SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Is having your data and identity
compromised the NEW NORMAL?
Dan DeBlasio
June 4th, 2015
IN AN INCREASINGLY DIGITAL
WORLD CYBERSECURITY IS A
SERIOUS PROBLEM
SNAPSHOT OF IDENTITY MANAGEMENT
BREACH TRENDS
LOOKING BACK BEFORE
DIVING AHEAD
IN A WORLD WHERE THE NORM IS CYBERSECURITY
BREACHES ……
IT IS IMPORTANT FOR ENTERPRISES
TO HAVE MEASURES IN PLACE
FOR PREVENTION AND CONTAINMENT
OF AN ATTACK
Not a question of “IF” but “WHEN”
2011 THREAT AGENTS OVER TIME BY PERCENT OF
BREACHES
2011 continued the shift towards external agents’ involvement in a high
percentage of data breaches. Though we have always seen an external
majority, never before has any year been so one-sided.
2012 THREAT LANDSCAPE OVERVIEW
2013 THREAT SUMMARY
2013 may be remembered as the “year
of the retailer breach,” but a
comprehensive assessment suggests it
was a year of transition from geopolitical
attacks to large-scale attacks on
payment card systems.
2014 THREAT SUMMARY
Data breaches double YOY
Average cost +$5.5 million / $200 per record
Corporations are being sued for data loss (Sony)
(Ponemon Institute)
THE TRENDS: BREACHES ARE DOUBLING IN COST
COST PER RECORD VARIES IN HARD AND SOFT
COSTS (NOT FACTORING TRUST / LOYALTY)
At 100 records variance is between $357 / record to $12 / Record
At 1,000,000 records variance is between $27.50 / record to $0.06 / Record
Glass half full Glass half empty
That is a LARGE Variance in my book!
IT’S IN THE CLOUD….....
But which Cloud……
Private
(Iaas)
Public
(SaaS)
Hybrid
(PaaS)
….and is your data and identity safe and secure?
WHAT THE CLOUD BRINGS
 Who owns the security?
 Who is liable in a breach?
 Who restores Trust?
FORMS OF STRONG IDENTITY TODAY
ACTUALLY, YOUR DIGITAL IDENTITY
TYPICALLY LOOKS LIKE THIS:
PASSWORDS ARE A WEAK DEFENSE
Verizon Data Breach Investigation 2013
SUMMARY
 Educate employees on phishing attacks (e-mails)
 Develop strong and changing passwords
 Or better yet deploy two factor authentication, especially for
external and mobile access
 Have a post breach strategy and communications plan to limit
damage to brand and customer trust
 Investigate new security measures utilizing cutting-edge systems
that use machine learning and, ironically, big data analysis may
give a huge boost to the powers of corporate security teams.
If you are looking to limit your risk of a security breach and cut the
cost of the damage by more then half in real $$$:
REFERENCES
 Verizon: Data breach investigations reports 2011, 2012, 2013, 2014
and 2015
 BBC News: Cybersecurity: Defending 'unpreventable' cyber
attacks, By Paul Rubens Technology reporter
 Forbes: The Power And Problem Of Privilege In Cybersecurity, Tom
Kemp, CEO of Centrify
 Frost-Sullivan: Damballa Failsafe Review 4-14-2015
 Gartner: Identity and Access Management Summit 2008
DAN DEBLASIO
DDEBLASIO@COX.NET
949-413-7876 (MOBILE)
HTTP://WWW.LINKEDIN.COM/IN/DANDEBLASIO/

Weitere ähnliche Inhalte

Was ist angesagt?

Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012Patricia Makaveli
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015Jörn Weber
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Eset trends report_2018
Eset trends report_2018Eset trends report_2018
Eset trends report_2018malvvv
 
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CloudIDSummit
 
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVA
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015anpapathanasiou
 
Aveshka Brief - OA NYC Meetup
Aveshka Brief - OA NYC MeetupAveshka Brief - OA NYC Meetup
Aveshka Brief - OA NYC MeetupOpen Analytics
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Wavecrest Computing
 
Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Qrator Labs
 
Cyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal GapCyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal GapBooz Allen Hamilton
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websitesBee_Ware
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
[Grom] Enabling the Protection, Detection, and Response to Cyber-Threats
[Grom] Enabling the Protection, Detection, and Response to Cyber-Threats[Grom] Enabling the Protection, Detection, and Response to Cyber-Threats
[Grom] Enabling the Protection, Detection, and Response to Cyber-ThreatsEuropean Collaboration Summit
 

Was ist angesagt? (20)

Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Eset trends report_2018
Eset trends report_2018Eset trends report_2018
Eset trends report_2018
 
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
CIS 2015- #FAIL No More, The Rise of the Self Defending Enterprise- Nishant K...
 
