SlideShare a Scribd company logo
1 of 1
Download to read offline
Use Case
Contractor Exposed Manufacturer’s Sensitive Data
www.digitalshadows.com
With Digital Shadows SearchLight™, a manufacturing frm discovered
that a third party contractor exposed sensitive Non Disclosure
Agreements signed by its customers via NAS (network addressed
storage). Threat actors may use an organization’s supply chain
to gain access to valuable systems and data such as intellectual
property and patents. The manufacturer is a long-standing Digital
Shadows client who engaged with us to proactively manage their
digital assets and third party risks.
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
Overview
With Digital Shadows SearchLightTM
, a manufacturing firm discovered
that a third party contractor exposed sensitive Non Disclosure Agreements
signed by its customers via NAS (network addressed storage). Threat
actors may use an organization’s supply chain to gain access to valuable
systems and data such as intellectual property and patents. The
manufacturer is a long-standing Digital Shadows client who engaged
with us to proactively manage their digital assets and third party risks.
Contractor Exposed Manufacturer’s
Sensitive Data
Digital Shadows SearchLightTM
How We Mitigated the Risk
Risk Detected
Digital Shadows SearchLightTM
uncovered the Non Disclosure Agreement (NDA)
information by monitoring for online mentions of the manufacturing firm’s company
name, project names and third party contractors. Our intelligence team launched an
investigation the same day to assess whether the NDA data was valid and related to
the manufacturing firm as it appeared.
Analyst Reviews and Adds Context
Digital Shadows analysts investigated the NDA data and uncovered that special pricing,
costing, terms and conditions and legal data was visible online. Although the data was
unintentionally exposed by the contractor, we alerted the manufacturer and provided
context and recommendations for thorough mitigation.
Risk Managed
Armed with this context, the manufacturing firm rapidly notified the third party
contractor to remove the sensitive NDA information from public access in their
network addressed storage. Based on recommendations from Digital Shadows, the
manufacturer also modified its policies and procedures for secure data handling.
Third Party Exposure Use Case
Manufacturing Industry
About Digital Shadows
www.digitalshadows.com
info@digitalshadows.com
+1-888-889-4143 | +44 203 393 7001
J17
About Digital Shadows
Digital Shadows enables organizations to manage digital risk by identifying and eliminating threats to their business
and brand. We monitor for digital risk across the broadest range of data sources within the open, deep and dark web
to deliver tailored threat intelligence, context and actionable remediation options that enable security teams to be
more effective and efficient. Our clients can focus on growing their core business knowing that they are protected if
their data is exposed, employees and third parties put them at risk, or their brand is being misused. To learn more,
visit www.digitalshadows.com.
Email: info@digitalshadows.com
U.S. Headquarters
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
Data Exposure Example
Call us at 1-888-889-4143
UK +44 (0)203 393 7001
U.S. Headquarters
Digital Shadows, Inc. North American Intelligence Operations Hub
UK Headquarters
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
Data Exposure Example
www.digitalshadows.com
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
Widest Collection of Sources
SearchLight monitors for data exposure across the widest
range of sources, within the open, deep and dark web.
No stone is left unturned.
Tailored and Targeted Collection
A register of key assets that uniquely define your organization
and your subsidiaries drives our intelligence machinery.
Why Digital Shadows Get Started
For more information on
Digital Shadows SearchLightTM
and
how we can help protect your
organization from Data Exposure,
please contact us
Visit www.digitalshadows.com
for more information
Call us at US 1-800-889-4143
UK +44 (0)203 393 7001
Email info@digitalshadows.com
Analyst
Added Context
Digital Shadows
intelligence analysts
investigate and add
context, impact and
recommended action.
Asset Registration
