SlideShare a Scribd company logo
1 of 31
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Risk Centric Security is an acknowledged authority on the costs
and impacts of data breaches and other types of cyber-security
events. The Company offers state of the art SaaS tools, training,
and consulting that empower Information Security Professionals
to perform credible, defensible, and reproducible risk and
decision analyses, and to articulate the results and relevance of
these analyses in language that business counterparts will
understand.
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved. Risk Analysis for the 21st CenturyĀ®
Patrick Florer has worked in Information Technology and
Security for over 33 years. In addition, he worked a parallel
track in evidence-based medicine for 17 of those years. He is
the CTO and Cofounder of Risk Centric Security. In addition,
he is a Distinguished Fellow of the Ponemon Institute. Mr.
Florer graduated summa cum laude from the University of
Texas at Austin and is a member of the scholastic honor
society Phi Beta Kappa.
Deconstructing the causes and costs of a data breach:
ā€¢ Threat Landscape
ā€¢ Types of Data
ā€¢ Types of Costs
ā€¢ Breach Reports
ā€¢ Frameworks, Bias and Correlation
ā€¢ Breach Examples
ā€¢ Closing Remarks
ā€¢ Q & A
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
14% of data breaches / 69% of security
incidents caused by internal agents (Verizon
DBIR 2013)
33% of breaches in 18 companies studied
were caused by malicious insiders
(Ponemon/Symantec 2011 CODB ā€“ Mar, 2013)
21% of electronic crime events caused by
insiders (CERT 2011 Cybersecurity Survey)
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
The actions of agents outside of an
organization that result in a data breach,
including:
Accidents
Negligence
Maliciousness:
Hacking
Phishing
Malware delivery
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
92% of data breaches / 31% of security incidents
caused by external agents (Verizon DBIR 2013)
76% of network intrusions exploited weak or stolen
credentials (Verizon DBIR 2013)
58% of electronic crime events caused by external
agents (CERT 2011 Cybersecurity Survey)
40% of breaches caused by malware (Verizon DBIR
2013)
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
55% - Organized Crime
21% - State affiliated agents
2% - activist/hacktivist
1% - former employees
21% - other or unknown
(all figures from Verizon 2013 DBIR
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
78% of initial compromises rated as low (68%) or very low
(10%) difficulty
73% of subsequent actions rated as low (71%) or very low
(2%) difficulty
22% of initial compromises rated as moderately difficult / 7%
of subsequent actions rate the same
<1% of initial compromises rated as highly difficult / 21% of
subsequent actions rate the same
Almost all moderate and highly difficult actions pertain to
espionage and NOT to organized crime.
(all figures from Verizon 2013 DBIR)
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Operational Data
Intellectual Property
Financial Information
Personally Identifiable Information (PII)
Protected Health Information (PHI)
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
ā€¢ Breached entity?
ā€¢ Shareholders?
ā€¢ Citizens / the public at large?
ā€¢ Card brands?
ā€¢ Issuing banks?
ā€¢ Customers?
ā€¢ Business partners?
ā€¢ Consumers?
ā€¢ Taxpayers (law enforcement costs)?
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Fixed / Overall Costs
Per record costs:
ā€¢ Direct/Primary
ā€¢ Indirect/Secondary
ā€¢ Variable costs that scale with magnitude of
breach
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Costs that we should be able to discover and/or estimate:
ā€¢ Lost productivity
ā€¢ Incident response and forensics costs
ā€¢ Costs of replacing lost or damaged hardware, software, or
information
ā€¢ Public relations costs
ā€¢ Legal costs
ā€¢ Costs of sending letters to notify customers and business
partners
ā€¢ Costs of providing credit monitoring
ā€¢ Fines from governmental action (HIPAA/HITECH, FTC, State
Attorneys General, etc.)
Costs that we should be able to discover and/or
estimate:
ā€¢ Fines and indemnifications imposed by contracts with
business partners
ā€¢ Contractual fines and penalties resulting from PCI DSS
related incidents - either data loss or compliance failure
ā€¢ Judgments and legal settlements - customers, business
partners, shareholders
ā€¢ Additional compliance and audit costs related to legal
settlements (20 years of additional reporting, for example)
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Costs that might be difficult to discover and/or
estimate:
ā€¢ Loss of competitive advantage
ā€¢ Loss of shareholder value
ā€¢ Reputation loss
ā€¢ Opportunity and Sales losses from customers and
business partners who went elsewhere
ā€¢ Value of intellectual property
Risk Centric Security, Inc. Confidential and Proprietary.
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Ponemon Institute 2011 Cost of Data Breach Study:
United States (March, 2013)