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox BlueGWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
GWAVACon 2015: Netbox Blue - GWAVA & Netbox Blue
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
Aveshka Brief - OA NYC Meetup
Aveshka Brief - OA NYC MeetupAveshka Brief - OA NYC Meetup
Aveshka Brief - OA NYC Meetup
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Big or Small, it can happen to your business!
Big or Small, it can happen to your business!Big or Small, it can happen to your business!
Big or Small, it can happen to your business!
 
Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015Russian and Worldwide Internet Security Trends 2015
Russian and Worldwide Internet Security Trends 2015
 
Cyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal GapCyber In-Security II: Closing the Federal Gap
Cyber In-Security II: Closing the Federal Gap
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Investigating tips
Investigating tipsInvestigating tips
Investigating tips
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the Message
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
[Grom] Enabling the Protection, Detection, and Response to Cyber-Threats
[Grom] Enabling the Protection, Detection, and Response to Cyber-Threats[Grom] Enabling the Protection, Detection, and Response to Cyber-Threats
[Grom] Enabling the Protection, Detection, and Response to Cyber-Threats
 

Andere mochten auch

JanosFuzi-Reference_letter
JanosFuzi-Reference_letterJanosFuzi-Reference_letter
JanosFuzi-Reference_letterJanos F
 
Ejercicio correlacion
Ejercicio correlacionEjercicio correlacion
Ejercicio correlacionisabelmundt
 
Milieu
MilieuMilieu
MilieuKybar
 
Gg1 120815164713-phpapp02
Gg1 120815164713-phpapp02Gg1 120815164713-phpapp02
Gg1 120815164713-phpapp02IETI SD
 
CARECAGESA879812CET.3SRJGYARCH
CARECAGESA879812CET.3SRJGYARCHCARECAGESA879812CET.3SRJGYARCH
CARECAGESA879812CET.3SRJGYARCHAlberto Cervantes
 
Definición de problemas de salud en el primer
Definición de problemas de salud en el primerDefinición de problemas de salud en el primer
Definición de problemas de salud en el primerHernán Couceiro
 
Expert Fridays - Сергей Укустов: "CRDT"
Expert Fridays - Сергей Укустов: "CRDT"Expert Fridays - Сергей Укустов: "CRDT"
Expert Fridays - Сергей Укустов: "CRDT"Provectus
 
life_estuarios_eu.pdf
life_estuarios_eu.pdflife_estuarios_eu.pdf
life_estuarios_eu.pdfIrekia - EJGV
 
Lehendakariaren hitzaldia - VANGUARD EKIMENA - “Industria erronkak eta teknol...
Lehendakariaren hitzaldia - VANGUARD EKIMENA - “Industria erronkak eta teknol...Lehendakariaren hitzaldia - VANGUARD EKIMENA - “Industria erronkak eta teknol...
Lehendakariaren hitzaldia - VANGUARD EKIMENA - “Industria erronkak eta teknol...Irekia - EJGV
 
Comstock City, Thomas-edits, ch.3
Comstock City, Thomas-edits, ch.3Comstock City, Thomas-edits, ch.3
Comstock City, Thomas-edits, ch.3Rachel Holt
 
Un futuro deseable
Un futuro deseableUn futuro deseable
Un futuro deseableazael01
 

Andere mochten auch (16)

TRABAJO ONDAS
TRABAJO ONDASTRABAJO ONDAS
TRABAJO ONDAS
 
The origins of tungsten wire mesh
The origins of tungsten wire meshThe origins of tungsten wire mesh
The origins of tungsten wire mesh
 
JanosFuzi-Reference_letter
JanosFuzi-Reference_letterJanosFuzi-Reference_letter
JanosFuzi-Reference_letter
 
Ejercicio correlacion
Ejercicio correlacionEjercicio correlacion
Ejercicio correlacion
 
Presentación1
Presentación1Presentación1
Presentación1
 
Milieu
MilieuMilieu
Milieu
 
Gg1 120815164713-phpapp02
Gg1 120815164713-phpapp02Gg1 120815164713-phpapp02
Gg1 120815164713-phpapp02
 
