SlideShare a Scribd company logo
Securing Your Digital Assets
July 14, 2015
6:00 PM – 8:00 PM
Darrell Gunter (moderator),
Justin Berman,
S. Gregory Boyd,
John Masserini, and
Nicolas Quairel
Tweet@
#CyberSecure2015
#CyberSecure2015
Do you have an
established CSO?
#CyberSecure2015
If you don’t have an
established CSO, do you
outsource?
#CyberSecure2015
Do you have an established
budget dedicated to Cyber
Security?
#CyberSecure2015
If you don’t currently have a budget,
approximately how much would you think
you would need to spend?
* $100,000
* $250,000
* $500,000
#CyberSecure2015
Does your CSO report
directly to the CEO?
#CyberSecure2015
How often does your CSO report to the
executive team?
* Weekly
* Monthly
* Quarterly
#CyberSecure2015
List of breaches in media companies
Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation
Sony Pictures 2014 47,000 SSN
30,000 Internal Documents
$15,000,000 Money spent by Sony to
deal with the ongoing
damages during the hack.
Sony Playstation
Network
2014 24 hour network outage due to
a DDoS attack
Unknown
Sony Playstation
Network
2011 77 Million accounts (Containing
credit card numbers)
$171,000,000 Total Outage Cost
New York Times 2013 Access to Reporters account by
Chinese attackers following
times investigation on China’s
prime minister.
Unknown
Big Idea
Entertainment
2015 320,000 Credit Card Info/
Payment card info
$8,500,000 Estimation due to the
number of records stolen
Craftsman Book
Company
2014 11,000 Credit Card information $600,000 Losses due to credit card
fraud.
Entercom Portland 2014 13,000 Personal Information
records
$350,000 Estimation due to the
number of records stolen
Society for Science &
the Public (SSP)
2014 Est. 20,000 Records Personal
Information/ SSN
$800,000 Estimation due to the
number of records stolen
Mimeo 2014 Est. 80,000 Records Personal
Information
$200,000 Estimation due to the
number of records stolen
#CyberSecure2015
List of breaches in media companies
Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation
AOL 2014 Est.10,500 Records (Mail
Address, Password)
$250,000 Estimation due to the
number of records stolen
Comcast 2014 More than 47,000 Records
Name, Adresses, Telephone
number
$300,000 Estimation due to the
number of records stolen
C3 Presents 2014 Est. 3,000 Employee Records
(Personal Information)
$200,000 Estimation due to the
number of records stolen
Washington Post 2013 Addition of pop-ups on their
mobile app containing political
messages
Unknown
Reuters 2014 Replacing website pages by
political messages
Unknown
Evernote 2013 50M records compromised
Customers’ email addresses,
usernames and encrypted
passwords exposed
Unknown
West Publishing Corp 2014 Customer address, date of birth,
and, in some cases, driver's
license number and Social
Security Number.
Unknown
#CyberSecure2015
What are the Top 3 Topics
in Data Security?
Securing Your Digital Assets
July 14, 2015
Tweet your questions at:
#CyberSecure2015

More Related Content

Similar to Securing Your Digital Assets slides NYC July 14, 2015

Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
Sohail Gohir
 
Internet Of Everything 2016
Internet Of Everything 2016Internet Of Everything 2016
Internet Of Everything 2016
Umberto Tessitore
 
The Internet of Everything 2016
The Internet of Everything 2016The Internet of Everything 2016
The Internet of Everything 2016
Saiful Islam
 
Internetofeverything 2016
Internetofeverything 2016Internetofeverything 2016
Internetofeverything 2016
Dave Parkerson
 
Internet of Everything
Internet of EverythingInternet of Everything
Internet of Everything
Dr. Joel Evans
 
Presenting and persuading with data
Presenting and persuading with dataPresenting and persuading with data
Presenting and persuading with data
Estrella Spaans
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
StampedeCon
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
AniketPandit18
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
chauhan323234
 
Financial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on TwitterFinancial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on Twitter
Christophe Langlois
 
Christophe Langlois - Banking
Christophe Langlois - BankingChristophe Langlois - Banking
Christophe Langlois - Banking
Arjen Strijker
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
Jonathan Care
 
If Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomesIf Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomes
James Dennin
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
Norman W. Mayes, CISSP, MCSE, ITIL
 
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
David Bray
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020
Shufti Pro
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
guest1d1ed5
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
Grant Barker
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
Ulf Mattsson
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Mahender Boda
 

Similar to Securing Your Digital Assets slides NYC July 14, 2015 (20)

Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
Internet Of Everything 2016
Internet Of Everything 2016Internet Of Everything 2016
Internet Of Everything 2016
 
The Internet of Everything 2016
The Internet of Everything 2016The Internet of Everything 2016
The Internet of Everything 2016
 
