SlideShare une entreprise Scribd logo
1  sur  48
Télécharger pour lire hors ligne
Patch
Upgrade
Virus
New
Version
Firewall
Rulebase
IDS
 Signatures
Regulation
Worm
The Growing Malware Threat
Exponential Growth in
                             Malware and Attacks
                                 at the Endpoint




                            Minimal Increase In IT
                                Security Software
                              Spending with Little
                            Thought to Likelihood
Malware growth   IT spend
1. Allow the Assumption That Data is in the Data Center
2.
3.
4.
5.
6.
7.
The fleet of smart phones you have deployed to your sales staff enables
            them to be more productive, and to work around the clock, but it
            also jeopardizes your data.

              With the proliferation of laptops, mobile devices, and USB memory sticks,
it is now likely that the majority of your data is no longer under the custody of your IT
department.

Consider how many copies of emails, PowerPoint presentations, business plans, and
other intellectual property are now on devices that are not in your data center.
The Ponemon Institute states that each customer record lost is worth $179. If you
look at total cost of loss, you can easily get to the point where you lose your
business 3-4 times a day, based on risk analytics!

Any risk model which ignores the lifeblood of your business, grossly
underestimates your exposure.

Any risk model that ignores reality, is worthless.
1. Allow the Assumption That Data is in the Data Center
2. Treating Mobile Devices Based on the Value of the Physical Asset, not
   the Data on the Physical Device
3.
4.
5.
6.
7.
Many IT departments make the sad mistake of considering replacement value for
IT assets when developing risk models (if they have them)
     •What about all the late nights working on those business plans, board
     presentations, and patents?
     •The intellectual property on your laptop is worth much more
     than the physical device.
Example –

What if a Coke bottle is only worth the CRV (recycling value)?

What about the contents?
1. Allow the Assumption That Data is in the Data Center
2. Treating Mobile Devices Based on the Value of the Physical Asset, not
   the Data on the Physical Device
3. Treating Mobile Devices as Desktops
4.
5.
6.
7.
About those Smartphones,

Have you considered that they are as powerful
as your desktops of 5 years ago?

Now let’s consider laptops, USB devices, etc…

Can you really afford to have a myopic IT department
create a single policy for internal assets as well as for mobile assets?

Whether it is laptops or smart phones, sometimes different rules should apply
when you change locations.
The days of the M&M Model of Perimeter Defense are behind us.

Your approach to security needs to keep up.
•


                Email
                "Endpoint . . . solutions are
        Internet Video
                now a             line of
                defense . . .”
    Personal Websites
                                        Charles Kolodgy
    Business Websites                  Research Director
                          IDC Security Products Program

         Social Media
1. Allow the Assumption That Data is in the Data Center
2. Treating Mobile Devices based on the Value of the Physical Asset, not
   the Data on the Physical Device
3. Treating Mobile Devices as Desktops
4. Adoption of Social Media Without Proper Protection
5.
6.
7.
Web 2.0 has brought user interaction to a whole different level.

Facebook, Twitter, and other social network platforms allow for collaboration,
interaction and exchanges of ideas on a many-to-many.

However, aside from being a potential drain on corporate resources, they also
jeopardize the integrity of your data, encourage employees to post potentially
sensitive data without thinking, and empower a new wave of identity theft based
on abuse of trust.
Outside of your marketing department, and PR…

WHY are employees on social networks during the day?

Facebook is
    •Email without the controls…
    •450 million strong…
    •and zero culture.

They are viruses with legs!
1. Allow the Assumption That Data is in the Data Center
2. Treating Mobile Devices based on the Value of the Physical Asset, not
   the Data on the Physical Device
3. Treating Mobile Devices as Desktops
4. Adoption of Social Media Without Proper Protection
5. Allowing Apple & Google to Become Your IT / QA Department
6.
7.
With the evolution of our work platforms, we rely more and
more every day on web based applications, PDFs, and
other cloud-based applications

What that means, in reality, is that the QA of your working
platforms is in the hands of Google, Adobe, Apple, and
Microsoft.

A breach in the foundation of these platforms means a
breach in your business processes.
Intel recently had to mention on their SEC filings that they
were part of the 34 companies impacted by Operation
Aurora.

How is THAT for security as a board level issue?

