Today data breaches are front and center in higher ed boardrooms. The trust between an institution and its students/faculty is at stake. There are more pieces of personal identity and more 3rd party devices on the network than other networks. Higher ed CISOs need risk intelligence to build trust and give their Board’s oversight.
Data Breach Risk Intelligence for Higher Education
1. DATA BREACH RISK INTELLIGENCE
FOR HIGHER ED
Financial prioritization of data breach risk in the
language of the C-suite
2. WHY?
Almost 1 million records were
stolen from just the top five
universities breached in 2014.
Data breaches are becoming front
and center in Boardrooms at
Higher Ed institutions.
…Yet data breach tools are
developed for yesterday’s IT.
Slow, disruptive to
students & staff
Discover data or
vulnerabilities, but not
both
Results not ready for
CFO and Board
presentations
False positives, unable to
scan largest servers
Not effective on Mac and
other platforms
3. ISCAN RISK INTELLIGENCE
in dollars
prioritized
real-time
trends
Financial prioritization of data breach risk in the language of the C-suite
One tool does
it all
• Sensitive data
• Who has access
• Vulnerabilities
Know your
security number
Dollar value of risk liability per
device
Actionable
intelligence
Total risk exposure of
organization
C-level ready
dashboard
• Evidence of impact
• Board oversight
4. ISCAN ANSWERS KEY QUESTIONS FOR CISOS
What data is
at risk and
who has
access?
How can
attackers get
to it?
What will it
cost when
breached?
5. HOW ISCAN IS DIFFERENT
• Deploys rapidly, scans are faster and more accurate
• Detects big 3: sensitive data, access permissions and
vulnerabilities
• Admins can find hacker traps
• Provides actionable intelligence and financially
prioritizes data breach risk
• C-suite ready dashboard puts a dollar number on
your risk exposure
• Works well with popular education environments/
devices like Mac, iO, Ubuntu and Linux choices
All in
one tool
6. HOW DO WE DO IT? PATENTED
AGENTLESS DISCOVERY
Mobile
app
Command
line
Constant auto assessment across
all device types
Cloud-based lightweight
deployment with same day results
Millions of devices at one time
Active directory
7. Potential liability $
Data at Risk
• Social Security
numbers
• Driver’s licenses
• Birthdates
• Telephone numbers
• Credit card numbers
• Bank accounts
• Intellectual property
• Sensitive files
DATA BREACH RISK REPORT
PER DEVICE
Vulnerabilities
By severity
By vendor
Unauthorized
access
Configurations
8. INTELLIGENCE DASHBOARD
Like a Google map of your assets
Immediate liability costs/
prioritization displayed for
decision-making
Trends for tracking the impact of
initiatives
Ready for the Boardroom
10. iScan Leading
competitor
Automatically find SSNs, IDs, Bank Accounts, Driver Licenses, Dates of Birth, Phone
Numbers, Addresses, Passports, Intellectual Property, Credit Cards, Patient Health Info
Find file patterns and MD5/SHA hashes – finds data theft artifacts, such as Cryptolocker, and
use for incidence response
Search files, e-mails and attachments on:
• File servers
• .zip files
• Outlook, Thunderbird, Apple Mail +
• Cloud storage folders including Dropbox, Skydrive, Google Drive, Box, Amazon Cloud Drive,
and more
• NAS
Search files on websites *
Search even the largest servers (1 TB+)
Schedule searches **
HOW WE COMPARE 1/3
* iScan searches the databases where form fill data resides
** iScan integrates with existing infrastructure for scheduled searches
11. iScan Leading
competitor
Works on:
• Windows XP - 8.1
• Windows Server - 2003 – 2012
• Linux 64 bit - RHEL 5+
• Mac OS X
Works on:
• CentOS 5+ Linux
• Oracle Linux
• Ubuntu
• Fedora
Works on mobile devices like tablets and smartphones
• Apple iOS 5 +
• Android 2.3 +
Effectively search both Mac and PC platforms
Manage data discovery without an agent
Non-intrusive, does not require scaling down resources on device
HOW WE COMPARE 2/3
12. HOW WE COMPARE 3/3 iScan Leading
competitor
View and manage by university, department or any sub group
Audit 3rd party devices “on the fly”
Receive results in your inbox daily
Fastest scanning available
Same day scalable implementation and results
Vulnerability scanning (How will data be breached)
View file permission access to sensitive data
Automatically calculates dollar value liability & financially prioritizes
Trend charts for monitoring impact
Intelligence dashboard for C-suite
One tool for data, access & vulnerabilities, and C-suite dashboard
13. IVY LEAGUE
UNIVERSITY
“We use iScan to report the
financial impact to our
Boardroom.
It also empowers our
students to self-assess their
computers.”
14. LIBERAL ARTS
UNIVERSITY
“We chose iScan Online as
the only vendor that could
complete the discovery of
sensitive data on our multi-
terabyte servers.”