Internetofeverything 2016
Internetofeverything 2016Internetofeverything 2016
Internetofeverything 2016
 
Internet of Everything
Internet of EverythingInternet of Everything
Internet of Everything
 
Presenting and persuading with data
Presenting and persuading with dataPresenting and persuading with data
Presenting and persuading with data
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
 
Financial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on TwitterFinancial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on Twitter
 
Christophe Langlois - Banking
Christophe Langlois - BankingChristophe Langlois - Banking
Christophe Langlois - Banking
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
If Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomesIf Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomes
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

More from Darrell W. Gunter

Social media cse 2013 annual meeting
Social media cse 2013 annual meetingSocial media cse 2013 annual meeting
Social media cse 2013 annual meeting
Darrell W. Gunter
 
Council of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different LensesCouncil of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different Lenses
Darrell W. Gunter
 
CESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMSCESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMS
Darrell W. Gunter
 
Adam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia PresentationAdam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia Presentation
Darrell W. Gunter
 
SSP Fall Meeting Mobile Gunter Nov 2011
SSP  Fall Meeting Mobile Gunter Nov 2011SSP  Fall Meeting Mobile Gunter Nov 2011
SSP Fall Meeting Mobile Gunter Nov 2011
Darrell W. Gunter
 
Discover How Social Media Can BE A Valuable Tool For Finance & HR
Discover How Social Media Can  BE A Valuable Tool For Finance & HRDiscover How Social Media Can  BE A Valuable Tool For Finance & HR
Discover How Social Media Can BE A Valuable Tool For Finance & HR
Darrell W. Gunter
 
PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.
Darrell W. Gunter
 
NFAIS - Social Search
NFAIS - Social SearchNFAIS - Social Search
NFAIS - Social Search
Darrell W. Gunter
 
AAP/PSP Semantic Publishing Workshop
AAP/PSP Semantic Publishing  WorkshopAAP/PSP Semantic Publishing  Workshop
AAP/PSP Semantic Publishing Workshop
Darrell W. Gunter
 
ASIDIC Spring 2010 Meeting Dwg
ASIDIC Spring 2010 Meeting   DwgASIDIC Spring 2010 Meeting   Dwg
ASIDIC Spring 2010 Meeting Dwg
Darrell W. Gunter
 
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Darrell W. Gunter
 
ASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. GunterASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. Gunter
Darrell W. Gunter
 
XXIX Charleston Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston   Semantic Web (5 Nov 2009) HulbertXXIX Charleston   Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston Semantic Web (5 Nov 2009) Hulbert
Darrell W. Gunter
 
XXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair KernerXXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair Kerner
Darrell W. Gunter
 
Reviewer Finder SIIA May 4 09
Reviewer Finder   SIIA May 4   09Reviewer Finder   SIIA May 4   09
Reviewer Finder SIIA May 4 09
Darrell W. Gunter
 
Ssp Collexis Overview 2009
Ssp Collexis   Overview 2009Ssp Collexis   Overview 2009
Ssp Collexis Overview 2009
Darrell W. Gunter
 
Bsec #2 April 7 09 Gunter
Bsec #2 April 7 09 GunterBsec #2 April 7 09 Gunter
Bsec #2 April 7 09 Gunter
Darrell W. Gunter
 
Ala 2008 Emerging Technologies
Ala 2008 Emerging TechnologiesAla 2008 Emerging Technologies
Ala 2008 Emerging Technologies
Darrell W. Gunter
 
Bridging The Google Gap
Bridging The Google GapBridging The Google Gap
Bridging The Google Gap
Darrell W. Gunter
 
How Data Never Looked So Good!
 How Data Never Looked So Good! How Data Never Looked So Good!
How Data Never Looked So Good!
Darrell W. Gunter
 

More from Darrell W. Gunter (20)

Social media cse 2013 annual meeting
Social media cse 2013 annual meetingSocial media cse 2013 annual meeting
Social media cse 2013 annual meeting
 
Council of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different LensesCouncil of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different Lenses
 
CESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMSCESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMS
 
Adam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia PresentationAdam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia Presentation
 
SSP Fall Meeting Mobile Gunter Nov 2011
SSP  Fall Meeting Mobile Gunter Nov 2011SSP  Fall Meeting Mobile Gunter Nov 2011
SSP Fall Meeting Mobile Gunter Nov 2011
 
Discover How Social Media Can BE A Valuable Tool For Finance & HR
Discover How Social Media Can  BE A Valuable Tool For Finance & HRDiscover How Social Media Can  BE A Valuable Tool For Finance & HR
Discover How Social Media Can BE A Valuable Tool For Finance & HR
 
PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.
 
