SlideShare a Scribd company logo
Securing Your Digital Assets
July 14, 2015
6:00 PM – 8:00 PM
Darrell Gunter (moderator),
Justin Berman,
S. Gregory Boyd,
John Masserini, and
Nicolas Quairel
Tweet@
#CyberSecure2015
#CyberSecure2015
Do you have an
established CSO?
#CyberSecure2015
If you don’t have an
established CSO, do you
outsource?
#CyberSecure2015
Do you have an established
budget dedicated to Cyber
Security?
#CyberSecure2015
If you don’t currently have a budget,
approximately how much would you think
you would need to spend?
* $100,000
* $250,000
* $500,000
#CyberSecure2015
Does your CSO report
directly to the CEO?
#CyberSecure2015
How often does your CSO report to the
executive team?
* Weekly
* Monthly
* Quarterly
#CyberSecure2015
List of breaches in media companies
Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation
Sony Pictures 2014 47,000 SSN
30,000 Internal Documents
$15,000,000 Money spent by Sony to
deal with the ongoing
damages during the hack.
Sony Playstation
Network
2014 24 hour network outage due to
a DDoS attack
Unknown
Sony Playstation
Network
2011 77 Million accounts (Containing
credit card numbers)
$171,000,000 Total Outage Cost
New York Times 2013 Access to Reporters account by
Chinese attackers following
times investigation on China’s
prime minister.
Unknown
Big Idea
Entertainment
2015 320,000 Credit Card Info/
Payment card info
$8,500,000 Estimation due to the
number of records stolen
Craftsman Book
Company
2014 11,000 Credit Card information $600,000 Losses due to credit card
fraud.
Entercom Portland 2014 13,000 Personal Information
records
$350,000 Estimation due to the
number of records stolen
Society for Science &
the Public (SSP)
2014 Est. 20,000 Records Personal
Information/ SSN
$800,000 Estimation due to the
number of records stolen
Mimeo 2014 Est. 80,000 Records Personal
Information
$200,000 Estimation due to the
number of records stolen
#CyberSecure2015
List of breaches in media companies
Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation
AOL 2014 Est.10,500 Records (Mail
Address, Password)
$250,000 Estimation due to the
number of records stolen
Comcast 2014 More than 47,000 Records
Name, Adresses, Telephone
number
$300,000 Estimation due to the
number of records stolen
C3 Presents 2014 Est. 3,000 Employee Records
(Personal Information)
$200,000 Estimation due to the
number of records stolen
Washington Post 2013 Addition of pop-ups on their
mobile app containing political
messages
Unknown
Reuters 2014 Replacing website pages by
political messages
Unknown
Evernote 2013 50M records compromised
Customers’ email addresses,
usernames and encrypted
passwords exposed
Unknown
West Publishing Corp 2014 Customer address, date of birth,
and, in some cases, driver's
license number and Social
Security Number.
Unknown
#CyberSecure2015
What are the Top 3 Topics
in Data Security?
Securing Your Digital Assets
July 14, 2015
Tweet your questions at:
#CyberSecure2015

More Related Content

Similar to Securing Your Digital Assets slides NYC July 14, 2015

Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
Sohail Gohir
 
Internet Of Everything 2016
Internet Of Everything 2016Internet Of Everything 2016
Internet Of Everything 2016
Umberto Tessitore
 
Internet of Everything
Internet of EverythingInternet of Everything
Internet of Everything
Dr. Joel Evans
 
The Internet of Everything 2016
The Internet of Everything 2016The Internet of Everything 2016
The Internet of Everything 2016
Saiful Islam
 
Internetofeverything 2016
Internetofeverything 2016Internetofeverything 2016
Internetofeverything 2016
Dave Parkerson
 
Presenting and persuading with data
Presenting and persuading with dataPresenting and persuading with data
Presenting and persuading with data
Estrella Spaans
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
StampedeCon
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
AniketPandit18
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
chauhan323234
 
Financial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on TwitterFinancial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on Twitter
Christophe Langlois
 
Christophe Langlois - Banking
Christophe Langlois - BankingChristophe Langlois - Banking
Christophe Langlois - Banking
Arjen Strijker
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
Jonathan Care
 
If Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomesIf Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomes
James Dennin
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
Norman W. Mayes, CISSP, MCSE, ITIL
 
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
David Bray
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020
Shufti Pro
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
guest1d1ed5
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
Grant Barker
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
Ulf Mattsson
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Mahender Boda
 

Similar to Securing Your Digital Assets slides NYC July 14, 2015 (20)

Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
Internet Of Everything 2016
Internet Of Everything 2016Internet Of Everything 2016
Internet Of Everything 2016
 
Internet of Everything
Internet of EverythingInternet of Everything
Internet of Everything
 
