SlideShare a Scribd company logo
1 of 15
Download to read offline
Proprietary and confidential
Will My SaaS Provider Leak My
Corporate Data?
Proprietary and confidential
A Strategic Guide to Avoiding
System and Network Breaches
“Against a sufficiently skilled, funded and
motivated attacker, all networks are
vulnerable.
But good security makes many kinds of
attack harder, costlier and riskier.
Against attackers who aren’t sufficiently
skilled, good security may protect you
completely.”
BRUCE SCHNEIER
Dec. 19, 2014
—Chief Technology Officer of Resilient Systems, a fellow at
Harvard's Berkman Center, and a board member of EFF
Proprietary and confidential
Overview
Who’s Really Vulnerable?
Spoiler: it’s all of us.
What am I afraid of?
Share your story
Can I Trust This Guy?
Focused topics on (not) sharing data
Proprietary and confidential
Who’s Really Vulnerable?
Proprietary and confidential
What Am I Afraid Of?
Part 1:
What top 2 or 3 things
scare you the most
about your current
situation?
Proprietary and confidential
What Am I Afraid Of?
Part 2:
● What makes you
interested in Security
today?
● What do you hope to
get from today’s
discussion?
Proprietary and confidential
What’s on Our Mind?
● Does my provider know what they’re
doing?
● PCI compliance will protect me
● How secure is my system
● How other people failed
● How much is security worth
● ...Others?
Proprietary and confidential
Does my provider know what they’re doing?
● Is SaaS provider more
knowledgeable and experienced
than my staff?
● Is provider more scalable than
my staff/systems?
● Who owns the data?
● Can they answer the hard
questions?
Proprietary and confidential
The Hard Questions
● Security: The system is protected, both logically and
physically, against unauthorized access.
● Availability: The system is available for operation and
use as committed or agreed to.
● Processing Integrity: System processing is
complete, accurate, timely, and authorized.
● Confidentiality: Information that is designated
“confidential” is protected as committed or agreed.
● Privacy: Personal information is collected, used,
retained, and disclosed in conformity with the
commitments in the entity’s privacy notice and with
the privacy principles put forth by the American
Institute of Certified Public Accountants (AICPA) and
the Canadian Institute of Chartered Accountants
(CICA).
Proprietary and confidential
SOC2
● Operation conforms to strict and
detailed standards
● Adherence verified continually
● Formal audit by third party
Proprietary and confidential
PCI Compliance Will Protect Me
● Gaps
● Strengths
● Evolution
Proprietary and confidential
How Secure Is My Own System
Can you tell if your system was
penetrated today?
Are you using…
● Malware scanning
● IDS/IPS
● Vulnerability scanning
Do your users know how to...
● Use strong passwords
● React to Pfishing
● Recognize fake sites
Proprietary and confidential
How Other People Failed
● Attacks in the news
● Common attacks
Proprietary and confidential
How Much Is Security Worth
“Sony made its situation worse by
having substandard security.”
BRUCE SCHNEIER
Sony Pictures’ executive
director of information
security Jason Spaltro told
CIO Magazine in 2007
that it may be “a valid
business decision to accept
the risk” of a security
breach.
http://www.cio.com/article/2439324/risk-
management/your-guide-to-good-enough-
compliance.html
Proprietary and confidential
The Guide to Secure Partner Relationships
● Admit you’re vulnerable
● Assess the risk
● Choose your partners
● Prioritize your improvements
● Monitor your environment
● Evolve

More Related Content

What's hot

Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking PresentationAmanUllah115928
 
Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionSkyport Systems
 
Security by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal SecuritySecurity by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal SecurityTara Arnold
 
Securign siem for small business
Securign   siem for small businessSecurign   siem for small business
Securign siem for small businessRajul Sthapak
 
Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service providerVishvendra Saini
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingjustyogesh
 
20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUNBrussels Legal Hackers
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญBAINIDA
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...Edureka!
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingMissStevenson1
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008Jim Geovedi
 

What's hot (20)

