SlideShare a Scribd company logo
A New Generation of
Finance
A New Generation of
Finance
Presented by Ariel Saghiv
Tarya © 2018, Ariel Saghiv
PRESS RELEASE
$4,000,000,000 VALUATION LOSS
A NEW MINDSET FOR DATA SECURITY IS NEEDED
IF ORGANIZATIONS ARE TO STAY AHEAD OF THE ATTACKERS
A New Generation of
Finance
Tarya © 2018, Ariel Saghiv
-750
BC
Tarya © 2018, Ariel Saghiv
2016
Tarya © 2018, Ariel Saghiv
How it works
Our Golden Standard for Privacy
GOLDEN
STANDARD
All data is stored on Tarya’s dedicated
servers which are
• Protected by state-of-the-art Cyber
Defense Systems - made by our
internal intelligence team consisting of
former 8200 members.
• Constantly updated and improved
through Attack Surface Analysis
The strictest compliance with numerous
local and international standards:
• ISO 27001 information security
compliance and certification
• Enforcing the Israeli Privacy Act
• Supervised by the Capital Market
and Insurance Authority
Implementing regulatory, electronic and physical security methods to keep personal
information safe.
Should WE be worried?
You
Tarya © 2018, Ariel Saghiv
Identity Theft
The fraudulent acquisition and use of a person's private
identifying information, usually for financial gain.
 Virus
 Worm
 Malicious code
 Social Engineering
Tarya © 2018, Ariel Saghiv
Tarya © 2018, Ariel Saghiv
A Growing Trend
 16.7 million people were affected
with identity fraud in the USA alone
 16.8 billion US$ were stolen!
(Increase 12% from 2016)
 Social security numbers are highly popular
(exceeded credit card number theft)
Javelin Strategy & Research (2017)
Tarya © 2018, Ariel Saghiv
https://breachlevelindex.com (2018 H1)
Tarya © 2018, Ariel Saghiv
https://breachlevelindex.com (2018 H1)
Tarya © 2018, Ariel Saghiv
TYPE OF ID FRAUD THAT CAN IMPACT YOU AND NEEDS
PROTECTION:
49% 16% 10% 6% 4% 3%
Gov’t Documents &
Benefit Information
Credit Cards Phone & Utilities Bank Documents Loan Information
Employee Related
Information
Other – 19% Personal documents pertaining to an individual’s assets or identity
What is Being Stolen?
Tarya © 2018, Ariel Saghiv
Opening new credit card or bank accounts in
your name using your $$
Requesting Medical service in
your name
Forging your signature on blank
checks
Buying a car (home, etc.)
by taking out a loan in your name
Authorizing ATM transfers
Giving your name to the police
during an arrest…
WHAT THIEVES ARE DOING
WITH THIS INFORMATION
Tarya © 2018, Ariel Saghiv
$1
Drivers license
$20 $100-$400 $20-$200 $20
Social security
number
Diplomas Online payment
services login info
Loyalty accounts
$1000 -
$2000
$5-$110 $1 $1-$10 $1-$1000
Passports (US)
General non-
financial institution
logins
Subscription
services
Medical records
Credit or debit card
(credit cards are more
popular)
It Doesn’t Cost Much Either…
Tarya © 2018, Ariel Saghiv
Online Payment Services Account Information
Value depends on the balance of the account
$400-$1000 Balance is worth $20-$50!
$1000-$2500 Balance is worth $50-$120!
2500-$5000 Balance is worth $120-$200!
© 2014 TARYA– Proprietary & Confidential
Tarya © 2018, Ariel Saghiv
Marketplace
• 90% sold on the dark web
• Tor (*.onion) web sites that have multiple identities
• Identity of the seller and buyer is anonymous
Tarya © 2018, Ariel Saghiv
© 2014 TARYA– Proprietary & Confidential
Tarya © 2018, Ariel Saghiv
Consumers’ Reaction to a Data Breach
48% 33% 19%
MUST BE CONVINCED THE
PROBLEM WAS FIXED
(BEFORE RESUMING BUSINESS)
WOULD
CONTINUE TO DO
BUSINESS
WOULD NO LONGER
CONDUCT BUSINESS
KPMG, Consumer Loss Barometer 2016
Tarya © 2018, Ariel Saghiv
Social
Networks
Online
Services
Honest
Users Attackers
REGULATION
EDUCATION / TOOLS LAW ENFORCEMENT
Asymmetry of an Online World
Case Study - Equifax Breach
Breach = “Shaming”
Tarya © 2018, Ariel Saghiv
143 Million consumers private data records hacked!
– Names
– social security numbers
– birth dates
– home addresses
– driver's license numbers
– 209,000 consumers credit cards
– Tax identification numbers
© 2014 TARYA– Proprietary & Confidential
Equifax Breach
Tarya © 2018, Ariel Saghiv
Equifax Breach
• Equifax utilized Apache struts for an online dispute portal designed for
customers to log issues with credit reports
• The vulnerability exploited was CVE-2017-5638 - an arbitrary
command execution vulnerability within Apache Struts.
© 2014 TARYA– Proprietary & Confidential
© 2014 TARYA– Proprietary & Confidential
Tarya © 2018, Ariel Saghiv
Breach = “Shaming”
►Leadership
►Management Responsibility
►Transparency
►Organizational Ethics
►Commitment to the Customer
From Breach Prevention to Breach Acceptance
Tarya © 2018, Ariel Saghiv
Tarya © 2018, Ariel Saghiv
THE FUTURE
►Early Warning on identity theft
(What was stolen? What can be done?)
►Blocking Identity theft (as a service)
►Cleanup (after the breach has occurred)
►Trust - currency of the future
The Future
3
© 2014 TARYA– Proprietary & Confidential
Tarya © 2018, Ariel Saghiv
Identity Protection Products
Tarya © 2018, Ariel Saghiv
Tarya © 2018, Ariel Saghiv
Thank you
www.tarya.co.il