NFAIS - Social Search
NFAIS - Social SearchNFAIS - Social Search
NFAIS - Social Search
 
AAP/PSP Semantic Publishing Workshop
AAP/PSP Semantic Publishing  WorkshopAAP/PSP Semantic Publishing  Workshop
AAP/PSP Semantic Publishing Workshop
 
ASIDIC Spring 2010 Meeting Dwg
ASIDIC Spring 2010 Meeting   DwgASIDIC Spring 2010 Meeting   Dwg
ASIDIC Spring 2010 Meeting Dwg
 
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
 
ASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. GunterASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. Gunter
 
XXIX Charleston Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston   Semantic Web (5 Nov 2009) HulbertXXIX Charleston   Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston Semantic Web (5 Nov 2009) Hulbert
 
XXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair KernerXXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair Kerner
 
Reviewer Finder SIIA May 4 09
Reviewer Finder   SIIA May 4   09Reviewer Finder   SIIA May 4   09
Reviewer Finder SIIA May 4 09
 
Ssp Collexis Overview 2009
Ssp Collexis   Overview 2009Ssp Collexis   Overview 2009
Ssp Collexis Overview 2009
 
Bsec #2 April 7 09 Gunter
Bsec #2 April 7 09 GunterBsec #2 April 7 09 Gunter
Bsec #2 April 7 09 Gunter
 
Ala 2008 Emerging Technologies
Ala 2008 Emerging TechnologiesAla 2008 Emerging Technologies
Ala 2008 Emerging Technologies
 
Bridging The Google Gap
Bridging The Google GapBridging The Google Gap
Bridging The Google Gap
 
How Data Never Looked So Good!
 How Data Never Looked So Good! How Data Never Looked So Good!
How Data Never Looked So Good!
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

Securing Your Digital Assets slides NYC July 14, 2015

  • 1. Securing Your Digital Assets July 14, 2015 6:00 PM – 8:00 PM Darrell Gunter (moderator), Justin Berman, S. Gregory Boyd, John Masserini, and Nicolas Quairel Tweet@ #CyberSecure2015
  • 2. #CyberSecure2015 Do you have an established CSO?
  • 3. #CyberSecure2015 If you don’t have an established CSO, do you outsource?
  • 4. #CyberSecure2015 Do you have an established budget dedicated to Cyber Security?
  • 5. #CyberSecure2015 If you don’t currently have a budget, approximately how much would you think you would need to spend? * $100,000 * $250,000 * $500,000
  • 6. #CyberSecure2015 Does your CSO report directly to the CEO?
  • 7. #CyberSecure2015 How often does your CSO report to the executive team? * Weekly * Monthly * Quarterly
  • 8. #CyberSecure2015 List of breaches in media companies Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation Sony Pictures 2014 47,000 SSN 30,000 Internal Documents $15,000,000 Money spent by Sony to deal with the ongoing damages during the hack. Sony Playstation Network 2014 24 hour network outage due to a DDoS attack Unknown Sony Playstation Network 2011 77 Million accounts (Containing credit card numbers) $171,000,000 Total Outage Cost New York Times 2013 Access to Reporters account by Chinese attackers following times investigation on China’s prime minister. Unknown Big Idea Entertainment 2015 320,000 Credit Card Info/ Payment card info $8,500,000 Estimation due to the number of records stolen Craftsman Book Company 2014 11,000 Credit Card information $600,000 Losses due to credit card fraud. Entercom Portland 2014 13,000 Personal Information records $350,000 Estimation due to the number of records stolen Society for Science & the Public (SSP) 2014 Est. 20,000 Records Personal Information/ SSN $800,000 Estimation due to the number of records stolen Mimeo 2014 Est. 80,000 Records Personal Information $200,000 Estimation due to the number of records stolen
  • 9. #CyberSecure2015 List of breaches in media companies Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation AOL 2014 Est.10,500 Records (Mail Address, Password) $250,000 Estimation due to the number of records stolen Comcast 2014 More than 47,000 Records Name, Adresses, Telephone number $300,000 Estimation due to the number of records stolen C3 Presents 2014 Est. 3,000 Employee Records (Personal Information) $200,000 Estimation due to the number of records stolen Washington Post 2013 Addition of pop-ups on their mobile app containing political messages Unknown Reuters 2014 Replacing website pages by political messages Unknown Evernote 2013 50M records compromised Customers’ email addresses, usernames and encrypted passwords exposed Unknown West Publishing Corp 2014 Customer address, date of birth, and, in some cases, driver's license number and Social Security Number. Unknown
  • 10. #CyberSecure2015 What are the Top 3 Topics in Data Security?
  • 11. Securing Your Digital Assets July 14, 2015 Tweet your questions at: #CyberSecure2015