SlideShare a Scribd company logo
1 of 1
251,287 ³
                                            WIKILEAKS IS RESPONSIBLE                                        INSIDER BREACHES
                                            for the release of 251,287 of the US State                      currently make up 42% of government breaches —
                                            Department’s classified communications.                         that’s up 68% from 2008.



                                                                                                                              2008         +68%                    NOW     42%
SECURITY BREACHES


GOVERNMENTS
ARE AT RISK TOO




                                                                    76
                                                                                                                   A GOVERNMENT
               The failure to erase personal
               information from a National
                                                                                    AT RISK                        LAPTOP
                                                                                                                   sells for about




                                                                                                                                                                         $12
               Archive and Records Administra-
                                                                 MILLION            OF IDENTITY                    $12,017 on the




                                                                                                                                                                          ,01
               tion (NARA) hard drive put




                                                                                                                                                                           7
                                                                VETERANS            THEFT.                         BLACK MARKET.


                                                                   SOURCES
                                                                   CBC News – www.cbc.ca/news/technology/story/2011/11/15/technology-data-
               Identities of    CAME UNDER THREAT

               80,000
                                                                   breaches-it-security.html (Canada)
                                after computer data was            Ponemon Institute – www.ponemon.org/local/upload/fckjail/generalcontent/18/file/
                                stolen by a civilian official      Cost%20of%20a%20Lost%20Laptop%20White%20Paper%20Final%203.pdf (U.S.)
                                                                   Forbes – www.forbes.com/2009/11/24/security-hackers-data-technology-cio-network-breaches.html
               OFFICERS         of the NYPD’s pension fund.        NY Post – www.nypost.com/p/news/regional/item_8BX3Qmj7PnfxPOdMPZTr8K#ixzz1jFv7eqYy
                                                                   BBC – www.bbc.co.uk/news/world-us-canada-14765837




                                                                                                                                          800 69-Shred | shredit.com

More Related Content

Viewers also liked

Discover Risk Culture with Mohammad Fheili
Discover Risk Culture with Mohammad FheiliDiscover Risk Culture with Mohammad Fheili
Discover Risk Culture with Mohammad FheiliMohammad Ibrahim Fheili
 
Risk Culture – Under the microscope
Risk Culture – Under the microscopeRisk Culture – Under the microscope
Risk Culture – Under the microscopeTPP Recruitment
 
2014_Risk culture series_Risk culture
2014_Risk culture series_Risk culture2014_Risk culture series_Risk culture
2014_Risk culture series_Risk cultureNeal Writer
 
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air TransportCHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air TransportCranfield University
 
Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightNICSA
 
Risk Culture, Risk What?
Risk Culture, Risk What?Risk Culture, Risk What?
Risk Culture, Risk What?Ian Rich
 
Co-Creating Foresight Culture in Government
Co-Creating Foresight Culture in GovernmentCo-Creating Foresight Culture in Government
Co-Creating Foresight Culture in GovernmentGreg Van Alstyne
 
Entrepreneurship ecosystem
Entrepreneurship ecosystemEntrepreneurship ecosystem
Entrepreneurship ecosystemIlia Kenigshtein
 
Risk Culture & Risk Appetite
Risk Culture & Risk AppetiteRisk Culture & Risk Appetite
Risk Culture & Risk AppetiteLászló Árvai
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyNICSA
 
Risk culture presentation
Risk culture presentationRisk culture presentation
Risk culture presentationBenjamin Kpodo
 

Viewers also liked (14)

At risk in retail banking
At risk in retail bankingAt risk in retail banking
At risk in retail banking
 
Discover risk culture
Discover risk cultureDiscover risk culture
Discover risk culture
 
Discover Risk Culture with Mohammad Fheili
Discover Risk Culture with Mohammad FheiliDiscover Risk Culture with Mohammad Fheili
Discover Risk Culture with Mohammad Fheili
 
Aml laws implications
Aml laws implicationsAml laws implications
Aml laws implications
 
Risk Culture – Under the microscope
Risk Culture – Under the microscopeRisk Culture – Under the microscope
Risk Culture – Under the microscope
 
2014_Risk culture series_Risk culture
2014_Risk culture series_Risk culture2014_Risk culture series_Risk culture
2014_Risk culture series_Risk culture
 
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air TransportCHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
CHC Safety & Quality Summit 2016 - Risk Culture in Commercial Air Transport
 
Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in Oversight
 
Risk Culture, Risk What?
Risk Culture, Risk What?Risk Culture, Risk What?
Risk Culture, Risk What?
 
