SlideShare a Scribd company logo
1 of 40
Download to read offline
Cyberwarfare, Payments Fraud
and Email Compromise
Webinar
Housekeeping
• 1 CPE credit in Information Technology - be sure to
participate in the polls to be eligible
• Webinar is being recorded - Slides and recording will
be emailed after the webinar
• 50 minute session
• 10 minute Q&A
• Send in your questions!
The contents contained within this slide deck may contain
basic and preliminary observations. We also refer to some
generally accepted principles for forensic investigations.
All observations are subject to further investigation and
explanation of facts and are therefore subject to change.
Additional evidence and forensic analysis may be required to
support any findings or observations.
Disclaimer
Objectives
 Introductions
 Understanding the Threats
 Cyber Criminals Monetizing Your Data; Fraud and Phishing and so much more
 B2B Fraud Statistics
 How a Cyber-threat actor(s) can destroy your business and why you are a target…
 Cyber Threat Intelligence: Know your enemy & vulnerabilities…
 How to Protect your business…
 Final Thoughts
 Ask an Expert…
Matthew Ferrante, Partner at Withum
Summary Accolades
• Sony Network Intrusions, Target Data Breach, Neiman Marcus, Banner Health Networks, etc..
• Cyber Services to SMEs, Global Enterprises, Businesses, Energy, Technology, Crypto, Manufacturing, Medical, etc..
• Criminal, Civil, Regulatory Actions, Class Action Lawsuits Technical Experts
• Barclays Global Security Transformation
• US Secret Service Top Electronic Crimes Expert
• Awarded by Debit & Credit Card Industry
• US Secret Service’s Director’s Citation
• US Department of Justice Awards for Invaluable Expertise
• Designed the First Title III Computer Network Wiretap in United States
• 65+ hackers apprehended Globally…
Summary Special Operations
> Disaster Recovery | Business Continuity Rebuild of NYFO after 09/11 Attacks
> Operation Firewall / Operation ‘Get Rich or Die Tryin’
> Joint Terrorism Task Force (USSS E-Crimes Support)
> 50th & Broadway: PBX Hacking, Access Device Fraud & Shoulder Surfing
> Al-Qaeda Network Takedowns: Netherlands, Middle East, etc..
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Eric Jackson
vCISO for Withum Cyber Team
Background
• Developed Endpoint Security Programs for a Fortune 500 financial
• Director of security program for life and safety organizations, to include 911 services
• Incident Management Lead – multiple DOD organizations
• Trained offensive and defensive security teams for DOD and civilian orgs
• Developed “Internet range” for training offensive and defensive security teams
• Developed multiple custom offensive and defensive security tools
Technical Background
• Worked hundreds of incident cases for the military
• Experienced penetration tester
• Emulated hackers for DOD exercises
• Years of experience running security operations centers, thousands of incidents from cradle-to-grave
• Expert Lockpicker
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Meet the Withum Cyber Team
US Secret
Service
US Central
Command US Air Force US NAVY
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
What We Do….
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Steve Susnak
SVP Capital One Commercial Banking
• Steve joined Capital One in 2019 and is currently the Northern Region
Director for Treasury Management(TM) with responsibilities for both the
core middle market and multiple specialty segments.
• Prior to joining Capital One, Steve spent 15 years at PNC Financial leading
a nationally based TM sales segment covering both general diversified
industries and financial institutions.
• His professional affiliations include membership with the National
Association for Financial Professionals (AFP), as well as multiple regional
associations. He has been a featured speaker on a variety of industry
topics at the regional and national levels.
• Steve received his B.S. in Economics from Allegheny College. He currently
serves on the board of the not-for-profit Laurie Ann West Community
Resource, where he resides in Pittsburgh, PA with his wife and two sons.
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Polling Question 1
Understanding the Threat Landscape
Breakdown Cybercrime Economy in Profits
• Illicit Online Markets: $860 Billion
• Theft of Intellectual Property or Trade Secrets: $500 Billion
• Data Trading: $160 Billion
• Cybercrime-As-A-Service: ~$1.6 billion
• Ransomware: $1 Billion
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Cyber Security Stats and Facts
Source: IBM/Ponemon
$1.5 Trillion
$6 Trillion by 2021
14 Sec. | 11 Sec. 2021
USA
146 Billion
$242 per record
$8 Million
• Cybercrime economy in profits:
• Cybercrime Damages:
• Ransomware Attacks:
• Top Country Targeted:
• Est. Records Exposed 2018 - 2023:
• Est. Cost Per Record Exposed:
• Average Cost of Data Breach:
• Dark Web Cybercrime Toolkit Cost:
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
COVID-19 Related Cyber Attack Statistics
Since COVID-19 pandemic began:
• Cyber attacks up 500%
• Google has been blocking 18 million COVID-19 related phishing emails and
malware daily
• Spear-phishing attacks increased 667%
• FBI complaint center for internet crime has received over 3,600 COVID-19 related
scam complaints
• COVID-19 related phone scams are on the rise
• Ransomware attacks increased 148%
• Average amount demanded for ransomware attacks increased 33%
