Table of Contents |
---|
Agenda
Validate Top Level Use Cases
- User Story which Shows Proposed Workflow
- Ensure Alignment with Stakeholder Needs
Collaborative Business Participation
Needs
- Desktop Hostname and Domain IDs for example AD\JSmith
- Data Identifiers - Definition of Addresses to Add to White List
- Other Data Identifiers - Already Gathered by Anderson
Discussion
- Rules for Escalation * better rules less false positives
- Medium of Notification * email reports, direct calls
- How You Want to Action Incidents
Visualization of DLP
There are three areas of Data Leakage Prevention:
DLP | How it Works | Key Concepts |
---|---|---|
Policy Gateway (currently in place) | All data (email, web traffic, ftp traffic) flows through a central policy gateway. The service reviews and alerts on CIBC specified keywords and document profiles. |
|
End-Point Desktop | Installed on user machines, End-Point Desktop,
In addition End-Point Desktop can interact with devices (USB, printers, etc). |
|
Data Discovery Services | Scan data repositories (network shares, websites, desktop computers and databases) and identify improperly protected files. Sensitive files are identified by CIBC specified keywords and document profiles. |
|