Verified # 971581275265 # Indian Call Girls In Deira By International City Ca...
Special report on security
1. Is having your data and identity
compromised the NEW NORMAL?
Dan DeBlasio
June 4th, 2015
IN AN INCREASINGLY DIGITAL
WORLD CYBERSECURITY IS A
SERIOUS PROBLEM
6. IN A WORLD WHERE THE NORM IS CYBERSECURITY
BREACHES ……
IT IS IMPORTANT FOR ENTERPRISES
TO HAVE MEASURES IN PLACE
FOR PREVENTION AND CONTAINMENT
OF AN ATTACK
Not a question of “IF” but “WHEN”
7. 2011 THREAT AGENTS OVER TIME BY PERCENT OF
BREACHES
2011 continued the shift towards external agents’ involvement in a high
percentage of data breaches. Though we have always seen an external
majority, never before has any year been so one-sided.
9. 2013 THREAT SUMMARY
2013 may be remembered as the “year
of the retailer breach,” but a
comprehensive assessment suggests it
was a year of transition from geopolitical
attacks to large-scale attacks on
payment card systems.
11. Data breaches double YOY
Average cost +$5.5 million / $200 per record
Corporations are being sued for data loss (Sony)
(Ponemon Institute)
THE TRENDS: BREACHES ARE DOUBLING IN COST
12. COST PER RECORD VARIES IN HARD AND SOFT
COSTS (NOT FACTORING TRUST / LOYALTY)
At 100 records variance is between $357 / record to $12 / Record
At 1,000,000 records variance is between $27.50 / record to $0.06 / Record
Glass half full Glass half empty
That is a LARGE Variance in my book!
13. IT’S IN THE CLOUD….....
But which Cloud……
Private
(Iaas)
Public
(SaaS)
Hybrid
(PaaS)
….and is your data and identity safe and secure?
14. WHAT THE CLOUD BRINGS
Who owns the security?
Who is liable in a breach?
Who restores Trust?
17. PASSWORDS ARE A WEAK DEFENSE
Verizon Data Breach Investigation 2013
18. SUMMARY
Educate employees on phishing attacks (e-mails)
Develop strong and changing passwords
Or better yet deploy two factor authentication, especially for
external and mobile access
Have a post breach strategy and communications plan to limit
damage to brand and customer trust
Investigate new security measures utilizing cutting-edge systems
that use machine learning and, ironically, big data analysis may
give a huge boost to the powers of corporate security teams.
If you are looking to limit your risk of a security breach and cut the
cost of the damage by more then half in real $$$:
19. REFERENCES
Verizon: Data breach investigations reports 2011, 2012, 2013, 2014
and 2015
BBC News: Cybersecurity: Defending 'unpreventable' cyber
attacks, By Paul Rubens Technology reporter
Forbes: The Power And Problem Of Privilege In Cybersecurity, Tom
Kemp, CEO of Centrify
Frost-Sullivan: Damballa Failsafe Review 4-14-2015
Gartner: Identity and Access Management Summit 2008
Problem statement: In an increasing digital world cybersecurity is a problem (Title) Positive principle. Positive principle: In a world where the norm is security breaches it is important for enterprises to have measures in place for prevention and containment of a security breach……….COST and business value. Huge losses in revenue beyond the cost of the record! What you invest in terms of business value is recoverable! For C Suite executives, for prevention and containment, this is your insurance policy.
It’s not the whole story, however. Nor is it the most important one. The most significant change we saw in 2011 was the rise of “hacktivism” against larger organizations worldwide.
For the Fiscal year 2010, the Secret Service arrested more than 1,200 suspects for cybercrime violations. These investigations involved over $500 million in actual fraud loss and prevented
approximately $7 billion in additional losses.
Input stats required
We are often asked whether “the Cloud” factors into many of the breaches we investigate. The easy answer is “No—not really.” It’s more about giving up control of our assets and data (and not controlling the associated risk) than any technology specfic to the Cloud.