Is having your data and identity
compromised the NEW NORMAL?
Dan DeBlasio
June 4th, 2015
IN AN INCREASINGLY DIGITAL
WORLD CYBERSECURITY IS A
SERIOUS PROBLEM
SNAPSHOT OF IDENTITY MANAGEMENT
BREACH TRENDS
LOOKING BACK BEFORE
DIVING AHEAD
IN A WORLD WHERE THE NORM IS CYBERSECURITY
BREACHES ……
IT IS IMPORTANT FOR ENTERPRISES
TO HAVE MEASURES IN PLACE
FOR PREVENTION AND CONTAINMENT
OF AN ATTACK
Not a question of “IF” but “WHEN”
2011 THREAT AGENTS OVER TIME BY PERCENT OF
BREACHES
2011 continued the shift towards external agents’ involvement in a high
percentage of data breaches. Though we have always seen an external
majority, never before has any year been so one-sided.
2012 THREAT LANDSCAPE OVERVIEW
2013 THREAT SUMMARY
2013 may be remembered as the “year
of the retailer breach,” but a
comprehensive assessment suggests it
was a year of transition from geopolitical
attacks to large-scale attacks on
payment card systems.
2014 THREAT SUMMARY
Data breaches double YOY
Average cost +$5.5 million / $200 per record
Corporations are being sued for data loss (Sony)
(Ponemon Institute)
THE TRENDS: BREACHES ARE DOUBLING IN COST
COST PER RECORD VARIES IN HARD AND SOFT
COSTS (NOT FACTORING TRUST / LOYALTY)
At 100 records variance is between $357 / record to $12 / Record
At 1,000,000 records variance is between $27.50 / record to $0.06 / Record
Glass half full Glass half empty
That is a LARGE Variance in my book!
IT’S IN THE CLOUD….....
But which Cloud……
Private
(Iaas)
Public
(SaaS)
Hybrid
(PaaS)
….and is your data and identity safe and secure?
WHAT THE CLOUD BRINGS
 Who owns the security?
 Who is liable in a breach?
 Who restores Trust?
FORMS OF STRONG IDENTITY TODAY
ACTUALLY, YOUR DIGITAL IDENTITY
TYPICALLY LOOKS LIKE THIS:
PASSWORDS ARE A WEAK DEFENSE
Verizon Data Breach Investigation 2013
SUMMARY
 Educate employees on phishing attacks (e-mails)
 Develop strong and changing passwords
 Or better yet deploy two factor authentication, especially for
external and mobile access
 Have a post breach strategy and communications plan to limit
damage to brand and customer trust
 Investigate new security measures utilizing cutting-edge systems
that use machine learning and, ironically, big data analysis may
give a huge boost to the powers of corporate security teams.
If you are looking to limit your risk of a security breach and cut the
cost of the damage by more then half in real $$$:
REFERENCES
 Verizon: Data breach investigations reports 2011, 2012, 2013, 2014
and 2015
 BBC News: Cybersecurity: Defending 'unpreventable' cyber
attacks, By Paul Rubens Technology reporter
 Forbes: The Power And Problem Of Privilege In Cybersecurity, Tom
Kemp, CEO of Centrify
 Frost-Sullivan: Damballa Failsafe Review 4-14-2015
 Gartner: Identity and Access Management Summit 2008
DAN DEBLASIO
DDEBLASIO@COX.NET
949-413-7876 (MOBILE)
HTTP://WWW.LINKEDIN.COM/IN/DANDEBLASIO/

