SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Precise and Actionable Social & Digital
Media Risk Scoring
PiiQ Media LLC © DBA PiiQ Risk
JUN 1, 2020
1
PiiQ Media is a data science
and technology firm
focused on delivering the
most precise social & digital
media scoring solutions on
the market for Individual
and Corporate Risk
2
Our products and services provide
organizations with an actionable social &
digital media Risk Assessment with scoring
across multiple markets; including, Cyber
Risk, Human Resources, Legal, Business
Intelligence, Cyber Insurance, Finance,
and Background Checks
Our expert staff has managed online capability for
major global events such as The Olympics, G8
Summit, and more
WHO WE ARE
3
PiiQ’s Proprietary Technology Featuring
The only Social & Digital
Media Risk Analysis and
Scoring capability on
the market. Identifies
the information threat
actors are using to
compromise your
organization
The broadest and most
comprehensive
collection of Social &
Digital Media data.  The
only, at scale, provider
of publicly available
information across all
major social platforms.
Individual and
Corporate Risk & Threat
monitoring.  Due
Diligence and Business
Intelligence insight via
deep open source data
mining
The first product on the
market to provide
Tailored Spear-Phishing
technology based on
publicly available
personally identifiable
information (PII)
WHAT WE DO
4
Worldwide, social media usage continues to expand:
A New Phishing Site launches every 20 seconds.
90% of Verified Phishing Scams Discovered in Secure
Email Gateways.
$8.2 was the average cost of human error in US
Data Breaches in 2019
5
PQ-Risk PRO
Legal Insurance Background Checks Healthcare Cyber Insurance Sports
Venues Entertainment Executive Protection
Allows you to understand individual and organizational risks created through social
media use with clear mitigation steps to secure information from exposure or
compromise.
The Marketplace:
Assess Individual Risks
• Understand what markers significantly increase individual and therefore
organizational risk and how to mitigate them
• Investigate and monitor individuals to alert on increases in risk before they
become issues
• Investigate key relationships, attributes, and activities that could compromise or
devalue business operations
6
PQ-RISK PRO
Tailored Spear Phishing Email Based
On Discovered Information
Overall Individual
Risk Score with
Critical Issues to
Address
Risk Scores for
Relationships,
Attributes, Content,
and Technical
Insights on Critical
Issues and
Associated
Vulnerabilities
Social Media Platforms
Discovered
7
PQ-Risk CXO
Corporations Legal Brands Insurance Healthcare Cyber Insurance
Entertainment Sports Mergers & Acquisitions Executive Protection
Allows you to understand key executive and corporate risks created through social
media use with clear mitigation steps to secure information from exposure or
compromise.
The Marketplace:
Assess C-SUITE Risks
• C-SUITE are increasingly becoming common targets for spear phishing attacks
because of visibility and access
• Understand what markers significantly increase individual and organizational
risk and how to mitigate them
• Investigate and Monitor individual and organizations to alert on increases in risk
before they become issues
• Organizations spend millions to secure information systems that can be easily
compromised through a single human compromise
8
PQ-RISK CXO
Aggregated Critical
Issues
Automatically
Identify, Analyze,
and Score
Company C-SUITE
One-Click C-SUITE
Collection, Analysis,
and Scoring
Visibility of Overall Risk
Scores for the C-SUITE
9
PQ-Risk HQ
Corporations Legal Brands Insurance Healthcare Entertainment Cyber
Insurance Sports Mergers & Acquisitions Executive Protection
Allows you to understand corporate risks created through openweb, social, and dark
web sources that effect your overall corporate risk.
The Marketplace:
Assess Corporate Risk
• Increased corporate risk can come from multiple sources; Insider Threats,
Infrastructure changes, Adversarial Groups, Partners, Negative Sentiment
• Understanding and assessing changes in open source information provides
insight into changes in your risk profile
• These changes can drive key decisions and company strategy in relation to
partners, resources, reputation.
10
PQ-RISK HQ
Geo-Based Alerts
possibly effecting
business operations
Assessment of critical
Corporate attributes
that effect Risk
Timeline of mentions,
employees, sentiment,
news, keywords
Overall Corporate
Risk Score and Top
Critical Issues
11
PQ-RISK HQ
Risk Factors measured in
Reputation, Organization,
Technical, and Partners that effect
Corporate Risk
12
PQ-Risk: Reduce Social Media Vulnerabilities and Exposure
ABC Company
Executives, Employees, & Partners
active in social media
Key Risk Markers:
• Patterns of relationships, attributes, and activity
• Open source data mining
• Threat Actors easily build context
• Context opens up vulnerability to compromise
PiiQ Risk Analysis &
Assessment
Open Source Risk
Screening
Contextualized
Spear-Phishing
Business Risk & Due
Diligence Analysis
Threat & Exposure
Monitoring
13
PiiQ Risk Vs. Competitors
PIIQ RISK HAS NO COMPETITORS
PIIQ RISK is the ONLY Social Media Risk Assessment and Scoring Company on the Market
HOW WE STACK UP
14
DISCLAIMER
PiiQ Media LLC takes privacy and data security seriously.
We maintain a comprehensive plan to ensure we comply
with all applicable US and European privacy and data
security laws including, without imitation, the General
Data Protection Regulation (GDPR)
CONTACT
PiiQ Media LLC
1 Broadway
Cambridge, MA 02142
PiiQMedia.com
+1 (617) 401-2173
info@piiqmedia.com