More Related Content

What's hot

iDenfy - Identity Verification Presentation
iDenfy - Identity Verification PresentationiDenfy - Identity Verification Presentation
iDenfy - Identity Verification Presentation
Domantas Ciulde
 
itsme Digital ID turns 3
itsme Digital ID turns 3itsme Digital ID turns 3
itsme Digital ID turns 3
Belgian Mobile ID - itsme
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
ForgeRock
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
RapidSSLOnline.com
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
blogzilla
 
GTSC IRS Day 2019 - Criminal Investigations - Eric Hylton and Panel
GTSC IRS Day 2019 - Criminal Investigations - Eric Hylton and PanelGTSC IRS Day 2019 - Criminal Investigations - Eric Hylton and Panel
GTSC IRS Day 2019 - Criminal Investigations - Eric Hylton and Panel
Government Technology & Services Coalition
 
Privacy& Personalisation: Data Driven marketing and compliance
Privacy& Personalisation: Data Driven marketing and compliancePrivacy& Personalisation: Data Driven marketing and compliance
Privacy& Personalisation: Data Driven marketing and compliance
iCompli Limited
 
AML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning WebinarAML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning Webinar
Idan Tohami
 
Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Søren Ilsøe
 
DLT - AML & CFT - Risks & Opportunites
DLT - AML & CFT - Risks & Opportunites DLT - AML & CFT - Risks & Opportunites
DLT - AML & CFT - Risks & Opportunites
Philip Vasquez
 
Blockchain and Patents talk
Blockchain and Patents talkBlockchain and Patents talk
Blockchain and Patents talk
Nelson Rosario
 
Concord presentation may2011
Concord presentation may2011Concord presentation may2011
Concord presentation may2011
David Millen
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
Gigya
 
General Data Protection Regulations (GDPR) & Impact on Your Business
General Data Protection Regulations (GDPR) & Impact on Your Business General Data Protection Regulations (GDPR) & Impact on Your Business
General Data Protection Regulations (GDPR) & Impact on Your Business
EquiCorp Associates
 
Brochure: Lexis Diligence
Brochure: Lexis Diligence Brochure: Lexis Diligence
Brochure: Lexis Diligence
LexisNexis Benelux
 