The Internet of Everything 2016
The Internet of Everything 2016The Internet of Everything 2016
The Internet of Everything 2016
 
Internetofeverything 2016
Internetofeverything 2016Internetofeverything 2016
Internetofeverything 2016
 
Presenting and persuading with data
Presenting and persuading with dataPresenting and persuading with data
Presenting and persuading with data
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
 
Financial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on TwitterFinancial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on Twitter
 
Christophe Langlois - Banking
Christophe Langlois - BankingChristophe Langlois - Banking
Christophe Langlois - Banking
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
If Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomesIf Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomes
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

More from Darrell W. Gunter

Social media cse 2013 annual meeting
Social media cse 2013 annual meetingSocial media cse 2013 annual meeting
Social media cse 2013 annual meeting
Darrell W. Gunter
 
Council of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different LensesCouncil of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different Lenses
Darrell W. Gunter
 
CESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMSCESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMS
Darrell W. Gunter
 
Adam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia PresentationAdam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia Presentation
Darrell W. Gunter
 
SSP Fall Meeting Mobile Gunter Nov 2011
SSP  Fall Meeting Mobile Gunter Nov 2011SSP  Fall Meeting Mobile Gunter Nov 2011
SSP Fall Meeting Mobile Gunter Nov 2011
Darrell W. Gunter
 
Discover How Social Media Can BE A Valuable Tool For Finance & HR
Discover How Social Media Can  BE A Valuable Tool For Finance & HRDiscover How Social Media Can  BE A Valuable Tool For Finance & HR
Discover How Social Media Can BE A Valuable Tool For Finance & HR
Darrell W. Gunter
 
PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.
Darrell W. Gunter
 
NFAIS - Social Search
NFAIS - Social SearchNFAIS - Social Search
NFAIS - Social Search
Darrell W. Gunter
 
AAP/PSP Semantic Publishing Workshop
AAP/PSP Semantic Publishing  WorkshopAAP/PSP Semantic Publishing  Workshop
AAP/PSP Semantic Publishing Workshop
Darrell W. Gunter
 
ASIDIC Spring 2010 Meeting Dwg
ASIDIC Spring 2010 Meeting   DwgASIDIC Spring 2010 Meeting   Dwg
ASIDIC Spring 2010 Meeting Dwg
Darrell W. Gunter
 
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Darrell W. Gunter
 
ASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. GunterASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. Gunter
Darrell W. Gunter
 
XXIX Charleston Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston   Semantic Web (5 Nov 2009) HulbertXXIX Charleston   Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston Semantic Web (5 Nov 2009) Hulbert
Darrell W. Gunter
 
XXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair KernerXXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair Kerner
Darrell W. Gunter
 
Reviewer Finder SIIA May 4 09
Reviewer Finder   SIIA May 4   09Reviewer Finder   SIIA May 4   09
Reviewer Finder SIIA May 4 09
Darrell W. Gunter
 
Ssp Collexis Overview 2009
Ssp Collexis   Overview 2009Ssp Collexis   Overview 2009
Ssp Collexis Overview 2009
Darrell W. Gunter
 
Bsec #2 April 7 09 Gunter
Bsec #2 April 7 09 GunterBsec #2 April 7 09 Gunter
Bsec #2 April 7 09 Gunter
Darrell W. Gunter
 
Ala 2008 Emerging Technologies
Ala 2008 Emerging TechnologiesAla 2008 Emerging Technologies
Ala 2008 Emerging Technologies
Darrell W. Gunter
 
Bridging The Google Gap
Bridging The Google GapBridging The Google Gap
Bridging The Google Gap
Darrell W. Gunter
 
How Data Never Looked So Good!
 How Data Never Looked So Good! How Data Never Looked So Good!
How Data Never Looked So Good!
Darrell W. Gunter
 

More from Darrell W. Gunter (20)

Social media cse 2013 annual meeting
Social media cse 2013 annual meetingSocial media cse 2013 annual meeting
Social media cse 2013 annual meeting
 
Council of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different LensesCouncil of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different Lenses
 
CESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMSCESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMS
 
Adam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia PresentationAdam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia Presentation
 
SSP Fall Meeting Mobile Gunter Nov 2011
SSP  Fall Meeting Mobile Gunter Nov 2011SSP  Fall Meeting Mobile Gunter Nov 2011
SSP Fall Meeting Mobile Gunter Nov 2011
 
Discover How Social Media Can BE A Valuable Tool For Finance & HR
Discover How Social Media Can  BE A Valuable Tool For Finance & HRDiscover How Social Media Can  BE A Valuable Tool For Finance & HR
Discover How Social Media Can BE A Valuable Tool For Finance & HR
 
PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.
 
