Data loss protection around the Hash Table.
Data loss protection is a cybersecurity first principle strategy.
It’s 10pm, do you know where your data is? Better yet, do you know what your material data is? That’s step one in Rick’s guide to data loss protection and prevention. With key resources from NIST and Forrester, Rick outlines the key components of defining material data and protecting that data from loss. He also dives into the advanced concept of network deception for those with a mature DLP program. As always, the Hash Table weighs in with industry best practices and lessons learned.
Four members of the CyberWire’s hash table of experts:
- Tom Quinn - CISO - T. Rowe Price Associates
- Nikk Gilbert - CISO - Cherokee Nation Businesses
- Dawn Cappelli - VP of Global Security and CISO for Rockwell Automation
- Gary McAlum - CSO- USAA
discuss the things they worry about when it comes to data loss protection.
Cybersecurity professional development and continued education.
You will learn about: data islands, off-island control, destruction, deception techniques, key DLP resources, strategies for data classification, loss protection, and loss prevention
CyberWire is the world’s most trusted news source for cybersecurity information and situational awareness. Join the conversation with Rick Howard on LinkedIn and Twitter, and follow CyberWire on social media and join our community of security professionals: LinkedIn, Twitter, Youtube, Facebook, Instagram
Additional first principles resources for your cybersecurity program.
For more data loss protection and cybersecurity first principles resources, check the topic essay.
- “Cyber Deception,” Dave Climek, Anthony Macera, and Walt Tirenin, Journal of Cyber Security and Information Systems, Volume: 4 Number: 1 - Focus on Air Force Research Laboratory’s Information Directorate, 8 March 2016.
- “Cyber Deception Systems - Market Segment Report,” by Wellington Research, 2019.
- “Data loss prevention,” Box.
- "Data Loss Prevention (DLP)," by Imperva.
- “Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication 800-171,” by Ron Ross, Victoria Pillitteri, Gary Guissanie, Ryan Wagner, Richard Graubart, Deb Bodeau, National Institute of Standards and Technology (NIST), July 2020.
- “Materiality in a nutshell,” by Datamaran, last visited 30 April 2020.
- “Overview of data loss prevention,” by Microsoft, 12 July 2019.
- “Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations: NIST Special Publication 800-171, Revision 2,” by Ron Ross, Victoria Pillitteri, Kelley Dempsey, Mark Riddle, Gary Guissanie, National Institute of Standards and Technology (NIST), February 2020.
- “The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019: The 13 Providers That Matter Most And How They Stack Up,” by Heidi Shey, Forrester, 10 June 2019.
- “What is a Honeypot?” by Caleb Townsend, Cybersecurity Magazine.
- "Yesterday’s Solutions Won’t Solve Tomorrow’s Data Security Issues: Understanding Shortcomings With Current DLP/CASB Security Solutions And How To Fill The Gaps,” Forrester and Code42, June 2020.