And if you are considering cloud based services, or
SaaS solutions, ensure that the infrastructure is secure
and robust.
1. Allow the Assumption That Data is in the Data Center
2. Treating Mobile Devices based on the Value of the Physical Asset, not
   the Data on the Physical Device
3. Treating Mobile Devices as Desktops
4. Adoption of Social Media Without Proper Protection
5. Allowing Apple & Google to Become Your IT / QA Department
6. Focusing on Protection rather than Detection
7.
Who would you rather fight?
       Stevie Wonder vs. Mohammed Ali

         Can’t fight what you can’t see…

Or Is Protection just slightly more important than Detection?
•

•

•                                                   9%
                                                                                      2%
                                                                    34%                      22%
                                                                            23%
                                                                                      4%



        Doors                      Locks       Alarm      Motion detector    Dog       Gun
        Windows                    Fence       Monitoring Crime watch        Police    Insurance
    Source: “Data @ Risk” by David H. Stelzl
“We had no idea this
 malware was                     High
 getting through.”




                                 Probability of
                    Likelihood



                                 Occurrence
                decreases with
                 Detection and
                    Response

“We’ve got it
 covered.”                        Low
                                                  Low   Impact of Risk   High
Only a comprehensive system allows you to take appropriate action,
not merely monitor or inform.

However, we need to put the decisions in the hands of the
business process owner, instead of leaving it with IT.
1. Allow the Assumption that Data is in the Data Center
2. Treating mobile devices based on the value of the physical asset, not
   the data on the physical device
3. Treating mobile devices as Desktops
4. Adoption of Social Media without proper protection
5. Allowing Apple and Google to become your IT / QA Department
6. Focusing on Protection rather than Detection
7. Assuming everything is OK
How many times have you heard your IT team say “We’re covered… We are
compliant”, only to have your expensive external audit firm come in and deliver a
scathing report that enumerates thousands of missed items, erroneous
configurations, and process violations?
Frankly, what your IT department is losing is credibility…

With you, the business owners.


But keep in mind…

You still must fund the lighthouse!
“Everyone Has a Plan… Until They Get Hit”
                   Michael Tyson
                   Philosopher and Pugilist
•
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target

Contenu connexe

Tendances

Information security awareness
Information security awarenessInformation security awareness
Information security awarenessCAS
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Chris Ross
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin RowneySymantec
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
Building security into the internetofthings
Building security into the internetofthingsBuilding security into the internetofthings
Building security into the internetofthingsPrayukth K V
 
NUS-ISS Learning Day 2019-Building IoT solutions with the Pi
NUS-ISS Learning Day 2019-Building IoT solutions with the PiNUS-ISS Learning Day 2019-Building IoT solutions with the Pi
NUS-ISS Learning Day 2019-Building IoT solutions with the PiNUS-ISS
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersFindWhitePapers
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?NTEN
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionFindWhitePapers
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliverMadison Oliver
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness trainingSandeep Taileng
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentationfranbodh
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - IdealwareIdealware
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
 

Tendances (20)

Information security awareness
Information security awarenessInformation security awareness
Information security awareness
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
 
RSA 2010 Kevin Rowney
RSA 2010 Kevin RowneyRSA 2010 Kevin Rowney
RSA 2010 Kevin Rowney
 
Information security
Information securityInformation security
Information security
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
APT & What we can do TODAY
APT & What we can do TODAYAPT & What we can do TODAY
APT & What we can do TODAY
 
Building security into the internetofthings
Building security into the internetofthingsBuilding security into the internetofthings
Building security into the internetofthings
 
NUS-ISS Learning Day 2019-Building IoT solutions with the Pi
NUS-ISS Learning Day 2019-Building IoT solutions with the PiNUS-ISS Learning Day 2019-Building IoT solutions with the Pi
NUS-ISS Learning Day 2019-Building IoT solutions with the Pi
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
FinalResearch_95752_oliver
FinalResearch_95752_oliverFinalResearch_95752_oliver
FinalResearch_95752_oliver
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
Attack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition SystemsAttack Vectors in Biometric Recognition Systems
Attack Vectors in Biometric Recognition Systems
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 

En vedette

121126 presentatie wonen welzijn zorg update woondomein
121126 presentatie wonen welzijn zorg update woondomein121126 presentatie wonen welzijn zorg update woondomein
121126 presentatie wonen welzijn zorg update woondomeinYuen-Kwan
 
Жилищные программы
Жилищные программыЖилищные программы
Жилищные программыanikey99
 
sewage sludge treatment
sewage sludge treatmentsewage sludge treatment
sewage sludge treatmentgary5theo
 