Organizations register
their company assets
with Digital Shadows,
including code samples,
document markings and
email footers.
Explore View
Organizations can view
the credential exposure
at a strategic level,
identifying trends over
time.
Mitigation Options
Each incident comes with a severity level and mitigation
options. We also offer Managed Takedown Service, which
provides end-to-end management for shutting down
malicious activity and offloading this time consuming task
from your team.
About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources
within the open, deep and dark web to protect an organization’s business, brand and
reputation. The Digital Shadows SearchLightTM
service combines scalable data analytics with
intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data
exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third
party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored
threat intelligence. The company is jointly headquartered in London and San Francisco.
For more information, visit www.digitalshadows.com.
Data Exposure Example
Digital Shadows SearchLight™ What We Did
. Headquarters
al Shadows, Inc.
Pine Street, Suite 600
Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
verview
th Digital Shadows SearchLightTM
, a manufacturing firm discovered
at a third party contractor exposed sensitive Non Disclosure Agreements
ned by its customers via NAS (network addressed storage). Threat
ors may use an organization’s supply chain to gain access to valuable
tems and data such as intellectual property and patents. The
nufacturer is a long-standing Digital Shadows client who engaged
h us to proactively manage their digital assets and third party risks.
Sensitive Data
gital Shadows SearchLightTM
ow We Mitigated the Risk
Risk Detected
Digital Shadows SearchLightTM
uncovered the Non Disclosure Agreement (NDA)
information by monitoring for online mentions of the manufacturing firm’s company
name, project names and third party contractors. Our intelligence team launched an
investigation the same day to assess whether the NDA data was valid and related to
the manufacturing firm as it appeared.
Analyst Reviews and Adds Context
Digital Shadows analysts investigated the NDA data and uncovered that special pricing,
costing, terms and conditions and legal data was visible online. Although the data was
unintentionally exposed by the contractor, we alerted the manufacturer and provided
context and recommendations for thorough mitigation.
Risk Managed
Armed with this context, the manufacturing firm rapidly notified the third party
contractor to remove the sensitive NDA information from public access in their
network addressed storage. Based on recommendations from Digital Shadows, the
manufacturer also modified its policies and procedures for secure data handling.
About Digital Shadows
www.digitalshadows.com
info@digitalshadows.com
+1-888-889-4143 | +44 203 393 7001
J17
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
Overview
With Digital Shadows SearchLightTM
, a manufacturing firm discovered
that a third party contractor exposed sensitive Non Disclosure Agreements
signed by its customers via NAS (network addressed storage). Threat
actors may use an organization’s supply chain to gain access to valuable
systems and data such as intellectual property and patents. The
manufacturer is a long-standing Digital Shadows client who engaged
with us to proactively manage their digital assets and third party risks.
Contractor Exposed Manufacturer’s
Sensitive Data
Digital Shadows SearchLightTM
How We Mitigated the Risk
Risk Detected
Digital Shadows SearchLightTM
uncovered the Non Disclosure Agreement (NDA)
information by monitoring for online mentions of the manufacturing firm’s company
name, project names and third party contractors. Our intelligence team launched an
investigation the same day to assess whether the NDA data was valid and related to
the manufacturing firm as it appeared.
Analyst Reviews and Adds Context
Digital Shadows analysts investigated the NDA data and uncovered that special pricing,
costing, terms and conditions and legal data was visible online. Although the data was
unintentionally exposed by the contractor, we alerted the manufacturer and provided
context and recommendations for thorough mitigation.
Risk Managed
