Data Security Everywhere Executive Pitch - Ext
Data Security Everywhere Executive Pitch - Ext
Data as a Central Asset: The Age of AI-Driven Security and the Rise of
Data as a By-Product of Network Security Compliance and Regulation Behavioral Analytics
Focus: Network perimeter - Access Focus: Regulatory Compliance and Data Focus: Behavioral Analytics and Context-
Control, Firewalls, Password Protection Governance Aware Protection
Threats: Malware Threats: Insider threats and targeted Threats: AI-powered attacks, Deepfakes,
attacks (APTs) Data Breaches, Malware, Social
Engineering, Cloud misconfigurations
"Data is the new currency. It has its value, its worth, and it can be
used to drive economies, businesses, and technology.”
1980s - Early 1990s Mid 1990s - Early 2000s 2000s – 2010s 2010s Late 2010s - Present
Erik Qualman, Author of Socialnomics
The Rise of Data Protection - Birth of Cloud and Mobile Transformation: Data in a
Encryption and DLP Borderless World
Focus: Data Integrity and Encryption Focus: Securing Data Beyond the Perimeter
© 2024 Forcepoint 2
Securing Data at its Core
When all else fails, a robust data
security measure can still help
Perimeter Security protect valuable data assets and
mitigate the impact of security
incidents/breaches.
Network Security
Application Security
Endpoint Security
Sensitive Data
Data Security
PII IP
PHI CGD
PCI Legal
© 2024 Forcepoint 3
AI Transformation is changing everything—and raising questions—even more than Digital Transformation
Regulatory Compliance
What are the rulesets
© 2025 Forcepoint 5
Regulatory
Compliance
6
Data Security is now a business imperative UNITED NATIONS
U N C TA D
Legislation
71% 9% 15% 5%
Yes Drafted None unknown
© 2024 Forcepoint 7
Cyber & Data Privacy Regulation in Indonesia (2/2)
Cyber & Data Cyber Cyber & Data
Financial Services Authority Regulation No.11 / POJK.03 / Financial Services Authority Letter No. Financial Service Authority Regulation No. 22
2022 Regarding Implementation of Information Technology 29/SEOJK.03/2022 Year 2023
by Commercial Banks Concerning Commercial Bank Cyber Security and
Resilience Mentioning about consumer protection in Financial
Article 21
Industry including needs to implement Data Protection
(1) Banks must maintain cyber resilience.
and Privacy for Banks
(2) To maintain cyber resilience as referred to in paragraph Banks are required to conduct periodic cyber maturity
(1), the Bank shall process at least: assessments, using the following methods:
a. identification of assets, threats, and vulnerabilities; Cybersecurity built-in risk assessment Cyber & Data
b. asset protection; Assessment of cybersecurity risk management Central Bank of Indonesia Governor Regulation
c. cyber incident detection; and implementation
No. 20 Year 2023
D. Cyber Incident Response and Recovery Cybersecurity governance
Cyber risk management framework
Article 30 (4c) Cyber risk management process Mentioning about consumer protection including needs
The risk management process of using an IT Service provider Cyber risk control system to implement Data Protection and Privacy for Banks
includes: Assessment of cybersecurity resilience process
c. Determination and monitoring of compliance with data implementation AI Ethics
and/or information security requirements in internal policies Banks are required to conduct periodic security testing
and procedures and in cooperation agreements. using the following methods: Circular Letter Ministry of Communication and
Vulnerability assessment and penetration testing (VAPT) Information No. 9 / 2023
Additional Article 30 (4c): Scenario-based testing
Examples of the scope of data and/or information security Banks are required to report cybersecurity incidents to Implement 9 (nine) AI Ethics principle when implement
required by the Bank are as follows: OJK and build AI System.
1. information security at the organization; Banks are required to establish independent
2. access management; cybersecurity functions AI Ethics
3. encryption and password management; First shipment: by the end of June 2023
4. security and network operation; • Next year: no later than 15 (fifteen) working days after Code of Ethics in Financial Industry by Financial
5. Application Programming Interface (API); the end of the reporting year Service Authority (OJK)
6. data location; and
7. confidentiality of personal data of Bank customers
Implement 5 (Five) AI Ethics principle when implement
and build AI system in Financial Industry.
Article 16 (2e)
The processing of personal data is carried out by protecting the security of personal data from unauthorized access, unauthorized disclosure, unauthorized modification, misuse, destruction
and/or loss of personal data.