Digital Asset Management Ltd - Madrid Presentation - Club Financiero
Digital Asset Management Ltd - Madrid Presentation - Club FinancieroDigital Asset Management Ltd - Madrid Presentation - Club Financiero
Digital Asset Management Ltd - Madrid Presentation - Club Financiero
Philip Vasquez
 
Lirax
LiraxLirax
Lirax
Liraxorg
 
HIPAA and Cybersecurity Alerts
HIPAA and Cybersecurity AlertsHIPAA and Cybersecurity Alerts
HIPAA and Cybersecurity Alerts
Jessica Parker
 
MBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance WhitepaperMBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance WhitepaperMBMeHealthCareSolutions
 

What's hot (19)

iDenfy - Identity Verification Presentation
iDenfy - Identity Verification PresentationiDenfy - Identity Verification Presentation
iDenfy - Identity Verification Presentation
 
itsme Digital ID turns 3
itsme Digital ID turns 3itsme Digital ID turns 3
itsme Digital ID turns 3
 
Intelligent Authentication (Identity Live Berlin 2018)
Intelligent Authentication  (Identity Live Berlin 2018)Intelligent Authentication  (Identity Live Berlin 2018)
Intelligent Authentication (Identity Live Berlin 2018)
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
GTSC IRS Day 2019 - Criminal Investigations - Eric Hylton and Panel
GTSC IRS Day 2019 - Criminal Investigations - Eric Hylton and PanelGTSC IRS Day 2019 - Criminal Investigations - Eric Hylton and Panel
GTSC IRS Day 2019 - Criminal Investigations - Eric Hylton and Panel
 
Privacy& Personalisation: Data Driven marketing and compliance
Privacy& Personalisation: Data Driven marketing and compliancePrivacy& Personalisation: Data Driven marketing and compliance
Privacy& Personalisation: Data Driven marketing and compliance
 
AML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning WebinarAML Transaction Monitoring Tuning Webinar
AML Transaction Monitoring Tuning Webinar
 
Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...Data Driven Tax Administration - new strategy for big data, BI and analytics ...
Data Driven Tax Administration - new strategy for big data, BI and analytics ...
 
DLT - AML & CFT - Risks & Opportunites
DLT - AML & CFT - Risks & Opportunites DLT - AML & CFT - Risks & Opportunites
DLT - AML & CFT - Risks & Opportunites
 
Blockchain and Patents talk
Blockchain and Patents talkBlockchain and Patents talk
Blockchain and Patents talk
 
Concord presentation may2011
Concord presentation may2011Concord presentation may2011
Concord presentation may2011
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
 
General Data Protection Regulations (GDPR) & Impact on Your Business
General Data Protection Regulations (GDPR) & Impact on Your Business General Data Protection Regulations (GDPR) & Impact on Your Business
General Data Protection Regulations (GDPR) & Impact on Your Business
 
Brochure: Lexis Diligence
Brochure: Lexis Diligence Brochure: Lexis Diligence
Brochure: Lexis Diligence
 
Digital Asset Management Ltd - Madrid Presentation - Club Financiero
Digital Asset Management Ltd - Madrid Presentation - Club FinancieroDigital Asset Management Ltd - Madrid Presentation - Club Financiero
Digital Asset Management Ltd - Madrid Presentation - Club Financiero
 
Lirax
LiraxLirax
Lirax
 
HIPAA and Cybersecurity Alerts
HIPAA and Cybersecurity AlertsHIPAA and Cybersecurity Alerts
HIPAA and Cybersecurity Alerts
 
MBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance WhitepaperMBM Achieving HIPAA Compliance Whitepaper
MBM Achieving HIPAA Compliance Whitepaper
 

Similar to Tarya - Stolen identities

Stolen identities
Stolen identitiesStolen identities
Stolen identities
CyberX-Labs
 
Navigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance GuidelinesNavigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance Guidelines
DATAVERSITY
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
Laurent Pacalin
 
Artificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionArtificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud Prevention
Jérôme Kehrli
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit123
 
