doctrackr presents at defcamp 2013 - november 29-30

27
DRM to p0wn NSA in a few easy steps Dan Gheorghe, Software Engineer docTrackr.com

Upload: doctrackr

Post on 30-Jun-2015

129 views

Category:

Technology


0 download

DESCRIPTION

DefCamp is one of the most important conferences on hacking & information security in South-East Europe. DefCamp takes place every year November 29-30th docTrackr was excited to present at DefCamp this year on a timely subject: how to keep the NSA off your back, and out of your data. Have a look at our slides for the event. You might get some ideas for protecting your own data If you'd like to learn more about docTrackr, you can head over to www.docTrackr.com and try our free document security tools for yourself!

TRANSCRIPT

Page 1: docTrackr Presents at DefCamp 2013 - November 29-30

DRM to p0wn NSA in a few easy steps

Dan Gheorghe, Software EngineerdocTrackr.com

Page 2: docTrackr Presents at DefCamp 2013 - November 29-30

ARE YOU IN CONTROL OF YOUR DATA?

ARE YOU IN CONTROL OF YOUR DATA?

Page 3: docTrackr Presents at DefCamp 2013 - November 29-30
Page 4: docTrackr Presents at DefCamp 2013 - November 29-30

Today’s Trend/Reality in the Cloud

UsersUsag

e

Page 5: docTrackr Presents at DefCamp 2013 - November 29-30

Email

Download Documents

SYNC WITH OTHER SYSTEMS

Page 6: docTrackr Presents at DefCamp 2013 - November 29-30

DLP – an answer ?

CATEGORIES OF DLP

• NETWORK AKA DATA IN MOTION

• STORAGE AKA DATA AT REST

• ENDPOINT AKA DATA IN USE

Page 7: docTrackr Presents at DefCamp 2013 - November 29-30

… NOT REALLY

1. IT’S CUMBERSOME FOR END USERS

2. NOT DESIGNED FOR COLLABORATION

3. COMPLEX ENTERPRISE-WIDE DEPLOYMENT

4. NOT 100% RELIABLE (FALSE POSITIVES)

Page 8: docTrackr Presents at DefCamp 2013 - November 29-30

DLP IS TRANSMISSION CONTROL

NOT DESIGNED TO ALLOW SECURE DATA SHARING AND COLLABORATION WHILE PREVENTING

DOCUMENT LEAKAGE

WHAT HAPPENS BEYOND ENTREPRISE BOUNDARIES?

Page 9: docTrackr Presents at DefCamp 2013 - November 29-30

Passwords ?

•Password security which uses RC4 128bit encryption or 128-bit AES Adobe 8 Generation technology•Public Key Infrastructure (PKI) encryption

Page 10: docTrackr Presents at DefCamp 2013 - November 29-30

WE NEED A NEW APPROACH

“How can we assure that only authorized people read classified data?”

“How can we assure the recipients do not share unauthorized data”

“How can we guarantee that data is not manipulated, unintentionally or fraudulently?”

Page 11: docTrackr Presents at DefCamp 2013 - November 29-30

DATA CENTRIC PROTECTION

If we cannot protect the data, why not let the data protect itself?

Page 12: docTrackr Presents at DefCamp 2013 - November 29-30

Information RightsInformation RightsManagement Management

Security

Control

Page 13: docTrackr Presents at DefCamp 2013 - November 29-30

as aas aServiceService

Information RightsInformation RightsManagement Management

Page 14: docTrackr Presents at DefCamp 2013 - November 29-30

1/ You create your document as usual

2/ Send it through a protection

engine

3/ The server monitors who can access the file and how.

And in 3 clicks you’ve got a doc ready to share securely!

How does it work?

Page 15: docTrackr Presents at DefCamp 2013 - November 29-30

Once your recipient gets it

Page 16: docTrackr Presents at DefCamp 2013 - November 29-30

Adobe PDF

Reader

MicrosoftOffice

Once your recipient gets it

He opens it with his or her usual

tools

Page 17: docTrackr Presents at DefCamp 2013 - November 29-30

Adobe PDF

Reader

MicrosoftOffice

1/ Checks if it’s the right version

Page 18: docTrackr Presents at DefCamp 2013 - November 29-30

Adobe PDF

Reader

MicrosoftOffice

1/ Checks if it’s the right version2/ If the recipient has permission

Page 19: docTrackr Presents at DefCamp 2013 - November 29-30

Adobe PDF

Reader

MicrosoftOffice

1/ Checks if it’s the right version2/ If the recipient has permission3/ And if yes, what he can do.

‣Revocation‣Cut/Paste‣Edit‣Print‣...

Page 20: docTrackr Presents at DefCamp 2013 - November 29-30

Adobe PDF

Reader

MicrosoftOffice

1/ Checks if it’s the right version2/ If the recipient has permission3/ And if yes, what he can do.

‣Revocation‣Cut/Paste‣Edit‣Print‣...

Page 21: docTrackr Presents at DefCamp 2013 - November 29-30

Adobe PDF

Reader

MicrosoftOffice

1/ Checks if it’s the right version2/ If the recipient has permission3/ And if yes, what he can do.

‣Revocation‣Cut/Paste‣Edit‣Print‣...

Page 22: docTrackr Presents at DefCamp 2013 - November 29-30

docTrackrA new approach to IRM

Page 23: docTrackr Presents at DefCamp 2013 - November 29-30

No installBridge on-premise

privacy & cloud needs

SecurityAdobe & Microsoftbased encryption

Automatic

Mirroringof changes

Analytics Extended audit

trail & files statistics

docTrackr+

Page 24: docTrackr Presents at DefCamp 2013 - November 29-30
Page 25: docTrackr Presents at DefCamp 2013 - November 29-30
Page 26: docTrackr Presents at DefCamp 2013 - November 29-30

docTrackr for Gmail

Secure your document attachments on the fly

http://bit.ly/1bJceQp

Page 27: docTrackr Presents at DefCamp 2013 - November 29-30

[email protected]@doctrackr.com