22
John Durant, Chief Technology Officer 3 Strategies to Protect IP in the Age of Employee Churn

3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

John Durant, Chief Technology Officer

3 Strategies to Protect IP in the Age of Employee Churn

Page 2: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

ATTENTION: Car break-in reportedLaptop stolen

Page 3: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

Page 4: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

SHARING

Source: HP Aruba Networks Millennial Study 2015

SAVVY SUSCEPTIBLE

admit to taking data when they leave a job, and 42% believe it is their right to do so

>50%

Page 5: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

Page 6: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

That value is constantly at risk—and insiders are the threat

Note: Worldwide; 49-day period ending in February 2016; 5,009 Respondents; Individuals who have bona fide credentials in IT or security fieldsSource: Ponemon Institute; Thales Group; Website (vormetric.com); ID 529920

Page 7: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

Page 8: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

CONVENTIONAL SECURITYFALLS SHORT

Page 9: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

What if we just let users be?

Page 10: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

STRATEGIESTO PROTECT IP3

Page 11: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

1. FOCUS ON THE HUMAN ELEMENTSee user activity and set a baseline for “normal.”

Page 12: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

Page 13: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

2. FOCUS ON YOUR MOST VALUABLE DATA (IP)What non-regulated data is most valuable to your company?

Page 14: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

Page 15: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

Page 16: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

3. MAKE YOUR DATA WORK HARDERExamine the present—predict the future.

Page 17: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

Page 18: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

Page 19: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

Insider Threat Predictability

Source: Deloitte - The Widespread Risk of Insider Threats 2015

Page 20: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

Transparency = Freedom

Page 21: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen

© 2017 Code42. Confidential & Proprietary Information of Code42 – Do Not Redistribute

Page 22: 3 Strategies to Protect IP in the Age of Employee Churn · 2017-03-29 · 3 Strategies to Protect IP in the Age of Employee Churn. ATTENTION: Car break-in reported Laptop stolen