49 Companies surveyed ā€“ multiple people per company.
Breach sizes ranged from 5K ā€“ 100K exposed records.
Participants estimated the minimum and maximum
amounts for a number of costs, from which the mid-point
value was selected.
According to some legal experts, Ponemon Institute
numbers are the ā€œgoldā€ standard in the Federal Courts.
The raw data are published in the report appendix.
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
In the 2011 report:
Overall weighted average per record = $194 (down from $214
in 2010)
Overall average total = $5.5 M (down from $7.2M in 2011)
Minimum total cost = $566 K
Median total cost = $4.5 M
Maximum total cost = $20.9 M
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Ponemon Institute 2013 Cost of Cyber Crime Study:
United States
56 Organizations Companies surveyed, > 1,000 seats
Costs were due to cyber crime ā€“ no errors or accidental
exposures
4 week study period extrapolated to 52 weeks.
The 56 organizations in the study experienced 102 cyber
attacks per week; 1.8 attacks each per week.
Annualized costs per company ranged from $1.4M to
$46M, with the average = $8.9M and the median = $6.2M
Average attack took 24 days to resolve and cost $592K
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Net Diligence 2013 Cyber Liability & Data Breach
Insurance Claims study
137 events between 2009 and 2011 ā€“ claims data were
provided by underwriters
Average cost per breach = $3.7 million
Payouts were net of deductibles/retentions, which ranged
from $50K to $1M
Report breaks out many types of costs: Crisis services,
Legal Defense, Legal Settlements
Cyber insurance does not reimburse for ā€œsoftā€ costs like
lost customers, brand damage, and lost stock value.
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
TJX
Heartland
Sony
Global Payments
Department of Revenue of South Carolina
Plans for the Presidential Helicopter
Coca-Cola
Merger Acquisitions
Insider Threat
Ford Motor Company
Measured on a per record basis, the cost per record
declines as the size of the breach increases
Measured on a total cost basis, the total cost increases
as the number of exposed records increases
Both of these correlations are weak
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
We have covered many topics today. To summarize:
ā€¢ Data breaches are caused by threats from the
inside and threats from the outside.
ā€¢ Data breaches are caused by accidents, negligence,
and maliciousness.
ā€¢ Data breaches involve many types of data.
ā€¢ Data breaches involve many types of costs.
ā€¢ There are many useful preventative technologies.
ā€¢ There are many effective technologies for breach
detection and mitigation.
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Watchful Software is focused on providing data-centric
information protection that works. With the massive amounts
that have been invested in securing the network perimeter, one
thing has become painfully clear: today's enterprises must secure
the information itself.
Charles Foley is the Chairman and CEO of Watchful Software, Inc.
Mr. Foley has over 20 years experience leading both private and public company teams
to success. Prior to Watchful Software, Mr. Foley was the Chairman and CEO of
TimeSight Systems, Inc., a developer of leading-edge storage and video management
solutions for the physical security market. He also served as President of Tacit Networks,
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
a leader in Wide Area Network acceleration systems,
where he designed the marketing and business
development strategies that led to their profitable
acquisition by Packeteer (NASDAQ: PKTR).
Risk Centric Security, Inc. Confidential and Proprietary .
Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
Heather Goodnight is the Regional Sales director for
Triumfant, Inc. She is one of the most accomplished
business and sales development professionals working in
the information security space. By focusing on customersā€™
business needs and aligning products and services, she
helps bring forth the benefits of successful selling
fundamentals and best practices that positively impact
bottom-line results.
Triumfant leverages patented analytics to detect, analyze and remediate the
malicious attacks that evade traditional endpoint protection solutions such
as the Advanced Persistent Threat, Zero Day Attacks, targeted attacks, and
rootkits. Triumfant automates the process of building a contextual and
surgical remediation that addresses the malware and all of the associated
collateral damage. Endpoints go from infection to remediation in five
minutes without the need to reboot or re-image.
Thank you !
Patrick Florer, CTO and Co-founder
Risk Centric Security, Inc
patrick@riskcentricsecurity.com
214.828.1172
Heather Goodnight, Regional Sales Director
Triumfant, Inc.
heather.goodnight@triumfant.com
214.405.5789
Charles Foley, Chairman and CEO
Thomas McClinton, Central US Sales Director
Watchful Software, Inc.
thomas.mcclinton@watchfulsoftware.com
832.754.8501
Risk Analysis for the 21st CenturyĀ®