Article 35
The personal data controller is obliged to protect and guarantee the security of the personal data processed, by undertaking:
a. preparation and implementation of operational and technical measures to protect personal data that are contrary to the provisions of laws and regulations; and
b. determine the level of security of personal data taking into account the nature and risks of personal data to be protected in the processing of personal data
Article 38
The personal data controller is obliged to protect the personal data from unauthorized processing
Article 39
1) The personal data controller is obliged to prevent personal data from being accessed unlawfully
2) Prevention as referred to in paragraph 1 is carried out by using a security system for the processing of personal data and/or processing of personal data using a reliable, secure, and
responsible electronic system
3) Prevention as referred to in paragraph 2 shall be carried out in accordance with the provisions of laws and regulations
• Controllers and Processors who violate their obligations are subject to administrative sanctions.
• Mandatory articles and Administrative sanctions
Violation of the provisions of Article 20 point (1), Article 21, Article 24, Article 25 point (2), Article
Any Person who intentionally and unlawfully obtains or collects Personal Data that does not belong
26 point (3), Article 27, Article 28, Article 29, Article 30, Article 31, Article 32 point (1), Article 33,
to him with the intention of benefiting himself or others which may result in the loss of the Personal
Article 34 point (1), Article 35, Article 36, Article 37, Article 38, Article 39 point (1), Article 40
Data Subject as referred to in Article 65 point (1) shall be punished with a maximum imprisonment
point (1), Article 41 point (1) and point (3), Article 42 point (1), Article 43 point (1), Article 44
of 5 (five) years and/or a maximum fine of Rp5,000,000,000.00 (five billion rupiah).
point (1), Article 45, Article 46 point (1) and point (3), Article 47, Article 48 point (1), Article 49,
Any Person who intentionally and unlawfully discloses Personal Data that does not belong to him
Article 51 point (1) and point (5), Article 52, Article 53 point (1), Article 55 point (2), and Article 56
as referred to in Article 65 point (2) shall be punished with a maximum imprisonment of 4 (four)
point (2) to point (4) are subject to administrative sanctions.
years and/or a maximum fine of Rp4,000,000,000.00 (four billion rupiah).
1. Any Person who intentionally and unlawfully uses Personal Data that does not belong to him
as referred to in Article 65 point (3) shall be punished with a maximum imprisonment of 5
Article 57 point 2 Article 57 point 4
(five) years and/or a maximum fine of Rp5,000,000,000.00 (five billion rupiah).
11
Data Protection vs Data Privacy
Privacy under Supreme Law "Everyone has the right to personal protection, family, honor, dignity and property under his
control, and has the right to a sense of security and protection from the threat of fear to do or
(UUD 1945) not do something which is a human right."
13
Organizations are being pressured to transform more than ever before
Apps &
Intellectual property, Regulated data
Data
Data Is Everywhere
People
Employees, contractors, suppliers, partners, customers
People Work Anywhere
Public 18
Sensitive data is now outside and exposed
Web Generative AI Unmanaged SaaS Managed SaaS Private Apps Datacenter Email
© 2024 Forcepoint 19
Public
Our DLP Capabilities – 1600+ Prebuilt
code, etc.
rea
accuracy
Meta-Data (Files, Emails, etc) , integrated with Microsoft
acy
Over 900 file types detected based on true file type to identify
File-Types all file types regardless of if they are renamed to avoid
detection
Public 20
We bring data security and networking together to eliminate gaps & redundancies
Data Security
Data
Policies
Data-first Approach
Convergence Network
Policies
SSE / SASE
Cloud Apps
Web
Private Apps
Data
Policies
Network
Custom Apps Data Security Everywhere
Policies
Data-first SASE
Architecture
Endpoints
View and control all of the customer's data with the industry's largest
pre-defined policy library. Ensure regulatory compliance across 80+
countries for GDPR, CCPA and more. Deploy data classification with
Boldon James and Azure Information Protection.
Protect PII and PHI, company financials, trade secrets, credit card data,
and other pieces of sensitive customer data-even in images. Follow
intellectual property (IP) in both structured and unstructured forms and
stop low & slow data theft even when user devices are off-network.
Public 23
Predefined Classifiers
Public
Public
Securing the data core across multiple channels
DLP Policies
managed by FSM
Isolated Container
Forcepoint MTA DLP
Real-time Real-time
Forcepoint Remote
Security Data
Browser Isolation
Classification Classification
Real-time
Internet Content
Classification
Outbound email
Public
What is the Future of Data Security?