Source: techjury
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
COVID-19 Related Cyber Attack Statistics (Cont.)
• 46% of businesses that started working remotely have experienced at
least one form of a cybersecurity attack
• Phishing websites have increased by 350%
• Between March 9th and March 23rd, over 300,000 coronavirus
keyword-related websites were created.
• Banks have experienced a 238% increase in cyberattacks
Source: techjury
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Cyber Insurance
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Accountability for Executives,
Board Members and Positions of Trust
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Corporate Executive Accountability Act, which would impose jail time
on corporate executives who "negligently permit or fail to prevent" a
"violation of the law" that "affects the health, safety, finances or
personal data"
Motivation of Threat Actors
Impacts by Cyber Security Incidents
Polling Question 2
What Makes an Easy Target
• Complacency & Groupthink: Not us; besides it’s a quiet place!
• No Security Strategy: Lack of Chief Information Security Officer (“CISO”) CISO or vCISO
• Security as an Afterthought and/or Expensive
• Limited IT and IT Security Expertise
• Misconfigurations, Misconceptions, Miscalculations (“3M”)
• We’re in the Cloud!
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
2019 Reported Cyber Crime by Victim Loss
Source: FBI
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Confidential
22
Confidential
22
The Scope of the Threat
66%
of respondents report
experiencing some form
of B2B payment fraud
attack within the past 2
years
Source: Capital One B2B Payment Security Research
Confidential
23
Confidential
23
Informational Purposes Only
Source: Capital One B2B Payment Security Research
Not a
priority for
leadership
Minimal
value add
Disruptive to
operations
Too
expensive
Difficult to
implement
In the
process of
updating
Need to
retrain
employees
User
friction
33%
29%
24%
20%
17%
15%
31%
11%
Businesses Report their Top Barriers to Updating Fraud Security
Neglecting the Significant Impact of Fraud
Confidential
24
Confidential
24
https://www.capitalone.com/learn-grow/business-resources/avoiding-business-fraud/
Source: 2020 AFP Payments Fraud and Control Report | www.AFPonline.org . The information contained herein is shared for educational purposes only to help clients protect themselves from fraud. It does not provide a comprehensive list of all types of
fraud, all departments that are vulnerable to fraud, or all best practices to tackle fraud. Nothing contained herein shall give rise to, or be construed to give rise to, any obligations or liability whatsoever on the part of Capital One.
Percentage Distribution of Organizations
Popular Targets of Fraud Within an Organization
Departments Most Vulnerable to Being Targeted by Business Email Compromise Fraud
Confidential
25
Confidential
25
Informational Purposes Only
Source: Capital One B2B Payment Security Research
B2B Payment Fraud by Attack Method
Within the past two years, has your organization experienced any of the below fraud attacks in regard to B2B payments?
Phishing/
Business Email
Compromise
Data
Breach
Note: N=225
Malware/
Ransomware
28% 27%
Account
Takeover
15%
Cashflow
scams
14%
Internal fraud /
Employee theft
13%
Other
1%
36%
The Most Common Methods of Fraud
Confidential
26
● A spoofed sender
domain
CEO fraudsters usually register a domain
similar to its target. Examples
About Business Email Compromise
From:
Sent: Wednesday, April 18, 2018 2:11 PM
To:
Subject: Re: INVOICE NO 17150 CIS# 105013
Were you able to initiate wire to ???
From:
Sent: Wednesday, April 18, 2018 3:48 PM
To:
Subject: Re: INVOICE NO 17150 CIS# 105013
Kindly, advise when wire is released.
● An urgent email
subject requesting
immediate
fund transfers
BEC scams typically use subject lines
that imply urgency regarding payment
inquiries or fund transfers.
● Position of the email sender
Cybercriminals employing CEO fraud typically pose as
someone influential in an organization.
● Body of the email
Scammers make it appear as if the fund
transfer is urgently needed and should be
executed as soon as possible.
From:
Sent: Friday April 6, 2018 3:07 PM
To:
Subject: Invoice No 17150 LLC
Could you please process this invoice from LLC. Kindly,
send me Wire Slip.
Thanks!!
How to protect a Business from Cyber Attacks
“Know your enemy and know yourself - Sun Tzu”
Polling Question 3
Business Destruction via Cyber
• Complacency
• False Sense of Security | Rubber Stamping Environment
• Check the Box Security | No Validation of Controls
• Not us…yes you!
• No Strategy / Plan
• Lack of Independent Security Audits
• Lack of Accountability
• Fix-on-Failure
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Protect Your Business (Assessments)
• Threat Emulation Security Assessment
• vCISO / vCCO Analysis of Sec. Control Framework
• Business Continuity & Backup Assurance
• Incident Response Exercises
• ‘Trust; but Verify’
• OSINT (Open Source Intel Report)
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Security Measures for Businesses
Secure workstations
• Lock our systems (Ctrl-Alt-Delete)
• Shut down systems not in use
• Run up-to-date virus scanning software
• Password protect files
• Apply software patches
• Run a desktop firewall
Backup Data
• Test backups
• Securely store backup media (offsite)
• Restrict access to who can perform restoration
