You are on page 1of 5

FORCEPOINT CONSULTING SERVICES:

USER AND DATA SECURITY PROGRAMS


Forcepoint Consulting Services: User and Data Security Programs

Protecting data, intellectual property, and information


systems from accidental and intentional employee misuse
is critical to preventing losses that can devastate profits,
brand reputation, and employees’ livelihoods. CISOs and
other security professionals understand these stakes, but
their jobs are harder than ever in the new IT operating
model that embraces cloud and mobility. Data is now
everywhere and can be accessed anywhere, and most
cyber activity is increasingly happening on networks that
are not owned or managed by the organization. Forcepoint Human Point System User
and Data Security Programs precept:
The Forcepoint Human Point System is designed
for this new world of expanded threats. Forcepoint Privacy, legal, and data protection requirements are
consulting services capitalize upon the work we’ve not impediments to effective security programs;
done with commercial and government customers they are vital underpinnings upon which effective
to develop effective, risk-based programs to protect risk reduction efforts are built, and they promote
data, intellectual property, and information systems trust and transparency while safeguarding the
from intentional and unintentional insider risk. Our workforce and the organization.
privacy-by-design precept of the Forcepoint Human
Point System User and Data Security Program Model
helps organizations restore confidence in the adoption
of cutting-edge technologies while maintaining the trust
The ideal user and data security program takes a holistic
of the workforce and preventing adverse impacts to a
approach to protecting an organization’s assets with the
thriving culture. Our experts can help organizations strike
following core principles:
the balance of interests between structured defense
programs and human agency that fuels a motivated and  Address risks within a legal, ethical, and policy
productive workforce. framework to ensure privacy protections
 Deploy a continuous assessment capability
Forcepoint consulting services help organizations:  Deploy analytics to discover potential threats, focusing
 Objectively measure organizational readiness to on the most valued assets
defend against insider threats  Provide solutions to help correlate the indicators and
 Design a custom-fit user and data security program review events in context
future state that meets familiar cultural requirements  Eliminate repudiation with an effective identity
while implementing proven risk management management system
best practices
 Partner with Forcepoint experts who have helped
integrate holistic and proactive human-centric security
programs in enterprises for more than 15 years
 Operationalize technologies and improve processes
to enable better and clearer decisions about what is
“good” and “bad” based upon the organization’s
risk profile
 Train stakeholders and working groups in state-of-the-
art threat mitigation, detection, and response to boost
program development and performance

www.forcepoint.com 2
Forcepoint Consulting Services: User and Data Security Programs

Integration Data Collection


with Enterprise & Analysis Tools,
Risk Management Techniques,
Policies, & Practices
Insider Threat
Formalized and Insider Threat Procedures Practices Related
Defined Program Response Plan & Practices to Trusted
to Support Business
Oversight the InTP Partners
of Program Communication Insider Threat
Compliance & of Insider Training &
Effectiveness Threat Events Awareness
Confidential Protection of Prevention,
Reporting Employee Civil Detection,
Organization-wide
Procedures Liberties & & Response
Participation
& Mechanisms Privacy Rights Infrastructure

Forcepoint Consulting Service Areas  Business processes


Insider Threat Vulnerability Assessment  Trusted partners

Forcepoint’s partnership with the Carnegie Mellon SEI-Authorized Insider Threat Vulnerability Assessors
University Software Engineering Institute (SEI) enables will conduct on-site document reviews, interviews of key
our certified consultants to deliver the SEI-licensed personnel, and observation of critical business processes.
Insider Threat Vulnerability Assessment (ITVA) service. The assessment report documents the key findings of the
SEI developed the ITVA methodology and criteria to help organization’s exposure to insider threats along multiple
organizations assess how prepared they are to prevent, vectors (e.g., technical, behavioral, process, and policy).
detect, and respond to insider threats. It’s based upon SEI’s
analysis of more than 1,300 documented cases in which User and Data Security Program Design
malicious insiders took advantage of process or control
There is no shortage of guidance from regulatory,
weaknesses to negatively impact an organization.
industrial, trade, and government bodies; however, their
best practices are frequently duplicative, not well organized
We provide an unparalleled assessment by combining
for the stages of program development, and difficult
the formal standards of the ITVA with years of program
for program managers to interpret, tailor, and apply.
experience—as well as technical and operational
Additionally, experience-driven guidance is often lacking
expertise—to provide organizations with a detailed
in practical areas of typical, daily program operations.
assessment of their current state of readiness to defend
References relevant to different customers include:
against the insider threat.
 Carnegie Mellon University (CMU) Software Engineering
The assessment identifies technical vulnerabilities, Institute (SEI) CERT Insider Threat Center
business process gaps, and inadequate management  Federal Financial Institutions Examination Council (FFIEC)
practices. The Insider Threat Vulnerability Assessment
 Financial Industry Regulatory Authority (FINRA)
examines practices within, and attributes of:
 Institute for Critical Infrastructure Technology (ICIT)
 Information technology
 Intelligence National Security Alliance (INSA)
 Human resources
 National Industrial Security Program Operating Manual
 Physical security (NISPOM)
 Engineering  National Infrastructure Advisory Council (NIAC)