CARECAGESA879812CET.3SRJGYARCH
CARECAGESA879812CET.3SRJGYARCHCARECAGESA879812CET.3SRJGYARCH
CARECAGESA879812CET.3SRJGYARCH
 
Definición de problemas de salud en el primer
Definición de problemas de salud en el primerDefinición de problemas de salud en el primer
Definición de problemas de salud en el primer
 
Lopd quironsalud
Lopd   quironsaludLopd   quironsalud
Lopd quironsalud
 
Expert Fridays - Сергей Укустов: "CRDT"
Expert Fridays - Сергей Укустов: "CRDT"Expert Fridays - Сергей Укустов: "CRDT"
Expert Fridays - Сергей Укустов: "CRDT"
 
Itinerari formatiu radiodiagnostic 2015 2016
Itinerari formatiu radiodiagnostic 2015 2016Itinerari formatiu radiodiagnostic 2015 2016
Itinerari formatiu radiodiagnostic 2015 2016
 
life_estuarios_eu.pdf
life_estuarios_eu.pdflife_estuarios_eu.pdf
life_estuarios_eu.pdf
 
Lehendakariaren hitzaldia - VANGUARD EKIMENA - “Industria erronkak eta teknol...
Lehendakariaren hitzaldia - VANGUARD EKIMENA - “Industria erronkak eta teknol...Lehendakariaren hitzaldia - VANGUARD EKIMENA - “Industria erronkak eta teknol...
Lehendakariaren hitzaldia - VANGUARD EKIMENA - “Industria erronkak eta teknol...
 
Comstock City, Thomas-edits, ch.3
Comstock City, Thomas-edits, ch.3Comstock City, Thomas-edits, ch.3
Comstock City, Thomas-edits, ch.3
 
Un futuro deseable
Un futuro deseableUn futuro deseable
Un futuro deseable
 

Ähnlich wie Special report on security

Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firmsJake Weaver
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
The 2014 Data Breach Investigations Report
The 2014 Data Breach Investigations ReportThe 2014 Data Breach Investigations Report
The 2014 Data Breach Investigations Report- Mark - Fullbright
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016thinkASG
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security reportGabe Akisanmi
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeNishantSisodiya
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Booz Allen Hamilton
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 

Ähnlich wie Special report on security (20)

Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
The 2014 Data Breach Investigations Report
The 2014 Data Breach Investigations ReportThe 2014 Data Breach Investigations Report
The 2014 Data Breach Investigations Report
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Alert logic cloud security report
Alert logic cloud security reportAlert logic cloud security report
Alert logic cloud security report
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 

Kürzlich hochgeladen

Barasat call girls 📞 8617697112 At Low Cost Cash Payment Booking
Barasat call girls 📞 8617697112 At Low Cost Cash Payment BookingBarasat call girls 📞 8617697112 At Low Cost Cash Payment Booking
Barasat call girls 📞 8617697112 At Low Cost Cash Payment BookingNitya salvi
 
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In Uttam Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | DelhiSaketCallGirlsCallUs
 
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In Patel Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | DelhiSaketCallGirlsCallUs
 
Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024samlnance
 
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| DelhiDELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhidelhimunirka444
 
FULL NIGHT — 9999894380 Call Girls In Kishangarh | Delhi
FULL NIGHT — 9999894380 Call Girls In Kishangarh | DelhiFULL NIGHT — 9999894380 Call Girls In Kishangarh | Delhi
FULL NIGHT — 9999894380 Call Girls In Kishangarh | DelhiSaketCallGirlsCallUs
 
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | DelhiSaketCallGirlsCallUs
 
Authentic # 00971556872006 # Hot Call Girls Service in Dubai By International...
Authentic # 00971556872006 # Hot Call Girls Service in Dubai By International...Authentic # 00971556872006 # Hot Call Girls Service in Dubai By International...
Authentic # 00971556872006 # Hot Call Girls Service in Dubai By International...home
 
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112Nitya salvi
 
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | Delhi
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | DelhiFULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | Delhi
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | DelhiSaketCallGirlsCallUs
 