Control Access to Data
• Only allow access that is absolutely required
• Don’t grant accounts because access “may” be
required
• Use least privilege access policies that state access
will only be granted if required, not by default
• Are accounts removed and passwords changed
when someone changes jobs or is terminated?
Physical Security
• Control access to sensitive areas
• Install cable locks
• Limited the amount of people who has access?
• Are sensitive documents secured?
Incident Response
• Do you Have a plan?
• When was it last reviewed and updated?
• Who gets alerts when something is wrong?
• Who contains/remediates it?
Perform Audits
• Evaluate internal/external controls
• Use third party for non-bias reporting
• Conduct regular penetration testing/scanning
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Security Measures for Businesses (Cont’d)
Teleconferencing
• Create Virtual Waiting Rooms
• Use unique meeting ID’s and Passwords
• Lock down your meeting (If Applicable)
Remote Work
• Use VPN (Virtual Private Networks)
• Use 2FA / MFA
Others
• In-House CFI / Security
• Understand your Cyber Security Policy, e.g. what is REALLY covering
and under what terms and conditions
• Cloud: Use the right licensing to protect your staff and your
customers data, e.g. M5 vs O5 (Microsoft Example)
• Data Loss Prevention
• FIM Solution
• Threat & Intel
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
How to Protect your Businesses
Assess the Risks and Formulate a Plan
• Perform an objective analysis of your information, systems and processes. Your IT team is probably qualified, but a third
party with experience in cybersecurity is recommended to avoid any bias.
• Look for weak spots in your network and data security. Make evaluations and scans a regular part of your internal audit
processes. Conduct regular external assessments and scans to identify vulnerabilities.
Avoid Human Error
• Cyber risks are not just a problem with technology. It all comes down to protecting information, and anyone with access to
that information (staff, contractors, vendors, and even customers) must be responsible and accountable.
• Establish a culture of cybersecurity awareness. All staff should regularly be made aware of the most current threats and
attacks being used by criminals.
• Provide mechanisms to enable remote workforces to perform their functions securely, while limiting the organization’s
risk exposure due to human error.
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
How to Protect the Businesses (Cont.)
Be Prepared for the Worst
• It is important to plan your response in the event you are hit with an attack. A comprehensive and documented Incident Management
Plan is designed to guide the organization through a suspected security incident.
• Roles and responsibilities should be defined, such as who will carry out key tasks like forensic investigation and legal response. Most states
have requirements for reporting data security breaches. It is important that your team know who is responsible for understanding the
breach reporting requirements and reporting to the applicable state(s) in a timely basis to avoid potential fines and penalties.
Commonly Overlooked Risks
• Even with the best of planning, there are still risks that are often overlooked. Problems can arise from disparate IT systems, poorly
configured personal devices used on the corporate network, and when services are integrated with third party vendors.
• Hackers will find and exploit your systems weakest link, whatever it may be. It is important to know where all of these weak links are and
work toward securing them.
This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited.
©2020 WithumSmith+Brown, PC All rights reserved.
Polling Question 4
Confidential
36
Tech Tips
Make It Hard
for Them
Don’t Know….
…..Don’t Click
Process Tips
Please note the information and tips contained herein are shared for educational purposes only to assist our clients in the joint fight against fraud and should not be construed to
create obligations on the part of Capital One
Informational Purposes Only
Tips to Help Tackle B2B Fraud
Confidential
37
● Use strong and different passwords.
● Never put sensitive data
on unsecured computers.
● Consider adopting multi-factor
authentication.
● Use controls available to you.
● Never respond to suspicious emails,
open attachments or click hyperlinks.
● Use known phone numbers
to verify changes.
● Check sender’s email addresses.
Tips to Help Tackle B2B Fraud
Make It Hard
for Them
Don’t Know…
...Don’t Click
Confidential
38
● Carefully monitor account activity and
review all transactions on a daily basis.
● Leverage reporting and alerting tools
that your FIs provide.
● Evaluate your internal controls and
conduct an annual risk assessment.
● Maintain a high level of awareness
across your staff.
● Insist that your suppliers use the same
methods of identity authentication as you.
● Always update software and systems.
● Use anti-virus and anti-malware
software that updates automatically.
● Dedicate a computer exclusively for online
banking transactions, nothing else.
● Restrict administrative rights to install
software to IT staff.
Tips to Help Tackle B2B Fraud
Tech Tips Process Tips
Questions
For More Information, Please Contact
Withum Cyber
WCyber.info@withum.com
Eric Jackson
+1 (402) 867-7432
ejackson@withum.com
Stephen Susnak
+1 (646) 988-6035
stephen.susnak@capitalone.com

