ISSA Baltimore Monthly Meeting
Behavioral Analytics for Intellectual Property Protection
Wednesday, May 28, 2014 · 5 - 6:30 PM
Off Campus
May 28, 2014
Behavioral Analytics for Intellectual Property Protection
Now more than ever, protecting data is the most important consideration
when developing a successful security strategy. The need for immediate
data availability continues to increase while the ability to secure
networks and devices decreases. Company assets are moving off
premise. Employees now own their laptops and mobile devices. Remote
desktops and cloud based Software as a Service (SaaS) solutions are
becoming the norm. At the same time the sophistication of inside or
outside attackers makes protecting the device or network nearly
impossible.
Historically, data protection solutions have followed the threat: moving
from the perimeter, to the network, to the server, to the application,
to the user, and now to the data itself. Current efforts to secure
“structured data” held in repositories such as internal file servers,
databases and content management systems are very mature and fully
deployed. Employing a combination of access management, network
monitoring, and database security solutions helps secure the
“unstructured data” in files. However, these methods do not protect the
larger percentage of intellectual property - unstructured file based
data. Sensitive information resides, unprotected, on endpoint devices or
in repositories like SharePoint, file servers, and cloud based
collaboration or storage solutions.
The focus on structured data was necessary because of the ever-changing
threat, but tools to secure “unstructured data” have lagged. As
structured data becomes more secure the attackers are moving to
“unstructured data” as their target. Malware and Advanced Persistent
Threats (APT) are aiming at the data on the desktop or held in
unstructured repositories. New methods to protect this “unstructured
data” are required. To effectively mitigate the risk of losing
intellectual property and sensitive data, companies must augment their
security architecture with a new approach to Observe, Analyze, & Act on
threats to their unstructured data.
Mark Bennett, VP of Sales, FileTrek
Focused on business development, partnerships, client acquisition and
customer satisfaction. Mark has over 20 years of experience helping
commercial and public sector clients solve complex IT and IT-Security
challenges. Aligning new and creative solutions to real-world customer
problems is Mark’s specialty. Mark has held management positions with
foremost industry companies including Accuvant and Cisco. Most recently
Mark was VP of Sales for IDMWORKS, a top ten Identity and Access
Management consultancy. From 2008 until 2011, as a member of the
executive team, Mark helped Accuvant grow sales from $145 million to
over $350 million. Mark graduated in 1981 from University of North
Carolina with a Bachelor of Arts Degree in Business Administration.
5:00 pm Dinner / Chapter Business
5:30 pm Presentation and Q&A
6:30 pm Close
Dinner is free and the entire program will allow members of the student
chapter to interact with information security professionals working in
the Baltimore area.
Behavioral Analytics for Intellectual Property Protection
Now more than ever, protecting data is the most important consideration
when developing a successful security strategy. The need for immediate
data availability continues to increase while the ability to secure
networks and devices decreases. Company assets are moving off
premise. Employees now own their laptops and mobile devices. Remote
desktops and cloud based Software as a Service (SaaS) solutions are
becoming the norm. At the same time the sophistication of inside or
outside attackers makes protecting the device or network nearly
impossible.
Historically, data protection solutions have followed the threat: moving
from the perimeter, to the network, to the server, to the application,
to the user, and now to the data itself. Current efforts to secure
“structured data” held in repositories such as internal file servers,
databases and content management systems are very mature and fully
deployed. Employing a combination of access management, network
monitoring, and database security solutions helps secure the
“unstructured data” in files. However, these methods do not protect the
larger percentage of intellectual property - unstructured file based
data. Sensitive information resides, unprotected, on endpoint devices or
in repositories like SharePoint, file servers, and cloud based
collaboration or storage solutions.
The focus on structured data was necessary because of the ever-changing
threat, but tools to secure “unstructured data” have lagged. As
structured data becomes more secure the attackers are moving to
“unstructured data” as their target. Malware and Advanced Persistent
Threats (APT) are aiming at the data on the desktop or held in
unstructured repositories. New methods to protect this “unstructured
data” are required. To effectively mitigate the risk of losing
intellectual property and sensitive data, companies must augment their
security architecture with a new approach to Observe, Analyze, & Act on
threats to their unstructured data.
Mark Bennett, VP of Sales, FileTrek
Focused on business development, partnerships, client acquisition and
customer satisfaction. Mark has over 20 years of experience helping
commercial and public sector clients solve complex IT and IT-Security
challenges. Aligning new and creative solutions to real-world customer
problems is Mark’s specialty. Mark has held management positions with
foremost industry companies including Accuvant and Cisco. Most recently
Mark was VP of Sales for IDMWORKS, a top ten Identity and Access
Management consultancy. From 2008 until 2011, as a member of the
executive team, Mark helped Accuvant grow sales from $145 million to
over $350 million. Mark graduated in 1981 from University of North
Carolina with a Bachelor of Arts Degree in Business Administration.
5:00 pm Dinner / Chapter Business
5:30 pm Presentation and Q&A
6:30 pm Close
Dinner is free and the entire program will allow members of the student
chapter to interact with information security professionals working in
the Baltimore area.