More Related Content

What's hot

Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Dawn Yankeelov
Ā 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
Ā 
Impacts cloud remote_workforce
Impacts cloud remote_workforceImpacts cloud remote_workforce
Impacts cloud remote_workforceRodrigo Varas
Ā 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFERMA
Ā 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Proofpoint
Ā 
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...EC-Council
Ā 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent ThreatsBooz Allen Hamilton
Ā 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
Ā 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020Netpluz Asia Pte Ltd
Ā 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
Ā 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
Ā 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
Ā 
The VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth AnalysisThe VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth AnalysisEMC
Ā 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research CSSaunders
Ā 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
Ā 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
Ā 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRBill Besse
Ā 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesSlideTeam
Ā 

What's hot (20)

Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
Ā 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Ā 
Impacts cloud remote_workforce
Impacts cloud remote_workforceImpacts cloud remote_workforce
Impacts cloud remote_workforce
Ā 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
Ā 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Ā 
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Ā 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
Ā 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
Ā 
Security on a budget
Security on a budget Security on a budget
Security on a budget
Ā 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
Ā 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
Ā 
Using the Threat Agent Library to improve threat modeling
Using the Threat Agent Library to improve threat modelingUsing the Threat Agent Library to improve threat modeling
Using the Threat Agent Library to improve threat modeling
Ā 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
Ā 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
Ā 
The VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth AnalysisThe VOHO Campaign: An In Depth Analysis
The VOHO Campaign: An In Depth Analysis
Ā 
Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research Professor Martin Gill, Director, Perpetuity Research
Professor Martin Gill, Director, Perpetuity Research
Ā 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
Ā 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
Ā 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
Ā 
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation SlidesHow To Handle Cybersecurity Risk PowerPoint Presentation Slides
How To Handle Cybersecurity Risk PowerPoint Presentation Slides
Ā 

Similar to Rcs triumfant watchful_webinar_final

Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
Ā 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
Ā 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesKrist Davood - Principal - CIO
Ā 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
Ā 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
Ā 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance TempRohan Sehgal
Ā 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
Ā 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
Ā 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframePrecisely
Ā 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
Ā 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
Ā 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15James Fisher
Ā 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAbdullahKanash
Ā 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
Ā 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
Ā 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
Ā 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
Ā 

Similar to Rcs triumfant watchful_webinar_final (20)

Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Ā 
Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
Ā 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
Ā 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Ā 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Ā 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Ā 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
Ā 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
Ā 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
Ā 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Ā 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
Ā 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
Ā 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
Ā 
Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15Foley-Cybersecurity-White-Paper_3.9.15
Foley-Cybersecurity-White-Paper_3.9.15
Ā 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
Ā 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Ā 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Ā 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
Ā 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
Ā 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
Ā 

Recently uploaded

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
Ā 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
Ā 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
Ā 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
Ā 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
Ā 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜RTylerCroy
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
Ā 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Ā 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Ā 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Ā 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Ā 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Ā 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Ā 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Ā 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Ā 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜
Ā 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Ā 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Ā 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Ā 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Ā 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Ā 