More Related Content

What's hot

Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Citrin Cooperman
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachFletcher Media
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCapri Insurance
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19Citrin Cooperman
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityPECB
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...Citrin Cooperman
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsShawn Tuma
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityKevin Duffey
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 

What's hot (20)

Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19A Hacker's Playground - Cyber Risks During COVID-19
A Hacker's Playground - Cyber Risks During COVID-19
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity Regulations
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 
A Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for BusinessesA Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for Businesses
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 

Similar to Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Fraud and Cyber Insurance

CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers BDO_Consulting
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Grant Barker
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWPICPE
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Jason Hong
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Jason Hong
 

Similar to Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Fraud and Cyber Insurance (20)

Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Small Business Tip Card
Small Business Tip CardSmall Business Tip Card
Small Business Tip Card
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 

More from Withum

Sage Intacct R3 Release 2023
Sage Intacct R3 Release 2023Sage Intacct R3 Release 2023
Sage Intacct R3 Release 2023Withum
 
Congressional Update on Potential Tax Legislation For You and Your Business.pptx
Congressional Update on Potential Tax Legislation For You and Your Business.pptxCongressional Update on Potential Tax Legislation For You and Your Business.pptx
Congressional Update on Potential Tax Legislation For You and Your Business.pptxWithum
 
Power Platform Governance Center of Excellence
Power Platform Governance Center of ExcellencePower Platform Governance Center of Excellence
Power Platform Governance Center of ExcellenceWithum
 
Safeguarding Your Law Firm Against Cyber Threats
Safeguarding Your Law Firm Against Cyber ThreatsSafeguarding Your Law Firm Against Cyber Threats
Safeguarding Your Law Firm Against Cyber ThreatsWithum
 
IRS Audits of The ERC 5.31.2023
IRS Audits of The ERC 5.31.2023IRS Audits of The ERC 5.31.2023
IRS Audits of The ERC 5.31.2023Withum
 
Navigating Through Uncertain Times: An Economic Update for Manufacturers with...
Navigating Through Uncertain Times: An Economic Update for Manufacturers with...Navigating Through Uncertain Times: An Economic Update for Manufacturers with...
Navigating Through Uncertain Times: An Economic Update for Manufacturers with...Withum
 
Put Your NetSuite Data to Work – Discover Better NetSuite Reporting
Put Your NetSuite Data to Work – Discover Better NetSuite ReportingPut Your NetSuite Data to Work – Discover Better NetSuite Reporting
Put Your NetSuite Data to Work – Discover Better NetSuite ReportingWithum
 
IRS Audits of The Employee Retention Credit 2.16.23.pdf
IRS Audits of The Employee Retention Credit 2.16.23.pdfIRS Audits of The Employee Retention Credit 2.16.23.pdf
IRS Audits of The Employee Retention Credit 2.16.23.pdfWithum
 
International Tax and TP in the Metaverse 2.9.23.pptx
International Tax and TP in the Metaverse 2.9.23.pptxInternational Tax and TP in the Metaverse 2.9.23.pptx
International Tax and TP in the Metaverse 2.9.23.pptxWithum
 
CMMC for Contractors and Manufacturers – What to Know for 2023
CMMC for Contractors and Manufacturers – What to Know for 2023CMMC for Contractors and Manufacturers – What to Know for 2023
CMMC for Contractors and Manufacturers – What to Know for 2023Withum
 
Sales Use Tax Opportunities and Traps Affecting Your Business
Sales Use Tax Opportunities and Traps Affecting Your BusinessSales Use Tax Opportunities and Traps Affecting Your Business
Sales Use Tax Opportunities and Traps Affecting Your BusinessWithum
 
Tax Planning for Property Owners – 2022 Year-End and Beyond
Tax Planning for Property Owners – 2022 Year-End and BeyondTax Planning for Property Owners – 2022 Year-End and Beyond
Tax Planning for Property Owners – 2022 Year-End and BeyondWithum
 
Webinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdf
Webinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdfWebinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdf
Webinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdfWithum
 
Lessons from the First 100 Days of Recreational Cannabis in New Jersey
Lessons from the First 100 Days of Recreational Cannabis in New JerseyLessons from the First 100 Days of Recreational Cannabis in New Jersey
Lessons from the First 100 Days of Recreational Cannabis in New JerseyWithum
 
6 Ways to Accelerate Your Multichannel Growth
6 Ways to Accelerate Your Multichannel Growth6 Ways to Accelerate Your Multichannel Growth
6 Ways to Accelerate Your Multichannel GrowthWithum
 
Is There A Union In Your Future? Understanding Cannabis Labor Peace Agreements
Is There A Union In Your Future? Understanding Cannabis Labor Peace AgreementsIs There A Union In Your Future? Understanding Cannabis Labor Peace Agreements
Is There A Union In Your Future? Understanding Cannabis Labor Peace AgreementsWithum
 
The Business of Sustainable Supply Chains for Manufacturers
The Business of Sustainable Supply Chains for ManufacturersThe Business of Sustainable Supply Chains for Manufacturers
The Business of Sustainable Supply Chains for ManufacturersWithum
 