❤Personal Whatsapp Srinagar Srinagar Call Girls 8617697112 💦✅.
❤Personal Whatsapp Srinagar Srinagar Call Girls 8617697112 💦✅.❤Personal Whatsapp Srinagar Srinagar Call Girls 8617697112 💦✅.
❤Personal Whatsapp Srinagar Srinagar Call Girls 8617697112 💦✅.Nitya salvi
 
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | DelhiFULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | DelhiSaketCallGirlsCallUs
 
Bobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdfBobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdfMARIBEL442158
 
Verified # 971581275265 # Indian Call Girls In Deira By International City Ca...
Verified # 971581275265 # Indian Call Girls In Deira By International City Ca...Verified # 971581275265 # Indian Call Girls In Deira By International City Ca...
Verified # 971581275265 # Indian Call Girls In Deira By International City Ca...home
 

Kürzlich hochgeladen (20)

Barasat call girls 📞 8617697112 At Low Cost Cash Payment Booking
Barasat call girls 📞 8617697112 At Low Cost Cash Payment BookingBarasat call girls 📞 8617697112 At Low Cost Cash Payment Booking
Barasat call girls 📞 8617697112 At Low Cost Cash Payment Booking
 
Dubai Call Girl Number # 00971588312479 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 00971588312479 # Call Girl Number In Dubai # (UAE)Dubai Call Girl Number # 00971588312479 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 00971588312479 # Call Girl Number In Dubai # (UAE)
 
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In Uttam Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | Delhi
 
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In Patel Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Patel Nagar | Delhi
 
❤ Sexy Call Girls in Chandigarh 👀📞 90,539,00,678📞 Chandigarh Call Girls Servi...
❤ Sexy Call Girls in Chandigarh 👀📞 90,539,00,678📞 Chandigarh Call Girls Servi...❤ Sexy Call Girls in Chandigarh 👀📞 90,539,00,678📞 Chandigarh Call Girls Servi...
❤ Sexy Call Girls in Chandigarh 👀📞 90,539,00,678📞 Chandigarh Call Girls Servi...
 
Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024Deconstructing Gendered Language; Feminist World-Making 2024
Deconstructing Gendered Language; Feminist World-Making 2024
 
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| DelhiDELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
 
FULL NIGHT — 9999894380 Call Girls In Kishangarh | Delhi
FULL NIGHT — 9999894380 Call Girls In Kishangarh | DelhiFULL NIGHT — 9999894380 Call Girls In Kishangarh | Delhi
FULL NIGHT — 9999894380 Call Girls In Kishangarh | Delhi
 
(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7
(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7
(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7
 
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In New Ashok Nagar | Delhi
 
Authentic # 00971556872006 # Hot Call Girls Service in Dubai By International...
Authentic # 00971556872006 # Hot Call Girls Service in Dubai By International...Authentic # 00971556872006 # Hot Call Girls Service in Dubai By International...
Authentic # 00971556872006 # Hot Call Girls Service in Dubai By International...
 
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
 
(NEHA) Call Girls Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(NEHA) Call Girls Mumbai Call Now 8250077686 Mumbai Escorts 24x7(NEHA) Call Girls Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(NEHA) Call Girls Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | Delhi
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | DelhiFULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | Delhi
FULL NIGHT — 9999894380 Call Girls In Shivaji Enclave | Delhi
 
❤Personal Whatsapp Srinagar Srinagar Call Girls 8617697112 💦✅.
❤Personal Whatsapp Srinagar Srinagar Call Girls 8617697112 💦✅.❤Personal Whatsapp Srinagar Srinagar Call Girls 8617697112 💦✅.
❤Personal Whatsapp Srinagar Srinagar Call Girls 8617697112 💦✅.
 
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | DelhiFULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
 
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
 
Bobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdfBobbie goods coloring book 81 pag_240127_163802.pdf
Bobbie goods coloring book 81 pag_240127_163802.pdf
 
Dubai Call Girls # 00971547881831 # Indian Call Girls In Dubai # (UAE)
Dubai Call Girls # 00971547881831 # Indian Call Girls In Dubai # (UAE)Dubai Call Girls # 00971547881831 # Indian Call Girls In Dubai # (UAE)
Dubai Call Girls # 00971547881831 # Indian Call Girls In Dubai # (UAE)
 
Verified # 971581275265 # Indian Call Girls In Deira By International City Ca...
Verified # 971581275265 # Indian Call Girls In Deira By International City Ca...Verified # 971581275265 # Indian Call Girls In Deira By International City Ca...
Verified # 971581275265 # Indian Call Girls In Deira By International City Ca...
 