Weitere ähnliche Inhalte

Was ist angesagt?

Keynote - The Digital CMO - Alan Osetek, President, Resolution Media
Keynote - The Digital CMO - Alan Osetek, President, Resolution MediaKeynote - The Digital CMO - Alan Osetek, President, Resolution Media
Keynote - The Digital CMO - Alan Osetek, President, Resolution Media
BrightEdge Technologies
 
Addressing Specific Challenges And E Media In Fs Alpesh Doshi
Addressing Specific Challenges And E Media In Fs   Alpesh DoshiAddressing Specific Challenges And E Media In Fs   Alpesh Doshi
Addressing Specific Challenges And E Media In Fs Alpesh Doshi
Alpesh Doshi
 
Nordic Investor Relations Conference: IR and Social Media
Nordic Investor Relations Conference: IR and Social MediaNordic Investor Relations Conference: IR and Social Media
Nordic Investor Relations Conference: IR and Social Media
Dave Hogan
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and compliance
Unified Communications Online
 

Was ist angesagt? (20)

Third party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligenceThird party risk management with cyber threat intelligence
Third party risk management with cyber threat intelligence
 
Top 5 it security threats for 2015
Top 5 it security threats for 2015Top 5 it security threats for 2015
Top 5 it security threats for 2015
 
Keynote - The Digital CMO - Alan Osetek, President, Resolution Media
Keynote - The Digital CMO - Alan Osetek, President, Resolution MediaKeynote - The Digital CMO - Alan Osetek, President, Resolution Media
Keynote - The Digital CMO - Alan Osetek, President, Resolution Media
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Digital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ Overview
 
Polecat connecting risk
Polecat connecting riskPolecat connecting risk
Polecat connecting risk
 
Social Media Intelligence
Social Media IntelligenceSocial Media Intelligence
Social Media Intelligence
 
Polecat: Connecting Risk Across the Enterprise
Polecat: Connecting Risk Across the EnterprisePolecat: Connecting Risk Across the Enterprise
Polecat: Connecting Risk Across the Enterprise
 
Addressing Specific Challenges And E Media In Fs Alpesh Doshi
Addressing Specific Challenges And E Media In Fs   Alpesh DoshiAddressing Specific Challenges And E Media In Fs   Alpesh Doshi
Addressing Specific Challenges And E Media In Fs Alpesh Doshi
 
Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?Social Media and Mortgage Regulation: What's Next?
Social Media and Mortgage Regulation: What's Next?
 