Using Cutting Edge Engagement Tools to Improve Talent Retention
Using Cutting Edge Engagement Tools to Improve Talent RetentionUsing Cutting Edge Engagement Tools to Improve Talent Retention
Using Cutting Edge Engagement Tools to Improve Talent RetentionWithum
 
PL 86-272 - The Past Present and Future
PL 86-272 - The Past Present and FuturePL 86-272 - The Past Present and Future
PL 86-272 - The Past Present and FutureWithum
 
Withum Global Summit 2022 6.8.22.pdf
Withum Global Summit 2022 6.8.22.pdfWithum Global Summit 2022 6.8.22.pdf
Withum Global Summit 2022 6.8.22.pdfWithum
 

More from Withum (20)

Sage Intacct R3 Release 2023
Sage Intacct R3 Release 2023Sage Intacct R3 Release 2023
Sage Intacct R3 Release 2023
 
Congressional Update on Potential Tax Legislation For You and Your Business.pptx
Congressional Update on Potential Tax Legislation For You and Your Business.pptxCongressional Update on Potential Tax Legislation For You and Your Business.pptx
Congressional Update on Potential Tax Legislation For You and Your Business.pptx
 
Power Platform Governance Center of Excellence
Power Platform Governance Center of ExcellencePower Platform Governance Center of Excellence
Power Platform Governance Center of Excellence
 
Safeguarding Your Law Firm Against Cyber Threats
Safeguarding Your Law Firm Against Cyber ThreatsSafeguarding Your Law Firm Against Cyber Threats
Safeguarding Your Law Firm Against Cyber Threats
 
IRS Audits of The ERC 5.31.2023
IRS Audits of The ERC 5.31.2023IRS Audits of The ERC 5.31.2023
IRS Audits of The ERC 5.31.2023
 
Navigating Through Uncertain Times: An Economic Update for Manufacturers with...
Navigating Through Uncertain Times: An Economic Update for Manufacturers with...Navigating Through Uncertain Times: An Economic Update for Manufacturers with...
Navigating Through Uncertain Times: An Economic Update for Manufacturers with...
 
Put Your NetSuite Data to Work – Discover Better NetSuite Reporting
Put Your NetSuite Data to Work – Discover Better NetSuite ReportingPut Your NetSuite Data to Work – Discover Better NetSuite Reporting
Put Your NetSuite Data to Work – Discover Better NetSuite Reporting
 
IRS Audits of The Employee Retention Credit 2.16.23.pdf
IRS Audits of The Employee Retention Credit 2.16.23.pdfIRS Audits of The Employee Retention Credit 2.16.23.pdf
IRS Audits of The Employee Retention Credit 2.16.23.pdf
 
International Tax and TP in the Metaverse 2.9.23.pptx
International Tax and TP in the Metaverse 2.9.23.pptxInternational Tax and TP in the Metaverse 2.9.23.pptx
International Tax and TP in the Metaverse 2.9.23.pptx
 
CMMC for Contractors and Manufacturers – What to Know for 2023
CMMC for Contractors and Manufacturers – What to Know for 2023CMMC for Contractors and Manufacturers – What to Know for 2023
CMMC for Contractors and Manufacturers – What to Know for 2023
 
Sales Use Tax Opportunities and Traps Affecting Your Business
Sales Use Tax Opportunities and Traps Affecting Your BusinessSales Use Tax Opportunities and Traps Affecting Your Business
Sales Use Tax Opportunities and Traps Affecting Your Business
 
Tax Planning for Property Owners – 2022 Year-End and Beyond
Tax Planning for Property Owners – 2022 Year-End and BeyondTax Planning for Property Owners – 2022 Year-End and Beyond
Tax Planning for Property Owners – 2022 Year-End and Beyond
 
Webinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdf
Webinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdfWebinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdf
Webinar: Year-End Planning Steps for Success in 2022 11.29.2022.pdf
 
Lessons from the First 100 Days of Recreational Cannabis in New Jersey
Lessons from the First 100 Days of Recreational Cannabis in New JerseyLessons from the First 100 Days of Recreational Cannabis in New Jersey
Lessons from the First 100 Days of Recreational Cannabis in New Jersey
 
6 Ways to Accelerate Your Multichannel Growth
6 Ways to Accelerate Your Multichannel Growth6 Ways to Accelerate Your Multichannel Growth
6 Ways to Accelerate Your Multichannel Growth
 
Is There A Union In Your Future? Understanding Cannabis Labor Peace Agreements
Is There A Union In Your Future? Understanding Cannabis Labor Peace AgreementsIs There A Union In Your Future? Understanding Cannabis Labor Peace Agreements
Is There A Union In Your Future? Understanding Cannabis Labor Peace Agreements
 
The Business of Sustainable Supply Chains for Manufacturers
The Business of Sustainable Supply Chains for ManufacturersThe Business of Sustainable Supply Chains for Manufacturers
The Business of Sustainable Supply Chains for Manufacturers
 
