Top Banner
16

Data Breach Risk Brief - 2015

Jan 13, 2017

Download

Data & Analytics

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Data Breach Risk Brief - 2015
Page 2: Data Breach Risk Brief - 2015

700,000 scans of customer servers,

employee desktops and laptops

Page 3: Data Breach Risk Brief - 2015

87%of all desktops

show credit card data being stored

36%of all desktops

show social security numbers

Results revealed a significant amount of data is now in the hands of employees

Page 4: Data Breach Risk Brief - 2015

53% of breaches are caused by employee error or maliciousness(source: BakerHostetler)

How much would employee error or maliciousness cost your company?

95%Of employee computers would cost more than $25,000 if breached.(Source: iScan)

$250k3% of employee computers would cost more than $250,000 if breached.(Source: iScan)

Page 5: Data Breach Risk Brief - 2015

$ 48,843$301,098

Average liability of a:

desktop/laptop

server

Page 6: Data Breach Risk Brief - 2015

$300 millionon an employee computer.

Highest data breach risk liability detected

$400 millionon a server. Actually, we’ve found multiple servers with this much liability.

Page 7: Data Breach Risk Brief - 2015

What Does It Mean for Security Leaders?

Page 8: Data Breach Risk Brief - 2015

If you work for a mid-sized company, for example

1. Recognize that just a handful of employee computers, if breached, would likely cost the company over $2 million.

2. Implement iScan to prioritize the “worst offenders” in terms of liability.

3. Provide employees with iScan security report cards for an easy “to-do” checklist.

4. Present to the Board - in dollars - how the total risk exposure of the organization was just reduced by over $2 million.

Page 9: Data Breach Risk Brief - 2015

Enable the business

Security Team• Financially prioritize risk

for remediation.• Optimize resources by

focusing on highest liability devices first.

The BoardProvide them with security oversight in dollars, the language they understand.

CFO & CRO• Justify resources.• Provide risk metrics.• Prove results

charted over time.

Page 10: Data Breach Risk Brief - 2015

IVY LEAGUE INSTITUTION

“We use iScan to report the financial impact to our Boardroom.

It also empowers our students to self-assess their computers.”

Page 11: Data Breach Risk Brief - 2015

HOTEL(1200 LOCATIONS)

“[I can] walk over to the CFO’s office for the justification of hiring people and procurement of additional products and services to safeguard our data.”

Page 12: Data Breach Risk Brief - 2015
Page 13: Data Breach Risk Brief - 2015

PRESENT THE DOLLAR RISK TO THE BOTTOM LINEEffectively communicate risk in dollars to the Board and CFO

DETECT•Unprotected data• Vulnerabilities• Access permissions

SEE THE SECURITY NUMBERPrioritize the highest risk devices

1 2 3

Real-time, agentless intelligence

Page 14: Data Breach Risk Brief - 2015

Scan liability data is a proprietary calculation of the cost of a breach.

Real-time sensitive data, vulnerabilities and access permissions are weighted by an industry-standard cost.

Dollars automatically calculated

Page 15: Data Breach Risk Brief - 2015

Also see the article in the Washington Times http://bit.ly/1Mu0oBM

Page 16: Data Breach Risk Brief - 2015

Find the power of a Security Number with a free trial

https://app.iscanonline.com/users/sign_up