Armed with this context, the manufacturing firm rapidly notified the third party
contractor to remove the sensitive NDA information from public access in their
network addressed storage. Based on recommendations from Digital Shadows, the
manufacturer also modified its policies and procedures for secure data handling.
About Digital Shadows
www.digitalshadows.com
info@digitalshadows.com
+1-888-889-4143 | +44 203 393 7001
J17
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
Overview
With Digital Shadows SearchLightTM
, a manufacturing firm discovered
that a third party contractor exposed sensitive Non Disclosure Agreements
signed by its customers via NAS (network addressed storage). Threat
actors may use an organization’s supply chain to gain access to valuable
systems and data such as intellectual property and patents. The
manufacturer is a long-standing Digital Shadows client who engaged
with us to proactively manage their digital assets and third party risks.
Contractor Exposed Manufacturer’s
Sensitive Data
Digital Shadows SearchLightTM
How We Mitigated the Risk
Risk Detected
Digital Shadows SearchLightTM
uncovered the Non Disclosure Agreement (NDA)
information by monitoring for online mentions of the manufacturing firm’s company
name, project names and third party contractors. Our intelligence team launched an
investigation the same day to assess whether the NDA data was valid and related to
the manufacturing firm as it appeared.
Analyst Reviews and Adds Context
Digital Shadows analysts investigated the NDA data and uncovered that special pricing,
costing, terms and conditions and legal data was visible online. Although the data was
unintentionally exposed by the contractor, we alerted the manufacturer and provided
context and recommendations for thorough mitigation.
Risk Managed
Armed with this context, the manufacturing firm rapidly notified the third party
contractor to remove the sensitive NDA information from public access in their
network addressed storage. Based on recommendations from Digital Shadows, the
manufacturer also modified its policies and procedures for secure data handling.
About Digital Shadows
www.digitalshadows.com
info@digitalshadows.com
+1-888-889-4143 | +44 203 393 7001
J17
U.S. Headquarters
Digital Shadows, Inc.
332 Pine Street, Suite 600
San Francisco, CA 94104
North American Intelligence Operations Hub
5307 E. Mockingbird Ln.
Suite 915
Dallas, TX 75206
UK Headquarters
Digital Shadows, Ltd.
Level 39
One Canada Square
London E14 5AB
Overview
With Digital Shadows SearchLightTM
, a manufacturing firm discovered
that a third party contractor exposed sensitive Non Disclosure Agreements
signed by its customers via NAS (network addressed storage). Threat
actors may use an organization’s supply chain to gain access to valuable
systems and data such as intellectual property and patents. The
manufacturer is a long-standing Digital Shadows client who engaged
with us to proactively manage their digital assets and third party risks.
Contractor Exposed Manufacturer’s
Sensitive Data
Digital Shadows SearchLightTM
How We Mitigated the Risk
Risk Detected
Digital Shadows SearchLightTM
uncovered the Non Disclosure Agreement (NDA)
information by monitoring for online mentions of the manufacturing firm’s company
name, project names and third party contractors. Our intelligence team launched an
investigation the same day to assess whether the NDA data was valid and related to
the manufacturing firm as it appeared.
Analyst Reviews and Adds Context
Digital Shadows analysts investigated the NDA data and uncovered that special pricing,
costing, terms and conditions and legal data was visible online. Although the data was
unintentionally exposed by the contractor, we alerted the manufacturer and provided
context and recommendations for thorough mitigation.
Risk Managed
Armed with this context, the manufacturing firm rapidly notified the third party
contractor to remove the sensitive NDA information from public access in their
network addressed storage. Based on recommendations from Digital Shadows, the
manufacturer also modified its policies and procedures for secure data handling.
Third Party Exposure Use Case
Manufacturing Industry
About Digital Shadows
www.digitalshadows.com
info@digitalshadows.com
+1-888-889-4143 | +44 203 393 7001
J17