Using Cutting Edge Engagement Tools to Improve Talent Retention
Using Cutting Edge Engagement Tools to Improve Talent RetentionUsing Cutting Edge Engagement Tools to Improve Talent Retention
Using Cutting Edge Engagement Tools to Improve Talent Retention
 
PL 86-272 - The Past Present and Future
PL 86-272 - The Past Present and FuturePL 86-272 - The Past Present and Future
PL 86-272 - The Past Present and Future
 
Withum Global Summit 2022 6.8.22.pdf
Withum Global Summit 2022 6.8.22.pdfWithum Global Summit 2022 6.8.22.pdf
Withum Global Summit 2022 6.8.22.pdf
 

Recently uploaded

Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 

Recently uploaded (20)

Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 

Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Fraud and Cyber Insurance

  • 1. Cyberwarfare, Payments Fraud and Email Compromise Webinar
  • 2. Housekeeping • 1 CPE credit in Information Technology - be sure to participate in the polls to be eligible • Webinar is being recorded - Slides and recording will be emailed after the webinar • 50 minute session • 10 minute Q&A • Send in your questions!
  • 3. The contents contained within this slide deck may contain basic and preliminary observations. We also refer to some generally accepted principles for forensic investigations. All observations are subject to further investigation and explanation of facts and are therefore subject to change. Additional evidence and forensic analysis may be required to support any findings or observations. Disclaimer
  • 4. Objectives  Introductions  Understanding the Threats  Cyber Criminals Monetizing Your Data; Fraud and Phishing and so much more  B2B Fraud Statistics  How a Cyber-threat actor(s) can destroy your business and why you are a target…  Cyber Threat Intelligence: Know your enemy & vulnerabilities…  How to Protect your business…  Final Thoughts  Ask an Expert…
  • 5. Matthew Ferrante, Partner at Withum Summary Accolades • Sony Network Intrusions, Target Data Breach, Neiman Marcus, Banner Health Networks, etc.. • Cyber Services to SMEs, Global Enterprises, Businesses, Energy, Technology, Crypto, Manufacturing, Medical, etc.. • Criminal, Civil, Regulatory Actions, Class Action Lawsuits Technical Experts • Barclays Global Security Transformation • US Secret Service Top Electronic Crimes Expert • Awarded by Debit & Credit Card Industry • US Secret Service’s Director’s Citation • US Department of Justice Awards for Invaluable Expertise • Designed the First Title III Computer Network Wiretap in United States • 65+ hackers apprehended Globally… Summary Special Operations > Disaster Recovery | Business Continuity Rebuild of NYFO after 09/11 Attacks > Operation Firewall / Operation ‘Get Rich or Die Tryin’ > Joint Terrorism Task Force (USSS E-Crimes Support) > 50th & Broadway: PBX Hacking, Access Device Fraud & Shoulder Surfing > Al-Qaeda Network Takedowns: Netherlands, Middle East, etc.. This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 6. Eric Jackson vCISO for Withum Cyber Team Background • Developed Endpoint Security Programs for a Fortune 500 financial • Director of security program for life and safety organizations, to include 911 services • Incident Management Lead – multiple DOD organizations • Trained offensive and defensive security teams for DOD and civilian orgs • Developed “Internet range” for training offensive and defensive security teams • Developed multiple custom offensive and defensive security tools Technical Background • Worked hundreds of incident cases for the military • Experienced penetration tester • Emulated hackers for DOD exercises • Years of experience running security operations centers, thousands of incidents from cradle-to-grave • Expert Lockpicker This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 7. Meet the Withum Cyber Team US Secret Service US Central Command US Air Force US NAVY This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 8. What We Do…. This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 9. Steve Susnak SVP Capital One Commercial Banking • Steve joined Capital One in 2019 and is currently the Northern Region Director for Treasury Management(TM) with responsibilities for both the core middle market and multiple specialty segments. • Prior to joining Capital One, Steve spent 15 years at PNC Financial leading a nationally based TM sales segment covering both general diversified industries and financial institutions. • His professional affiliations include membership with the National Association for Financial Professionals (AFP), as well as multiple regional associations. He has been a featured speaker on a variety of industry topics at the regional and national levels. • Steve received his B.S. in Economics from Allegheny College. He currently serves on the board of the not-for-profit Laurie Ann West Community Resource, where he resides in Pittsburgh, PA with his wife and two sons. This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 12. Breakdown Cybercrime Economy in Profits • Illicit Online Markets: $860 Billion • Theft of Intellectual Property or Trade Secrets: $500 Billion • Data Trading: $160 Billion • Cybercrime-As-A-Service: ~$1.6 billion • Ransomware: $1 Billion This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 13. Cyber Security Stats and Facts Source: IBM/Ponemon $1.5 Trillion $6 Trillion by 2021 14 Sec. | 11 Sec. 2021 USA 146 Billion $242 per record $8 Million • Cybercrime economy in profits: • Cybercrime Damages: • Ransomware Attacks: • Top Country Targeted: • Est. Records Exposed 2018 - 2023: • Est. Cost Per Record Exposed: • Average Cost of Data Breach: • Dark Web Cybercrime Toolkit Cost: This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 14. COVID-19 Related Cyber Attack