Rcs triumfant watchful_webinar_final

  • 1. Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 2. Risk Centric Security is an acknowledged authority on the costs and impacts of data breaches and other types of cyber-security events. The Company offers state of the art SaaS tools, training, and consulting that empower Information Security Professionals to perform credible, defensible, and reproducible risk and decision analyses, and to articulate the results and relevance of these analyses in language that business counterparts will understand. Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved. Risk Analysis for the 21st CenturyĀ® Patrick Florer has worked in Information Technology and Security for over 33 years. In addition, he worked a parallel track in evidence-based medicine for 17 of those years. He is the CTO and Cofounder of Risk Centric Security. In addition, he is a Distinguished Fellow of the Ponemon Institute. Mr. Florer graduated summa cum laude from the University of Texas at Austin and is a member of the scholastic honor society Phi Beta Kappa.
  • 3. Deconstructing the causes and costs of a data breach: ā€¢ Threat Landscape ā€¢ Types of Data ā€¢ Types of Costs ā€¢ Breach Reports ā€¢ Frameworks, Bias and Correlation ā€¢ Breach Examples ā€¢ Closing Remarks ā€¢ Q & A Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 4.
  • 5. 14% of data breaches / 69% of security incidents caused by internal agents (Verizon DBIR 2013) 33% of breaches in 18 companies studied were caused by malicious insiders (Ponemon/Symantec 2011 CODB ā€“ Mar, 2013) 21% of electronic crime events caused by insiders (CERT 2011 Cybersecurity Survey) Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 6. The actions of agents outside of an organization that result in a data breach, including: Accidents Negligence Maliciousness: Hacking Phishing Malware delivery Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 7. 92% of data breaches / 31% of security incidents caused by external agents (Verizon DBIR 2013) 76% of network intrusions exploited weak or stolen credentials (Verizon DBIR 2013) 58% of electronic crime events caused by external agents (CERT 2011 Cybersecurity Survey) 40% of breaches caused by malware (Verizon DBIR 2013) Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 8. 55% - Organized Crime 21% - State affiliated agents 2% - activist/hacktivist 1% - former employees 21% - other or unknown (all figures from Verizon 2013 DBIR Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 9. 78% of initial compromises rated as low (68%) or very low (10%) difficulty 73% of subsequent actions rated as low (71%) or very low (2%) difficulty 22% of initial compromises rated as moderately difficult / 7% of subsequent actions rate the same <1% of initial compromises rated as highly difficult / 21% of subsequent actions rate the same Almost all moderate and highly difficult actions pertain to espionage and NOT to organized crime. (all figures from Verizon 2013 DBIR) Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 10.
  • 11. Operational Data Intellectual Property Financial Information Personally Identifiable Information (PII) Protected Health Information (PHI) Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 12.
  • 13. ā€¢ Breached entity? ā€¢ Shareholders? ā€¢ Citizens / the public at large? ā€¢ Card brands? ā€¢ Issuing banks? ā€¢ Customers? ā€¢ Business partners? ā€¢ Consumers? ā€¢ Taxpayers (law enforcement costs)? Risk Centric Security, Inc. Confidential and Proprietary. Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 14. Fixed / Overall Costs Per record costs: ā€¢ Direct/Primary ā€¢ Indirect/Secondary ā€¢ Variable costs that scale with magnitude of breach Risk Centric Security, Inc. Confidential and Proprietary. Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 15. Costs that we should be able to discover and/or estimate: ā€¢ Lost productivity ā€¢ Incident response and forensics costs ā€¢ Costs of replacing lost or damaged hardware, software, or information ā€¢ Public relations costs ā€¢ Legal costs ā€¢ Costs of sending letters to notify customers and business partners ā€¢ Costs of providing credit monitoring ā€¢ Fines from governmental action (HIPAA/HITECH, FTC, State Attorneys General, etc.)
  • 16. Costs that we should be able to discover and/or estimate: ā€¢ Fines and indemnifications imposed by contracts with business partners ā€¢ Contractual fines and penalties resulting from PCI DSS related incidents - either data loss or compliance failure ā€¢ Judgments and legal settlements - customers, business partners, shareholders ā€¢ Additional compliance and audit costs related to legal settlements (20 years of additional reporting, for example) Risk Centric Security, Inc. Confidential and Proprietary. Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 17. Costs that might be difficult to discover and/or estimate: ā€¢ Loss of competitive advantage ā€¢ Loss of shareholder value ā€¢ Reputation loss ā€¢ Opportunity and Sales losses from customers and business partners who went elsewhere ā€¢ Value of intellectual property Risk Centric Security, Inc. Confidential and Proprietary. Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 18. Ponemon Institute 2011 Cost of Data Breach Study: United States (March, 2013) 49 Companies surveyed ā€“ multiple people per company. Breach sizes ranged from 5K ā€“ 100K exposed records. Participants estimated the minimum and maximum amounts for a number of costs, from which the mid-point value was selected. According to some legal experts, Ponemon Institute numbers are the ā€œgoldā€ standard in the Federal Courts. The raw data are published in the report appendix. Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 19. In the 2011 report: Overall weighted average per record = $194 (down from $214 in 2010) Overall average total = $5.5 M (down from $7.2M in 2011) Minimum total cost = $566 K Median total cost = $4.5 M Maximum total cost = $20.9 M Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 20. Ponemon Institute 2013 Cost of Cyber Crime Study: United States 56 Organizations Companies surveyed, > 1,000 seats Costs were due to cyber crime ā€“ no errors or accidental exposures 4 week study period extrapolated to 52 weeks. The 56 organizations in the study experienced 102 cyber attacks per week; 1.8 attacks each per week. Annualized costs per company ranged from $1.4M to $46M, with the average = $8.9M and the median = $6.2M Average attack took 24 days to resolve and cost $592K Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 21. Net Diligence 2013 Cyber Liability & Data Breach Insurance Claims study 137 events between 2009 and 2011 ā€“ claims data were provided by underwriters Average cost per breach = $3.7 million Payouts were net of deductibles/retentions, which ranged from $50K to $1M Report breaks out many types of costs: Crisis services, Legal Defense, Legal Settlements Cyber insurance does not reimburse for ā€œsoftā€ costs like lost customers, brand damage, and lost stock value. Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 22.
  • 24. Plans for the Presidential Helicopter Coca-Cola Merger Acquisitions Insider Threat Ford Motor Company
  • 25. Measured on a per record basis, the cost per record declines as the size of the breach increases Measured on a total cost basis, the total cost increases as the number of exposed records increases Both of these correlations are weak Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 26. Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 27. Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 28. We have covered many topics today. To summarize: ā€¢ Data breaches are caused by threats from the inside and threats from the outside. ā€¢ Data breaches are caused by accidents, negligence, and maliciousness. ā€¢ Data breaches involve many types of data. ā€¢ Data breaches involve many types of costs. ā€¢ There are many useful preventative technologies. ā€¢ There are many effective technologies for breach detection and mitigation. Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved.
  • 29. Watchful Software is focused on providing data-centric information protection that works. With the massive amounts that have been invested in securing the network perimeter, one thing has become painfully clear: today's enterprises must secure the information itself. Charles Foley is the Chairman and CEO of Watchful Software, Inc. Mr. Foley has over 20 years experience leading both private and public company teams to success. Prior to Watchful Software, Mr. Foley was the Chairman and CEO of TimeSight Systems, Inc., a developer of leading-edge storage and video management solutions for the physical security market. He also served as President of Tacit Networks, Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved. a leader in Wide Area Network acceleration systems, where he designed the marketing and business development strategies that led to their profitable acquisition by Packeteer (NASDAQ: PKTR).
  • 30. Risk Centric Security, Inc. Confidential and Proprietary . Copyright Ā© 2013 Risk Centric Security, Inc . All rights reserved. Heather Goodnight is the Regional Sales director for Triumfant, Inc. She is one of the most accomplished business and sales development professionals working in the information security space. By focusing on customersā€™ business needs and aligning products and services, she helps bring forth the benefits of successful selling fundamentals and best practices that positively impact bottom-line results. Triumfant leverages patented analytics to detect, analyze and remediate the malicious attacks that evade traditional endpoint protection solutions such as the Advanced Persistent Threat, Zero Day Attacks, targeted attacks, and rootkits. Triumfant automates the process of building a contextual and surgical remediation that addresses the malware and all of the associated collateral damage. Endpoints go from infection to remediation in five minutes without the need to reboot or re-image.
  • 31. Thank you ! Patrick Florer, CTO and Co-founder Risk Centric Security, Inc patrick@riskcentricsecurity.com 214.828.1172 Heather Goodnight, Regional Sales Director Triumfant, Inc. heather.goodnight@triumfant.com 214.405.5789 Charles Foley, Chairman and CEO Thomas McClinton, Central US Sales Director Watchful Software, Inc. thomas.mcclinton@watchfulsoftware.com 832.754.8501 Risk Analysis for the 21st CenturyĀ®