Special report on security

  • 1.
    Is having yourdata and identity compromised the NEW NORMAL? Dan DeBlasio June 4th, 2015 IN AN INCREASINGLY DIGITAL WORLD CYBERSECURITY IS A SERIOUS PROBLEM
  • 2.
  • 3.
    BREACH TRENDS LOOKING BACKBEFORE DIVING AHEAD
  • 6.
    IN A WORLDWHERE THE NORM IS CYBERSECURITY BREACHES …… IT IS IMPORTANT FOR ENTERPRISES TO HAVE MEASURES IN PLACE FOR PREVENTION AND CONTAINMENT OF AN ATTACK Not a question of “IF” but “WHEN”
  • 7.
    2011 THREAT AGENTSOVER TIME BY PERCENT OF BREACHES 2011 continued the shift towards external agents’ involvement in a high percentage of data breaches. Though we have always seen an external majority, never before has any year been so one-sided.
  • 8.
  • 9.
    2013 THREAT SUMMARY 2013may be remembered as the “year of the retailer breach,” but a comprehensive assessment suggests it was a year of transition from geopolitical attacks to large-scale attacks on payment card systems.
  • 10.
  • 11.
    Data breaches doubleYOY Average cost +$5.5 million / $200 per record Corporations are being sued for data loss (Sony) (Ponemon Institute) THE TRENDS: BREACHES ARE DOUBLING IN COST
  • 12.
    COST PER RECORDVARIES IN HARD AND SOFT COSTS (NOT FACTORING TRUST / LOYALTY) At 100 records variance is between $357 / record to $12 / Record At 1,000,000 records variance is between $27.50 / record to $0.06 / Record Glass half full Glass half empty That is a LARGE Variance in my book!
  • 13.
    IT’S IN THECLOUD…..... But which Cloud…… Private (Iaas) Public (SaaS) Hybrid (PaaS) ….and is your data and identity safe and secure?
  • 14.
    WHAT THE CLOUDBRINGS  Who owns the security?  Who is liable in a breach?  Who restores Trust?
  • 15.
    FORMS OF STRONGIDENTITY TODAY
  • 16.
    ACTUALLY, YOUR DIGITALIDENTITY TYPICALLY LOOKS LIKE THIS:
  • 17.
    PASSWORDS ARE AWEAK DEFENSE Verizon Data Breach Investigation 2013
  • 18.
    SUMMARY  Educate employeeson phishing attacks (e-mails)  Develop strong and changing passwords  Or better yet deploy two factor authentication, especially for external and mobile access  Have a post breach strategy and communications plan to limit damage to brand and customer trust  Investigate new security measures utilizing cutting-edge systems that use machine learning and, ironically, big data analysis may give a huge boost to the powers of corporate security teams. If you are looking to limit your risk of a security breach and cut the cost of the damage by more then half in real $$$:
  • 19.
    REFERENCES  Verizon: Databreach investigations reports 2011, 2012, 2013, 2014 and 2015  BBC News: Cybersecurity: Defending 'unpreventable' cyber attacks, By Paul Rubens Technology reporter  Forbes: The Power And Problem Of Privilege In Cybersecurity, Tom Kemp, CEO of Centrify  Frost-Sullivan: Damballa Failsafe Review 4-14-2015  Gartner: Identity and Access Management Summit 2008
  • 20.

Editor's Notes

  • #2 Problem statement: In an increasing digital world cybersecurity is a problem (Title) Positive principle. Positive principle: In a world where the norm is security breaches it is important for enterprises to have measures in place for prevention and containment of a security breach……….COST and business value. Huge losses in revenue beyond the cost of the record! What you invest in terms of business value is recoverable! For C Suite executives, for prevention and containment, this is your insurance policy.
  • #8 It’s not the whole story, however. Nor is it the most important one. The most significant change we saw in 2011 was the rise of “hacktivism” against larger organizations worldwide. For the Fiscal year 2010, the Secret Service arrested more than 1,200 suspects for cybercrime violations. These investigations involved over $500 million in actual fraud loss and prevented approximately $7 billion in additional losses.
  • #12 Input stats required
  • #15 We are often asked whether “the Cloud” factors into many of the breaches we investigate. The easy answer is “No—not really.” It’s more about giving up control of our assets and data (and not controlling the associated risk) than any technology specfic to the Cloud.