SlideShare a Scribd company logo
1 of 17
Download to read offline
DATA BREACH RISK INTELLIGENCE
FOR HIGHER ED
Financial prioritization of data breach risk in the
language of the C-suite
WHY?
Almost 1 million records were
stolen from just the top five
universities breached in 2014.
Data breaches are becoming front
and center in Boardrooms at
Higher Ed institutions.
…Yet data breach tools are
developed for yesterday’s IT.
Slow, disruptive to
students & staff
Discover data or
vulnerabilities, but not
both
Results not ready for
CFO and Board
presentations
False positives, unable to
scan largest servers
Not effective on Mac and
other platforms
ISCAN RISK INTELLIGENCE 

in dollars
prioritized
real-time
trends
Financial prioritization of data breach risk in the language of the C-suite
One tool does
it all
• Sensitive data
• Who has access
• Vulnerabilities
Know your
security number
Dollar value of risk liability per
device
Actionable
intelligence
Total risk exposure of
organization
C-level ready
dashboard
• Evidence of impact
• Board oversight
ISCAN ANSWERS KEY QUESTIONS FOR CISOS
What data is
at risk and
who has
access?
How can
attackers get
to it?
What will it
cost when
breached?
HOW ISCAN IS DIFFERENT
• Deploys rapidly, scans are faster and more accurate
• Detects big 3: sensitive data, access permissions and
vulnerabilities
• Admins can find hacker traps
• Provides actionable intelligence and financially
prioritizes data breach risk
• C-suite ready dashboard puts a dollar number on
your risk exposure
• Works well with popular education environments/
devices like Mac, iO, Ubuntu and Linux choices
All in
one tool
HOW DO WE DO IT? PATENTED
AGENTLESS DISCOVERY
Mobile
app
Command
line
Constant auto assessment across
all device types
Cloud-based lightweight
deployment with same day results
Millions of devices at one time
Active directory
Potential liability $
Data at Risk
• Social Security
numbers
• Driver’s licenses
• Birthdates
• Telephone numbers
• Credit card numbers
• Bank accounts
• Intellectual property
• Sensitive files
DATA BREACH RISK REPORT
PER DEVICE
Vulnerabilities
By severity
By vendor
Unauthorized
access
Configurations
INTELLIGENCE DASHBOARD
Like a Google map of your assets
Immediate liability costs/
prioritization displayed for
decision-making
Trends for tracking the impact of
initiatives
Ready for the Boardroom
INTEGRATION
Works with existing
technology investments in
Systems Management
and RMM tools
iScan Leading
competitor
Automatically find SSNs, IDs, Bank Accounts, Driver Licenses, Dates of Birth, Phone
Numbers, Addresses, Passports, Intellectual Property, Credit Cards, Patient Health Info
Find file patterns and MD5/SHA hashes – finds data theft artifacts, such as Cryptolocker, and
use for incidence response
Search files, e-mails and attachments on:
• File servers
• .zip files
• Outlook, Thunderbird, Apple Mail +
• Cloud storage folders including Dropbox, Skydrive, Google Drive, Box, Amazon Cloud Drive,
and more
• NAS
Search files on websites *
Search even the largest servers (1 TB+)
Schedule searches **
HOW WE COMPARE 1/3
* iScan searches the databases where form fill data resides
** iScan integrates with existing infrastructure for scheduled searches
iScan Leading
competitor
Works on:
• Windows XP - 8.1
• Windows Server - 2003 – 2012
• Linux 64 bit - RHEL 5+
• Mac OS X
Works on:
• CentOS 5+ Linux
• Oracle Linux
• Ubuntu
• Fedora
Works on mobile devices like tablets and smartphones
• Apple iOS 5 +
• Android 2.3 +
Effectively search both Mac and PC platforms
Manage data discovery without an agent
Non-intrusive, does not require scaling down resources on device
HOW WE COMPARE 2/3
HOW WE COMPARE 3/3 iScan Leading
competitor
View and manage by university, department or any sub group
Audit 3rd party devices “on the fly”
Receive results in your inbox daily
Fastest scanning available
Same day scalable implementation and results
Vulnerability scanning (How will data be breached)
View file permission access to sensitive data
Automatically calculates dollar value liability & financially prioritizes
Trend charts for monitoring impact
Intelligence dashboard for C-suite
One tool for data, access & vulnerabilities, and C-suite dashboard
IVY LEAGUE
UNIVERSITY
“We use iScan to report the
financial impact to our
Boardroom.
It also empowers our
students to self-assess their
computers.”
LIBERAL ARTS
UNIVERSITY
“We chose iScan Online as
the only vendor that could
complete the discovery of
sensitive data on our multi-
terabyte servers.”
RECOGNITION
Industry Innovator:
Analysis & Control
REMOTE SECURITY
SELF-ASSESSMENT
FRAMEWORK
Patent 9,032,520
Patent 8,819,773
TRY US FOR FREE
Sign up at
https://app.iscanonline.com/
THANK YOU
iscanonline.com

