SlideShare a Scribd company logo
STYLE
HAVEN
VISIO
N
MISSION
Chief Information
Security Officer
Data Protection Officer
Governance
MARKETING
INVENTOR
Y
CUSTOMER
DATA
SALE
S
SUPPLIER
DATA
FINANCIAL
DATA
WE
PROVIDE
Includes personal information like names, address,
contact details and demographics of the customer. To
understand customer preferences, purchasing behavior
and enables targeted marketing campaigns.
Captures information about the products sold, the
prices, quantities and transaction details. Support
in tracking sales performance, inventory
management and identifying popular products.
The availability of stock products, quantities, locations
and replenishment schedules. Assist in managing
stock levels, forecasting demand and ensuring smooth
supply chain operations.
Handle financial such as revenue, expenses, profit
margins and cash flow information. Monitoring
financial information performance, budgetting, and
making informed business decisions.
Gathering information related to marketing campaigns,
advertising efforts, customer responses and engagement
metrics. Can help in evaluating the effectiveness of
marketing strategies and optimizing future campaigns.
Information about the suppliers, the contact details,
product catalogs, pricing and delivery schedules. Builds
a managing relationships with suppliers, tracking orders
and ensuring timely deliveries.
Data
Breaches
AI and
Deepfake
Threats
Insider
Threats
DDoS
Attacks
POS System
attack
CYBERSECURITY
AND
DATA PRIVACY THREATS
Unauthorized access
to sensitive data,
often through
hacking, leading to
exposure or theft of
personal or corporate
information.
Misuse of artificial
intelligence for
malicious purposes,
including creating
convincing fake
content.
Malicious actions or
negligence by
employees or
insiders who have
access to sensitive
data.
Distributed Denial of
Service attacks
overwhelm a system
or network, making
it unavailable to
users.
Cybercriminals may
attempt to
compromise the retail
company’s payment
terminals or networks
to steal credit card
information during
transactions.
C Y B E R S E C U R I T Y
T H R E A T
WEBINAR
WEDNESDAY, September 20,2013-5:30pm-7:00pm
University of the Visayas-Main Campus
OBJECTIVES
To gain an understanding of Cybersecurity Threats to
prevent and mitigate cybersecurity incidents.
SPEAKERS
• Marie Jessa V. Congson
3rd year BSBA-Human Resource Management
• Mica Marie Sarabia
4th year BSBA-Marketing Management
• Patricia A. Selma
4th year BSBA-Marketing Management
• Christine Lloa
3rd year BSBA-Marketing Management
• Joan Orquia
3rd year BSBA-Marketing Management
CYBERSECURITY THREAT
-Is a threat refers to any potential event or circumstance that can exploit vulnerabilities in computer systems,
networks, or dat, leading to harm, damage, unauthorized access, data breaches, or disruption of operations.
is unauthorized access and theft of
sensitive data, often for financial gain or
espionage.
-It can be the consequence of an
accidental event or intentional action to
steal information from an individual or
organization.
DATA BREACHES
HOW DOES
THE THREAT
HAPPEN?
In Cybersecurity, data breaches happens when unauthorized
people access private or sensitive information without
authorization. These threat can happened in a variety of ways,
but the following are some common ones:
• Phishing Attacks
• Malware Infections
• Weak or Stolen Credentials
• Insider Threats
• Vulnerabilities and Exploits
• Third-Party Attacks
WHO
ARE THE
USUAL
VICTIMS
OF THIS
THREAT?
Blue Dark Professional Geometric Business Project Presentation  (1).pptx

More Related Content

Similar to Blue Dark Professional Geometric Business Project Presentation (1).pptx

'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
FortuneCMO, LLC
 
Understanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdfUnderstanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdf
Eracom Technologies
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
Priyanka Aash
 
Data mining
Data miningData mining
Data mining
udhaysweety
 
Big data: What's the big deal?
Big data: What's the big deal?Big data: What's the big deal?
Big data: What's the big deal?
Penser
 
2016_William_Gibson
2016_William_Gibson2016_William_Gibson
2016_William_Gibson
Bill Gibson
 
Who needs business intelligence?
Who needs business intelligence?Who needs business intelligence?
Who needs business intelligence?
Norman Manley
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Peter1020
 
Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data Breaches
Ethisphere
 
MANOHAR RAO T - Risk Role
MANOHAR RAO T  -  Risk RoleMANOHAR RAO T  -  Risk Role
MANOHAR RAO T - Risk Role
Manohar Rao. MBA Finance, ISO 27001
 
What I found in my data: True data security stories
What I found in my data: True data security storiesWhat I found in my data: True data security stories
What I found in my data: True data security stories
DataGravity
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
CBIZ, Inc.
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
IRJET Journal
 
How To Navigate AI - The Future is Yours to Define - Tim Hayden
How To Navigate AI - The Future is Yours to Define - Tim HaydenHow To Navigate AI - The Future is Yours to Define - Tim Hayden
How To Navigate AI - The Future is Yours to Define - Tim Hayden
DigiMarCon - Digital Marketing, Media and Advertising Conferences & Exhibitions
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
Dunton Environmental
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
CXO 2.0 Conference
 
Brodrick's resume
Brodrick's resume Brodrick's resume
Brodrick's resume
Brodrick Nettles
 
Data mining
Data miningData mining
Data mining
Gagan Mittal
 
Managing complaints from electronic frauds and achieving customers
Managing complaints from electronic frauds and achieving customersManaging complaints from electronic frauds and achieving customers
Managing complaints from electronic frauds and achieving customers
Talent Ajieh
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_Richey
Peter Tran
 

Similar to Blue Dark Professional Geometric Business Project Presentation (1).pptx (20)

'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
'HOW SECURE IS YOUR MARKETING TRANSFORMATION' RSA CMO Cybersecurity SURVEY
 
Understanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdfUnderstanding Website Data Security And Its Importance.pdf
Understanding Website Data Security And Its Importance.pdf
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
 
Data mining
Data miningData mining
Data mining
 
Big data: What's the big deal?
Big data: What's the big deal?Big data: What's the big deal?
Big data: What's the big deal?
 