More Related Content

What's hot

Phishing Site Detected and Taken Down
Phishing Site Detected and Taken Down Phishing Site Detected and Taken Down
Phishing Site Detected and Taken Down Digital Shadows
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
WTF is Digital Risk Protection
WTF is Digital Risk ProtectionWTF is Digital Risk Protection
WTF is Digital Risk ProtectionDigital Shadows
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudUlf Mattsson
 
Managed Takedown Service - Digital Shadows
Managed Takedown Service - Digital ShadowsManaged Takedown Service - Digital Shadows
Managed Takedown Service - Digital ShadowsDigital Shadows
 
Digital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析Jordan Pan
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Ulf Mattsson
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data securityUlf Mattsson
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data securityUlf Mattsson
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Concurrency Security Summit presentation
Concurrency Security Summit presentationConcurrency Security Summit presentation
Concurrency Security Summit presentationTed Wentzel
 
Data Sources - Digital Shadows
Data Sources - Digital ShadowsData Sources - Digital Shadows
Data Sources - Digital ShadowsDigital Shadows
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloudUlf Mattsson
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...Ulf Mattsson
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeUlf Mattsson
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionCIO Look Magazine
 

What's hot (20)

Phishing Site Detected and Taken Down
Phishing Site Detected and Taken Down Phishing Site Detected and Taken Down
Phishing Site Detected and Taken Down
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
WTF is Digital Risk Protection
WTF is Digital Risk ProtectionWTF is Digital Risk Protection
WTF is Digital Risk Protection
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
Managed Takedown Service - Digital Shadows
Managed Takedown Service - Digital ShadowsManaged Takedown Service - Digital Shadows
Managed Takedown Service - Digital Shadows
 
Digital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ Overview
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Concurrency Security Summit presentation
Concurrency Security Summit presentationConcurrency Security Summit presentation
Concurrency Security Summit presentation
 
Data Sources - Digital Shadows
Data Sources - Digital ShadowsData Sources - Digital Shadows
Data Sources - Digital Shadows
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
 

Similar to Contractor Exposed Manufacturer's Sensitive Data

Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsParaben Corporation
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issueSonaliG6
 
Data Security.pptx
Data Security.pptxData Security.pptx
Data Security.pptxFujifilmFbsg
 
Cyber security cdg.io
Cyber security   cdg.ioCyber security   cdg.io
Cyber security cdg.ioCyberGroup
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Guide: Security and Compliance
Guide: Security and ComplianceGuide: Security and Compliance
Guide: Security and ComplianceQuestionPro
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxSonaliG6
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfMr. Business Magazine
 
Fraud Investigation Case study
Fraud Investigation Case studyFraud Investigation Case study
Fraud Investigation Case studyCGI
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 

Similar to Contractor Exposed Manufacturer's Sensitive Data (20)

Digital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration DatasheetDigital Shadows and Demisto Enterprise Integration Datasheet
Digital Shadows and Demisto Enterprise Integration Datasheet
 
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion AttemptDigital Shadows Helps Large Retailer Navigate Extortion Attempt
Digital Shadows Helps Large Retailer Navigate Extortion Attempt
 
Data Loss Detection
Data Loss DetectionData Loss Detection
Data Loss Detection
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdfIs It Possible to Prevent Data Leaks in an Effective Manner.pdf
Is It Possible to Prevent Data Leaks in an Effective Manner.pdf
 
Data Security.pdf
Data Security.pdfData Security.pdf
Data Security.pdf
 
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
Can You Tell Me About Some Effective Ways to Prevent Data Leakage?
 
DarkWeb
DarkWebDarkWeb
DarkWeb
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Get The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation ToolsGet The Information Here For Mobile Phone Investigation Tools
Get The Information Here For Mobile Phone Investigation Tools
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
 
Data Security.pptx
Data Security.pptxData Security.pptx
Data Security.pptx
 
Cyber security cdg.io
Cyber security   cdg.ioCyber security   cdg.io
Cyber security cdg.io
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Guide: Security and Compliance
Guide: Security and ComplianceGuide: Security and Compliance
Guide: Security and Compliance
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
 
Fraud Investigation Case study
Fraud Investigation Case studyFraud Investigation Case study
Fraud Investigation Case study
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 

More from Digital Shadows

Threat model of a remote worker | Infographic
Threat model of a remote worker | InfographicThreat model of a remote worker | Infographic
Threat model of a remote worker | InfographicDigital Shadows
 
Inadvertant Data Breaches
Inadvertant Data BreachesInadvertant Data Breaches
Inadvertant Data BreachesDigital Shadows
 
Digital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows
 
Digital Shadows Shadow Search
Digital Shadows Shadow SearchDigital Shadows Shadow Search
Digital Shadows Shadow SearchDigital Shadows
 
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkMapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkDigital Shadows
 
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for OrganizationsMitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for OrganizationsDigital Shadows
 
MITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB IndictmentMITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB IndictmentDigital Shadows
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerDigital Shadows
 