More Related Content

What's hot

AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security CrossroadsAMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security CrossroadsIvanti
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSridhar Karnam
 
AMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to StartAMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to StartIvanti
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringBooz Allen Hamilton
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Managementicomply
 
CNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk ManagementCNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk ManagementSam Bowne
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3aGene Kim
 
Information technology risks
Information technology risksInformation technology risks
Information technology riskssalman butt
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample ReportRandy James
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)Gabby Nizri
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsIgnyte Assurance Platform
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalOscar Williams
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergySec
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral AnalyticsInterset
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
Trust and Transformation: Peter Coffee at Cloud@KM 20110503
Trust and Transformation: Peter Coffee at Cloud@KM 20110503Trust and Transformation: Peter Coffee at Cloud@KM 20110503
Trust and Transformation: Peter Coffee at Cloud@KM 20110503Peter Coffee
 

What's hot (20)

AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security CrossroadsAMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
AMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to StartAMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
AMB110: IT Asset Management – How to Start When You Don’t Know Where to Start
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous Monitoring
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
CNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk ManagementCNIT 160 3a Information Risk Management
CNIT 160 3a Information Risk Management
 
3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a3 2006 06 cs6 4 gait principles v3a
3 2006 06 cs6 4 gait principles v3a
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
Audit Sample Report
Audit Sample ReportAudit Sample Report
Audit Sample Report
 
Network operations center best practices (3)
Network operations center best practices (3)Network operations center best practices (3)
Network operations center best practices (3)
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply ChainsFortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
 
SOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_DigitalSOC3D_Brochure_NEW_Digital
SOC3D_Brochure_NEW_Digital
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Trust and Transformation: Peter Coffee at Cloud@KM 20110503
Trust and Transformation: Peter Coffee at Cloud@KM 20110503Trust and Transformation: Peter Coffee at Cloud@KM 20110503
Trust and Transformation: Peter Coffee at Cloud@KM 20110503
 

Similar to Data Breach Risk Intelligence for Higher Education

Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Priyanka Aash
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseResilient Systems
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016FitCEO, Inc. (FCI)
 
QRadar Security Intelligence Overview.pptx
QRadar Security Intelligence Overview.pptxQRadar Security Intelligence Overview.pptx
QRadar Security Intelligence Overview.pptxDmitry718707
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draftEoin Keary
 
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and NumbersApplication Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and NumbersDenim Group
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunk
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityAIS Network
 
Using Big Data for Cybersecurity
Using Big Data for CybersecurityUsing Big Data for Cybersecurity
Using Big Data for CybersecuritySplunk
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesBlack Duck by Synopsys
 
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...EC-Council
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMAlienVault
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...TI Safe
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0James Perry, Jr.
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksMicrosoft
 

Similar to Data Breach Risk Intelligence for Higher Education (20)

Data Breach Risk Intelligence
Data Breach Risk IntelligenceData Breach Risk Intelligence
Data Breach Risk Intelligence
 
Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
 
Data exfiltration so many threats 2016
Data exfiltration so many threats 2016Data exfiltration so many threats 2016
Data exfiltration so many threats 2016
 
QRadar Security Intelligence Overview.pptx
QRadar Security Intelligence Overview.pptxQRadar Security Intelligence Overview.pptx
QRadar Security Intelligence Overview.pptx
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and NumbersApplication Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
 
SplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSASplunkLive! Customer Presentation - SSA
SplunkLive! Customer Presentation - SSA
 
Managing IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing VulnerabilityManaging IT Risk and Assessing Vulnerability
Managing IT Risk and Assessing Vulnerability
 
Using Big Data for Cybersecurity
Using Big Data for CybersecurityUsing Big Data for Cybersecurity
Using Big Data for Cybersecurity
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 
Data Science for Cyber Risk
Data Science for Cyber RiskData Science for Cyber Risk
Data Science for Cyber Risk
 
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
TakeDownCon Rocket City: Research Advancements Towards Protecting Critical As...
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
CLASS 2018 - Palestra de Denis Prado (Security Intelligence Sales Leader Lati...
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
How to protect your corporate from advanced attacks
How to protect your corporate from advanced attacksHow to protect your corporate from advanced attacks
How to protect your corporate from advanced attacks
 

More from MAX Risk Intelligence by LOGICnow (6)

Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015
 
iScan Risk Intelligence for Regional Banks
iScan Risk Intelligence for Regional BanksiScan Risk Intelligence for Regional Banks
iScan Risk Intelligence for Regional Banks
 
5 Phrases Every Security Chief Needs to Speak - Business
5 Phrases Every Security Chief Needs to Speak - Business5 Phrases Every Security Chief Needs to Speak - Business
5 Phrases Every Security Chief Needs to Speak - Business
 
5 Data Breach Charts for the Board Room
5 Data Breach Charts for the Board Room5 Data Breach Charts for the Board Room
5 Data Breach Charts for the Board Room
 
