where in the world is your data? data breach analysis angelbeat seminar billy austin, president...

Post on 03-Jan-2016

214 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Where in the world is your data?Data Breach Analysis

Angelbeat SeminarBilly Austin, PresidentiScan Online, Inc.

Have you noticed how data breaches continue to escalate regardless of size or industry?

Breaches occur because two attack vectors exist on a device:

1. Confidential Data

2. Operating System Vulnerability

3. Application Vulnerability

4. Configuration Vulnerability

Breach In Action

Data Breach Analytics:What data is at riskHow attackers will get to

the dataWhat will it cost when

you’re breached

Why it is important: Know what sensitive information is at risk before a data breach occurs.

STEP 1

Discover Sensitive Data

STEP 2

Detect Security Threats

Why you care: When unencrypted sensitive data is discovered, it is imperative to detect the threat posture.

Why you care: Combining unprotected data & threats help prioritize IT resources based on calculated liability exposure.

STEP 3

Prioritize Combined Intelligence

Why it is important: Remediation reduces financial impact and the risk to compromise.

STEP 4

Remediate Data & Threats

Why you really care: Instantaneous view into the risk and geo-location of a breach, protecting shareholder value before an incident.

STEP 5

Manage Breach Prevention Lifecycle

THANK YOUWWW.ISCANONLINE.COM

A DATA BREACH PREVENTION PLATFORM PROVIDER

Free Trial & Webinarwww.iscanonline.com/company

top related