Bileti gtn
Bileti gtnBileti gtn
Bileti gtnanikey99
 
Vospitatel BulDD. Samoprezentatsia
Vospitatel BulDD. SamoprezentatsiaVospitatel BulDD. Samoprezentatsia
Vospitatel BulDD. Samoprezentatsiaanikey99
 
Krasnoyarsk christmas070116
Krasnoyarsk christmas070116Krasnoyarsk christmas070116
Krasnoyarsk christmas070116anikey99
 
SHAIL DESIGN RESUME
SHAIL DESIGN RESUMESHAIL DESIGN RESUME
SHAIL DESIGN RESUMEshail shah
 
Gershwin george-rhapsody-blue-rhapsody-blue-1st-clarinet-pdf-38818
Gershwin george-rhapsody-blue-rhapsody-blue-1st-clarinet-pdf-38818Gershwin george-rhapsody-blue-rhapsody-blue-1st-clarinet-pdf-38818
Gershwin george-rhapsody-blue-rhapsody-blue-1st-clarinet-pdf-38818marisarodrimar
 
I.T. used in food traceability and food distribution.
I.T. used in food traceability and food distribution.I.T. used in food traceability and food distribution.
I.T. used in food traceability and food distribution.daraghG
 

En vedette (16)

121126 presentatie wonen welzijn zorg update woondomein
121126 presentatie wonen welzijn zorg update woondomein121126 presentatie wonen welzijn zorg update woondomein
121126 presentatie wonen welzijn zorg update woondomein
 
Nina Dorobiala
Nina DorobialaNina Dorobiala
Nina Dorobiala
 
Gentileza 4"B"
Gentileza 4"B"Gentileza 4"B"
Gentileza 4"B"
 
Жилищные программы
Жилищные программыЖилищные программы
Жилищные программы
 
sewage sludge treatment
sewage sludge treatmentsewage sludge treatment
sewage sludge treatment
 
Bileti gtn
Bileti gtnBileti gtn
Bileti gtn
 
5 "B"
5 "B"5 "B"
5 "B"
 
Vospitatel BulDD. Samoprezentatsia
Vospitatel BulDD. SamoprezentatsiaVospitatel BulDD. Samoprezentatsia
Vospitatel BulDD. Samoprezentatsia
 
Gentileza 5"A"
Gentileza 5"A"Gentileza 5"A"
Gentileza 5"A"
 
Krasnoyarsk christmas070116
Krasnoyarsk christmas070116Krasnoyarsk christmas070116
Krasnoyarsk christmas070116
 
SHAIL DESIGN RESUME
SHAIL DESIGN RESUMESHAIL DESIGN RESUME
SHAIL DESIGN RESUME
 
Coretan2
Coretan2Coretan2
Coretan2
 
entoprocta filum
entoprocta filumentoprocta filum
entoprocta filum
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Gershwin george-rhapsody-blue-rhapsody-blue-1st-clarinet-pdf-38818
Gershwin george-rhapsody-blue-rhapsody-blue-1st-clarinet-pdf-38818Gershwin george-rhapsody-blue-rhapsody-blue-1st-clarinet-pdf-38818
Gershwin george-rhapsody-blue-rhapsody-blue-1st-clarinet-pdf-38818
 
I.T. used in food traceability and food distribution.
I.T. used in food traceability and food distribution.I.T. used in food traceability and food distribution.
I.T. used in food traceability and food distribution.
 

Similaire à 2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target

IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIAGILLY
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sectorCore Security
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016FitCEO, Inc. (FCI)
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI JoAnna Cheshire
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015anpapathanasiou
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Erik Ginalick
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise21CT Inc.
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 

Similaire à 2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target (20)

IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
 
Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015Top 6 things_small_businesses_q12015
Top 6 things_small_businesses_q12015
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243Dont Let Data And Business Assets Slip Out The Back Door Cm101243
Dont Let Data And Business Assets Slip Out The Back Door Cm101243
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 

Plus de Raleigh ISSA

Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh ISSA
 
Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh ISSA
 
Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh ISSA
 
Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh ISSA
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account securityRaleigh ISSA
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014Raleigh ISSA
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...Raleigh ISSA
 
April 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesApril 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesRaleigh ISSA
 
March 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secMarch 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secRaleigh ISSA
 
March 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesMarch 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesRaleigh ISSA
 
February 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesFebruary 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesRaleigh ISSA
 
2014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 20142014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 2014Raleigh ISSA
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
2013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 20132013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 2013Raleigh ISSA
 
2013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 20132013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 2013Raleigh ISSA
 