BYOD Security Scanning
BYOD Security ScanningBYOD Security Scanning
BYOD Security Scanning
 
iScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task ForceiScan Online - PCI DSS Mobile Task Force
iScan Online - PCI DSS Mobile Task Force
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Data Breach Risk Intelligence for Higher Education

  • 1. DATA BREACH RISK INTELLIGENCE FOR HIGHER ED Financial prioritization of data breach risk in the language of the C-suite
  • 2. WHY? Almost 1 million records were stolen from just the top five universities breached in 2014. Data breaches are becoming front and center in Boardrooms at Higher Ed institutions. …Yet data breach tools are developed for yesterday’s IT. Slow, disruptive to students & staff Discover data or vulnerabilities, but not both Results not ready for CFO and Board presentations False positives, unable to scan largest servers Not effective on Mac and other platforms
  • 3. ISCAN RISK INTELLIGENCE 
 in dollars prioritized real-time trends Financial prioritization of data breach risk in the language of the C-suite One tool does it all • Sensitive data • Who has access • Vulnerabilities Know your security number Dollar value of risk liability per device Actionable intelligence Total risk exposure of organization C-level ready dashboard • Evidence of impact • Board oversight
  • 4. ISCAN ANSWERS KEY QUESTIONS FOR CISOS What data is at risk and who has access? How can attackers get to it? What will it cost when breached?
  • 5. HOW ISCAN IS DIFFERENT • Deploys rapidly, scans are faster and more accurate • Detects big 3: sensitive data, access permissions and vulnerabilities • Admins can find hacker traps • Provides actionable intelligence and financially prioritizes data breach risk • C-suite ready dashboard puts a dollar number on your risk exposure • Works well with popular education environments/ devices like Mac, iO, Ubuntu and Linux choices All in one tool
  • 6. HOW DO WE DO IT? PATENTED AGENTLESS DISCOVERY Mobile app Command line Constant auto assessment across all device types Cloud-based lightweight deployment with same day results Millions of devices at one time Active directory
  • 7. Potential liability $ Data at Risk • Social Security numbers • Driver’s licenses • Birthdates • Telephone numbers • Credit card numbers • Bank accounts • Intellectual property • Sensitive files DATA BREACH RISK REPORT PER DEVICE Vulnerabilities By severity By vendor Unauthorized access Configurations
  • 8. INTELLIGENCE DASHBOARD Like a Google map of your assets Immediate liability costs/ prioritization displayed for decision-making Trends for tracking the impact of initiatives Ready for the Boardroom
  • 9. INTEGRATION Works with existing technology investments in Systems Management and RMM tools
  • 10. iScan Leading competitor Automatically find SSNs, IDs, Bank Accounts, Driver Licenses, Dates of Birth, Phone Numbers, Addresses, Passports, Intellectual Property, Credit Cards, Patient Health Info Find file patterns and MD5/SHA hashes – finds data theft artifacts, such as Cryptolocker, and use for incidence response Search files, e-mails and attachments on: • File servers • .zip files • Outlook, Thunderbird, Apple Mail + • Cloud storage folders including Dropbox, Skydrive, Google Drive, Box, Amazon Cloud Drive, and more • NAS Search files on websites * Search even the largest servers (1 TB+) Schedule searches ** HOW WE COMPARE 1/3 * iScan searches the databases where form fill data resides ** iScan integrates with existing infrastructure for scheduled searches
  • 11. iScan Leading competitor Works on: • Windows XP - 8.1 • Windows Server - 2003 – 2012 • Linux 64 bit - RHEL 5+ • Mac OS X Works on: • CentOS 5+ Linux • Oracle Linux • Ubuntu • Fedora Works on mobile devices like tablets and smartphones • Apple iOS 5 + • Android 2.3 + Effectively search both Mac and PC platforms Manage data discovery without an agent Non-intrusive, does not require scaling down resources on device HOW WE COMPARE 2/3
  • 12. HOW WE COMPARE 3/3 iScan Leading competitor View and manage by university, department or any sub group Audit 3rd party devices “on the fly” Receive results in your inbox daily Fastest scanning available Same day scalable implementation and results Vulnerability scanning (How will data be breached) View file permission access to sensitive data Automatically calculates dollar value liability & financially prioritizes Trend charts for monitoring impact Intelligence dashboard for C-suite One tool for data, access & vulnerabilities, and C-suite dashboard
  • 13. IVY LEAGUE UNIVERSITY “We use iScan to report the financial impact to our Boardroom. It also empowers our students to self-assess their computers.”
  • 14. LIBERAL ARTS UNIVERSITY “We chose iScan Online as the only vendor that could complete the discovery of sensitive data on our multi- terabyte servers.”
  • 15. RECOGNITION Industry Innovator: Analysis & Control REMOTE SECURITY SELF-ASSESSMENT FRAMEWORK Patent 9,032,520 Patent 8,819,773
  • 16. TRY US FOR FREE Sign up at https://app.iscanonline.com/