Digital Shadows Client Feedback
Digital Shadows Client FeedbackDigital Shadows Client Feedback
Digital Shadows Client FeedbackDigital Shadows
 
Inglorious Threat Intelligence by Rick Holland
Inglorious Threat Intelligence by Rick HollandInglorious Threat Intelligence by Rick Holland
Inglorious Threat Intelligence by Rick HollandDigital Shadows
 

More from Digital Shadows (11)

Threat model of a remote worker | Infographic
Threat model of a remote worker | InfographicThreat model of a remote worker | Infographic
Threat model of a remote worker | Infographic
 
Inadvertant Data Breaches
Inadvertant Data BreachesInadvertant Data Breaches
Inadvertant Data Breaches
 
Digital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security FrameworkDigital Shadows and the NIST Cyber Security Framework
Digital Shadows and the NIST Cyber Security Framework
 
Detecting Spoof Domains
Detecting Spoof DomainsDetecting Spoof Domains
Detecting Spoof Domains
 
Digital Shadows Shadow Search
Digital Shadows Shadow SearchDigital Shadows Shadow Search
Digital Shadows Shadow Search
 
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkMapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
 
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for OrganizationsMitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
 
MITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB IndictmentMITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB Indictment
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
Digital Shadows Client Feedback
Digital Shadows Client FeedbackDigital Shadows Client Feedback
Digital Shadows Client Feedback
 
Inglorious Threat Intelligence by Rick Holland
Inglorious Threat Intelligence by Rick HollandInglorious Threat Intelligence by Rick Holland
Inglorious Threat Intelligence by Rick Holland
 

Recently uploaded

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Contractor Exposed Manufacturer's Sensitive Data