Ethical Hacking Presentation
Ethical Hacking PresentationEthical Hacking Presentation
Ethical Hacking Presentation
 
Active Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval ProtectionActive Directory: Modern Threats, Medieval Protection
Active Directory: Modern Threats, Medieval Protection
 
Ransomware protection
Ransomware protectionRansomware protection
Ransomware protection
 
Security by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal SecuritySecurity by Design: An Introduction to Drupal Security
Security by Design: An Introduction to Drupal Security
 
Securign siem for small business
Securign   siem for small businessSecurign   siem for small business
Securign siem for small business
 
Cybersecurity service provider
Cybersecurity service providerCybersecurity service provider
Cybersecurity service provider
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN20171106 - Privacy Design Lab - LINDDUN
20171106 - Privacy Design Lab - LINDDUN
 
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญCurrent trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
Current trends in information security โดย ผศ.ดร.ปราโมทย์ กั่วเจริญ
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
Openbar Leuven // Top 5 focus areas in cyber security linked to you digital t...
 
Sprint Secure Portfolio
Sprint Secure PortfolioSprint Secure Portfolio
Sprint Secure Portfolio
 
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
How to Become an Ethical Hacker? | Ethical Hacking Career | Ethical Hacker Sa...
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Security
SecuritySecurity
Security
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Viewers also liked

The Best PeopleMatter Features You Aren't Using - Collaborate '15 Presentation
The Best PeopleMatter Features You Aren't Using - Collaborate '15 PresentationThe Best PeopleMatter Features You Aren't Using - Collaborate '15 Presentation
The Best PeopleMatter Features You Aren't Using - Collaborate '15 PresentationSnag
 
PeopleMatter schedule webinar
PeopleMatter schedule webinarPeopleMatter schedule webinar
PeopleMatter schedule webinarSnag
 
What Great Brands Do - Collaborate '15 Presentation
What Great Brands Do - Collaborate '15 PresentationWhat Great Brands Do - Collaborate '15 Presentation
What Great Brands Do - Collaborate '15 PresentationSnag
 
Joint Employer and the NLRB: How Potential Changes May Impact All Employers
Joint Employer and the NLRB: How Potential Changes May Impact All EmployersJoint Employer and the NLRB: How Potential Changes May Impact All Employers
Joint Employer and the NLRB: How Potential Changes May Impact All EmployersSnag
 
Who Is a Joint Employer? - Collaborate '15 Presentation
Who Is a Joint Employer? - Collaborate '15 PresentationWho Is a Joint Employer? - Collaborate '15 Presentation
Who Is a Joint Employer? - Collaborate '15 PresentationSnag
 
Holiday Hiring 101
Holiday Hiring 101Holiday Hiring 101
Holiday Hiring 101Snag
 
2 New Reporting Rules for Obamacare in 2015
2 New Reporting Rules for Obamacare in 20152 New Reporting Rules for Obamacare in 2015
2 New Reporting Rules for Obamacare in 2015Snag
 
The Rising Cost of Bad Hires: How to Stay Compliant with Background Checks an...
The Rising Cost of Bad Hires: How to Stay Compliant with Background Checks an...The Rising Cost of Bad Hires: How to Stay Compliant with Background Checks an...
The Rising Cost of Bad Hires: How to Stay Compliant with Background Checks an...Snag
 
Weed, Pregnancy & Unions...Oh My! - Collaborate '15 Presentation
Weed, Pregnancy & Unions...Oh My! - Collaborate '15 PresentationWeed, Pregnancy & Unions...Oh My! - Collaborate '15 Presentation
Weed, Pregnancy & Unions...Oh My! - Collaborate '15 PresentationSnag
 
ACA Compliance Playbook - Collaborate '15 Presentation
ACA Compliance Playbook - Collaborate '15 PresentationACA Compliance Playbook - Collaborate '15 Presentation
ACA Compliance Playbook - Collaborate '15 PresentationSnag
 
