where in the world is your data? data breach analysis angelbeat seminar billy austin, president...

16
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.

Upload: shanna-porter

Post on 03-Jan-2016

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc

Where in the world is your data?Data Breach Analysis

Angelbeat SeminarBilly Austin, PresidentiScan Online, Inc.

Page 2: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc

Have you noticed how data breaches continue to escalate regardless of size or industry?

Page 3: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc

Breaches occur because two attack vectors exist on a device:

1. Confidential Data

2. Operating System Vulnerability

3. Application Vulnerability

4. Configuration Vulnerability

Page 4: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc

Breach In Action

Page 5: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc

Data Breach Analytics:What data is at riskHow attackers will get to

the dataWhat will it cost when

you’re breached

Page 6: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc
Page 7: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc

Why it is important: Know what sensitive information is at risk before a data breach occurs.

STEP 1

Discover Sensitive Data

Page 8: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc
Page 9: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc

STEP 2

Detect Security Threats

Why you care: When unencrypted sensitive data is discovered, it is imperative to detect the threat posture.

Page 10: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc
Page 11: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc

Why you care: Combining unprotected data & threats help prioritize IT resources based on calculated liability exposure.

STEP 3

Prioritize Combined Intelligence

Page 12: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc
Page 13: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc

Why it is important: Remediation reduces financial impact and the risk to compromise.

STEP 4

Remediate Data & Threats

Page 14: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc
Page 15: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc

Why you really care: Instantaneous view into the risk and geo-location of a breach, protecting shareholder value before an incident.

STEP 5

Manage Breach Prevention Lifecycle

Page 16: Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc

THANK YOUWWW.ISCANONLINE.COM

A DATA BREACH PREVENTION PLATFORM PROVIDER

Free Trial & Webinarwww.iscanonline.com/company