SlideShare a Scribd company logo
1 of 19
Data Breach:


From the
Inside Out
The Lorenzi Group
Data Breaches EVERYWHERE!
   It seems like everyone is being hacked!




          What is going on?
 What do these data breaches mean to me?
Cost Effects of Data Breaches
           Your Business           Your Customers

                  Loss of
                                       Loss of Privacy
              Trade Secrets


           Public Trust Declines          ID Theft


                Regulatory             Price of Goods
              Investigations              Increases


                                   Risk of Malware @ home
                 Lawsuits
                                           Increases



Money allocated for business growth is instead spent cleaning
                        up the mess!
What is REALLY Going On?


Before we get THERE,
           let’s look at technology today….
MOST Companies Data Security:
                    Simplified
                                                                  Examples:
                                       Internet                     Law Firms
                                                                Accounting Firms
                                                                   Call Centers
                                                                  Manufacturers
                                      ISP Modem                 Financial Advisors
                                                                  Dentist Offices
                                  Company Firewall                 Retail Stores
                                                                       ETC.
                                   Company Router
Who is watching
 YOUR data?

    Get                                                                   Company
                                                                           Antivirus
   ROAR
   NOTE: Most companies are set up like this, including YOURS… IF you’re lucky!
MOST Companies Data Security:
 Explained
The previous slide is the typical layout of most businesses today.


 Most   companies:
     Know to use Antivirus software.
     Know to have a firewall.
     Could spend money on IT security more
      efficiently
     Don’t know how to properly protect Intellectual
      Property
     Underestimate their exposure to risk
Technically “Savvy” Companies Data Security:
                           Simplified
                                       Examples:
                                         Apple
                                        Microsoft
                        Internet        Google
                                         eBay
                                       CitiGroup
                                        NY Times
                       ISP Modem        Amazon

                    Company Firewall
                     Company IDS/IPS
                     Company Router
 Who is watching
  YOUR data?

     Get
                                              Company
    ROAR                                       Antivirus
Technically “Savvy” Companies Data Security:
                                                     Explained
The previous slide is the layout of technically “savvy” businesses today.


 Technically         “Savvy” companies:
      Attempt to protect their ideas and work product
      Attempt to to control their data
      Aggressively use technology to protect their
       business
      Use IDS/IPS to stop data from leaving
        IDS – Intrusion Detection System
        IPS – Intrusion Prevention System
So, what is REALLY Going on?


Hackers are taking advantage of weakness
   in computer systems and networks
With all this
technology, how do
  hackers get in?
How do Hackers Attack You?
   They would check for a firewall.
       Do you even have a firewall?
       What’s its status?
       Which firewall ports are open?
   They would email your employees.
       Can they email your employee a dangerous link?
       Can they email your employees a virus?
   They would email your vendors.
       What risks do your vendors pose to your network?

        What if none of these attempts worked?
More Ways to Steal Your Data…
         The first set of tricks almost ALWAYS work.

    1.     They start to work from the INSIDE out.
    2.     They get to know an employee.

    It’s IMPORTANT to remember:
    1. Employees have access to your data too
    2. 15% of employees steal*
    3. Effects of Employee Theft = 7% Revenues**

* Statistic Brain (www.statisticbrain.com) – Employee Theft Statistics
** Statistic Brain (www.statisticbrain.com) – Employee Theft Statistics
How do we KNOW where
Data Security Is Going…
…Because the OLD way isn’t working

               Customer Lawsuits
                Digital Forensics
                   eDiscovery
          Evidence Hosting & Storage
           Regulatory Investigations
                Regulatory Fines
              Loss of Productivity
            Loss of Competitiveness


             It is TOO expensive
to continue allowing data breaches to occur.
Where Data Security Is GOING:
  Security           Simplified
  Analytics                                                                Examples:
       &                                                               KaiserPermanente
Intelligence                                                                 Fidelity
                                      Internet
                                                                        LockheedMartin
                                                                           AssuraMed

                                     ISP Modem
                              Company Firewall                           Lorenzi ROAR
                               Company IDS/IPS
      ROAR                     Company Router
  monitors data
   patterns 24x7
providing constant
feedback & insight                                                                      Company
                                                                                         Antivirus


                     NOTE: Examples may not be Lorenzi clients but utilize technology similar to ROAR
Where Data Security Is GOING:
Explained
The previous slide is the layout of where companies need to go.