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
TrustArc
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website Security
Sucuri
 
Cyber-Crime: Where the real threats are for Auto Captives
Cyber-Crime: Where the real threats are for Auto CaptivesCyber-Crime: Where the real threats are for Auto Captives
Cyber-Crime: Where the real threats are for Auto Captives
White Clarke Group
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slides
Callcredit123
 
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel GroupFintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
FinTech Belgium
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Molly Alexander
 
The Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit PauThe Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit Pau
Krowdthink
 
Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart City
Peter Waher
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19
Kyriba Corporation
 
Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19
Kyriba Corporation
 
Identity Theft & Account Fraud
Identity Theft & Account FraudIdentity Theft & Account Fraud
Identity Theft & Account Fraud
- Mark - Fullbright
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
Laurent Pacalin
 
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresMapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance Procedures
DATAVERSITY
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Dataconomy Media
 
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresMapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance Procedures
DATAVERSITY
 

Similar to Tarya - Stolen identities (20)

Stolen identities
Stolen identitiesStolen identities
Stolen identities
 
Navigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance GuidelinesNavigating the Complex World of Compliance Guidelines
Navigating the Complex World of Compliance Guidelines
 
Preventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite GroupPreventing P2P Fraud with Aite Group
Preventing P2P Fraud with Aite Group
 
Artificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud PreventionArtificial Intelligence for Banking Fraud Prevention
Artificial Intelligence for Banking Fraud Prevention
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...
 
Ecommerce Website Security
Ecommerce Website SecurityEcommerce Website Security
Ecommerce Website Security
 
Cyber-Crime: Where the real threats are for Auto Captives
Cyber-Crime: Where the real threats are for Auto CaptivesCyber-Crime: Where the real threats are for Auto Captives
Cyber-Crime: Where the real threats are for Auto Captives
 
Insurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slidesInsurance stream - Marc DonFrancesco slides
Insurance stream - Marc DonFrancesco slides
 
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel GroupFintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
Fintech Belgium - Meetup on Compliance / KYC - Frank Verhaest - Isabel Group
 
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
Towards the Next Generation Financial Crimes Platform - How Data, Analytics, ...
 
The Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit PauThe Privacy Advantage 2016 - Amit Pau
The Privacy Advantage 2016 - Amit Pau
 
Smart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart CitySmart City Lecture 2 - Privacy in the Smart City
Smart City Lecture 2 - Privacy in the Smart City
 
Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19 Driving Payments Security and Efficiency During COVID 19
Driving Payments Security and Efficiency During COVID 19
 
Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19Driving Payments Security and Efficiency During COVID-19
Driving Payments Security and Efficiency During COVID-19
 
Identity Theft & Account Fraud
Identity Theft & Account FraudIdentity Theft & Account Fraud
Identity Theft & Account Fraud
 
Detecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-TimeDetecting Wire Fraud in Real-Time
Detecting Wire Fraud in Real-Time
 
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresMapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance Procedures
 
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...Data Natives meets DataRobot |  "Build and deploy an anti-money laundering mo...
Data Natives meets DataRobot | "Build and deploy an anti-money laundering mo...
 
Mapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance ProceduresMapping Business Processes to Compliance Procedures
Mapping Business Processes to Compliance Procedures
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Tarya - Stolen identities