2013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 20132013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 2013Raleigh ISSA
 
2013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 20132013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 2013Raleigh ISSA
 
2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith PiguesRaleigh ISSA
 
2013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 20132013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 2013Raleigh ISSA
 
2013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 20132013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 2013Raleigh ISSA
 

Plus de Raleigh ISSA (20)

Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9Raleigh issa chapter updates-slides-2014-9
Raleigh issa chapter updates-slides-2014-9
 
Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8Raleigh issa chapter updates-slides-2014-8
Raleigh issa chapter updates-slides-2014-8
 
Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7Raleigh issa chapter updates-slides-2014-7
Raleigh issa chapter updates-slides-2014-7
 
Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6Raleigh issa chapter updates-slides-2014-6
Raleigh issa chapter updates-slides-2014-6
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
A10 issa d do s 5-2014
A10 issa d do s 5-2014A10 issa d do s 5-2014
A10 issa d do s 5-2014
 
Raleigh issa chapter april meeting - managing a security & privacy governan...
Raleigh issa chapter   april meeting - managing a security & privacy governan...Raleigh issa chapter   april meeting - managing a security & privacy governan...
Raleigh issa chapter april meeting - managing a security & privacy governan...
 
April 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slidesApril 2014 Raleigh ISSA chapter update slides
April 2014 Raleigh ISSA chapter update slides
 
March 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info secMarch 2014 B2B - Breaking into info sec
March 2014 B2B - Breaking into info sec
 
March 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slidesMarch 2014 Raleigh ISSA chapter update slides
March 2014 Raleigh ISSA chapter update slides
 
February 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slidesFebruary 2014 Raleigh Chapter ISSA Board update slides
February 2014 Raleigh Chapter ISSA Board update slides
 
2014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 20142014-01 Raleigh ISSA Chapter Updates January 2014
2014-01 Raleigh ISSA Chapter Updates January 2014
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
2013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 20132013-11 Raleigh ISSA Chapter Updates November 2013
2013-11 Raleigh ISSA Chapter Updates November 2013
 
2013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 20132013-10 Raleigh ISSA Chapter Updates October 2013
2013-10 Raleigh ISSA Chapter Updates October 2013
 
2013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 20132013-09 Raleigh ISSA Chapter Updates September 2013
2013-09 Raleigh ISSA Chapter Updates September 2013
 
2013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 20132013-08 Raleigh ISSA Chapter Updates August 2013
2013-08 Raleigh ISSA Chapter Updates August 2013
 
2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues2013-07 How to Win with Customers - Keith Pigues
2013-07 How to Win with Customers - Keith Pigues
 
2013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 20132013-07 Raleigh ISSA Chapter Updates July 2013
2013-07 Raleigh ISSA Chapter Updates July 2013
 
2013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 20132013-06 Raleigh ISSA Chapter Updates June 2013
2013-06 Raleigh ISSA Chapter Updates June 2013
 