Statistics Since COVID-19 pandemic began: • Cyber attacks up 500% • Google has been blocking 18 million COVID-19 related phishing emails and malware daily • Spear-phishing attacks increased 667% • FBI complaint center for internet crime has received over 3,600 COVID-19 related scam complaints • COVID-19 related phone scams are on the rise • Ransomware attacks increased 148% • Average amount demanded for ransomware attacks increased 33% Source: techjury This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 15. COVID-19 Related Cyber Attack Statistics (Cont.) • 46% of businesses that started working remotely have experienced at least one form of a cybersecurity attack • Phishing websites have increased by 350% • Between March 9th and March 23rd, over 300,000 coronavirus keyword-related websites were created. • Banks have experienced a 238% increase in cyberattacks Source: techjury This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 16. Cyber Insurance This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 17. Accountability for Executives, Board Members and Positions of Trust This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved. Corporate Executive Accountability Act, which would impose jail time on corporate executives who "negligently permit or fail to prevent" a "violation of the law" that "affects the health, safety, finances or personal data"
  • 18. Motivation of Threat Actors Impacts by Cyber Security Incidents
  • 20. What Makes an Easy Target • Complacency & Groupthink: Not us; besides it’s a quiet place! • No Security Strategy: Lack of Chief Information Security Officer (“CISO”) CISO or vCISO • Security as an Afterthought and/or Expensive • Limited IT and IT Security Expertise • Misconfigurations, Misconceptions, Miscalculations (“3M”) • We’re in the Cloud! This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 21. 2019 Reported Cyber Crime by Victim Loss Source: FBI This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 22. Confidential 22 Confidential 22 The Scope of the Threat 66% of respondents report experiencing some form of B2B payment fraud attack within the past 2 years Source: Capital One B2B Payment Security Research
  • 23. Confidential 23 Confidential 23 Informational Purposes Only Source: Capital One B2B Payment Security Research Not a priority for leadership Minimal value add Disruptive to operations Too expensive Difficult to implement In the process of updating Need to retrain employees User friction 33% 29% 24% 20% 17% 15% 31% 11% Businesses Report their Top Barriers to Updating Fraud Security Neglecting the Significant Impact of Fraud
  • 24. Confidential 24 Confidential 24 https://www.capitalone.com/learn-grow/business-resources/avoiding-business-fraud/ Source: 2020 AFP Payments Fraud and Control Report | www.AFPonline.org . The information contained herein is shared for educational purposes only to help clients protect themselves from fraud. It does not provide a comprehensive list of all types of fraud, all departments that are vulnerable to fraud, or all best practices to tackle fraud. Nothing contained herein shall give rise to, or be construed to give rise to, any obligations or liability whatsoever on the part of Capital One. Percentage Distribution of Organizations Popular Targets of Fraud Within an Organization Departments Most Vulnerable to Being Targeted by Business Email Compromise Fraud
  • 25. Confidential 25 Confidential 25 Informational Purposes Only Source: Capital One B2B Payment Security Research B2B Payment Fraud by Attack Method Within the past two years, has your organization experienced any of the below fraud attacks in regard to B2B payments? Phishing/ Business Email Compromise Data Breach Note: N=225 Malware/ Ransomware 28% 27% Account Takeover 15% Cashflow scams 14% Internal fraud / Employee theft 13% Other 1% 36% The Most Common Methods of Fraud
  • 26. Confidential 26 ● A spoofed sender domain CEO fraudsters usually register a domain similar to its target. Examples About Business Email Compromise From: Sent: Wednesday, April 18, 2018 2:11 PM To: Subject: Re: INVOICE NO 17150 CIS# 105013 Were you able to initiate wire to ??? From: Sent: Wednesday, April 18, 2018 3:48 PM To: Subject: Re: INVOICE NO 17150 CIS# 105013 Kindly, advise when wire is released. ● An urgent email subject requesting immediate fund transfers BEC scams typically use subject lines that imply urgency regarding payment inquiries or fund transfers. ● Position of the email sender Cybercriminals employing CEO fraud typically pose as someone influential in an organization. ● Body of the email Scammers make it appear as if the fund transfer is urgently needed and should be executed as soon as possible. From: Sent: Friday April 6, 2018 3:07 PM To: Subject: Invoice No 17150 LLC Could you please process this invoice from LLC. Kindly, send me Wire Slip. Thanks!!
  • 27. How to protect a Business from Cyber Attacks “Know your enemy and know yourself - Sun Tzu”