PeopleMatter: Assessment Tests Screening Series
PeopleMatter: Assessment Tests Screening SeriesPeopleMatter: Assessment Tests Screening Series
PeopleMatter: Assessment Tests Screening SeriesSnag
 
PeopleMatter: Trendy I-9 Trends to Look Out for in 2015
PeopleMatter: Trendy I-9 Trends to Look Out for in 2015PeopleMatter: Trendy I-9 Trends to Look Out for in 2015
PeopleMatter: Trendy I-9 Trends to Look Out for in 2015Snag
 
Implementation 101 - Collaborate '15 Presentation
Implementation 101 - Collaborate '15 PresentationImplementation 101 - Collaborate '15 Presentation
Implementation 101 - Collaborate '15 PresentationSnag
 
Winning the War for Talent: 4 Ways to Fill Your Applicant Pool Faster and Hir...
Winning the War for Talent: 4 Ways to Fill Your Applicant Pool Faster and Hir...Winning the War for Talent: 4 Ways to Fill Your Applicant Pool Faster and Hir...
Winning the War for Talent: 4 Ways to Fill Your Applicant Pool Faster and Hir...Snag
 
I-9 for Every Hire - Collaborate '15 Presentation
I-9 for Every Hire - Collaborate '15 PresentationI-9 for Every Hire - Collaborate '15 Presentation
I-9 for Every Hire - Collaborate '15 PresentationSnag
 
Designing the Workforce of Tomorrow - Collaborate '15 Presentation
Designing the Workforce of Tomorrow - Collaborate '15 PresentationDesigning the Workforce of Tomorrow - Collaborate '15 Presentation
Designing the Workforce of Tomorrow - Collaborate '15 PresentationSnag
 
PeopleMatter: Background Checks Screening Series
PeopleMatter: Background Checks Screening SeriesPeopleMatter: Background Checks Screening Series
PeopleMatter: Background Checks Screening SeriesSnag
 
Scheduling, Shift Swapping and Tracking - Collaborate '15 Presentation
Scheduling, Shift Swapping and Tracking - Collaborate '15 PresentationScheduling, Shift Swapping and Tracking - Collaborate '15 Presentation
Scheduling, Shift Swapping and Tracking - Collaborate '15 PresentationSnag
 
PeopleMatter: Health Care Reform and What It Means for Restaurant, Retail and...
PeopleMatter: Health Care Reform and What It Means for Restaurant, Retail and...PeopleMatter: Health Care Reform and What It Means for Restaurant, Retail and...
PeopleMatter: Health Care Reform and What It Means for Restaurant, Retail and...Snag
 
Designing the Workforce of Tomorrow: 4 Ways to Get the Most Out of Your Mille...
Designing the Workforce of Tomorrow: 4 Ways to Get the Most Out of Your Mille...Designing the Workforce of Tomorrow: 4 Ways to Get the Most Out of Your Mille...
Designing the Workforce of Tomorrow: 4 Ways to Get the Most Out of Your Mille...Snag
 

Viewers also liked (20)

The Best PeopleMatter Features You Aren't Using - Collaborate '15 Presentation
The Best PeopleMatter Features You Aren't Using - Collaborate '15 PresentationThe Best PeopleMatter Features You Aren't Using - Collaborate '15 Presentation
The Best PeopleMatter Features You Aren't Using - Collaborate '15 Presentation
 
PeopleMatter schedule webinar
PeopleMatter schedule webinarPeopleMatter schedule webinar
PeopleMatter schedule webinar
 
What Great Brands Do - Collaborate '15 Presentation
What Great Brands Do - Collaborate '15 PresentationWhat Great Brands Do - Collaborate '15 Presentation
What Great Brands Do - Collaborate '15 Presentation
 
Joint Employer and the NLRB: How Potential Changes May Impact All Employers
Joint Employer and the NLRB: How Potential Changes May Impact All EmployersJoint Employer and the NLRB: How Potential Changes May Impact All Employers
Joint Employer and the NLRB: How Potential Changes May Impact All Employers
 