 Companies         will:
     Use existing technology to protect data

 Take    Additional Protections Including:
     Utilize Continuous Monitoring
     Utilize Security Analytics
     Reduce Bottom-line Expenses
Lorenzi ROAR Provides:
   Continuous Monitoring of data activity
       Think: DVR’ing how data moves on your network
         Example: You can replay questionable activities

   Security Analytics
       Think: Alerting you when data does something it
        hasn’t done before
    Examples: Forwarding an email to a private address,
         FTP’ing a design, printing out financials

   User Access logging for Compliance

   Performance Metrics for Bottom-line
    management & cost savings
So, what does this mean to me?
 As   a Businesses Executive:
    Hackers are coming
    You won’t know where they are coming
     from
    Protect your data (it’s easy)
 As   a Consumer:
    Hackers are watching you
    You NEED to encourage businesses to
     protect your data
    Don’t click on random web-links
Wrap Up
   Hackers can beat “Set it & Forget it” Technology

   Companies MUST watch data movement at the
    DEVICE level to determine risks

   Attacks are more FREQUENT from Outside In, but
    more SUCCESSFUL from Inside Out.

   Lorenzi ROAR provides the TOOLS & INSIGHT
    companies NEED to protect their data.
Are YOU
Ready for a FREE Trial of ROAR?


     The Lorenzi Group
         866-632-9880 x123
     www.thelorenzigroup.com
     info@thelorenzigroup.com

More Related Content

What's hot

Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira Jones
 
Developing a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesDeveloping a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesEnterprise Security Risk Management
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File VirtualizationFindWhitePapers
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionFindWhitePapers
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
The CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticThe CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticEchoworx
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFEJames Wier
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesCompTIA
 
Threat From The Inside, Fti Journal
Threat From The Inside, Fti JournalThreat From The Inside, Fti Journal
Threat From The Inside, Fti JournalAlbert Kassis
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric OverviewCenturic
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Team Sistemi
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Tyrone Grandison
 

What's hot (20)

E-commerce Security
E-commerce SecurityE-commerce Security
E-commerce Security
 
Neira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf readyNeira jones pci london january 2013 pdf ready
Neira jones pci london january 2013 pdf ready
 
Developing a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sourcesDeveloping a corporate intelligence strategy from online sources
Developing a corporate intelligence strategy from online sources
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File Virtualization
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
The CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticThe CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be cryptic
 
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFETECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
TECHNOLOGY 101 AND THE PRACTICE OF LAW: KEEPING YOUR FIRM SAFE
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Threat From The Inside, Fti Journal
Threat From The Inside, Fti JournalThreat From The Inside, Fti Journal
Threat From The Inside, Fti Journal
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Information security
Information securityInformation security
Information security
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010Review of the Jamaican Cybercrime Act of 2010
Review of the Jamaican Cybercrime Act of 2010
 

Similar to Data Breach from the Inside Out

"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategyJason Clark
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecuritySvetlana Belyaeva
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC PerspectivePositive Hack Days
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsHappiest Minds Technologies
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesBryTech INC
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 
Digital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 

Similar to Data Breach from the Inside Out (20)

"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy"Thinking diffrent" about your information security strategy
"Thinking diffrent" about your information security strategy
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity2 21677 splunk_big_data_futureofsecurity
2 21677 splunk_big_data_futureofsecurity
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
Information Security
Information SecurityInformation Security
Information Security
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling Enterprises
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Digital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ OverviewDigital Shadows SearchLight™ Overview
Digital Shadows SearchLight™ Overview
 
Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Robust Software Solutions.pptx
Robust Software Solutions.pptxRobust Software Solutions.pptx
Robust Software Solutions.pptx
 

