5 Data Breach Awareness Charts For The Board Room INCLUDES A SOFT COPY ON BOARD ROOM BREACH AWARENESS Copyright ®2014 iScan Online, Inc. All Rights Reserved.
Jan 16, 2015
5 Data Breach !Awareness Charts!
For The Board RoomINCLUDES A
SOFT COPY ON BOARD ROOM
BREACH AWARENESS
Copyright ®2014 iScan Online, Inc. All Rights Reserved.
Have you noticed how data breaches continue to escalate, regardless of size or industry?
1. Confidential Data
2. Operating System Vulnerability
3. Application Vulnerability
4. Configuration Vulnerability
Data breaches occur because two attack vectors exist on a compromised device:
Successful organizations that avoid data theft, adhere to a Data Breach Prevention LifeCycle.
DISCOVER
DETECTPRIORITIZE
Let the data tell the story after the Discover and Detect stages complete.!!
Consider these charts for your board presentation:
1. Baseline Data Discovery - A snapshot in time representing what data is at risk.
Dat
a D
isco
vere
d
0 K
250 K
500 K
750 K
1000 K
Credit Card Social Security Drivers License Passport Date of Birth Trade Secret
Why it is important: - Know what you don’t know by identifying sensitive data at risk before a breach occurs.
0
25
50
75
100
John Jane Billy Carl Brad Steve Sally David Simon Monica Mateo Mireya0
25
50
75
100
John Jane Billy Carl Brad Steve Sally David Simon Monica Mateo Mireya0
25
50
75
100
John Jane Billy Carl Brad Steve Sally David Simon Monica Mateo Mireya
2. Data at Risk by Employee - Shows the volume of unencrypted data by device.
Steve: Windows 7 Records at Risk
68
Un
pro
tect
ed
Data
Reco
rds
Why it is important: - Trade secrets, personal identifiable information and intellectual property are stored where you least expect it. Exposes who and what device.
REMOTE WORKERS BYOD BRANCH OFFICES
0
25
50
75
100
John Jane Billy Carl Brad Steve Sally David Simon Monica Mateo Mireya
3. Security Threats by Device - Presents the volume of vulnerabilities by device.
Jane: Windows 8 Threat by Severity
High - 82%
Why you care: - When unencrypted sensitive data is discovered, it is imperative to detect the security threats on those devices.
4. Card brands discovered - Unencrypted payment data at risk.
Lia
bility
Exp
osu
re
20 Bil
15 Bil
10 Bil
5 Bil
0 Bil
7.5M
15M
22.5M
30M
Card
Data
Dis
covere
d
Why you care: - Cardholder data is commonly found throughout the network. Simply put, you now know your exposure to a data breach by card brand.
PAN Primary Account
Number
5. Combined Intelligence - Prioritized at risk assets - discovered data & detected threats.
Host High Vulnerability!Count
Unprotected Data!Count
$ Liability!Exposure
Juan 831 95976 $19,291,176
Jane 405 9247 $1,858,647
Billy 86 1247 $250,647
Carl 12 742 $149,142
Why you care: - Combined intelligence includes the sensitive data discovered & security threats detected to calculate an overall risk and liability exposure.
800 MIL?600 MIL? 1 BIL?
iScan Online helps organizations identify data breaches before they happen through combined intelligence.
The security of all sensitive data is under relentless attack.
Need help with the Discovery & Detection of unprotected data & security threats? Register for iScan
Online Trial
Want to speak to an iScan Online representative about where you can improve your data breach liability exposure?!Call us now or click here for a soft copy of the slides.
1-800-630-4713Call a Prevention Expert
Learn more and register www.iscanonline.com
ADMIT ONE
1:00 PM CST
SEPT 23What’s New Data Breaches
WHAT’S NEW - ISCAN ONLINE!SEPTEMBER 23 | 1:00pm CST