Dernier

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target

  • 1.
  • 3.
  • 4.
  • 5.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. Exponential Growth in Malware and Attacks at the Endpoint Minimal Increase In IT Security Software Spending with Little Thought to Likelihood Malware growth IT spend
  • 12.
  • 13. 1. Allow the Assumption That Data is in the Data Center 2. 3. 4. 5. 6. 7.
  • 14. The fleet of smart phones you have deployed to your sales staff enables them to be more productive, and to work around the clock, but it also jeopardizes your data. With the proliferation of laptops, mobile devices, and USB memory sticks, it is now likely that the majority of your data is no longer under the custody of your IT department. Consider how many copies of emails, PowerPoint presentations, business plans, and other intellectual property are now on devices that are not in your data center.
  • 15. The Ponemon Institute states that each customer record lost is worth $179. If you look at total cost of loss, you can easily get to the point where you lose your business 3-4 times a day, based on risk analytics! Any risk model which ignores the lifeblood of your business, grossly underestimates your exposure. Any risk model that ignores reality, is worthless.
  • 16. 1. Allow the Assumption That Data is in the Data Center 2. Treating Mobile Devices Based on the Value of the Physical Asset, not the Data on the Physical Device 3. 4. 5. 6. 7.
  • 17. Many IT departments make the sad mistake of considering replacement value for IT assets when developing risk models (if they have them) •What about all the late nights working on those business plans, board presentations, and patents? •The intellectual property on your laptop is worth much more than the physical device.
  • 18. Example – What if a Coke bottle is only worth the CRV (recycling value)? What about the contents?
  • 19. 1. Allow the Assumption That Data is in the Data Center 2. Treating Mobile Devices Based on the Value of the Physical Asset, not the Data on the Physical Device 3. Treating Mobile Devices as Desktops 4. 5. 6. 7.
  • 20. About those Smartphones, Have you considered that they are as powerful as your desktops of 5 years ago? Now let’s consider laptops, USB devices, etc… Can you really afford to have a myopic IT department create a single policy for internal assets as well as for mobile assets? Whether it is laptops or smart phones, sometimes different rules should apply when you change locations.
  • 21. The days of the M&M Model of Perimeter Defense are behind us. Your approach to security needs to keep up.
  • 22. Email "Endpoint . . . solutions are Internet Video now a line of defense . . .” Personal Websites Charles Kolodgy Business Websites Research Director IDC Security Products Program Social Media
  • 23. 1. Allow the Assumption That Data is in the Data Center 2. Treating Mobile Devices based on the Value of the Physical Asset, not the Data on the Physical Device 3. Treating Mobile Devices as Desktops 4. Adoption of Social Media Without Proper Protection 5. 6. 7.
  • 24. Web 2.0 has brought user interaction to a whole different level. Facebook, Twitter, and other social network platforms allow for collaboration, interaction and exchanges of ideas on a many-to-many. However, aside from being a potential drain on corporate resources, they also jeopardize the integrity of your data, encourage employees to post potentially sensitive data without thinking, and empower a new wave of identity theft based on abuse of trust.
  • 25.
  • 26. Outside of your marketing department, and PR… WHY are employees on social networks during the day? Facebook is •Email without the controls… •450 million strong… •and zero culture. They are viruses with legs!
  • 27. 1. Allow the Assumption That Data is in the Data Center 2. Treating Mobile Devices based on the Value of the Physical Asset, not the Data on the Physical Device 3. Treating Mobile Devices as Desktops 4. Adoption of Social Media Without Proper Protection 5. Allowing Apple & Google to Become Your IT / QA Department 6. 7.
  • 28. With the evolution of our work platforms, we rely more and more every day on web based applications, PDFs, and other cloud-based applications What that means, in reality, is that the QA of your working platforms is in the hands of Google, Adobe, Apple, and Microsoft. A breach in the foundation of these platforms means a breach in your business processes.
  • 29.
  • 30. Intel recently had to mention on their SEC filings that they were part of the 34 companies impacted by Operation Aurora. How is THAT for security as a board level issue? And if you are considering cloud based services, or SaaS solutions, ensure that the infrastructure is secure and robust.
  • 31. 1. Allow the Assumption That Data is in the Data Center 2. Treating Mobile Devices based on the Value of the Physical Asset, not the Data on the Physical Device 3. Treating Mobile Devices as Desktops 4. Adoption of Social Media Without Proper Protection 5. Allowing Apple & Google to Become Your IT / QA Department 6. Focusing on Protection rather than Detection 7.
  • 32. Who would you rather fight? Stevie Wonder vs. Mohammed Ali Can’t fight what you can’t see… Or Is Protection just slightly more important than Detection?
  • 33. • • • 9% 2% 34% 22% 23% 4% Doors Locks Alarm Motion detector Dog Gun Windows Fence Monitoring Crime watch Police Insurance Source: “Data @ Risk” by David H. Stelzl
  • 34. “We had no idea this malware was High getting through.” Probability of Likelihood Occurrence decreases with Detection and Response “We’ve got it covered.” Low Low Impact of Risk High
  • 35. Only a comprehensive system allows you to take appropriate action, not merely monitor or inform. However, we need to put the decisions in the hands of the business process owner, instead of leaving it with IT.
  • 36. 1. Allow the Assumption that Data is in the Data Center 2. Treating mobile devices based on the value of the physical asset, not the data on the physical device 3. Treating mobile devices as Desktops 4. Adoption of Social Media without proper protection 5. Allowing Apple and Google to become your IT / QA Department 6. Focusing on Protection rather than Detection 7. Assuming everything is OK
  • 37. How many times have you heard your IT team say “We’re covered… We are compliant”, only to have your expensive external audit firm come in and deliver a scathing report that enumerates thousands of missed items, erroneous configurations, and process violations?
  • 38. Frankly, what your IT department is losing is credibility… With you, the business owners. But keep in mind… You still must fund the lighthouse!
  • 39. “Everyone Has a Plan… Until They Get Hit” Michael Tyson Philosopher and Pugilist
  • 40.
  • 41.