  • 1. Use Case Contractor Exposed Manufacturer’s Sensitive Data www.digitalshadows.com With Digital Shadows SearchLight™, a manufacturing frm discovered that a third party contractor exposed sensitive Non Disclosure Agreements signed by its customers via NAS (network addressed storage). Threat actors may use an organization’s supply chain to gain access to valuable systems and data such as intellectual property and patents. The manufacturer is a long-standing Digital Shadows client who engaged with us to proactively manage their digital assets and third party risks. U.S. Headquarters Digital Shadows, Inc. 332 Pine Street, Suite 600 San Francisco, CA 94104 North American Intelligence Operations Hub 5307 E. Mockingbird Ln. Suite 915 Dallas, TX 75206 UK Headquarters Digital Shadows, Ltd. Level 39 One Canada Square London E14 5AB Overview With Digital Shadows SearchLightTM , a manufacturing firm discovered that a third party contractor exposed sensitive Non Disclosure Agreements signed by its customers via NAS (network addressed storage). Threat actors may use an organization’s supply chain to gain access to valuable systems and data such as intellectual property and patents. The manufacturer is a long-standing Digital Shadows client who engaged with us to proactively manage their digital assets and third party risks. Contractor Exposed Manufacturer’s Sensitive Data Digital Shadows SearchLightTM How We Mitigated the Risk Risk Detected Digital Shadows SearchLightTM uncovered the Non Disclosure Agreement (NDA) information by monitoring for online mentions of the manufacturing firm’s company name, project names and third party contractors. Our intelligence team launched an investigation the same day to assess whether the NDA data was valid and related to the manufacturing firm as it appeared. Analyst Reviews and Adds Context Digital Shadows analysts investigated the NDA data and uncovered that special pricing, costing, terms and conditions and legal data was visible online. Although the data was unintentionally exposed by the contractor, we alerted the manufacturer and provided context and recommendations for thorough mitigation. Risk Managed Armed with this context, the manufacturing firm rapidly notified the third party contractor to remove the sensitive NDA information from public access in their network addressed storage. Based on recommendations from Digital Shadows, the manufacturer also modified its policies and procedures for secure data handling. Third Party Exposure Use Case Manufacturing Industry About Digital Shadows www.digitalshadows.com info@digitalshadows.com +1-888-889-4143 | +44 203 393 7001 J17 About Digital Shadows Digital Shadows enables organizations to manage digital risk by identifying and eliminating threats to their business and brand. We monitor for digital risk across the broadest range of data sources within the open, deep and dark web to deliver tailored threat intelligence, context and actionable remediation options that enable security teams to be more effective and efficient. Our clients can focus on growing their core business knowing that they are protected if their data is exposed, employees and third parties put them at risk, or their brand is being misused. To learn more, visit www.digitalshadows.com. Email: info@digitalshadows.com U.S. Headquarters Widest Collection of Sources SearchLight monitors for data exposure across the widest range of sources, within the open, deep and dark web. No stone is left unturned. Tailored and Targeted Collection A register of key assets that uniquely define your organization and your subsidiaries drives our intelligence machinery. Why Digital Shadows Get Started For more information on Digital Shadows SearchLightTM and how we can help protect your organization from Data Exposure, please contact us Visit www.digitalshadows.com for more information Call us at US 1-800-889-4143 UK +44 (0)203 393 7001 Email info@digitalshadows.com Analyst Added Context Digital Shadows intelligence analysts investigate and add context, impact and recommended action. Asset Registration Organizations register their company assets with Digital Shadows, including code samples, document markings and email footers. Explore View Organizations can view the credential exposure at a strategic level, identifying trends over time. Mitigation Options Each incident comes with a severity level and mitigation options. We also offer Managed Takedown Service, which provides end-to-end management for shutting down malicious activity and offloading this time consuming task from your team. About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources within the open, deep and dark web to protect an organization’s business, brand and reputation. The Digital Shadows SearchLightTM service combines scalable data analytics with intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored threat intelligence. The company is jointly headquartered in London and San Francisco. For more information, visit www.digitalshadows.com. Data Exposure Example Call us at 1-888-889-4143 UK +44 (0)203 393 7001 U.S. Headquarters Digital Shadows, Inc. North American Intelligence Operations Hub UK Headquarters Widest Collection of Sources SearchLight monitors for data exposure across the widest range of sources, within the open, deep and dark web. No stone is left unturned. Tailored and Targeted Collection A register of key assets that uniquely define your organization and your subsidiaries drives our intelligence machinery. Why Digital Shadows Get Started For more information on Digital Shadows SearchLightTM and how we can help protect your organization from Data Exposure, please contact us Visit www.digitalshadows.com for more information Call us