Cloud Native and Hybrid DLP Privacy and Compliance Driven DLP Real-Time and Context-Aware DLP
• Protects data across hybrid • Granular compliance features • Contextual decision making: Makes
environments • Adherence to Global regulatory decisions based on users’ activities
• Protection regardless of where data requirements • Automated policy enforcement
resides (on-premise, cloud, endpoint) • Compliance reporting • Real-time responses to Data Breaches
and Exfiltration attempts
AI Powered, Autonomous DLP Integrated, Cross Channel DLP Zero Trust DLP Platform
• Reduce reliance on pre-set rules • Unified security ecosystem for • Behavioural analytics
• Learn and Adapt based on patterns of comprehensive and automated • Risk-based access controls,
normal behavior protection • Identity-driven policies
• More effective at detecting anomalous • Consistent data security protection
actions across ALL channels
• AI driven content recognition and
classification
Classify Protect
Classify Protect
Workflow orchestration
Track data ownership and accountability to ensure actions taken are aligned
with the responsibilities of each stakeholder
Challenges
• Stop leakage of sensitive data from employee’s mailboxes. Breach had already taken place showing their email to be a
large point of potential exfiltration.
Approach
• Use Forcepoint Data Visibility to do a major scan before legal was to get involved.
• 5 days to scan across 2.5TB of raw data, 9 million emails with attachments in 5 different languages.
Results
• Completed total scan of 2.5TB in just 2 ½ days!
• Were able to identify sensitive email content and remove sensitive data.
• Just one email had bank account details and screenshots of bank statements covering billions of dollars.
Public
Modernize and automate the data security lifecycle with AI-powered DSPM technologies
Increase Productivity
Enable faster, safer data access and sharing for better innovation & collaboration
Cut Costs
Reduce Risk
Streamline Compliance
Gain true visibility and control over sensitive data throughout your organization
Neo
Agent
Forcepoint Public
Public
Context and Risk Aware Data Protection
Forcepoint Cloud
Access patterns
Users
N
D
L
P
D
U
P
DLP Incidents + IOBs
DUP Usage & C
IdaaS
E A
O
Unified
Behavioral Data Activity
S SaaS Apps
B
Agent
Analytics Sentiment Messaging
IOB examples
Incidents
• Hoarding large amounts of data
DLP
• Syncing agent to personal cloud Risk Score
• Frequently coping files to USB
• Active on job hunting sites
• Suspicious app transfers DLP as a Service
Email
Web CASB
Cloud
Public
Use Case Example
BLOCK
ENCRYPT
CONFIRM
Public
Risk-Adaptive Protection
Automate insights/enforcement with contextual security—boost productivity & simplify operations
20 Audit only
Working
normally
Make digital security more like the real world Zero Trust Continuous Monitoring Focus on highest risk
AI-powered discovery,
classification, orchestration Risk-Adaptive Protection
Security. Simplified.
Cloud Web
Server Apps
Cloud Apps + Endpoint +
BYOD Web Email
Cloud
Bring enterprise-class DLP (1700+ built-in policies) wherever needed
Focus harshest actions (blocking) on people who pose the most risk—
without causing problems for everyone else
Risk-Adaptive Protection
Pioneered by Forcepoint
Safeguard managed & agentless devices (Wi-Fi, BYOD, IoT) DLP SWG
• Enforce in cloud or at network edge
No Agent
Go direct for more efficient bandwidth, location-aware apps
• Enforce on endpoint (up to 2X faster) or at network edge Managed BYOD
Device on-site
Inspect data uploaded from server apps to web storage Server Apps
Web
The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research,
Inc. The Forrester Wave™ is a graphical representation of Forrester’s call on a market and is plotted using a detailed spreadsheet with
exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester
Wave™. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.
up to
31% *
91% *
$600k /year**
Improvement customers estimate that Customers who felt one platform for DLP IT savings from not buying/maintaining a
unified DLP policies would have on: policies across cloud, web, private apps second data security solution, recreating
would improve overall data security policies, or reconciling gaps
Reduced Complexity, Staff Productivity,
Reduced Reporting Effort plus, gains from
Increased Productivity for Users
(hours per month * number of users)
*IDC White Paper, sponsored by Forcepoint, The Quest for a Single Set of Unified DLP Policies, IDC #US51335023, Jan 2024 **$100k license + 4 admins * ($25k policy recreation + $100k incident management)
Increase Cut
Productivity Costs
Reduce Streamline
Risk Compliance