SlideShare a Scribd company logo
Securing Your Digital Assets
July 14, 2015
6:00 PM – 8:00 PM
Darrell Gunter (moderator),
Justin Berman,
S. Gregory Boyd,
John Masserini, and
Nicolas Quairel
Tweet@
#CyberSecure2015
#CyberSecure2015
Do you have an
established CSO?
#CyberSecure2015
If you don’t have an
established CSO, do you
outsource?
#CyberSecure2015
Do you have an established
budget dedicated to Cyber
Security?
#CyberSecure2015
If you don’t currently have a budget,
approximately how much would you think
you would need to spend?
* $100,000
* $250,000
* $500,000
#CyberSecure2015
Does your CSO report
directly to the CEO?
#CyberSecure2015
How often does your CSO report to the
executive team?
* Weekly
* Monthly
* Quarterly
#CyberSecure2015
List of breaches in media companies
Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation
Sony Pictures 2014 47,000 SSN
30,000 Internal Documents
$15,000,000 Money spent by Sony to
deal with the ongoing
damages during the hack.
Sony Playstation
Network
2014 24 hour network outage due to
a DDoS attack
Unknown
Sony Playstation
Network
2011 77 Million accounts (Containing
credit card numbers)
$171,000,000 Total Outage Cost
New York Times 2013 Access to Reporters account by
Chinese attackers following
times investigation on China’s
prime minister.
Unknown
Big Idea
Entertainment
2015 320,000 Credit Card Info/
Payment card info
$8,500,000 Estimation due to the
number of records stolen
Craftsman Book
Company
2014 11,000 Credit Card information $600,000 Losses due to credit card
fraud.
Entercom Portland 2014 13,000 Personal Information
records
$350,000 Estimation due to the
number of records stolen
Society for Science &
the Public (SSP)
2014 Est. 20,000 Records Personal
Information/ SSN
$800,000 Estimation due to the
number of records stolen
Mimeo 2014 Est. 80,000 Records Personal
Information
$200,000 Estimation due to the
number of records stolen
#CyberSecure2015
List of breaches in media companies
Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation
AOL 2014 Est.10,500 Records (Mail
Address, Password)
$250,000 Estimation due to the
number of records stolen
Comcast 2014 More than 47,000 Records
Name, Adresses, Telephone
number
$300,000 Estimation due to the
number of records stolen
C3 Presents 2014 Est. 3,000 Employee Records
(Personal Information)
$200,000 Estimation due to the
number of records stolen
Washington Post 2013 Addition of pop-ups on their
mobile app containing political
messages
Unknown
Reuters 2014 Replacing website pages by
political messages
Unknown
Evernote 2013 50M records compromised
Customers’ email addresses,
usernames and encrypted
passwords exposed
Unknown
West Publishing Corp 2014 Customer address, date of birth,
and, in some cases, driver's
license number and Social
Security Number.
Unknown
#CyberSecure2015
What are the Top 3 Topics
in Data Security?
Securing Your Digital Assets
July 14, 2015
Tweet your questions at:
#CyberSecure2015

More Related Content

Similar to Securing Your Digital Assets slides NYC July 14, 2015

Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1Sohail Gohir
 
Internetofeverything 2016
Internetofeverything 2016Internetofeverything 2016
Internetofeverything 2016Dave Parkerson
 
Internet of Everything
Internet of EverythingInternet of Everything
Internet of EverythingDr. Joel Evans
 
The Internet of Everything 2016
The Internet of Everything 2016The Internet of Everything 2016
The Internet of Everything 2016Saiful Islam
 
Presenting and persuading with data
Presenting and persuading with dataPresenting and persuading with data
Presenting and persuading with dataEstrella Spaans
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015StampedeCon
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation AniketPandit18
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfchauhan323234
 
Financial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on TwitterFinancial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on TwitterChristophe Langlois
 
Christophe Langlois - Banking
Christophe Langlois - BankingChristophe Langlois - Banking
Christophe Langlois - BankingArjen Strijker
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...Jonathan Care
 
If Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomesIf Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomesJames Dennin
 
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...David Bray
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Shufti Pro
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Grant Barker
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 

Similar to Securing Your Digital Assets slides NYC July 14, 2015 (20)

Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
Internet Of Everything 2016
Internet Of Everything 2016Internet Of Everything 2016
Internet Of Everything 2016
 
Internetofeverything 2016
Internetofeverything 2016Internetofeverything 2016
Internetofeverything 2016
 
Internet of Everything
Internet of EverythingInternet of Everything
Internet of Everything
 
The Internet of Everything 2016
The Internet of Everything 2016The Internet of Everything 2016
The Internet of Everything 2016
 
Presenting and persuading with data
Presenting and persuading with dataPresenting and persuading with data
Presenting and persuading with data
 
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
Identity Fraud Protection Using Big Data Analytics - StampedeCon 2015
 
Phishing attack seminar presentation
Phishing attack seminar presentation Phishing attack seminar presentation
Phishing attack seminar presentation
 
phishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdfphishingattackseminarpresentation-211230055252.pdf
phishingattackseminarpresentation-211230055252.pdf
 
Financial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on TwitterFinancial Institutions Must Support Their Clients on Twitter
Financial Institutions Must Support Their Clients on Twitter
 
Christophe Langlois - Banking
Christophe Langlois - BankingChristophe Langlois - Banking
Christophe Langlois - Banking
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
If Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomesIf Tinder pursues multiple monetization strategies: analysis of outcomes
If Tinder pursues multiple monetization strategies: analysis of outcomes
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
Going #Exponential: Public Service and the Internet of Everything in 15 Minut...
 