at US 1-800-889-4143 UK +44 (0)203 393 7001 Email info@digitalshadows.com Analyst Added Context Digital Shadows intelligence analysts investigate and add context, impact and recommended action. Asset Registration Organizations register their company assets with Digital Shadows, including code samples, document markings and email footers. Explore View Organizations can view the credential exposure at a strategic level, identifying trends over time. Mitigation Options Each incident comes with a severity level and mitigation options. We also offer Managed Takedown Service, which provides end-to-end management for shutting down malicious activity and offloading this time consuming task from your team. About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources within the open, deep and dark web to protect an organization’s business, brand and reputation. The Digital Shadows SearchLightTM service combines scalable data analytics with intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored threat intelligence. The company is jointly headquartered in London and San Francisco. For more information, visit www.digitalshadows.com. Data Exposure Example www.digitalshadows.com U.S. Headquarters Digital Shadows, Inc. 332 Pine Street, Suite 600 San Francisco, CA 94104 North American Intelligence Operations Hub 5307 E. Mockingbird Ln. Suite 915 UK Headquarters Digital Shadows, Ltd. Level 39 One Canada Square Widest Collection of Sources SearchLight monitors for data exposure across the widest range of sources, within the open, deep and dark web. No stone is left unturned. Tailored and Targeted Collection A register of key assets that uniquely define your organization and your subsidiaries drives our intelligence machinery. Why Digital Shadows Get Started For more information on Digital Shadows SearchLightTM and how we can help protect your organization from Data Exposure, please contact us Visit www.digitalshadows.com for more information Call us at US 1-800-889-4143 UK +44 (0)203 393 7001 Email info@digitalshadows.com Analyst Added Context Digital Shadows intelligence analysts investigate and add context, impact and recommended action. Asset Registration Organizations register their company assets with Digital Shadows, including code samples, document markings and email footers. Explore View Organizations can view the credential exposure at a strategic level, identifying trends over time. Mitigation Options Each incident comes with a severity level and mitigation options. We also offer Managed Takedown Service, which provides end-to-end management for shutting down malicious activity and offloading this time consuming task from your team. About Digital Shadows Digital Shadows monitors and manages digital risk across the widest range of data sources within the open, deep and dark web to protect an organization’s business, brand and reputation. The Digital Shadows SearchLightTM service combines scalable data analytics with intelligence analysts to manage and mitigate risks of an organization’s cyber threat, data exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third party risk, and create an up-to-the-minute view of an organization’s digital risk with tailored threat intelligence. The company is jointly headquartered in London and San Francisco. For more information, visit www.digitalshadows.com. Data Exposure Example Digital Shadows SearchLight™ What We Did . Headquarters al Shadows, Inc. Pine Street, Suite 600 Francisco, CA 94104 North American Intelligence Operations Hub 5307 E. Mockingbird Ln. Suite 915 Dallas, TX 75206 UK Headquarters Digital Shadows, Ltd. Level 39 One Canada Square London E14 5AB verview th Digital Shadows SearchLightTM , a manufacturing firm discovered at a third party contractor exposed sensitive Non Disclosure Agreements ned by its customers via NAS (network addressed storage). Threat ors may use an organization’s supply chain to gain access to valuable tems and data such as intellectual property and patents. The nufacturer is a long-standing Digital Shadows client who engaged h us to proactively manage their digital assets and third party risks. Sensitive Data gital Shadows SearchLightTM ow We Mitigated the Risk Risk Detected Digital Shadows SearchLightTM uncovered the Non Disclosure Agreement (NDA) information by monitoring for online mentions of the manufacturing firm’s company name, project names and third party contractors. Our intelligence team launched an investigation the same day to assess whether the NDA data was valid and related to the manufacturing firm as it appeared. Analyst Reviews and Adds Context Digital Shadows analysts investigated the NDA data and uncovered that special pricing, costing, terms and conditions and legal data was visible online. Although the data was unintentionally exposed by the contractor, we alerted the manufacturer and provided context and recommendations for thorough mitigation. Risk Managed Armed with this context, the manufacturing firm rapidly notified the third party contractor to remove the sensitive NDA information from public access in their network addressed storage. Based on recommendations from Digital Shadows, the manufacturer also modified its policies and procedures for secure data handling. About Digital Shadows www.digitalshadows.com info@digitalshadows.com +1-888-889-4143 | +44 203 393 7001 J17 U.S. Headquarters Digital Shadows, Inc. 332 Pine Street, Suite 600 San Francisco, CA 94104 North American Intelligence Operations Hub 5307 E. Mockingbird Ln. Suite 915 Dallas, TX 75206 UK Headquarters Digital Shadows, Ltd. Level 39 One Canada Square London E14 5AB Overview With Digital Shadows SearchLightTM , a manufacturing firm discovered that a third party contractor exposed