More from The Lorenzi Group

ROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperThe Lorenzi Group
 
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...The Lorenzi Group
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsThe Lorenzi Group
 
ROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectThe Lorenzi Group
 
Digital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' DilemmaDigital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' DilemmaThe Lorenzi Group
 
Rising Cost of Child Porn Defense
Rising Cost of Child Porn DefenseRising Cost of Child Porn Defense
Rising Cost of Child Porn DefenseThe Lorenzi Group
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersThe Lorenzi Group
 
So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....The Lorenzi Group
 
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierDigital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierThe Lorenzi Group
 
Digital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial ExecutiveDigital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial ExecutiveThe Lorenzi Group
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesThe Lorenzi Group
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindThe Lorenzi Group
 
Introduction to the Epsilon Data Breach
Introduction to the Epsilon Data BreachIntroduction to the Epsilon Data Breach
Introduction to the Epsilon Data BreachThe Lorenzi Group
 

More from The Lorenzi Group (20)

ROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat HelperROAR in Real Like: Heartbeat Helper
ROAR in Real Like: Heartbeat Helper
 
ROAR for IT Managers
ROAR for IT ManagersROAR for IT Managers
ROAR for IT Managers
 
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
Why ROAR makes CENTS: An Insiders Guide to Saving Clients Money (While Protec...
 
The Many Faces of SHIELD
The Many Faces of SHIELDThe Many Faces of SHIELD
The Many Faces of SHIELD
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital Enviroments
 
ROARing Compliance
ROARing ComplianceROARing Compliance
ROARing Compliance
 
ROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture PerfectROAR in Real Life: Picture Perfect
ROAR in Real Life: Picture Perfect
 
ROAR in Pictures: Biking
ROAR in Pictures: BikingROAR in Pictures: Biking
ROAR in Pictures: Biking
 
DDoS Explained
DDoS ExplainedDDoS Explained
DDoS Explained
 
Digital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' DilemmaDigital Forensics: The Employees' Dilemma
Digital Forensics: The Employees' Dilemma
 
Rising Cost of Child Porn Defense
Rising Cost of Child Porn DefenseRising Cost of Child Porn Defense
Rising Cost of Child Porn Defense
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....So, You Want To Work In Digital Forensics....
So, You Want To Work In Digital Forensics....
 
Digital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next FrontierDigital Forensics: Yesterday, Today, and the Next Frontier
Digital Forensics: Yesterday, Today, and the Next Frontier
 
Digital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial ExecutiveDigital Forensics & eDiscovery for the Financial Executive
Digital Forensics & eDiscovery for the Financial Executive
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR Executives
 
eDiscovery IS Data Security
eDiscovery IS Data SecurityeDiscovery IS Data Security
eDiscovery IS Data Security
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
 
Introduction to the Epsilon Data Breach
Introduction to the Epsilon Data BreachIntroduction to the Epsilon Data Breach
Introduction to the Epsilon Data Breach
 
Sex, Crime, & Online Slime
Sex, Crime, & Online SlimeSex, Crime, & Online Slime
Sex, Crime, & Online Slime
 