NFAIS - Social Search
NFAIS - Social SearchNFAIS - Social Search
NFAIS - Social Search
 
AAP/PSP Semantic Publishing Workshop
AAP/PSP Semantic Publishing  WorkshopAAP/PSP Semantic Publishing  Workshop
AAP/PSP Semantic Publishing Workshop
 
ASIDIC Spring 2010 Meeting Dwg
ASIDIC Spring 2010 Meeting   DwgASIDIC Spring 2010 Meeting   Dwg
ASIDIC Spring 2010 Meeting Dwg
 
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
 
ASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. GunterASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. Gunter
 
XXIX Charleston Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston   Semantic Web (5 Nov 2009) HulbertXXIX Charleston   Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston Semantic Web (5 Nov 2009) Hulbert
 
XXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair KernerXXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair Kerner
 
Reviewer Finder SIIA May 4 09
Reviewer Finder   SIIA May 4   09Reviewer Finder   SIIA May 4   09
Reviewer Finder SIIA May 4 09
 
Ssp Collexis Overview 2009
Ssp Collexis   Overview 2009Ssp Collexis   Overview 2009
Ssp Collexis Overview 2009
 
Bsec #2 April 7 09 Gunter
Bsec #2 April 7 09 GunterBsec #2 April 7 09 Gunter
Bsec #2 April 7 09 Gunter
 
Ala 2008 Emerging Technologies
Ala 2008 Emerging TechnologiesAla 2008 Emerging Technologies
Ala 2008 Emerging Technologies
 
Bridging The Google Gap
Bridging The Google GapBridging The Google Gap
Bridging The Google Gap
 
How Data Never Looked So Good!
 How Data Never Looked So Good! How Data Never Looked So Good!
How Data Never Looked So Good!
 

Recently uploaded

Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 

Recently uploaded (20)

Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 

Securing Your Digital Assets slides NYC July 14, 2015

  • 1. Securing Your Digital Assets July 14, 2015 6:00 PM – 8:00 PM Darrell Gunter (moderator), Justin Berman, S. Gregory Boyd, John Masserini, and Nicolas Quairel Tweet@ #CyberSecure2015
  • 2. #CyberSecure2015 Do you have an established CSO?
  • 3. #CyberSecure2015 If you don’t have an established CSO, do you outsource?
  • 4. #CyberSecure2015 Do you have an established budget dedicated to Cyber Security?
  • 5. #CyberSecure2015 If you don’t currently have a budget, approximately how much would you think you would need to spend? * $100,000 * $250,000 * $500,000
  • 6. #CyberSecure2015 Does your CSO report directly to the CEO?
  • 7. #CyberSecure2015 How often does your CSO report to the executive team? * Weekly * Monthly * Quarterly
  • 8. #CyberSecure2015 List of breaches in media companies Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation Sony Pictures 2014 47,000 SSN 30,000 Internal Documents $15,000,000 Money spent by Sony to deal with the ongoing damages during the hack. Sony Playstation Network 2014 24 hour network outage due to a DDoS attack Unknown Sony Playstation Network 2011 77 Million accounts (Containing credit card numbers) $171,000,000 Total Outage Cost New York Times 2013 Access to Reporters account by Chinese attackers following times investigation on China’s prime minister. Unknown Big Idea Entertainment 2015 320,000 Credit Card Info/ Payment card info $8,500,000 Estimation due to the number of records stolen Craftsman Book Company 2014 11,000 Credit Card information $600,000 Losses due to credit card fraud. Entercom Portland 2014 13,000 Personal Information records $350,000 Estimation due to the number of records stolen Society for Science & the Public (SSP) 2014 Est. 20,000 Records Personal Information/ SSN $800,000 Estimation due to the number of records stolen Mimeo 2014 Est. 80,000 Records Personal Information $200,000 Estimation due to the number of records stolen
  • 9. #CyberSecure2015 List of breaches in media companies Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation AOL 2014 Est.10,500 Records (Mail Address, Password) $250,000 Estimation due to the number of records stolen Comcast 2014 More than 47,000 Records Name, Adresses, Telephone number $300,000 Estimation due to the number of records stolen C3 Presents 2014 Est. 3,000 Employee Records (Personal Information) $200,000 Estimation due to the number of records stolen Washington Post 2013 Addition of pop-ups on their mobile app containing political messages Unknown Reuters 2014 Replacing website pages by political messages Unknown Evernote 2013 50M records compromised Customers’ email addresses, usernames and encrypted passwords exposed Unknown West Publishing Corp 2014 Customer address, date of birth, and, in some cases, driver's license number and Social Security Number. Unknown
  • 10. #CyberSecure2015 What are the Top 3 Topics in Data Security?
  • 11. Securing Your Digital Assets July 14, 2015 Tweet your questions at: #CyberSecure2015