  • 1. A New Generation of Finance A New Generation of Finance Presented by Ariel Saghiv
  • 2. Tarya © 2018, Ariel Saghiv PRESS RELEASE $4,000,000,000 VALUATION LOSS
  • 3. A NEW MINDSET FOR DATA SECURITY IS NEEDED IF ORGANIZATIONS ARE TO STAY AHEAD OF THE ATTACKERS
  • 4. A New Generation of Finance
  • 5. Tarya © 2018, Ariel Saghiv -750 BC
  • 6. Tarya © 2018, Ariel Saghiv 2016
  • 7. Tarya © 2018, Ariel Saghiv
  • 9. Our Golden Standard for Privacy GOLDEN STANDARD All data is stored on Tarya’s dedicated servers which are • Protected by state-of-the-art Cyber Defense Systems - made by our internal intelligence team consisting of former 8200 members. • Constantly updated and improved through Attack Surface Analysis The strictest compliance with numerous local and international standards: • ISO 27001 information security compliance and certification • Enforcing the Israeli Privacy Act • Supervised by the Capital Market and Insurance Authority Implementing regulatory, electronic and physical security methods to keep personal information safe.
  • 10. Should WE be worried? You
  • 11. Tarya © 2018, Ariel Saghiv Identity Theft The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.  Virus  Worm  Malicious code  Social Engineering
  • 12. Tarya © 2018, Ariel Saghiv
  • 13. Tarya © 2018, Ariel Saghiv A Growing Trend  16.7 million people were affected with identity fraud in the USA alone  16.8 billion US$ were stolen! (Increase 12% from 2016)  Social security numbers are highly popular (exceeded credit card number theft) Javelin Strategy & Research (2017)
  • 14. Tarya © 2018, Ariel Saghiv https://breachlevelindex.com (2018 H1)
  • 15. Tarya © 2018, Ariel Saghiv https://breachlevelindex.com (2018 H1)
  • 16. Tarya © 2018, Ariel Saghiv TYPE OF ID FRAUD THAT CAN IMPACT YOU AND NEEDS PROTECTION: 49% 16% 10% 6% 4% 3% Gov’t Documents & Benefit Information Credit Cards Phone & Utilities Bank Documents Loan Information Employee Related Information Other – 19% Personal documents pertaining to an individual’s assets or identity What is Being Stolen?
  • 17. Tarya © 2018, Ariel Saghiv Opening new credit card or bank accounts in your name using your $$ Requesting Medical service in your name Forging your signature on blank checks Buying a car (home, etc.) by taking out a loan in your name Authorizing ATM transfers Giving your name to the police during an arrest… WHAT THIEVES ARE DOING WITH THIS INFORMATION
  • 18. Tarya © 2018, Ariel Saghiv $1 Drivers license $20 $100-$400 $20-$200 $20 Social security number Diplomas Online payment services login info Loyalty accounts $1000 - $2000 $5-$110 $1 $1-$10 $1-$1000 Passports (US) General non- financial institution logins Subscription services Medical records Credit or debit card (credit cards are more popular) It Doesn’t Cost Much Either…
  • 19. Tarya © 2018, Ariel Saghiv Online Payment Services Account Information Value depends on the balance of the account $400-$1000 Balance is worth $20-$50! $1000-$2500 Balance is worth $50-$120! 2500-$5000 Balance is worth $120-$200!
  • 20. © 2014 TARYA– Proprietary & Confidential
  • 21. Tarya © 2018, Ariel Saghiv Marketplace • 90% sold on the dark web • Tor (*.onion) web sites that have multiple identities • Identity of the seller and buyer is anonymous
  • 22. Tarya © 2018, Ariel Saghiv
  • 23. © 2014 TARYA– Proprietary & Confidential
  • 24. Tarya © 2018, Ariel Saghiv Consumers’ Reaction to a Data Breach 48% 33% 19% MUST BE CONVINCED THE PROBLEM WAS FIXED (BEFORE RESUMING BUSINESS) WOULD CONTINUE TO DO BUSINESS WOULD NO LONGER CONDUCT BUSINESS KPMG, Consumer Loss Barometer 2016
  • 25. Tarya © 2018, Ariel Saghiv Social Networks Online Services Honest Users Attackers REGULATION EDUCATION / TOOLS LAW ENFORCEMENT Asymmetry of an Online World
  • 26. Case Study - Equifax Breach Breach = “Shaming”
  • 27. Tarya © 2018, Ariel Saghiv 143 Million consumers private data records hacked! – Names – social security numbers – birth dates – home addresses – driver's license numbers – 209,000 consumers credit cards – Tax identification numbers
  • 28. © 2014 TARYA– Proprietary & Confidential Equifax Breach
  • 29. Tarya © 2018, Ariel Saghiv Equifax Breach • Equifax utilized Apache struts for an online dispute portal designed for customers to log issues with credit reports • The vulnerability exploited was CVE-2017-5638 - an arbitrary command execution vulnerability within Apache Struts.
  • 30. © 2014 TARYA– Proprietary & Confidential
  • 31. © 2014 TARYA– Proprietary & Confidential
  • 32. Tarya © 2018, Ariel Saghiv Breach = “Shaming” ►Leadership ►Management Responsibility ►Transparency ►Organizational Ethics ►Commitment to the Customer
  • 33. From Breach Prevention to Breach Acceptance
  • 34. Tarya © 2018, Ariel Saghiv
  • 35. Tarya © 2018, Ariel Saghiv THE FUTURE ►Early Warning on identity theft (What was stolen? What can be done?) ►Blocking Identity theft (as a service) ►Cleanup (after the breach has occurred) ►Trust - currency of the future The Future 3
  • 36. © 2014 TARYA– Proprietary & Confidential
  • 37. Tarya © 2018, Ariel Saghiv Identity Protection Products
  • 38. Tarya © 2018, Ariel Saghiv
  • 39. Tarya © 2018, Ariel Saghiv