Who Is a Joint Employer? - Collaborate '15 Presentation
Who Is a Joint Employer? - Collaborate '15 PresentationWho Is a Joint Employer? - Collaborate '15 Presentation
Who Is a Joint Employer? - Collaborate '15 Presentation
 
Holiday Hiring 101
Holiday Hiring 101Holiday Hiring 101
Holiday Hiring 101
 
2 New Reporting Rules for Obamacare in 2015
2 New Reporting Rules for Obamacare in 20152 New Reporting Rules for Obamacare in 2015
2 New Reporting Rules for Obamacare in 2015
 
The Rising Cost of Bad Hires: How to Stay Compliant with Background Checks an...
The Rising Cost of Bad Hires: How to Stay Compliant with Background Checks an...The Rising Cost of Bad Hires: How to Stay Compliant with Background Checks an...
The Rising Cost of Bad Hires: How to Stay Compliant with Background Checks an...
 
Weed, Pregnancy & Unions...Oh My! - Collaborate '15 Presentation
Weed, Pregnancy & Unions...Oh My! - Collaborate '15 PresentationWeed, Pregnancy & Unions...Oh My! - Collaborate '15 Presentation
Weed, Pregnancy & Unions...Oh My! - Collaborate '15 Presentation
 
ACA Compliance Playbook - Collaborate '15 Presentation
ACA Compliance Playbook - Collaborate '15 PresentationACA Compliance Playbook - Collaborate '15 Presentation
ACA Compliance Playbook - Collaborate '15 Presentation
 
PeopleMatter: Assessment Tests Screening Series
PeopleMatter: Assessment Tests Screening SeriesPeopleMatter: Assessment Tests Screening Series
PeopleMatter: Assessment Tests Screening Series
 
PeopleMatter: Trendy I-9 Trends to Look Out for in 2015
PeopleMatter: Trendy I-9 Trends to Look Out for in 2015PeopleMatter: Trendy I-9 Trends to Look Out for in 2015
PeopleMatter: Trendy I-9 Trends to Look Out for in 2015
 
Implementation 101 - Collaborate '15 Presentation
Implementation 101 - Collaborate '15 PresentationImplementation 101 - Collaborate '15 Presentation
Implementation 101 - Collaborate '15 Presentation
 
Winning the War for Talent: 4 Ways to Fill Your Applicant Pool Faster and Hir...
Winning the War for Talent: 4 Ways to Fill Your Applicant Pool Faster and Hir...Winning the War for Talent: 4 Ways to Fill Your Applicant Pool Faster and Hir...
Winning the War for Talent: 4 Ways to Fill Your Applicant Pool Faster and Hir...
 
I-9 for Every Hire - Collaborate '15 Presentation
I-9 for Every Hire - Collaborate '15 PresentationI-9 for Every Hire - Collaborate '15 Presentation
I-9 for Every Hire - Collaborate '15 Presentation
 
Designing the Workforce of Tomorrow - Collaborate '15 Presentation
Designing the Workforce of Tomorrow - Collaborate '15 PresentationDesigning the Workforce of Tomorrow - Collaborate '15 Presentation
Designing the Workforce of Tomorrow - Collaborate '15 Presentation
 
PeopleMatter: Background Checks Screening Series
PeopleMatter: Background Checks Screening SeriesPeopleMatter: Background Checks Screening Series
PeopleMatter: Background Checks Screening Series
 
Scheduling, Shift Swapping and Tracking - Collaborate '15 Presentation
Scheduling, Shift Swapping and Tracking - Collaborate '15 PresentationScheduling, Shift Swapping and Tracking - Collaborate '15 Presentation
Scheduling, Shift Swapping and Tracking - Collaborate '15 Presentation
 
PeopleMatter: Health Care Reform and What It Means for Restaurant, Retail and...
PeopleMatter: Health Care Reform and What It Means for Restaurant, Retail and...PeopleMatter: Health Care Reform and What It Means for Restaurant, Retail and...
PeopleMatter: Health Care Reform and What It Means for Restaurant, Retail and...
 
