1 / 21

Security is No Longer Optional.

Security is No Longer Optional. Cheaper. Higher Quality. More Secure. Cheaper. Pick Only 2. Higher Quality. More Secure. Threats. State Sponsored Cyber-Crime. Tech-Savvy Generation . Organized Crime Groups. ‘H-Activism’. Threats. State Sponsored Cyber-Crime.

collin
Download Presentation

Security is No Longer Optional.

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security is No Longer Optional.

  2. Cheaper Higher Quality More Secure

  3. Cheaper Pick Only 2 Higher Quality More Secure

  4. Threats State Sponsored Cyber-Crime Tech-Savvy Generation Organized Crime Groups ‘H-Activism’

  5. Threats State Sponsored Cyber-Crime Tech-Savvy Generation Organized Crime Groups ‘H-Activism’ Targets Reliance on Service Availability Payment Card Information Intellectual Property Consumer Data

  6. Threats State Sponsored Cyber-Crime Tech-Savvy Generation Organized Crime Groups ‘H-Activism’ Targets Reliance on Service Availability Payment Card Information Intellectual Property Consumer Data Enablers Threat Intelligence Decentralized Technology Cloud Computing Outsourcing

  7. Recent Cyber Attacks High DigiNotar CA HBGary Federal “Stuxnet- Iran Centrifuge” Sony PSN Arizona DPS RSA Comodo CA FBI – Infragard GlobalSign CA CitiGroup StartCom CA Spanish Govm’t PBS.org PayPal IMF Epic Games Codemasters Sony BMG Northrop Grumman Estimated Impact (hard + soft) Sony Pictures EA Battlefield Hero (beta) Google Sega Nintendo Riot Games EA Neverwinter Nights Malaysia Govm’t Sony Greece Square Enix Bethesda Software Lockheed-Martin (Intrusion via RSA trust) US Chamber of Commerce CIA Motorola US Senate Unveillance EA Forums Low Skill Set / Sophistication / Cleverness Low High

  8. “I divide the entire set of Fortune 2,000 firms into two categories… …those that know they’ve been compromised and those that don’t know it yet.” Dmitri Alperovitch Vice President, Threat Research McAfee

  9. Proactive Protection:Content, Transactions, UptimeKeep bad things from happening.

  10. Proactive Protection:Content, Transactions, UptimeKeep bad things from happening. Reactive Protection:Logging, Forensics, Tracking Know if happening, what exactly happened, and how.

  11. Security is a Business Issue.

  12. Put Security into a Business Context throughRiskManagement

  13. Risk Management Business Value Business Risk Impact Probability Cost Impact Probability Cost = Informed Business Decision

  14. Modeling an alternative DVD distribution model R5 = 3.0 Million Downloads (49%) US Retail DVD = 0.7M Downloads (12%) Russian DVD US Retail DVD Cams US Retail DVD Russian DVD Cams Estimated Loss to Piracy (unrealized revenue to Top 10 Mature Markets) Estimated Russia 52 Wk HE Revenue: $1.05M Estimated Net Result: Loss of $5.85M R5 Differential = R5 Impact Total ALL Piracy: $38.9M (incl R5) Piracy without R5: $32.0M R5 Only: $6.9M Lower-Quality Cam, Better cam, US Retail Compromise wk 10 of Theatrical Piracy impacts calculated to TOP 10 Mature Markets using the “Disney-developed Piracy Impact Model”, which has been freely shared with other studios.

  15. Have the right people at the table.

  16. Cheaper Higher Quality More Secure + Revolutionary Security Models + Revolutionary Business Models

More Related