Editor's Notes

  1. שלום, אני אריאל סגיב לא באתי לספר על FIREWALL ולא על סיסמאות חזקות וגם לא על רגולציה באתי לשנות את נקודת המבט שלכם מה קורה אחרי שהמידע הסודי ביותר ידלוף. וזה יקרה.
  2. קחו רגע להפנים את הגרף --הפסקה אנחנו רואים פה את שווי המנייה של חברת EQUIFAX אחת מ-3 חברות האשראי הגדולות בארה"ב רגע אחרי שדיווחו על דליפת המידע הגדולה ביותר של 2017, וצברה הפסד של 4 מיליארד דולר. לא נעים
  3. מידע ידלוף. כמה שלא נשקיע, טעות פשוטה של עובד – והמידע בחוץ. We are already worried - so should you צריך לעשות חישוב מסלול מחדש
  4. קצת על המקורות ומאיפה אני מגיע
  5. בנקים נראו ככה
  6. עדיין נראים ככה
  7. ה SHARING ECONOMY קרה
  8. בנינו טכנולוגיה שמקשרת צרכני אשראי מצד אחד, משקיעים בצד השני BIG DATA ומודלים עסקיים מתקדמים לעשות תהליכים אוטומטיים, בכמה דקות וברמת דיוק גבוהה
  9. פועלים לשמירה על פרטיות המשתמשים במשולש הזהב – רגולציה, טכנולוגיה ואופרציה כדי להקפיד שמידע יישאר בחברה הצבנו ביחד עם MADASEC הצבנו לעצמנו GOLDEN STANDARD לשמירה על פרטיות הלקוחות
  10. ועדיין מתעוררים כל יום עם חששות מה יוליד יום
  11. גניבת מידע מתבצעת למטרה של רווח כלכלי או התחזות אפשר לגנוב באמצעים טכנולוגיים כמו וירוסים או חולשות במערכת, ואפילו על ידי גניבת תיק עם מסמכים ואם יש על זה סרטים, בטוח יש בעיה
  12. הסרט הזה לא הזוי כמעט 17 מיליון אמריקאים חוו זאת ב 2017 פרטים אישיים הרבה יותר פופולריים מגניבת כרטיסי אשראי
  13. מדובר בתופעה גלובלית כל אירוע במפה (מהחצי הראשון של 2018) מייצג אירוע דליפת מידע קטן או גדול האירועים מתוחזקים ומפורסמים עי אתר BREACH LEVEL INDEX
  14. אין תעשיה של נפגעת מדליפות מידע – רפואה, ממשלה, קמעונאות ואלה הנתונים רק לחצי הראשון של 2018
  15. איזה סוגי מידע פופולרי? העתקי מסמכים ופרטים מזהים ניתן להדפיס תעודות מזויפות בקלות רבה
  16. מה עושים עם הזהות שקניתי?
  17. וזה גם ממש לא יקר, מתחיל ב 1$ ועד אלפי דולרים לפי שווי המידע שנרכש ומה אפשר לעשות איתו
  18. גם חשבונות ONLINE שווים לא מעט ומאפשרים ביצוע רכישות על חשבון מישהו אחר או אף משיכת הכסף ככה נראית פרסומת ב FACEBOOK של מישהו שמוכר
  19. שימו לב למידע הרב הזמין בקלות לכל דורש רובו נמכר ב DARKWEB
  20. ב DARKWEB גם האתרים, גם הקונים, וגם המוכרים אנונימיים בגלל שמדובר ברכישת מידע אין שליחה בפועל של מוצרים