Designing the Workforce of Tomorrow: 4 Ways to Get the Most Out of Your Mille...
Designing the Workforce of Tomorrow: 4 Ways to Get the Most Out of Your Mille...Designing the Workforce of Tomorrow: 4 Ways to Get the Most Out of Your Mille...
Designing the Workforce of Tomorrow: 4 Ways to Get the Most Out of Your Mille...
 

Similar to Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptxBinod Rimal
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfAnanthReddy38
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systemsmsd11
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badbanerjeea
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineeringSweta Kumari Barnwal
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - IdealwareIdealware
 

Similar to Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation (20)

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Cloud Security.pptx
Cloud Security.pptxCloud Security.pptx
Cloud Security.pptx
 
Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
 
Network Security
Network SecurityNetwork Security
Network Security
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
 
introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)introduction of ethical hacking. (ppt)
introduction of ethical hacking. (ppt)
 
introduction of ethical hacking. ppt
introduction of ethical hacking. pptintroduction of ethical hacking. ppt
introduction of ethical hacking. ppt
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 

More from Snag

Everything you need to know to complete the I-9 form
Everything you need to know to complete the I-9 formEverything you need to know to complete the I-9 form
Everything you need to know to complete the I-9 formSnag
 
Hire Faster this Summer & Beyond: 2018 Summer Hiring Report
Hire Faster this Summer & Beyond: 2018 Summer Hiring ReportHire Faster this Summer & Beyond: 2018 Summer Hiring Report
Hire Faster this Summer & Beyond: 2018 Summer Hiring ReportSnag
 
Uncovering the Underemployed: 2018 State of the Hourly Worker Report
Uncovering the Underemployed: 2018 State of the Hourly Worker ReportUncovering the Underemployed: 2018 State of the Hourly Worker Report
Uncovering the Underemployed: 2018 State of the Hourly Worker ReportSnag
 
Top 3 Reasons You Need Machine Learning and Chatbots to Power Your Recruiting
Top 3 Reasons You Need Machine Learning and Chatbots to Power Your RecruitingTop 3 Reasons You Need Machine Learning and Chatbots to Power Your Recruiting
Top 3 Reasons You Need Machine Learning and Chatbots to Power Your RecruitingSnag
 
6 Surprising Hourly Job Seeker Insights | Snagajob
6 Surprising Hourly Job Seeker Insights | Snagajob6 Surprising Hourly Job Seeker Insights | Snagajob
6 Surprising Hourly Job Seeker Insights | SnagajobSnag
 
Reclaim your time with schedule software and team messaging | Free webinar | ...
Reclaim your time with schedule software and team messaging | Free webinar | ...Reclaim your time with schedule software and team messaging | Free webinar | ...
Reclaim your time with schedule software and team messaging | Free webinar | ...Snag
 
New Form I-9 Changes—Here's what you need to know before Sept. 18, 2017 | Sna...
New Form I-9 Changes—Here's what you need to know before Sept. 18, 2017 | Sna...New Form I-9 Changes—Here's what you need to know before Sept. 18, 2017 | Sna...
New Form I-9 Changes—Here's what you need to know before Sept. 18, 2017 | Sna...Snag
 
[Webinar] Successful Back-to-school Hiring Strategies | Snagajob
[Webinar] Successful Back-to-school Hiring Strategies | Snagajob[Webinar] Successful Back-to-school Hiring Strategies | Snagajob
[Webinar] Successful Back-to-school Hiring Strategies | SnagajobSnag
 
Snagajob | The New Rules of Getting Your Jobs to Show Up on Google
Snagajob | The New Rules of Getting Your Jobs to Show Up on GoogleSnagajob | The New Rules of Getting Your Jobs to Show Up on Google
Snagajob | The New Rules of Getting Your Jobs to Show Up on GoogleSnag
 
Drugs, FMLA & Workplace Investigations Webinar | Snagajob
Drugs, FMLA & Workplace Investigations Webinar | SnagajobDrugs, FMLA & Workplace Investigations Webinar | Snagajob
Drugs, FMLA & Workplace Investigations Webinar | SnagajobSnag
 
