The first rule of survival:
Don’ t Cross the Street Blindfolded
Companies spend money on the wrong things.
Commonly Stolen:
Personal Information
Credit Information
Medical Records
Intellectual Property
Customer/Partner Data
Network Credentials
Email Addresses/Passwords
The second rule of survival:
Diamonds vs. Toothbrush
Risk Mitigation: Pre-Planning
What’ s Most Important?
Banking Credentials
Cloud Storage
Vendor Access
Remote Management
Employee PII
Credit Information
Medical Records
Social Media Presence
Intellectual Property
Customer Data
Supply Chain Data
Network Credentials
Email Addresses
Legal Data
Financial Records
Payroll and Accounting Data
The third rule of survival:
Don’ t Go to Costco the Day of the Storm
Risk Mitigation: Response
Risk Mitigation: Response
Risk Mitigation: Compliance
Risk Mitigation: Insurance
Risk Mitigation: Exercise
The fifth rule of survival:
It’ s best to solve the problem with the simplest method.
Data Breach: When it’ s not a drill
There are two kinds of companies in America: those who’ ve been breached and those who don’ t know they’ ve been breached.
FBI Director James Comey