  21. ממש EBAY של מידע אישי צריך לחפש FULLZ או SSN
  22. ואפשר גם להזמין במייל
  23. הלקוחות היום מודעים מאי פעם לפרטיות שלהם, ומצביעים ברגליים מחקרים מראים שחשוב מאוד לתקשר באופן שקוף את האירוע וכיצד פועלים לכבות את השריפה
  24. מציאות מטרידה ואסימטרית ולכן חשוב שנהיה מודעים אליה האמצעים של אכיפת החוק והחינוך למשתמשים והרגולציה אינם נותנים מענה להיקפים המסיביים
  25. אירוע של דליפת מידע = BREACH הינו SHAMING מודרני לחברה שנכשלה בשמירה על אמון המשתמשים ופעלה בחוסר אחריות
  26. EQUIFAX אחת מ-3 החברות הגדולות בארה"ב לניתוח ומתן שירותי CREDITSCORE בדליפה נגנבו פרטים של כחצי מאוכלוסיית ארה"ב ומשתמשים רבים בקנדה ואירופה בעידן האינטרנט קשה לשמור על זה בסוד. וגם על הדעה של הלקוחות
  27. In todays age - its very difficult to contain a breach
  28. הפרצה נבעה מתוכנה לא מעודכנת באתר האינטרנט של החברה במודול תלונות לקוחות
  29. למעשה כבר בפברואר פורסמה התראה על חולשה במנוע האפליקטיבי שלא טופלה. הפורצים חדרו למערכת והוציאו מידע במשך כמעט 3 חודשים לקח לחברה כחודש לפרסם את האירוע ובמהלכו כדור השלג רק התגבר – בכירים מכרו מניות לפני פרסום, פורטל בירור פרטי הפריצה נפרץ אף הוא וגנב פרטי משתמשים, התברר שגם אזרחים אירופים וקנדיים נפגעו ומנכ"ל החברה התפטר
  30. בראיה לאחור ניהול המשבר יכול היה להתנהל אחרת – החל מתיקון החולשה בזמן, גילוי של הפרצה מוקדם יותר והתנהלות אחראית ושקופה של ההנהלה הייתה פה שרשרת של אירועים שאפשר היה לפתור אחרת וניתן ללמוד מזה הרבה. האחריות אינה רק של המנכ"ל אלא של כלל עובדי החברה ניהול נכון של המשבר הוא חלק חשוב לא פחות ממניעתו
  31. אנו היום חיים בעידן שהאירוע יקרה. והשאלה איך נפעל?
  32. ממש מהחודש שעבר, פייסבוק שאחרי המשפט בסנאט ופרשת קמברידג אנליטיקה חווה פריצה נוספת ונגישות למידע של 50 מיליון משתמשים
  33. המשברים הרבים מייצרים בשוק הזדמנויות לשירותים חדשים לחברות ולפרטיים: החל מגילוי מוקדם של אירוע, חסימת שימוש בפרטים אישיים ואף טיפול בנפגעים לאחר אירוע דלף מדד האמון והיכולת למדוד ולפרסם אותו הופך למעשה להיות המטבע של העתיד כך נראה סרט הדרכה של BANK OF AMERICA ללקוחות הבנק במקרה של גניבת המידע האישי
  34. חברות חדשות צצות כדי לאפשר הגנה על הזהות
  35. ניטור שימוש בזהות, ביטוח, חסימה אוטומטית של הזהות במוסדות שונים ונותנות שירותים לפרטיים וחברות
  36. לסיכום
  37. תודה רבה,