30
BY © 2016 ISACA. All Rights Reserved 1 BY © 2016 ISACA. All Rights Reserved Protecting and Recovering Encrypted Data in Today’s World Ted Pan Technical Product Specialist, Intel Security

Protecting and Recovering Encrypted Data in Today’s World

  • Upload
    mcafee

  • View
    999

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

1

BY

© 2016 ISACA. All Rights Reserved

Protecting and Recovering Encrypted Data in Today’s World

Ted PanTechnical Product Specialist, Intel Security

Page 2: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

2

WELCOME

Use the Attachments button to find the following:

• PDF of today’s presentation

• Link to the Event Home Page where ISACA members can find the CPE Quiz

• MORE information about upcoming CSX events

• Upcoming ISACA Events

• MORE assets from today’s webcast

• Have a question for the speaker? Text it in using the Ask A Question button!

• Audio is streamed over your computer

• Technical issues? Click the ?button

• Use the Feedback button to share your feedback about today’s event

• Questions or suggestions?Visit support.isaca.org

Page 3: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

3

TODAY’S SPEAKER

Ted PanTechnical Product Specialist - Data Protection

Intel Security

Page 4: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

4

� Protect Encrypted Data

� Recover Encrypted Data

� Latest Encryption Technologies

� Q&A

AGENDA

Page 5: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

5

Do you believe that governments should be allowed to force encryption providers to create a backdoor to their encryption solutions for legal investigations?

A. Yes

B. No

POLLING QUESTION 1

Page 6: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

6

THE CONTROVERSY

Balance

Page 7: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

7

ENCRYPTION KEY VS PHYSICAL VAULTS

Page 8: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

8

PROTECT ENCRYPTED DATA

Page 9: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

9

TYPES OF ENCRYPTION

Full Disk Encryption File and Folder Encryption

Page 10: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

10

Encryption Algorithm

HOW FULL DISK ENCRYPTION WORKS

It was the best of times, it was

the worst of times.

Encryption Key

Page 11: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

11

FULL DISK ENCRYPTION PROTECTS

Page 12: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

12

ENCRYPTION BACKDOOR IMPLICATIONS

Trustworthiness Security Customer Impact

Page 13: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

13

POLLING QUESTION 2

Would you trust an encryption solution where you don’t have full control of the keys?

A. Yes

B. No

Page 14: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

14

Clipper Chip

HISTORIC BACKDOORS

Page 15: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

15

Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG)

HISTORIC BACKDOORS (CONT.)

NIST SP 800-90A

Page 16: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

16

Recover Encrypted Data

Page 17: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

17

RECOVER USE CASES

Help Desk SupportLeaves the Company Investigations

Page 18: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

18

BEST PRACTICES

Integrated forensic tools

Centralized console

Protected repository of keys

Page 19: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

19

WORKING WITH OUTSIDE AGENCIES

Prevent unjustified disclosure of sensitive data

Page 20: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

20

PROTECTING A LOST SYSTEM

Show proof of encryption on a lost or stolen system

Page 21: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

21

RECOVERING A CORRUPTED DRIVE

Provide a backup of the key to recover the data

Page 22: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

22

Leverage the Latest Encryption Technologies

Page 23: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

23

SPEED IT UP

AES-NI Instruction set provides much faster encryption

Page 24: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

24

PROTECT THE RAM

Protect against cold boot attack

Page 25: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

25

PRE-BOOT AUTHENTICATION

Provide protection before the Operating System starts up

Page 26: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

26

BOOT OFF THE NETWORK

Provide keys to a system before the Operating System starts up

Page 27: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

27

INCREASED PASSWORD STRENGTH

• Require complex passwords

• Require minimum length of 8

• Disable users when the system doesn’t communicate back with the central server

Page 28: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

28

© 2016 ISACA. All Rights Reserved

QUESTIONS?For more information visit: www.mcafee.com/dataprotection

Page 29: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

29

CYBER SECURITY TRAINING:OUR CSX PORTFOLIO

PERFORMANCE BASED TRAINING – OUR ADVANTAGEInstead of the typical question/answer experience common to other certifications, which merely gauge the memorization of facts, CSX certifications evaluate the hands-on capability and aptitude of an individual desiring to work in the field of Cybersecurity.

Page 30: Protecting and Recovering Encrypted Data in Today’s World

BY

© 2016 ISACA. All Rights Reserved

30

BY

© 2016 ISACA. All Rights Reserved

THANK YOU FOR ATTENDING TODAY’S WEBINARFor more information visit www.isaca.org/cyber