7 Data Loss Prevention Best Practices (Expert Explains) | PurpleSec

Поділитися
Вставка
  • Опубліковано 29 лип 2024
  • On average it takes organizations 191 days to identify data breaches. If an organization lacks diligence in protecting the sensitive data it owns or is entrusted with, they are at risk of exposing sensitive data to those who are not authorized to observe or possess it. The strategy often used to counter and reduce the risk of data loss is referred to as Data Loss Prevention (DLP).
    Video Chapters
    ------------------------------
    00:00 - Introduction
    00:47 - What Is Data Loss Prevention?
    01:26 - Understanding Sensitive Data
    02:36 - Average Cost Of A Data Breach
    04:22 - How Does A DLP System Work?
    10:23 - What Are The Top DLP Best Practices?
    13:41 - When Do You Need A DLP Strategy?
    17:12 - Conclusion
    About The Author
    ------------------------------
    Michael Swanagan, CISSP, CISA, CISM
    purplesec.us/cyber-security-e...
    Related Videos
    ------------------------
    ► What Is Vulnerability Management?
    • What Is Vulnerability ...
    ► Common Types Of Network Security Vulnerabilities In 2022
    • Common Types Of Networ...
    ► The 3 Types Of Security Controls
    • The 3 Types Of Securit...
    ► Red Team VS Blue Team: What’s The Difference?
    • Red Team VS Blue Team:...
    ► What Is A Security Operations Center?
    • What Is A Security Ope...
    ► What Are The Types Of Penetration Testing?
    • What Are The Types Of ...
    ► Firewall Penetration Testing: Steps, Methods, & Tools
    • Firewall Penetration T...
    Resources & Links
    ------------------------------
    What Is Cyber Security?
    purplesec.us/cyber-security/
    50 Free Information & Cyber Security Policy Templates
    purplesec.us/resources/cyber-...
    What Is Data Loss Prevention (DLP)?
    Data Loss Prevention is defined as a strategy that detects potential data breaches or data ex-filtration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint actions), in-motion (network traffic), and at rest (data storage).
    Data Loss Prevention is also synonymous with the term Data Leakage Prevention. These terms are often used interchangeably, however, Data Loss Prevention is the common term used by DLP solution providers today.
    Understanding Sensitive Data
    Sensitive data is information that must be protected against unauthorized access to safeguard the privacy or security of an individual or organization. It can exist within entries on a spreadsheet containing employee names and Social Security numbers.
    Sensitive data may be the contents of a document describing the secret formula for a brand of soda, or it could be a database that contains the full names, addresses, and driver license numbers for a state’s DMV.
    One of the core functions of a DLP strategy and solution is to prevent exposing sensitive data to unauthorized parties.
    Organizations today are faced with the challenge of selecting the best security solutions.
    This includes implementing Security Information and Event Management (SIEM) and Intrusion Detection or Prevention Systems (IDS / IPS) to protect their corporate data.
    This is because the unintentional leakage or loss of sensitive data due to a malicious actor, an inside job, or an unknowing employee, can lead to significant financial loss and reputational damage to any organization.
    --------------------------------------
    ► If you need help securing your business from cyber attacks then feel free to reach out: purplesec.us/consultation/
    ► Follow us on Twitter: / purple_sec
    ► Find us on Pinterest: / purple_sec
    #datalossprevention #dlp #PurpleSec
  • Наука та технологія

КОМЕНТАРІ • 15

  • @PurpleSec
    @PurpleSec  3 роки тому +3

    👋 If you're new here, then consider subscribing to our weekly newsletter featuring the top cybersecurity minds in the industry:
    www.linkedin.com/newsletters/ai-cybersecurity-insights-7058517055238504448/

  • @charanreddy8856
    @charanreddy8856 2 роки тому +5

    Everything in a single video. Good job PurpleSec Cyber Security! Thanks

    • @PurpleSec
      @PurpleSec  2 роки тому +1

      Glad this was useful!
      - Jason

    • @rajeshkothamasu2234
      @rajeshkothamasu2234 2 роки тому

      @@PurpleSec what is the course to learn entire dlp please reply to the message

  • @KapitanZbik2138
    @KapitanZbik2138 4 місяці тому +1

    This is actually a great piece of knowledge over there. I am preparing for a SOC/NOC job interview and I find this vid very helpful. Thank You for that!

    • @PurpleSec
      @PurpleSec  4 місяці тому

      Fantastic! Very happy this was useful for you. One bit of advice for your interview - lean into your soft skills. It's one of the most desired skills and often overlooked. Best of luck!
      - Jason

  • @snixtysnixt
    @snixtysnixt Рік тому

    Great video. Thank you.

  • @poonampatil7800
    @poonampatil7800 2 роки тому +1

    Nicely explained

  • @SantoshSharma
    @SantoshSharma Рік тому +2

    very good and detailed video. Nice work. may be more videos on showing DLP Architecture.

    • @PurpleSec
      @PurpleSec  Рік тому

      Glad you found value in this video!
      - Jason

  • @johnmcgillin4378
    @johnmcgillin4378 3 місяці тому

    What I thought of is using the internet using data can be terrible or even frightening hopefully there maybe a day whare you can set up your cell phone like the radio years ago and still now the radio is I guess doctored to are advantage I'm sure you have a good idea what I mean.

  • @angelcetina5147
    @angelcetina5147 3 роки тому +1

    Hello @PurlpeSec, Can we say that DLP is one of the tools that the Blue Team in the companies uses?

    • @PurpleSec
      @PurpleSec  3 роки тому +2

      Yes, the software itself is a technical control that is deployed by security teams to defend their network against data exfiltration. A DLP program is more complex and involves many stakeholders, including up to the c-suite.
      Hope this helps!
      - Jason

  • @a46475
    @a46475 5 місяців тому

    Are we talking about data loss or data leak? Who coined this term?