sensitive Non Disclosure Agreements signed by its customers via NAS (network addressed storage). Threat actors may use an organization’s supply chain to gain access to valuable systems and data such as intellectual property and patents. The manufacturer is a long-standing Digital Shadows client who engaged with us to proactively manage their digital assets and third party risks. Contractor Exposed Manufacturer’s Sensitive Data Digital Shadows SearchLightTM How We Mitigated the Risk Risk Detected Digital Shadows SearchLightTM uncovered the Non Disclosure Agreement (NDA) information by monitoring for online mentions of the manufacturing firm’s company name, project names and third party contractors. Our intelligence team launched an investigation the same day to assess whether the NDA data was valid and related to the manufacturing firm as it appeared. Analyst Reviews and Adds Context Digital Shadows analysts investigated the NDA data and uncovered that special pricing, costing, terms and conditions and legal data was visible online. Although the data was unintentionally exposed by the contractor, we alerted the manufacturer and provided context and recommendations for thorough mitigation. Risk Managed Armed with this context, the manufacturing firm rapidly notified the third party contractor to remove the sensitive NDA information from public access in their network addressed storage. Based on recommendations from Digital Shadows, the manufacturer also modified its policies and procedures for secure data handling. About Digital Shadows www.digitalshadows.com info@digitalshadows.com +1-888-889-4143 | +44 203 393 7001 J17 U.S. Headquarters Digital Shadows, Inc. 332 Pine Street, Suite 600 San Francisco, CA 94104 North American Intelligence Operations Hub 5307 E. Mockingbird Ln. Suite 915 Dallas, TX 75206 UK Headquarters Digital Shadows, Ltd. Level 39 One Canada Square London E14 5AB Overview With Digital Shadows SearchLightTM , a manufacturing firm discovered that a third party contractor exposed sensitive Non Disclosure Agreements signed by its customers via NAS (network addressed storage). Threat actors may use an organization’s supply chain to gain access to valuable systems and data such as intellectual property and patents. The manufacturer is a long-standing Digital Shadows client who engaged with us to proactively manage their digital assets and third party risks. Contractor Exposed Manufacturer’s Sensitive Data Digital Shadows SearchLightTM How We Mitigated the Risk Risk Detected Digital Shadows SearchLightTM uncovered the Non Disclosure Agreement (NDA) information by monitoring for online mentions of the manufacturing firm’s company name, project names and third party contractors. Our intelligence team launched an investigation the same day to assess whether the NDA data was valid and related to the manufacturing firm as it appeared. Analyst Reviews and Adds Context Digital Shadows analysts investigated the NDA data and uncovered that special pricing, costing, terms and conditions and legal data was visible online. Although the data was unintentionally exposed by the contractor, we alerted the manufacturer and provided context and recommendations for thorough mitigation. Risk Managed Armed with this context, the manufacturing firm rapidly notified the third party contractor to remove the sensitive NDA information from public access in their network addressed storage. Based on recommendations from Digital Shadows, the manufacturer also modified its policies and procedures for secure data handling. About Digital Shadows www.digitalshadows.com info@digitalshadows.com +1-888-889-4143 | +44 203 393 7001 J17 U.S. Headquarters Digital Shadows, Inc. 332 Pine Street, Suite 600 San Francisco, CA 94104 North American Intelligence Operations Hub 5307 E. Mockingbird Ln. Suite 915 Dallas, TX 75206 UK Headquarters Digital Shadows, Ltd. Level 39 One Canada Square London E14 5AB Overview With Digital Shadows SearchLightTM , a manufacturing firm discovered that a third party contractor exposed sensitive Non Disclosure Agreements signed by its customers via NAS (network addressed storage). Threat actors may use an organization’s supply chain to gain access to valuable systems and data such as intellectual property and patents. The manufacturer is a long-standing Digital Shadows client who engaged with us to proactively manage their digital assets and third party risks. Contractor Exposed Manufacturer’s Sensitive Data Digital Shadows SearchLightTM How We Mitigated the Risk Risk Detected Digital Shadows SearchLightTM uncovered the Non Disclosure Agreement (NDA) information by monitoring for online mentions of the manufacturing firm’s company name, project names and third party contractors. Our intelligence team launched an investigation the same day to assess whether the NDA data was valid and related to the manufacturing firm as it appeared. Analyst Reviews and Adds Context Digital Shadows analysts investigated the NDA data and uncovered that special pricing, costing, terms and conditions and legal data was visible online. Although the data was unintentionally exposed by the contractor, we alerted the manufacturer and provided context and recommendations for thorough mitigation. Risk Managed Armed with this context, the manufacturing firm rapidly notified the third party contractor to remove the sensitive NDA information from public access in their network addressed storage. Based on recommendations from Digital Shadows, the manufacturer also modified its policies and procedures for secure data handling. Third Party Exposure Use Case Manufacturing Industry About Digital Shadows www.digitalshadows.com info@digitalshadows.com +1-888-889-4143 | +44 203 393 7001 J17