[Webinar] Supercharge Your Candidate Experience | Snagajob
[Webinar] Supercharge Your Candidate Experience | Snagajob[Webinar] Supercharge Your Candidate Experience | Snagajob
[Webinar] Supercharge Your Candidate Experience | SnagajobSnag
 
When & How to Hire Great People
When & How to Hire Great PeopleWhen & How to Hire Great People
When & How to Hire Great PeopleSnag
 
Your Ultimate Hourly Insights Guide: What do your hourly employees really want?
Your Ultimate Hourly Insights Guide: What do your hourly employees really want?Your Ultimate Hourly Insights Guide: What do your hourly employees really want?
Your Ultimate Hourly Insights Guide: What do your hourly employees really want?Snag
 
Ready for the New Form I-9? A Step-by-Step Guide to 100% I-9 Compliance in 2017
Ready for the New Form I-9? A Step-by-Step Guide to 100% I-9 Compliance in 2017Ready for the New Form I-9? A Step-by-Step Guide to 100% I-9 Compliance in 2017
Ready for the New Form I-9? A Step-by-Step Guide to 100% I-9 Compliance in 2017Snag
 
Top 5 Labor and Employment Law Trends for 2017
Top 5 Labor and Employment Law Trends for 2017Top 5 Labor and Employment Law Trends for 2017
Top 5 Labor and Employment Law Trends for 2017Snag
 
The New Overtime Regulation: What You Need To Know
The New Overtime Regulation: What You Need To KnowThe New Overtime Regulation: What You Need To Know
The New Overtime Regulation: What You Need To KnowSnag
 
The Secret to Successful Job Postings: Understanding Job Seeker Behavior to M...
The Secret to Successful Job Postings: Understanding Job Seeker Behavior to M...The Secret to Successful Job Postings: Understanding Job Seeker Behavior to M...
The Secret to Successful Job Postings: Understanding Job Seeker Behavior to M...Snag
 
2016 Holiday Hiring Game Plan
2016 Holiday Hiring Game Plan2016 Holiday Hiring Game Plan
2016 Holiday Hiring Game PlanSnag
 
The Real Deal on Form I-9: Breaking Down Proposed Changes, I-9 Myths & Inside...
The Real Deal on Form I-9: Breaking Down Proposed Changes, I-9 Myths & Inside...The Real Deal on Form I-9: Breaking Down Proposed Changes, I-9 Myths & Inside...
The Real Deal on Form I-9: Breaking Down Proposed Changes, I-9 Myths & Inside...Snag
 
The Science of Talent Attraction: What Matters to Modern Candidates and What ...
The Science of Talent Attraction: What Matters to Modern Candidates and What ...The Science of Talent Attraction: What Matters to Modern Candidates and What ...
The Science of Talent Attraction: What Matters to Modern Candidates and What ...Snag
 

More from Snag (20)

Everything you need to know to complete the I-9 form
Everything you need to know to complete the I-9 formEverything you need to know to complete the I-9 form
Everything you need to know to complete the I-9 form
 
Hire Faster this Summer & Beyond: 2018 Summer Hiring Report
Hire Faster this Summer & Beyond: 2018 Summer Hiring ReportHire Faster this Summer & Beyond: 2018 Summer Hiring Report
Hire Faster this Summer & Beyond: 2018 Summer Hiring Report
 
Uncovering the Underemployed: 2018 State of the Hourly Worker Report
Uncovering the Underemployed: 2018 State of the Hourly Worker ReportUncovering the Underemployed: 2018 State of the Hourly Worker Report
Uncovering the Underemployed: 2018 State of the Hourly Worker Report
 
Top 3 Reasons You Need Machine Learning and Chatbots to Power Your Recruiting
Top 3 Reasons You Need Machine Learning and Chatbots to Power Your RecruitingTop 3 Reasons You Need Machine Learning and Chatbots to Power Your Recruiting
Top 3 Reasons You Need Machine Learning and Chatbots to Power Your Recruiting
 