Co-Creating Foresight Culture in Government
Co-Creating Foresight Culture in GovernmentCo-Creating Foresight Culture in Government
Co-Creating Foresight Culture in Government
 
Entrepreneurship ecosystem
Entrepreneurship ecosystemEntrepreneurship ecosystem
Entrepreneurship ecosystem
 
Risk Culture & Risk Appetite
Risk Culture & Risk AppetiteRisk Culture & Risk Appetite
Risk Culture & Risk Appetite
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Risk culture presentation
Risk culture presentationRisk culture presentation
Risk culture presentation
 

Similar to Every Workplace Needs to Reduce Risk of Data Breaches – Including Government Institutions

Thy myth of hacking Oracle
Thy myth of hacking OracleThy myth of hacking Oracle
Thy myth of hacking OracleErmando
 
Technosoft presentation at nasscom big data event on 06 feb-2013
Technosoft presentation at nasscom big data event on 06 feb-2013Technosoft presentation at nasscom big data event on 06 feb-2013
Technosoft presentation at nasscom big data event on 06 feb-2013Technosoft_Corporation
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Kevin Duffey
 
Managing and Sustaining a Global Business Continuity Management Programme
Managing and Sustaining a Global Business Continuity Management ProgrammeManaging and Sustaining a Global Business Continuity Management Programme
Managing and Sustaining a Global Business Continuity Management ProgrammeBCM Institute
 
US Data Breaches Analysis
US Data Breaches   AnalysisUS Data Breaches   Analysis
US Data Breaches Analysisjkveragas
 
Tapping into the Neglected $4B Market
Tapping into the Neglected $4B MarketTapping into the Neglected $4B Market
Tapping into the Neglected $4B Marketgaryeflores
 
Sample Customer Pitch Deck
Sample Customer Pitch DeckSample Customer Pitch Deck
Sample Customer Pitch Deckkylec2000
 
Hospitality Law Conference 2010 - Information Protection & Privacy: The New H...
Hospitality Law Conference 2010 - Information Protection & Privacy: The New H...Hospitality Law Conference 2010 - Information Protection & Privacy: The New H...
Hospitality Law Conference 2010 - Information Protection & Privacy: The New H...HospitalityLawyer.com
 
DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoRamsés Gallego
 
Building Great Companies on the Cloud
Building Great Companies on the CloudBuilding Great Companies on the Cloud
Building Great Companies on the CloudRoman Stanek
 
Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02Scott Winter
 
Security4all Desktop Security
Security4all   Desktop SecuritySecurity4all   Desktop Security
Security4all Desktop SecurityBen W.
 
NASCO PRESENTATION/KANSAS CITY
NASCO PRESENTATION/KANSAS CITYNASCO PRESENTATION/KANSAS CITY
NASCO PRESENTATION/KANSAS CITYNorman Anderson
 
Big data datacrunch
Big data datacrunchBig data datacrunch
Big data datacrunchReseau'Nable
 

Similar to Every Workplace Needs to Reduce Risk of Data Breaches – Including Government Institutions (15)

Thy myth of hacking Oracle
Thy myth of hacking OracleThy myth of hacking Oracle
Thy myth of hacking Oracle
 
Technosoft presentation at nasscom big data event on 06 feb-2013
Technosoft presentation at nasscom big data event on 06 feb-2013Technosoft presentation at nasscom big data event on 06 feb-2013
Technosoft presentation at nasscom big data event on 06 feb-2013
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
 
Managing and Sustaining a Global Business Continuity Management Programme
Managing and Sustaining a Global Business Continuity Management ProgrammeManaging and Sustaining a Global Business Continuity Management Programme
Managing and Sustaining a Global Business Continuity Management Programme
 
US Data Breaches Analysis
US Data Breaches   AnalysisUS Data Breaches   Analysis
US Data Breaches Analysis
 
Tapping into the Neglected $4B Market
Tapping into the Neglected $4B MarketTapping into the Neglected $4B Market
Tapping into the Neglected $4B Market
 
Sample Customer Pitch Deck
Sample Customer Pitch DeckSample Customer Pitch Deck
Sample Customer Pitch Deck
 
Hospitality Law Conference 2010 - Information Protection & Privacy: The New H...
Hospitality Law Conference 2010 - Information Protection & Privacy: The New H...Hospitality Law Conference 2010 - Information Protection & Privacy: The New H...
Hospitality Law Conference 2010 - Information Protection & Privacy: The New H...
 
