Data Breach Risk Intelligence

20
Data Breach Risk Intelligence www.iscanonline.com

Transcript of Data Breach Risk Intelligence

Page 1: Data Breach Risk Intelligence

Data Breach Risk Intelligencewww.iscanonline.com

Page 2: Data Breach Risk Intelligence

Data is at Risk EverywhereThe adoption of cloud sharing, mobility and replication of data is a daunting challenge for those in charge of safeguarding sensitive information.

On average, there is better than a 1-in-5 chance your organization will be breached in the next 2 years.*

* Ponemon Institute’s Cost of a Data Breach 2015

Page 3: Data Breach Risk Intelligence

Vulnerable SystemsComputer and mobile devices that store sensitive data e.g., ACH payments, credit cards and trade secrets are vulnerable, providing attackers a backdoor to your crown jewels.

99.9% of vulnerabilities are exploited more than a year after they become known.*

*2015 Verizon Data Breach Investigations Report

Page 4: Data Breach Risk Intelligence

What if you knew where data is at risk & could predict the financial

loss?

Page 5: Data Breach Risk Intelligence

Meet the Data Breach Risk Report

Quantifies risk for non-technical and security operations, predicting the financial liability before a breach occurs.

Page 6: Data Breach Risk Intelligence

Chief Information Security Officers can now speak with authority and confidence by answering:

Discover data that matters to you most; credit cards, social security, ACH payments, trade secrets & more. Then find out who has access to it.

Known vulnerabilities contribute to most breaches. By knowing the vulnerable attack path to your data, data loss mitigation is performed.

Simply put, this is the calculated financial impact if a breach were to occur based on your actual data.

What will it cost when breached?

How will the bad guys get to the data?

What data is at risk & who has access?

Data Breach Risk Report

Page 7: Data Breach Risk Intelligence

Data Breach Risk Report

What vulnerabilities provide attackers an entry to the data?

What type of data is at risk?

Where is my data at risk and Who has access?

How much would it cost if breached today?

Page 8: Data Breach Risk Intelligence

What is the calculated liability for all of your systems?

Page 9: Data Breach Risk Intelligence

Calculating the Liability ExposureThe liability is generated by taking the average cost of a data breach record, multiplied by the number of unprotected data records. This sum is then weighted on critical vulnerabilities and unauthorized access.

Page 10: Data Breach Risk Intelligence

Data Breach Risk Baseline

While attackers continue to evade defensive measures, it is crucial to baseline your current data breach risk posture in monetary value before a breach occurs.

Page 11: Data Breach Risk Intelligence

Data Breach Risk Trend

When performing periodic data breach risk assessments, trending enables you to measure the progress of liability reduction over time.

Page 12: Data Breach Risk Intelligence

How do you get this intelligence in 24 hours?

Page 13: Data Breach Risk Intelligence

The Data Breach Risk Platform

Sign in to the iScan Intelligence dashboard to deliver a patented non-intrusive discovery of your data at risk and calculated monetary loss in minutes.

Page 14: Data Breach Risk Intelligence

Intelligence is very powerful when you can tell a story with the data breach risk report. In order to acquire the data, this is performed by scanning endpoints.

The patented scanning technology delivers eye-opening results for all of your systems within 24 hours. Mobile - Leverage the native mobile app for

Apple iOS and Android devices to uncover data and threats for smart devices.

Browser - Scanning through the browser is ideal for assessing remote workers, website visitors and employees on the go.

CLI - The command line interface is the most popular agent-less scan delivery. Simply download the iscanruntime.exe and schedule a task with your existing systems management tool.

Patented Agent-less Scanning

Page 15: Data Breach Risk Intelligence

Next steps, who to communicate the risk to?

Page 16: Data Breach Risk Intelligence

The Boardroom

Presenting risk to the C-Suite requires the translation of geek speak to a common language we all understand - dollars & cents

iScan’s reporting makes this translation easy. Deliver easy-to-understand presentations on your total risk posture and the progress being made.

Page 17: Data Breach Risk Intelligence

IT Security

InfoSec knows the enemy is coming but needs intelligence to prioritize their next move. With iScan breach intelligence, the alignment of IT troops reduces the financial impact before the inevitable.

Eliminate confusion and second-guessing by introducing a common metric to define where resources are needed: the dollars at risk.

Page 18: Data Breach Risk Intelligence

How would you leverage financial risk reporting for your business?

Page 19: Data Breach Risk Intelligence

iScan Online Common Uses

JustifyIllustrate the financial risk to justify expenditures.

ComplianceMeet HIPAA, PCI & other regulatory initiatives.

CommunicateShow the risk to departments in a manner that resonates - It would cost this much if you’re attacked today!

Page 20: Data Breach Risk Intelligence

Data Breach Risk Intelligence

5600 Tennyson Pkwy, #343 Plano, TX 75024

iScan Online, Inc.iscanonline.com [email protected] 800-630-4713

14 Day Free Trial

Request Meeting

Signup for Webinar

Know your financial risk today.