  • 29. Business Destruction via Cyber • Complacency • False Sense of Security | Rubber Stamping Environment • Check the Box Security | No Validation of Controls • Not us…yes you! • No Strategy / Plan • Lack of Independent Security Audits • Lack of Accountability • Fix-on-Failure This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 30. Protect Your Business (Assessments) • Threat Emulation Security Assessment • vCISO / vCCO Analysis of Sec. Control Framework • Business Continuity & Backup Assurance • Incident Response Exercises • ‘Trust; but Verify’ • OSINT (Open Source Intel Report) This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 31. Security Measures for Businesses Secure workstations • Lock our systems (Ctrl-Alt-Delete) • Shut down systems not in use • Run up-to-date virus scanning software • Password protect files • Apply software patches • Run a desktop firewall Backup Data • Test backups • Securely store backup media (offsite) • Restrict access to who can perform restoration Control Access to Data • Only allow access that is absolutely required • Don’t grant accounts because access “may” be required • Use least privilege access policies that state access will only be granted if required, not by default • Are accounts removed and passwords changed when someone changes jobs or is terminated? Physical Security • Control access to sensitive areas • Install cable locks • Limited the amount of people who has access? • Are sensitive documents secured? Incident Response • Do you Have a plan? • When was it last reviewed and updated? • Who gets alerts when something is wrong? • Who contains/remediates it? Perform Audits • Evaluate internal/external controls • Use third party for non-bias reporting • Conduct regular penetration testing/scanning This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 32. Security Measures for Businesses (Cont’d) Teleconferencing • Create Virtual Waiting Rooms • Use unique meeting ID’s and Passwords • Lock down your meeting (If Applicable) Remote Work • Use VPN (Virtual Private Networks) • Use 2FA / MFA Others • In-House CFI / Security • Understand your Cyber Security Policy, e.g. what is REALLY covering and under what terms and conditions • Cloud: Use the right licensing to protect your staff and your customers data, e.g. M5 vs O5 (Microsoft Example) • Data Loss Prevention • FIM Solution • Threat & Intel This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 33. How to Protect your Businesses Assess the Risks and Formulate a Plan • Perform an objective analysis of your information, systems and processes. Your IT team is probably qualified, but a third party with experience in cybersecurity is recommended to avoid any bias. • Look for weak spots in your network and data security. Make evaluations and scans a regular part of your internal audit processes. Conduct regular external assessments and scans to identify vulnerabilities. Avoid Human Error • Cyber risks are not just a problem with technology. It all comes down to protecting information, and anyone with access to that information (staff, contractors, vendors, and even customers) must be responsible and accountable. • Establish a culture of cybersecurity awareness. All staff should regularly be made aware of the most current threats and attacks being used by criminals. • Provide mechanisms to enable remote workforces to perform their functions securely, while limiting the organization’s risk exposure due to human error. This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 34. How to Protect the Businesses (Cont.) Be Prepared for the Worst • It is important to plan your response in the event you are hit with an attack. A comprehensive and documented Incident Management Plan is designed to guide the organization through a suspected security incident. • Roles and responsibilities should be defined, such as who will carry out key tasks like forensic investigation and legal response. Most states have requirements for reporting data security breaches. It is important that your team know who is responsible for understanding the breach reporting requirements and reporting to the applicable state(s) in a timely basis to avoid potential fines and penalties. Commonly Overlooked Risks • Even with the best of planning, there are still risks that are often overlooked. Problems can arise from disparate IT systems, poorly configured personal devices used on the corporate network, and when services are integrated with third party vendors. • Hackers will find and exploit your systems weakest link, whatever it may be. It is important to know where all of these weak links are and work toward securing them. This presentation is protected by U.S. copyright laws. Reproduction and/or distribution of the presentation without written permission of Withum is prohibited. ©2020 WithumSmith+Brown, PC All rights reserved.
  • 36. Confidential 36 Tech Tips Make It Hard for Them Don’t Know…. …..Don’t Click Process Tips Please note the information and tips contained herein are shared for educational purposes only to assist our clients in the joint fight against fraud and should not be construed to create obligations on the part of Capital One Informational Purposes Only Tips to Help Tackle B2B Fraud
  • 37. Confidential 37 ● Use strong and different passwords. ● Never put sensitive data on unsecured computers. ● Consider adopting multi-factor authentication. ● Use controls available to you. ● Never respond to suspicious emails, open attachments or click hyperlinks. ● Use known phone numbers to verify changes. ● Check sender’s email addresses. Tips to Help Tackle B2B Fraud Make It Hard for Them Don’t Know… ...Don’t Click
  • 38. Confidential 38 ● Carefully monitor account activity and review all transactions on a daily basis. ● Leverage reporting and alerting tools that your FIs provide. ● Evaluate your internal controls and conduct an annual risk assessment. ● Maintain a high level of awareness across your staff. ● Insist that your suppliers use the same methods of identity authentication as you. ● Always update software and systems. ● Use anti-virus and anti-malware software that updates automatically. ● Dedicate a computer exclusively for online banking transactions, nothing else. ● Restrict administrative rights to install software to IT staff. Tips to Help Tackle B2B Fraud Tech Tips Process Tips
  • 40. For More Information, Please Contact Withum Cyber WCyber.info@withum.com Eric Jackson +1 (402) 867-7432 ejackson@withum.com Stephen Susnak +1 (646) 988-6035 stephen.susnak@capitalone.com