2016_William_Gibson
2016_William_Gibson2016_William_Gibson
2016_William_Gibson
 
Who needs business intelligence?
Who needs business intelligence?Who needs business intelligence?
Who needs business intelligence?
 
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Digital Outsourcing: Risks, Pitfalls, and Security Considerations
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
 
Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data Breaches
 
MANOHAR RAO T - Risk Role
MANOHAR RAO T  -  Risk RoleMANOHAR RAO T  -  Risk Role
MANOHAR RAO T - Risk Role
 
What I found in my data: True data security stories
What I found in my data: True data security storiesWhat I found in my data: True data security stories
What I found in my data: True data security stories
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
How To Navigate AI - The Future is Yours to Define - Tim Hayden
How To Navigate AI - The Future is Yours to Define - Tim HaydenHow To Navigate AI - The Future is Yours to Define - Tim Hayden
How To Navigate AI - The Future is Yours to Define - Tim Hayden
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
Brodrick's resume
Brodrick's resume Brodrick's resume
Brodrick's resume
 
Data mining
Data miningData mining
Data mining
 
Managing complaints from electronic frauds and achieving customers
Managing complaints from electronic frauds and achieving customersManaging complaints from electronic frauds and achieving customers
Managing complaints from electronic frauds and achieving customers
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_Richey
 

Recently uploaded

Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
APCO
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdfHOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
46adnanshahzad
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
SalesTown
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
ssuser567e2d
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 

Recently uploaded (20)

Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
The APCO Geopolitical Radar - Q3 2024 The Global Operating Environment for Bu...
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdfHOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Chapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .pptChapter 7 Final business management sciences .ppt
Chapter 7 Final business management sciences .ppt
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 

Blue Dark Professional Geometric Business Project Presentation (1).pptx

  • 1.
  • 5. Chief Information Security Officer Data Protection Officer Governance
  • 6. MARKETING INVENTOR Y CUSTOMER DATA SALE S SUPPLIER DATA FINANCIAL DATA WE PROVIDE Includes personal information like names, address, contact details and demographics of the customer. To understand customer preferences, purchasing behavior and enables targeted marketing campaigns. Captures information about the products sold, the prices, quantities and transaction details. Support in tracking sales performance, inventory management and identifying popular products. The availability of stock products, quantities, locations and replenishment schedules. Assist in managing stock levels, forecasting demand and ensuring smooth supply chain operations. Handle financial such as revenue, expenses, profit margins and cash flow information. Monitoring financial information performance, budgetting, and making informed business decisions. Gathering information related to marketing campaigns, advertising efforts, customer responses and engagement metrics. Can help in evaluating the effectiveness of marketing strategies and optimizing future campaigns. Information about the suppliers, the contact details, product catalogs, pricing and delivery schedules. Builds a managing relationships with suppliers, tracking orders and ensuring timely deliveries.
  • 7. Data Breaches AI and Deepfake Threats Insider Threats DDoS Attacks POS System attack CYBERSECURITY AND DATA PRIVACY THREATS Unauthorized access to sensitive data, often through hacking, leading to exposure or theft of personal or corporate information. Misuse of artificial intelligence for malicious purposes, including creating convincing fake content. Malicious actions or negligence by employees or insiders who have access to sensitive data. Distributed Denial of Service attacks overwhelm a system or network, making it unavailable to users. Cybercriminals may attempt to compromise the retail company’s payment terminals or networks to steal credit card information during transactions.
  • 8. C Y B E R S E C U R I T Y T H R E A T WEBINAR WEDNESDAY, September 20,2013-5:30pm-7:00pm University of the Visayas-Main Campus
  • 9. OBJECTIVES To gain an understanding of Cybersecurity Threats to prevent and mitigate cybersecurity incidents. SPEAKERS • Marie Jessa V. Congson 3rd year BSBA-Human Resource Management • Mica Marie Sarabia 4th year BSBA-Marketing Management • Patricia A. Selma 4th year BSBA-Marketing Management • Christine Lloa 3rd year BSBA-Marketing Management • Joan Orquia 3rd year BSBA-Marketing Management
  • 10. CYBERSECURITY THREAT -Is a threat refers to any potential event or circumstance that can exploit vulnerabilities in computer systems, networks, or dat, leading to harm, damage, unauthorized access, data breaches, or disruption of operations. is unauthorized access and theft of sensitive data, often for financial gain or espionage. -It can be the consequence of an accidental event or intentional action to steal information from an individual or organization. DATA BREACHES
  • 11. HOW DOES THE THREAT HAPPEN? In Cybersecurity, data breaches happens when unauthorized people access private or sensitive information without authorization. These threat can happened in a variety of ways, but the following are some common ones: • Phishing Attacks • Malware Infections • Weak or Stolen Credentials • Insider Threats • Vulnerabilities and Exploits • Third-Party Attacks