www.forcepoint.com 3
Forcepoint Consulting Services: User and Data Security Programs

 National Insider Threat Task Force (NITTF) Insider Threat Operations


 National Institute of Standards and Technology (NIST) Forcepoint consulting staff provide a comprehensive
 Payment Card Industry (PCI) Data Security Standard (DSS) range of services in support of user and data security
 Securities Industry and Financial Markets Association program operations. Consulting services in this area are
(SIFMA) customizable based on need. Examples of operations
support include:
The User and Data Security Program Design service
 Enhancing privacy and data protection
incorporates built-in privacy-by-design and governance
controls to help organizations prevent, detect, and respond to  Investigations support
risks posed to information systems and the data they contain.  Program training
 Data and technology fusion
Through the implementation of a cross-functional core
 Data analysis
group, the Human Point System User and Data Security
Program Model supports organization-wide efforts to  Incident response
put the relevant best practices for program operations  Standard operating procedures enhancement
to work. Its risk-mitigating practices and techniques  Audit and compliance
include helpful guidance developed from years of
 Program metrics, reports, and communications
extensive experience guiding organizations through design
decisions and activities. The model architecture includes  Program review
operational advice covering privacy, governance, roles and  Operationalize Human Point System components
responsibilities, working groups, training and awareness,  Human Point System expansion (e.g., UEBA, DLP, FIT,
incident response, case management, and data handling. Cross Domain) and operations maturation

Insider Threat Program Development


Insider Threat Workshops
The development of a Human Point System User and Data
Security Program may seem like a daunting task, but that A hallmark of the Forcepoint Human Point System User
is simply not the case. Through the program, Forcepoint’s and Data Security Program Model is the early training
consultants will expedite organizations toward achieving of senior leadership, program managers, and cross-
the desired future state of the program with sample project functional team members. Development and operations
plans, templates, and assistance in developing processes teams are set up for success through a common
and project artifacts. understanding of program design, risk mitigation
strategies, and key steps to launching successful
Organizations benefit from our deep understanding of programs.
developing the initial operating capability and the project
activities necessary to continuously improve and mature Customizable workshops include:
its effectiveness. The privacy-by-design and governance  Insider Threat Awareness and Fundamentals
standards reflected in the Forcepoint Human Point System  Attributes and Best Practices of Successful Insider
User and Data Security Program Model encompass all Threat Programs
the activities required to establish a transparent and
 Best Practices Controls for Mitigating the Insider
trustworthy program in the enterprise.
Threat Risk
 Principal Steps to Getting the User and Data Security
Program Started

www.forcepoint.com 4
ABOUT FORCEPOINT
Forcepoint is transforming cybersecurity by focusing on what matters
most: understanding people’s intent as they interact with critical data
and intellectual property wherever it resides. Our uncompromising
systems enable companies to empower employees with unobstructed
access to confidential data while protecting intellectual property and
simplifying compliance. Based in Austin, Texas, Forcepoint supports
more than 20,000 organizations worldwide. For more about Forcepoint,
visit www.forcepoint.com and follow us on Twitter at @ForcepointSec.

CONTACT
www.forcepoint.com/contact

© 2018 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of


Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other
trademarks used in this document are the property of their respective owners.

[WHITEPAPER_CONSULTING_SERVICES_EN] 200067.042518

You might also like