Nordic Investor Relations Conference: IR and Social Media
Nordic Investor Relations Conference: IR and Social MediaNordic Investor Relations Conference: IR and Social Media
Nordic Investor Relations Conference: IR and Social Media
 
Social collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and complianceSocial collaboration 10 must have tips for security, productivity and compliance
Social collaboration 10 must have tips for security, productivity and compliance
 
Smarsh social media in investment banking
Smarsh social media in investment bankingSmarsh social media in investment banking
Smarsh social media in investment banking
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 
Insights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense ReportInsights from 2016 Cyberthreat Defense Report
Insights from 2016 Cyberthreat Defense Report
 
Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...Smarsh social media trends, insights, and best practices from 2015 compliance...
Smarsh social media trends, insights, and best practices from 2015 compliance...
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
Managing it security and data privacy security
Managing it security and data privacy securityManaging it security and data privacy security
Managing it security and data privacy security
 

Ähnlich wie Piiq Risk - Product Stack Capabilities Deck

Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
rsouthal2003
 
Big Data - Analytics iC-360
Big Data - Analytics iC-360Big Data - Analytics iC-360
Big Data - Analytics iC-360
davemishra
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
Josh Stein
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
evonnehoggarth79783
 
Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdfUnderstanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
uzair
 
[En] Spotter Solutions and Applications 2013
[En] Spotter Solutions and Applications 2013[En] Spotter Solutions and Applications 2013
[En] Spotter Solutions and Applications 2013
Spotter
 

Ähnlich wie Piiq Risk - Product Stack Capabilities Deck (20)

Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
Forrester-Wave-Digital_Risk_Monitoring-Q3-2016
 
Big Data - Analytics iC-360
Big Data - Analytics iC-360Big Data - Analytics iC-360
Big Data - Analytics iC-360
 
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
01-Build-an-IT-Risk-Management-Program--Phases-1-3.pptx
 
The Foundations of Social Media Risk Management
The Foundations of Social Media Risk ManagementThe Foundations of Social Media Risk Management
The Foundations of Social Media Risk Management
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
Webinar: The Future of Data-driven Storytelling
Webinar: The Future of Data-driven StorytellingWebinar: The Future of Data-driven Storytelling
Webinar: The Future of Data-driven Storytelling
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdfUnderstanding Cyber Threat Intelligence A Guide for Analysts.pdf
Understanding Cyber Threat Intelligence A Guide for Analysts.pdf
 
Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013
 
Mapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementMapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk Management
 
[En] Spotter Solutions and Applications 2013
[En] Spotter Solutions and Applications 2013[En] Spotter Solutions and Applications 2013
[En] Spotter Solutions and Applications 2013
 
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
 
Dominate Data With Social Media Mining
Dominate Data With Social Media MiningDominate Data With Social Media Mining
Dominate Data With Social Media Mining
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 

Kürzlich hochgeladen

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
VictorSzoltysek
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 

Kürzlich hochgeladen (20)

