Title: Encryption Beyond the Basics
1EncryptionBeyond the Basics
- Have a Successful Project and Meet the CSCIC
Deadline
2Agenda
- The Need for Encryption
- CSCIC Standards
- Understanding Encryption
- Cold Boot Attack
- Effective Technology Selection
- A Successful Methodology
3The Need for Encryption
- Data is made vulnerable by mobility
- Sensitive data is lost or stolen nearly everyday
4Regulations and Standards
- CSCIC
- HIPAA
- Sarbanes-Oxley
- PCI
5CSCIC Encryption Standards
- All Laptops Full Disk Encryption
- Pre-Boot Authentication
- All PDAs Volume, Folder, File or Field Level
Encryption - All USB Flash Drives Volume, Folder, File, or
Field Level Encryption
6CSCIC Encryption Standards
- Removable Electronic Storage Media
- FIPS 140 Validation
- Validate Successful Encryption
- December 31, 2008 Deadline
7Understanding Full Disk Encryption
8Understanding Full Disk Encryption
- Authentication Modes
- Single Sign On
- Separate Pre-Boot Authentication and Windows
Authentication - Windows Integrated Logon
- 2 Factor Authentication
9Full Disk Encryption - Concerns
- Can I shut down my computer during the initial
encryption without causing issues? - How long will it take to encrypt the hard drive?
10Full Disk Encryption - Concerns
- Will my computer be slower after it is encrypted?
- What will the end user experience during and
after deployment? - Can multiple users use one computer?
11PDA Encryption
- Blackberry
- Windows Mobile
- Palm OS
- Symbian
12Removable Media
- USB Flash Drives
- SD Cards
- Compaq Flash Cards
- CD/DVD
- Disks (Floppy, Zip, Jazz, etc.)
- MiniDisk
- MP3 Players
- Tapes
13Your Encryption Roadmap
14Technology Components
15Central Management
16Key Management
17Secure Recovery
- What if a user leaves?
- What if a user refuses to unlock a computer?
- How can I recover an encrypted computer?
18Cold Boot Attack
19Effective Technology Selection
- Get Started Soon
- Technology Selection is Critical
- Technology Selection is Difficult
- Very Detailed and Time Consuming
20Effective Technology Selection
21Technology Selection Obstacles
22Encryption Challenges
23Policy Assessment
Critical to deployment success
24Successful Solution Methodology
25Bryan Spinner
3 Columbia Circle Albany, New York
12203 http//www.DandD.com bspinner_at_DandD.com Tel
518.218.0900 Fax 518.218.1829