6 Surprising Hourly Job Seeker Insights | Snagajob
6 Surprising Hourly Job Seeker Insights | Snagajob6 Surprising Hourly Job Seeker Insights | Snagajob
6 Surprising Hourly Job Seeker Insights | Snagajob
 
Reclaim your time with schedule software and team messaging | Free webinar | ...
Reclaim your time with schedule software and team messaging | Free webinar | ...Reclaim your time with schedule software and team messaging | Free webinar | ...
Reclaim your time with schedule software and team messaging | Free webinar | ...
 
New Form I-9 Changes—Here's what you need to know before Sept. 18, 2017 | Sna...
New Form I-9 Changes—Here's what you need to know before Sept. 18, 2017 | Sna...New Form I-9 Changes—Here's what you need to know before Sept. 18, 2017 | Sna...
New Form I-9 Changes—Here's what you need to know before Sept. 18, 2017 | Sna...
 
[Webinar] Successful Back-to-school Hiring Strategies | Snagajob
[Webinar] Successful Back-to-school Hiring Strategies | Snagajob[Webinar] Successful Back-to-school Hiring Strategies | Snagajob
[Webinar] Successful Back-to-school Hiring Strategies | Snagajob
 
Snagajob | The New Rules of Getting Your Jobs to Show Up on Google
Snagajob | The New Rules of Getting Your Jobs to Show Up on GoogleSnagajob | The New Rules of Getting Your Jobs to Show Up on Google
Snagajob | The New Rules of Getting Your Jobs to Show Up on Google
 
Drugs, FMLA & Workplace Investigations Webinar | Snagajob
Drugs, FMLA & Workplace Investigations Webinar | SnagajobDrugs, FMLA & Workplace Investigations Webinar | Snagajob
Drugs, FMLA & Workplace Investigations Webinar | Snagajob
 
[Webinar] Supercharge Your Candidate Experience | Snagajob
[Webinar] Supercharge Your Candidate Experience | Snagajob[Webinar] Supercharge Your Candidate Experience | Snagajob
[Webinar] Supercharge Your Candidate Experience | Snagajob
 
When & How to Hire Great People
When & How to Hire Great PeopleWhen & How to Hire Great People
When & How to Hire Great People
 
Your Ultimate Hourly Insights Guide: What do your hourly employees really want?
Your Ultimate Hourly Insights Guide: What do your hourly employees really want?Your Ultimate Hourly Insights Guide: What do your hourly employees really want?
Your Ultimate Hourly Insights Guide: What do your hourly employees really want?
 
Ready for the New Form I-9? A Step-by-Step Guide to 100% I-9 Compliance in 2017
Ready for the New Form I-9? A Step-by-Step Guide to 100% I-9 Compliance in 2017Ready for the New Form I-9? A Step-by-Step Guide to 100% I-9 Compliance in 2017
Ready for the New Form I-9? A Step-by-Step Guide to 100% I-9 Compliance in 2017
 
Top 5 Labor and Employment Law Trends for 2017
Top 5 Labor and Employment Law Trends for 2017Top 5 Labor and Employment Law Trends for 2017
Top 5 Labor and Employment Law Trends for 2017
 
The New Overtime Regulation: What You Need To Know
The New Overtime Regulation: What You Need To KnowThe New Overtime Regulation: What You Need To Know
The New Overtime Regulation: What You Need To Know
 
The Secret to Successful Job Postings: Understanding Job Seeker Behavior to M...
The Secret to Successful Job Postings: Understanding Job Seeker Behavior to M...The Secret to Successful Job Postings: Understanding Job Seeker Behavior to M...
The Secret to Successful Job Postings: Understanding Job Seeker Behavior to M...
 
