attacking sensitive data on your computer. why? who cares? increasing data theft & data breaches...

13
Identity Finder Attacking Sensitive Data on Your Computer

Upload: winifred-collins

Post on 17-Jan-2018

218 views

Category:

Documents


0 download

DESCRIPTION

Overview of SSN Policy Implementation Requirements Approval Process for SSN SSN Inventory & Remediation Plan SSN Remediation Plan

TRANSCRIPT

Page 1: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

Identity FinderAttacking Sensitive Data on Your Computer

Page 2: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

Why? Who cares?Increasing data theft & data breaches = $$$$

$Where does the money go?Comply with lawsProtect ourselves, friends, and family.

Page 3: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

Overview of SSN Policy Implementation RequirementsApproval Process for SSNSSN Inventory & Remediation Plan

SSN Remediation Plan

Page 4: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

Know Your DataMake a flow chart of your data

Daily Admissions

H: Drive

Advance/BSR

Email to Med Admin

Suggestions

SQL Server

Page 5: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

What does Identity Finder do?Searches hard drives, email, network shares,

CDs, DVD’s, you name it for sensitive data like SSN.

Provides a report of the interesting files.With a sneak peek.Allows for on-the-spot remediation.After remediating the report, do not keep the

report.

Page 6: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

Did someone demo time?

Page 7: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

Lots and Lots of MatchesKnow your dataClean your temporary filesSort by number of matchesExclude/include certain file types

Page 8: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

Clean UpBrowsersEmpty Recycle BinCcleaner Secure Deletion Shredder

Page 9: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

Sort by Number of MatchesDemo

Page 10: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

Quarantine to Secure ServerMove files to a secure serverNobody misses themEmail notification of deletion

Page 11: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

Records ManagementGo to Records Management Web SiteRecords can be destroyed by the Records

Retention SchedulesProduced by the Library of VirginiaFor more info, email Caroline Walters

Page 13: Attacking Sensitive Data on Your Computer. Why? Who cares? Increasing data theft & data breaches = $$$$$ Where does the money go? Comply with laws Protect

QuestionsWhat is your process?What are your issues?