Wireless
WirelessWireless
Wireless
 
DLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés GallegoDLP - Network Security Conference_ Ramsés Gallego
DLP - Network Security Conference_ Ramsés Gallego
 
Building Great Companies on the Cloud
Building Great Companies on the CloudBuilding Great Companies on the Cloud
Building Great Companies on the Cloud
 
Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02Cloudexpokeynote5 090518103820 Phpapp02
Cloudexpokeynote5 090518103820 Phpapp02
 
Security4all Desktop Security
Security4all   Desktop SecuritySecurity4all   Desktop Security
Security4all Desktop Security
 
NASCO PRESENTATION/KANSAS CITY
NASCO PRESENTATION/KANSAS CITYNASCO PRESENTATION/KANSAS CITY
NASCO PRESENTATION/KANSAS CITY
 
Big data datacrunch
Big data datacrunchBig data datacrunch
Big data datacrunch
 

More from Shred-it

Lifecycle of a Document
Lifecycle of a Document Lifecycle of a Document
Lifecycle of a Document Shred-it
 
Recycling Shredded Paper
Recycling Shredded PaperRecycling Shredded Paper
Recycling Shredded PaperShred-it
 
Security Tracker 2012 - U.S.
Security Tracker 2012 - U.S.Security Tracker 2012 - U.S.
Security Tracker 2012 - U.S.Shred-it
 
50 Security Tips – Part 2
50 Security Tips – Part 250 Security Tips – Part 2
50 Security Tips – Part 2Shred-it
 
50 Security Tips – Part 1
50 Security Tips – Part 1 50 Security Tips – Part 1
50 Security Tips – Part 1 Shred-it
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowShred-it
 
Your Employees and Information Security
Your Employees and Information SecurityYour Employees and Information Security
Your Employees and Information SecurityShred-it
 

More from Shred-it (7)

Lifecycle of a Document
Lifecycle of a Document Lifecycle of a Document
Lifecycle of a Document
 
Recycling Shredded Paper
Recycling Shredded PaperRecycling Shredded Paper
Recycling Shredded Paper
 
Security Tracker 2012 - U.S.
Security Tracker 2012 - U.S.Security Tracker 2012 - U.S.
Security Tracker 2012 - U.S.
 
50 Security Tips – Part 2
50 Security Tips – Part 250 Security Tips – Part 2
50 Security Tips – Part 2
 
50 Security Tips – Part 1
50 Security Tips – Part 1 50 Security Tips – Part 1
50 Security Tips – Part 1
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to know
 
Your Employees and Information Security
Your Employees and Information SecurityYour Employees and Information Security
Your Employees and Information Security
 

Every Workplace Needs to Reduce Risk of Data Breaches – Including Government Institutions

  • 1. 251,287 ³ WIKILEAKS IS RESPONSIBLE INSIDER BREACHES for the release of 251,287 of the US State currently make up 42% of government breaches — Department’s classified communications. that’s up 68% from 2008. 2008 +68% NOW 42% SECURITY BREACHES GOVERNMENTS ARE AT RISK TOO 76 A GOVERNMENT The failure to erase personal information from a National AT RISK LAPTOP sells for about $12 Archive and Records Administra- MILLION OF IDENTITY $12,017 on the ,01 tion (NARA) hard drive put 7 VETERANS THEFT. BLACK MARKET. SOURCES CBC News – www.cbc.ca/news/technology/story/2011/11/15/technology-data- Identities of CAME UNDER THREAT 80,000 breaches-it-security.html (Canada) after computer data was Ponemon Institute – www.ponemon.org/local/upload/fckjail/generalcontent/18/file/ stolen by a civilian official Cost%20of%20a%20Lost%20Laptop%20White%20Paper%20Final%203.pdf (U.S.) Forbes – www.forbes.com/2009/11/24/security-hackers-data-technology-cio-network-breaches.html OFFICERS of the NYPD’s pension fund. NY Post – www.nypost.com/p/news/regional/item_8BX3Qmj7PnfxPOdMPZTr8K#ixzz1jFv7eqYy BBC – www.bbc.co.uk/news/world-us-canada-14765837 800 69-Shred | shredit.com