Data Breach from the Inside Out

  • 1. Data Breach: From the Inside Out The Lorenzi Group
  • 2. Data Breaches EVERYWHERE! It seems like everyone is being hacked! What is going on? What do these data breaches mean to me?
  • 3. Cost Effects of Data Breaches Your Business Your Customers Loss of Loss of Privacy Trade Secrets Public Trust Declines ID Theft Regulatory Price of Goods Investigations Increases Risk of Malware @ home Lawsuits Increases Money allocated for business growth is instead spent cleaning up the mess!
  • 4. What is REALLY Going On? Before we get THERE, let’s look at technology today….
  • 5. MOST Companies Data Security: Simplified Examples: Internet Law Firms Accounting Firms Call Centers Manufacturers ISP Modem Financial Advisors Dentist Offices Company Firewall Retail Stores ETC. Company Router Who is watching YOUR data? Get Company Antivirus ROAR NOTE: Most companies are set up like this, including YOURS… IF you’re lucky!
  • 6. MOST Companies Data Security: Explained The previous slide is the typical layout of most businesses today.  Most companies:  Know to use Antivirus software.  Know to have a firewall.  Could spend money on IT security more efficiently  Don’t know how to properly protect Intellectual Property  Underestimate their exposure to risk
  • 7. Technically “Savvy” Companies Data Security: Simplified Examples: Apple Microsoft Internet Google eBay CitiGroup NY Times ISP Modem Amazon Company Firewall Company IDS/IPS Company Router Who is watching YOUR data? Get Company ROAR Antivirus
  • 8. Technically “Savvy” Companies Data Security: Explained The previous slide is the layout of technically “savvy” businesses today.  Technically “Savvy” companies:  Attempt to protect their ideas and work product  Attempt to to control their data  Aggressively use technology to protect their business  Use IDS/IPS to stop data from leaving  IDS – Intrusion Detection System  IPS – Intrusion Prevention System
  • 9. So, what is REALLY Going on? Hackers are taking advantage of weakness in computer systems and networks
  • 10. With all this technology, how do hackers get in?
  • 11. How do Hackers Attack You?  They would check for a firewall.  Do you even have a firewall?  What’s its status?  Which firewall ports are open?  They would email your employees.  Can they email your employee a dangerous link?  Can they email your employees a virus?  They would email your vendors.  What risks do your vendors pose to your network? What if none of these attempts worked?
  • 12. More Ways to Steal Your Data… The first set of tricks almost ALWAYS work. 1. They start to work from the INSIDE out. 2. They get to know an employee. It’s IMPORTANT to remember: 1. Employees have access to your data too 2. 15% of employees steal* 3. Effects of Employee Theft = 7% Revenues** * Statistic Brain (www.statisticbrain.com) – Employee Theft Statistics ** Statistic Brain (www.statisticbrain.com) – Employee Theft Statistics
  • 13. How do we KNOW where Data Security Is Going… …Because the OLD way isn’t working Customer Lawsuits Digital Forensics eDiscovery Evidence Hosting & Storage Regulatory Investigations Regulatory Fines Loss of Productivity Loss of Competitiveness It is TOO expensive to continue allowing data breaches to occur.
  • 14. Where Data Security Is GOING: Security Simplified Analytics Examples: & KaiserPermanente Intelligence Fidelity Internet LockheedMartin AssuraMed ISP Modem Company Firewall Lorenzi ROAR Company IDS/IPS ROAR Company Router monitors data patterns 24x7 providing constant feedback & insight Company Antivirus NOTE: Examples may not be Lorenzi clients but utilize technology similar to ROAR
  • 15. Where Data Security Is GOING: Explained The previous slide is the layout of where companies need to go.  Companies will:  Use existing technology to protect data  Take Additional Protections Including:  Utilize Continuous Monitoring  Utilize Security Analytics  Reduce Bottom-line Expenses
  • 16. Lorenzi ROAR Provides:  Continuous Monitoring of data activity  Think: DVR’ing how data moves on your network Example: You can replay questionable activities  Security Analytics  Think: Alerting you when data does something it hasn’t done before Examples: Forwarding an email to a private address, FTP’ing a design, printing out financials  User Access logging for Compliance  Performance Metrics for Bottom-line management & cost savings
  • 17. So, what does this mean to me?  As a Businesses Executive:  Hackers are coming  You won’t know where they are coming from  Protect your data (it’s easy)  As a Consumer:  Hackers are watching you  You NEED to encourage businesses to protect your data  Don’t click on random web-links
  • 18. Wrap Up  Hackers can beat “Set it & Forget it” Technology  Companies MUST watch data movement at the DEVICE level to determine risks  Attacks are more FREQUENT from Outside In, but more SUCCESSFUL from Inside Out.  Lorenzi ROAR provides the TOOLS & INSIGHT companies NEED to protect their data.
  • 19. Are YOU Ready for a FREE Trial of ROAR? The Lorenzi Group 866-632-9880 x123 www.thelorenzigroup.com info@thelorenzigroup.com