
1PREVENTION OF INSIDER THREATS TO INFORMATION
2Company Overview
- Uniquely focused on prevention of insider threats
to information - Innovative products builtout of personal need
- Strong acceptance
- Insurance
- Pharmaceutical
- Technology software
- Entertainment
- Founded November 2002
- Headquartered in Waltham, MA
3Insider Threat Illegitimate Use of Legitimate
Authority
- 70 of incidents with loss involve insiders
- IP loss the costliest form of cybercrime
- 72 have no ethical problem seeking personal gain
4- Motive
- Users have intimate knowledge of infos value
- Some want to personally benefit others err
5Point-of-UseVisibility Continuous monitoring of
all information use
RISK ASSESSMENT
How does information leave the companyand what
kind of information?
INCIDENT RESPONSE
POLICY ENFORCEMENT
What information has a departing employee removed?
How did sourcecode find its way onto the internet?
AUDIT
6- Storage Device Management
- Control the use of storage devices
- CD/DVD, USB flash drives, local network disc
drives - What can be written/read, whenand by whom?
Point-of-UsePolicy Enforcement Control with
Consequences
- Application Management
- White/blacklisting apps
- Limit attachment, clipboard printing
- Limit network access by app, port number, IP
address user
Data Containment Prevention of IP Loss Leakage
of Confidential Information
7- Risk Analysis,
- Management Mitigation
- Assess risk of insider abuse
- Audit for compliance with security and IT
policies - Trace incidents to their source
Management Console
DigitalGuardian Server
- Loss Prevention Through Data Containment
- Control the flow of information to apps, network
storage devices - Real-time prevention of actions that violate
policies - Increase policy awareness
Digital Guardian Agent
Disconnected User
Desktop User
Remote User
Protected Clients
8Policy Examples
Webmail File Attachment
FTP Transfer Outside Company
IM Clipboard Paste
Clipboard Copy
CD/DVD Burn
Enterprise Application
USB File Copy
Printing
Port 80 for Unapproved Apps
9Policy in Action
Optional Administrator Alert
Document needed for offsite meeting with patent
counsel.
10Interactive 3D Visualization of Activity Alerts
- Provides high-level view of information use and
compliance with acceptable use policies - Intuitive exploration, questioning and probing of
data - Trends, anomalies and incidents can be quickly
identified
11Violations by Location over Time
12Closer Inspection Violations by Policy in Boston
13Closer Still Policy Timeframe of Interest
14Visual Interaction Reveals Outliers
15Analysis Taken to the Individual User Rule Level
16Violation Summary by User
17Forensic Quality Detail Documents Violation
18CurrentApplications
Offshore Outsourcing Risk Insurance
IP Data Containment Multimedia Entertainment
Regulatory Compliance Aerospace
Targeted Investigations Telecom Equipment
Training Awareness All
19Case Study Multimedia Entertainment Company
- Business problem
- Prior incident, suspect more
- 77 of unauthorized copies attributable to
insiders - Business objective
- Prevent all unauthorized transfer of media files
outside of company - Implemented solution
- Control storage devices block USB/CD/DVD file
writes - Restrict file transfer block FTP communication
outside of company - Forensic readiness continuous journaling of
information use - Results
- Protection with no disruptions
- Ability to correlate file, app network activity
identified loss via port 80 tunneling application
to which traditional tools offered no clues - Additional network policies being evaluated
20Case Study Large Employee Benefits Company
- Business problem
- Inability to adequately manage risk when
offshoring - Business objective
- Verify trust relationship continuous audit
- Risk appropriate controls over information use
- Current Solution
- Log analysis
- Windows group policies scripts
- Implemented solution
- Require Digital Guardian on all computers
handling their data - Continuous audit with alerts tied to risky
activities e.g. FTP - Writing to removable/detachable storage
prevented, with exceptions - Printing disabled for all but select staff
- Results
- Risk assessment ongoing with regard to network
use - Policies restricting FTP, IM P2P are being
evaluated