Global Identity Fraud Report 2020
Global Identity Fraud Report 2020Global Identity Fraud Report 2020
Global Identity Fraud Report 2020
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

More from Darrell W. Gunter

Social media cse 2013 annual meeting
Social media cse 2013 annual meetingSocial media cse 2013 annual meeting
Social media cse 2013 annual meetingDarrell W. Gunter
 
Council of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different LensesCouncil of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different LensesDarrell W. Gunter
 
CESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMSCESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMSDarrell W. Gunter
 
Adam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia PresentationAdam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia PresentationDarrell W. Gunter
 
SSP Fall Meeting Mobile Gunter Nov 2011
SSP  Fall Meeting Mobile Gunter Nov 2011SSP  Fall Meeting Mobile Gunter Nov 2011
SSP Fall Meeting Mobile Gunter Nov 2011Darrell W. Gunter
 
Discover How Social Media Can BE A Valuable Tool For Finance & HR
Discover How Social Media Can  BE A Valuable Tool For Finance & HRDiscover How Social Media Can  BE A Valuable Tool For Finance & HR
Discover How Social Media Can BE A Valuable Tool For Finance & HRDarrell W. Gunter
 
PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.Darrell W. Gunter
 
AAP/PSP Semantic Publishing Workshop
AAP/PSP Semantic Publishing  WorkshopAAP/PSP Semantic Publishing  Workshop
AAP/PSP Semantic Publishing WorkshopDarrell W. Gunter
 
ASIDIC Spring 2010 Meeting Dwg
ASIDIC Spring 2010 Meeting   DwgASIDIC Spring 2010 Meeting   Dwg
ASIDIC Spring 2010 Meeting DwgDarrell W. Gunter
 
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...
Social Media and Scientific Research How Semantic Technologies Enhance Colla...Darrell W. Gunter
 
ASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. GunterASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. GunterDarrell W. Gunter
 
XXIX Charleston Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston   Semantic Web (5 Nov 2009) HulbertXXIX Charleston   Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston Semantic Web (5 Nov 2009) HulbertDarrell W. Gunter
 
XXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair KernerXXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair KernerDarrell W. Gunter
 
Reviewer Finder SIIA May 4 09
Reviewer Finder   SIIA May 4   09Reviewer Finder   SIIA May 4   09
Reviewer Finder SIIA May 4 09Darrell W. Gunter
 
Ala 2008 Emerging Technologies
Ala 2008 Emerging TechnologiesAla 2008 Emerging Technologies
Ala 2008 Emerging TechnologiesDarrell W. Gunter
 
How Data Never Looked So Good!
 How Data Never Looked So Good! How Data Never Looked So Good!
How Data Never Looked So Good!Darrell W. Gunter
 

More from Darrell W. Gunter (20)

Social media cse 2013 annual meeting
Social media cse 2013 annual meetingSocial media cse 2013 annual meeting
Social media cse 2013 annual meeting
 
Council of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different LensesCouncil of Science Editors - Viewing Social Media Through Different Lenses
Council of Science Editors - Viewing Social Media Through Different Lenses
 
CESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMSCESSE 2012 - STRATEGIC TEAMS
CESSE 2012 - STRATEGIC TEAMS
 
Adam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia PresentationAdam Marshall Charelston Utopia Presentation
Adam Marshall Charelston Utopia Presentation
 
SSP Fall Meeting Mobile Gunter Nov 2011
SSP  Fall Meeting Mobile Gunter Nov 2011SSP  Fall Meeting Mobile Gunter Nov 2011
SSP Fall Meeting Mobile Gunter Nov 2011
 
Discover How Social Media Can BE A Valuable Tool For Finance & HR
Discover How Social Media Can  BE A Valuable Tool For Finance & HRDiscover How Social Media Can  BE A Valuable Tool For Finance & HR
Discover How Social Media Can BE A Valuable Tool For Finance & HR
 
PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.PSP Social Media - How to grow your business.
PSP Social Media - How to grow your business.
 
NFAIS - Social Search
NFAIS - Social SearchNFAIS - Social Search
NFAIS - Social Search
 
AAP/PSP Semantic Publishing Workshop
AAP/PSP Semantic Publishing  WorkshopAAP/PSP Semantic Publishing  Workshop
AAP/PSP Semantic Publishing Workshop
 
ASIDIC Spring 2010 Meeting Dwg
ASIDIC Spring 2010 Meeting   DwgASIDIC Spring 2010 Meeting   Dwg
ASIDIC Spring 2010 Meeting Dwg
 
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...Social Media and Scientific ResearchHow Semantic Technologies Enhance Colla...
Social Media and Scientific Research How Semantic Technologies Enhance Colla...
 
ASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. GunterASIDIC FALL Meeting 2009 Darrell W. Gunter
ASIDIC FALL Meeting 2009 Darrell W. Gunter
 
XXIX Charleston Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston   Semantic Web (5 Nov 2009) HulbertXXIX Charleston   Semantic Web (5 Nov 2009) Hulbert
XXIX Charleston Semantic Web (5 Nov 2009) Hulbert
 
XXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair KernerXXIX Charleston 2009 Silverchair Kerner
XXIX Charleston 2009 Silverchair Kerner
 
Reviewer Finder SIIA May 4 09
Reviewer Finder   SIIA May 4   09Reviewer Finder   SIIA May 4   09
Reviewer Finder SIIA May 4 09
 
Ssp Collexis Overview 2009
Ssp Collexis   Overview 2009Ssp Collexis   Overview 2009
Ssp Collexis Overview 2009
 
Bsec #2 April 7 09 Gunter
Bsec #2 April 7 09 GunterBsec #2 April 7 09 Gunter
Bsec #2 April 7 09 Gunter
 
Ala 2008 Emerging Technologies
Ala 2008 Emerging TechnologiesAla 2008 Emerging Technologies
Ala 2008 Emerging Technologies
 
Bridging The Google Gap
Bridging The Google GapBridging The Google Gap
Bridging The Google Gap
 
How Data Never Looked So Good!
 How Data Never Looked So Good! How Data Never Looked So Good!
How Data Never Looked So Good!
 

Recently uploaded

Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024TopCSSGallery
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfEasyPrinterHelp
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 

Recently uploaded (20)

Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 

Securing Your Digital Assets slides NYC July 14, 2015

  • 1. Securing Your Digital Assets July 14, 2015 6:00 PM – 8:00 PM Darrell Gunter (moderator), Justin Berman, S. Gregory Boyd, John Masserini, and Nicolas Quairel Tweet@ #CyberSecure2015
  • 2. #CyberSecure2015 Do you have an established CSO?
  • 3. #CyberSecure2015 If you don’t have an established CSO, do you outsource?
  • 4. #CyberSecure2015 Do you have an established budget dedicated to Cyber Security?
  • 5. #CyberSecure2015 If you don’t currently have a budget, approximately how much would you think you would need to spend? * $100,000 * $250,000 * $500,000
  • 6. #CyberSecure2015 Does your CSO report directly to the CEO?
  • 7. #CyberSecure2015 How often does your CSO report to the executive team? * Weekly * Monthly * Quarterly
  • 8. #CyberSecure2015 List of breaches in media companies Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation Sony Pictures 2014 47,000 SSN 30,000 Internal Documents $15,000,000 Money spent by Sony to deal with the ongoing damages during the hack. Sony Playstation Network 2014 24 hour network outage due to a DDoS attack Unknown Sony Playstation Network 2011 77 Million accounts (Containing credit card numbers) $171,000,000 Total Outage Cost New York Times 2013 Access to Reporters account by Chinese attackers following times investigation on China’s prime minister. Unknown Big Idea Entertainment 2015 320,000 Credit Card Info/ Payment card info $8,500,000 Estimation due to the number of records stolen Craftsman Book Company 2014 11,000 Credit Card information $600,000 Losses due to credit card fraud. Entercom Portland 2014 13,000 Personal Information records $350,000 Estimation due to the number of records stolen Society for Science & the Public (SSP) 2014 Est. 20,000 Records Personal Information/ SSN $800,000 Estimation due to the number of records stolen Mimeo 2014 Est. 80,000 Records Personal Information $200,000 Estimation due to the number of records stolen
  • 9. #CyberSecure2015 List of breaches in media companies Name: Year: Harm / Data Stolen Estimated Cost: Cost Explanation AOL 2014 Est.10,500 Records (Mail Address, Password) $250,000 Estimation due to the number of records stolen Comcast 2014 More than 47,000 Records Name, Adresses, Telephone number $300,000 Estimation due to the number of records stolen C3 Presents 2014 Est. 3,000 Employee Records (Personal Information) $200,000 Estimation due to the number of records stolen Washington Post 2013 Addition of pop-ups on their mobile app containing political messages Unknown Reuters 2014 Replacing website pages by political messages Unknown Evernote 2013 50M records compromised Customers’ email addresses, usernames and encrypted passwords exposed Unknown West Publishing Corp 2014 Customer address, date of birth, and, in some cases, driver's license number and Social Security Number. Unknown
  • 10. #CyberSecure2015 What are the Top 3 Topics in Data Security?
  • 11. Securing Your Digital Assets July 14, 2015 Tweet your questions at: #CyberSecure2015