18
Securing Your Data Lessons Learned from Ashley Madison John Q Martin Sales Engineer Twitter : @SQLServerMonkey Email: [email protected] Blog: http://blogs.sqlsentry.com/author/JohnMartin/

Securing your Data, Reporting Recommended Practices

Embed Size (px)

Citation preview

Page 1: Securing your Data, Reporting Recommended Practices

Securing Your DataLessons Learned from Ashley MadisonJohn Q Martin

Sales Engineer

Twitter: @SQLServerMonkey

Email: [email protected]

Blog: http://blogs.sqlsentry.com/author/JohnMartin/

Page 2: Securing your Data, Reporting Recommended Practices

Thank you to our sponsors

Page 3: Securing your Data, Reporting Recommended Practices

Introduce Yourself• John Q Martin

Working with data in many forms for more than a decade as a consultant and numerous operational IT roles and industries.

Page 4: Securing your Data, Reporting Recommended Practices

Agenda

Current landscape

Important Concepts

Compliance

Page 5: Securing your Data, Reporting Recommended Practices

Current Landscape

Criminal, State Sponsored, Vigilante, Corporate Espionage

Mobile, Dynamic, Agile workforce

Data Everywhere

Sharp focus on privacy

Page 6: Securing your Data, Reporting Recommended Practices

High Profile Data Breaches

TalkTalk

Ashley Madison

Sony

Starwood Hotels

Page 7: Securing your Data, Reporting Recommended Practices

What is a Data Breach?

“a breach of security leading to the accidental or unlawful destruction, loss, alteration,

unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed

in connection with the provision of a public electronic communications service”

Personal data breach definition – UK Information Commissioner's office.

Page 8: Securing your Data, Reporting Recommended Practices

The Work-Anywhere culture

Education• What are you working on• Simple precautions

Think Privacy• Privacy screen filters for devices• Select the right location

Page 9: Securing your Data, Reporting Recommended Practices

Working with data

Where does it reside• Are there limitations on where it can be sent• How do you transport it

Protective Markings• Tag your visualizations & data

Page 10: Securing your Data, Reporting Recommended Practices

Compliance

Understand if you need to comply• Industry Standards• Legislation Based

Understand how data is classified• What can be stored, retained, and displayed• What were the capture T&C’s

Page 11: Securing your Data, Reporting Recommended Practices

Compliance | UK DPA

Eight Key Data Protection Principles• Used fairly and lawfully.• Used for limited, specifically stated

purposes.• Used in a way that is adequate,

relevant and not excessive• Not transferred outside the

European Economic Area without adequate protection

• Accurate• Kept for no longer than is

absolutely necessary.• Handled according to people’s data

protection rights• Kept safe and Secure

Page 12: Securing your Data, Reporting Recommended Practices

Compliance | UK DPA

Eight Key Data Protection Principles• Used fairly and lawfully.• Used for limited, specifically stated

purposes.• Used in a way that is adequate,

relevant and not excessive• Not transferred outside the

European Economic Area without adequate protection

• Accurate• Kept for no longer than is

absolutely necessary.• Handled according to people’s data

protection rights• Kept safe and Secure

Page 13: Securing your Data, Reporting Recommended Practices

Compliance | UK DPA

“any set of information relating to individuals to the extent that, although the information is not

processed by means of equipment operating automatically in response to instructions given for

that purpose, the set is structured, either by reference to individuals or by reference to criteria relating to individuals, in such a way that specific information relating to a particular individual is

readily accessible.”

What type of information is protected by the Data Protection Act? – UK Information Commissioner's office.

Page 14: Securing your Data, Reporting Recommended Practices

Controlling, Processing, SharingDo you have a duty of care• What are you working on• Simple precautions

Who else can see the data• Shoulder Surfing• Granted access via sharing

Page 15: Securing your Data, Reporting Recommended Practices

SummaryAppropriate options

Protective Markings

Understand compliance requirements

Selective Sharing

Page 16: Securing your Data, Reporting Recommended Practices

Questions?

Page 17: Securing your Data, Reporting Recommended Practices

Thank You!

Page 18: Securing your Data, Reporting Recommended Practices