Special report on security

  • 1. Is having your data and identity compromised the NEW NORMAL? Dan DeBlasio June 4th, 2015 IN AN INCREASINGLY DIGITAL WORLD CYBERSECURITY IS A SERIOUS PROBLEM
  • 2. SNAPSHOT OF IDENTITY MANAGEMENT
  • 3. BREACH TRENDS LOOKING BACK BEFORE DIVING AHEAD
  • 4.
  • 5.
  • 6. IN A WORLD WHERE THE NORM IS CYBERSECURITY BREACHES …… IT IS IMPORTANT FOR ENTERPRISES TO HAVE MEASURES IN PLACE FOR PREVENTION AND CONTAINMENT OF AN ATTACK Not a question of “IF” but “WHEN”
  • 7. 2011 THREAT AGENTS OVER TIME BY PERCENT OF BREACHES 2011 continued the shift towards external agents’ involvement in a high percentage of data breaches. Though we have always seen an external majority, never before has any year been so one-sided.
  • 9. 2013 THREAT SUMMARY 2013 may be remembered as the “year of the retailer breach,” but a comprehensive assessment suggests it was a year of transition from geopolitical attacks to large-scale attacks on payment card systems.
  • 11. Data breaches double YOY Average cost +$5.5 million / $200 per record Corporations are being sued for data loss (Sony) (Ponemon Institute) THE TRENDS: BREACHES ARE DOUBLING IN COST
  • 12. COST PER RECORD VARIES IN HARD AND SOFT COSTS (NOT FACTORING TRUST / LOYALTY) At 100 records variance is between $357 / record to $12 / Record At 1,000,000 records variance is between $27.50 / record to $0.06 / Record Glass half full Glass half empty That is a LARGE Variance in my book!
  • 13. IT’S IN THE CLOUD…..... But which Cloud…… Private (Iaas) Public (SaaS) Hybrid (PaaS) ….and is your data and identity safe and secure?
  • 14. WHAT THE CLOUD BRINGS  Who owns the security?  Who is liable in a breach?  Who restores Trust?
  • 15. FORMS OF STRONG IDENTITY TODAY
  • 16. ACTUALLY, YOUR DIGITAL IDENTITY TYPICALLY LOOKS LIKE THIS:
  • 17. PASSWORDS ARE A WEAK DEFENSE Verizon Data Breach Investigation 2013
  • 18. SUMMARY  Educate employees on phishing attacks (e-mails)  Develop strong and changing passwords  Or better yet deploy two factor authentication, especially for external and mobile access  Have a post breach strategy and communications plan to limit damage to brand and customer trust  Investigate new security measures utilizing cutting-edge systems that use machine learning and, ironically, big data analysis may give a huge boost to the powers of corporate security teams. If you are looking to limit your risk of a security breach and cut the cost of the damage by more then half in real $$$:
  • 19. REFERENCES  Verizon: Data breach investigations reports 2011, 2012, 2013, 2014 and 2015  BBC News: Cybersecurity: Defending 'unpreventable' cyber attacks, By Paul Rubens Technology reporter  Forbes: The Power And Problem Of Privilege In Cybersecurity, Tom Kemp, CEO of Centrify  Frost-Sullivan: Damballa Failsafe Review 4-14-2015  Gartner: Identity and Access Management Summit 2008

Hinweis der Redaktion

  1. Problem statement: In an increasing digital world cybersecurity is a problem (Title) Positive principle. Positive principle: In a world where the norm is security breaches it is important for enterprises to have measures in place for prevention and containment of a security breach……….COST and business value. Huge losses in revenue beyond the cost of the record! What you invest in terms of business value is recoverable! For C Suite executives, for prevention and containment, this is your insurance policy.
  2. It’s not the whole story, however. Nor is it the most important one. The most significant change we saw in 2011 was the rise of “hacktivism” against larger organizations worldwide. For the Fiscal year 2010, the Secret Service arrested more than 1,200 suspects for cybercrime violations. These investigations involved over $500 million in actual fraud loss and prevented approximately $7 billion in additional losses.
  3. Input stats required
  4. We are often asked whether “the Cloud” factors into many of the breaches we investigate. The easy answer is “No—not really.” It’s more about giving up control of our assets and data (and not controlling the associated risk) than any technology specfic to the Cloud.