2016 Holiday Hiring Game Plan
2016 Holiday Hiring Game Plan2016 Holiday Hiring Game Plan
2016 Holiday Hiring Game Plan
 
The Real Deal on Form I-9: Breaking Down Proposed Changes, I-9 Myths & Inside...
The Real Deal on Form I-9: Breaking Down Proposed Changes, I-9 Myths & Inside...The Real Deal on Form I-9: Breaking Down Proposed Changes, I-9 Myths & Inside...
The Real Deal on Form I-9: Breaking Down Proposed Changes, I-9 Myths & Inside...
 
The Science of Talent Attraction: What Matters to Modern Candidates and What ...
The Science of Talent Attraction: What Matters to Modern Candidates and What ...The Science of Talent Attraction: What Matters to Modern Candidates and What ...
The Science of Talent Attraction: What Matters to Modern Candidates and What ...
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation

  • 1. Proprietary and confidential Will My SaaS Provider Leak My Corporate Data?
  • 2. Proprietary and confidential A Strategic Guide to Avoiding System and Network Breaches “Against a sufficiently skilled, funded and motivated attacker, all networks are vulnerable. But good security makes many kinds of attack harder, costlier and riskier. Against attackers who aren’t sufficiently skilled, good security may protect you completely.” BRUCE SCHNEIER Dec. 19, 2014 —Chief Technology Officer of Resilient Systems, a fellow at Harvard's Berkman Center, and a board member of EFF
  • 3. Proprietary and confidential Overview Who’s Really Vulnerable? Spoiler: it’s all of us. What am I afraid of? Share your story Can I Trust This Guy? Focused topics on (not) sharing data
  • 5. Proprietary and confidential What Am I Afraid Of? Part 1: What top 2 or 3 things scare you the most about your current situation?
  • 6. Proprietary and confidential What Am I Afraid Of? Part 2: ● What makes you interested in Security today? ● What do you hope to get from today’s discussion?
  • 7. Proprietary and confidential What’s on Our Mind? ● Does my provider know what they’re doing? ● PCI compliance will protect me ● How secure is my system ● How other people failed ● How much is security worth ● ...Others?
  • 8. Proprietary and confidential Does my provider know what they’re doing? ● Is SaaS provider more knowledgeable and experienced than my staff? ● Is provider more scalable than my staff/systems? ● Who owns the data? ● Can they answer the hard questions?
  • 9. Proprietary and confidential The Hard Questions ● Security: The system is protected, both logically and physically, against unauthorized access. ● Availability: The system is available for operation and use as committed or agreed to. ● Processing Integrity: System processing is complete, accurate, timely, and authorized. ● Confidentiality: Information that is designated “confidential” is protected as committed or agreed. ● Privacy: Personal information is collected, used, retained, and disclosed in conformity with the commitments in the entity’s privacy notice and with the privacy principles put forth by the American Institute of Certified Public Accountants (AICPA) and the Canadian Institute of Chartered Accountants (CICA).
  • 10. Proprietary and confidential SOC2 ● Operation conforms to strict and detailed standards ● Adherence verified continually ● Formal audit by third party
  • 11. Proprietary and confidential PCI Compliance Will Protect Me ● Gaps ● Strengths ● Evolution
  • 12. Proprietary and confidential How Secure Is My Own System Can you tell if your system was penetrated today? Are you using… ● Malware scanning ● IDS/IPS ● Vulnerability scanning Do your users know how to... ● Use strong passwords ● React to Pfishing ● Recognize fake sites
  • 13. Proprietary and confidential How Other People Failed ● Attacks in the news ● Common attacks
  • 14. Proprietary and confidential How Much Is Security Worth “Sony made its situation worse by having substandard security.” BRUCE SCHNEIER Sony Pictures’ executive director of information security Jason Spaltro told CIO Magazine in 2007 that it may be “a valid business decision to accept the risk” of a security breach. http://www.cio.com/article/2439324/risk- management/your-guide-to-good-enough- compliance.html
  • 15. Proprietary and confidential The Guide to Secure Partner Relationships ● Admit you’re vulnerable ● Assess the risk ● Choose your partners ● Prioritize your improvements ● Monitor your environment ● Evolve