Top Banner
The loss Of Intellectual Property In The Digital Age: What Companies Can Do To Protect Themselves
31

Project powerpoint

Apr 12, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Project powerpoint

The loss Of Intellectual Property In The Digital Age:

What Companies Can Do To Protect Themselves

Page 2: Project powerpoint

Digital Revolution

l People being connected in new ways

l More information in less timel More oftenl Greater Distances

l Securing IP is a big concern for business

Page 3: Project powerpoint

Cyber-based Threatsl Evolving and Growing Rapidlyl Competitorsl Malicious Employeesl Well-Intentioned Employeesl Criminal Groupsl Hacktivistsl Foreign Governments

Page 4: Project powerpoint

IP is Valuable

l Design Costsl Manufacturing Costsl Marketing Costs

Page 5: Project powerpoint

New Work Locations

l From Homel Hotelsl Coffee Shopsl Airports

Page 6: Project powerpoint

Personal Devices for Work

l Laptopsl Smart Phonesl Tabletsl Desktops

Page 7: Project powerpoint

Cheap Data

l Larger Capacityl Room to download A lot of stuff

l More Portablel Easy to conceal and move

Page 8: Project powerpoint

Reasoning

l Innocent Reasonsl Working from Home

l Malicious Reasonsl Sell data to competitor

Page 9: Project powerpoint

Symantec Survey

l Attribute ownership of IP to creator of itl Moving IP outside the company in all directionsl Often take IP with them when they leave

Page 10: Project powerpoint

VW vs. GM

l Executives took 1000's of pagesl More noticeable in 1997 than nowl Photocopiedl Carried out of buildingl Lots of witnesses

l 100 Million Dollar Settlement

Page 11: Project powerpoint

Starwood vs. Hilton

l Over 100,000 files stolenl Downloaded to laptop much more quicklyl No physical witnesses

l Value of data was 1 Million Dollars

Page 12: Project powerpoint

What Companies Can Do To Protect IP

Page 13: Project powerpoint

Data Encryption

l Whole Hard Drivesl USB Keysl Emails and Attachmentsl Individual Files

Page 14: Project powerpoint

Mobile Device Management

l Bring your own device (BYOD)l Common todayl Security challengesl User privacy

Page 15: Project powerpoint

Mobile Device Management

l Software Solutions l MobileNowl MobileIronl Zenprisel IBMl Symantecl Airwatch

Page 16: Project powerpoint

Mobile Device Management

l Device Policiesl Control which features and apps can be usedl Authentication Requirementsl Specific polices for specific groups

Page 17: Project powerpoint

Mobile Device Management

l Jailbroken Devicesl Pose a big security riskl Detect these devicesl Enforce greater controls on them

Page 18: Project powerpoint

Mobile Device Management

l Updatingl Update OS and apps remotelyl All devices patched at same time

Page 19: Project powerpoint

Mobile Device Management

l Applicationsl App Blacklistingl Block and revoke any app from any userl Track usagel App-to-app encryptionl Each app has it's own keysl AES256 encrypted

Page 20: Project powerpoint

Email

l Encrypt attachmentsl Prevent unauthorized copying and forwardingl Restrict Sharing of attachments to certain appsl Specify attachment types to encrypt

Page 21: Project powerpoint

Home Directory

l Store all data in home directoryl Persistent and centralized location l Backupl Distributionl Many clients for all different platformsl All accessing the same directoryl Data easily located and wiped

Page 22: Project powerpoint

Profiles

l Geofencingl Corporate data only accessible in certain locations

l Time-basedl Corporate data only accessible in during certain times

l Distributionl Documents distributed to certain users

Page 23: Project powerpoint

Mobile Device Management

l Remote Lock, locate and wipel Lost or Stolenl Infected with malwarel User leaves company

Page 24: Project powerpoint

Data Leak Prevention

l Works via deep content inspectionl Reads data to identify specific words, terms, or characteristics to indicate sensitivityl Does not prevent attacksl Limits accidental deletion or moving

Page 25: Project powerpoint

Data Leak Prevention

l System figures out sensitive data on it's ownl Logs moving, copying, or deleting

l Can prevent user from emailing data out by making it write onlyl Requires a lot of fine tuning to get it right

Page 26: Project powerpoint

Attribute Based Access Control

l Grants access to data based on attributesl Locationl Authentication Method

l Identifies deviation from norml Type of datal Time of accessl Location of access

Page 27: Project powerpoint

Cloud Storage Providers

l Data integrityl Data is safe from theft, deletion, or other loss

l Access controlledl Read, Write, or aggregated views

l Data must be available when neededl Data safe in transit

Page 28: Project powerpoint

Data Backups

l Policy for backing up datal Encryptedl Sent in a secure wayl Stored in a physically secure locationl Stored in multiple locations

Page 29: Project powerpoint

Other IP Security Practices

l Train employees in security principlesl Good passwords or passphrasesl Protect credentialsl Social Engineeringl Alerting IT to malware

Page 30: Project powerpoint

Other IP Security Practices

l Keeping logs of activityl Useful for analyzing attacks

l Intrusion Detection Systemsl Detection and response to attacks

l Control physical access to offices and server rooms

Page 31: Project powerpoint

Other IP Security Practices

l Set Up user accountsl Give all users their own accountl Provide access to the least amount of data the user needs to do their job

l Set up firewall security for all internet connections