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 

Piiq Risk - Product Stack Capabilities Deck

  • 1. Precise and Actionable Social & Digital Media Risk Scoring PiiQ Media LLC © DBA PiiQ Risk JUN 1, 2020 1
  • 2. PiiQ Media is a data science and technology firm focused on delivering the most precise social & digital media scoring solutions on the market for Individual and Corporate Risk 2 Our products and services provide organizations with an actionable social & digital media Risk Assessment with scoring across multiple markets; including, Cyber Risk, Human Resources, Legal, Business Intelligence, Cyber Insurance, Finance, and Background Checks Our expert staff has managed online capability for major global events such as The Olympics, G8 Summit, and more WHO WE ARE
  • 3. 3 PiiQ’s Proprietary Technology Featuring The only Social & Digital Media Risk Analysis and Scoring capability on the market. Identifies the information threat actors are using to compromise your organization The broadest and most comprehensive collection of Social & Digital Media data.  The only, at scale, provider of publicly available information across all major social platforms. Individual and Corporate Risk & Threat monitoring.  Due Diligence and Business Intelligence insight via deep open source data mining The first product on the market to provide Tailored Spear-Phishing technology based on publicly available personally identifiable information (PII) WHAT WE DO
  • 4. 4 Worldwide, social media usage continues to expand: A New Phishing Site launches every 20 seconds. 90% of Verified Phishing Scams Discovered in Secure Email Gateways. $8.2 was the average cost of human error in US Data Breaches in 2019
  • 5. 5 PQ-Risk PRO Legal Insurance Background Checks Healthcare Cyber Insurance Sports Venues Entertainment Executive Protection Allows you to understand individual and organizational risks created through social media use with clear mitigation steps to secure information from exposure or compromise. The Marketplace: Assess Individual Risks • Understand what markers significantly increase individual and therefore organizational risk and how to mitigate them • Investigate and monitor individuals to alert on increases in risk before they become issues • Investigate key relationships, attributes, and activities that could compromise or devalue business operations
  • 6. 6 PQ-RISK PRO Tailored Spear Phishing Email Based On Discovered Information Overall Individual Risk Score with Critical Issues to Address Risk Scores for Relationships, Attributes, Content, and Technical Insights on Critical Issues and Associated Vulnerabilities Social Media Platforms Discovered
  • 7. 7 PQ-Risk CXO Corporations Legal Brands Insurance Healthcare Cyber Insurance Entertainment Sports Mergers & Acquisitions Executive Protection Allows you to understand key executive and corporate risks created through social media use with clear mitigation steps to secure information from exposure or compromise. The Marketplace: Assess C-SUITE Risks • C-SUITE are increasingly becoming common targets for spear phishing attacks because of visibility and access • Understand what markers significantly increase individual and organizational risk and how to mitigate them • Investigate and Monitor individual and organizations to alert on increases in risk before they become issues • Organizations spend millions to secure information systems that can be easily compromised through a single human compromise
  • 8. 8 PQ-RISK CXO Aggregated Critical Issues Automatically Identify, Analyze, and Score Company C-SUITE One-Click C-SUITE Collection, Analysis, and Scoring Visibility of Overall Risk Scores for the C-SUITE
  • 9. 9 PQ-Risk HQ Corporations Legal Brands Insurance Healthcare Entertainment Cyber Insurance Sports Mergers & Acquisitions Executive Protection Allows you to understand corporate risks created through openweb, social, and dark web sources that effect your overall corporate risk. The Marketplace: Assess Corporate Risk • Increased corporate risk can come from multiple sources; Insider Threats, Infrastructure changes, Adversarial Groups, Partners, Negative Sentiment • Understanding and assessing changes in open source information provides insight into changes in your risk profile • These changes can drive key decisions and company strategy in relation to partners, resources, reputation.
  • 10. 10 PQ-RISK HQ Geo-Based Alerts possibly effecting business operations Assessment of critical Corporate attributes that effect Risk Timeline of mentions, employees, sentiment, news, keywords Overall Corporate Risk Score and Top Critical Issues
  • 11. 11 PQ-RISK HQ Risk Factors measured in Reputation, Organization, Technical, and Partners that effect Corporate Risk
  • 12. 12 PQ-Risk: Reduce Social Media Vulnerabilities and Exposure ABC Company Executives, Employees, & Partners active in social media Key Risk Markers: • Patterns of relationships, attributes, and activity • Open source data mining • Threat Actors easily build context • Context opens up vulnerability to compromise PiiQ Risk Analysis & Assessment Open Source Risk Screening Contextualized Spear-Phishing Business Risk & Due Diligence Analysis Threat & Exposure Monitoring
  • 13. 13 PiiQ Risk Vs. Competitors PIIQ RISK HAS NO COMPETITORS PIIQ RISK is the ONLY Social Media Risk Assessment and Scoring Company on the Market HOW WE STACK UP
  • 14. 14 DISCLAIMER PiiQ Media LLC takes privacy and data security seriously. We maintain a comprehensive plan to ensure we comply with all applicable US and European privacy and data security laws including, without imitation, the General Data Protection Regulation (GDPR) CONTACT PiiQ Media LLC 1 Broadway Cambridge, MA 02142 PiiQMedia.com +1 (617) 401-2173 info@piiqmedia.com