View
1.743
Download
1
Embed Size (px)
Citation preview
87%of all desktops
show credit card data being stored
36%of all desktops
show social security numbers
Results revealed a significant amount of data is now in the hands of employees
53% of breaches are caused by employee error or maliciousness(source: BakerHostetler)
How much would employee error or maliciousness cost your company?
95%Of employee computers would cost more than $25,000 if breached.(Source: iScan)
$250k3% of employee computers would cost more than $250,000 if breached.(Source: iScan)
$300 millionon an employee computer.
Highest data breach risk liability detected
$400 millionon a server. Actually, we’ve found multiple servers with this much liability.
If you work for a mid-sized company, for example
1. Recognize that just a handful of employee computers, if breached, would likely cost the company over $2 million.
2. Implement iScan to prioritize the “worst offenders” in terms of liability.
3. Provide employees with iScan security report cards for an easy “to-do” checklist.
4. Present to the Board - in dollars - how the total risk exposure of the organization was just reduced by over $2 million.
Enable the business
Security Team• Financially prioritize risk
for remediation.• Optimize resources by
focusing on highest liability devices first.
The BoardProvide them with security oversight in dollars, the language they understand.
CFO & CRO• Justify resources.• Provide risk metrics.• Prove results
charted over time.
IVY LEAGUE INSTITUTION
“We use iScan to report the financial impact to our Boardroom.
It also empowers our students to self-assess their computers.”
HOTEL(1200 LOCATIONS)
“[I can] walk over to the CFO’s office for the justification of hiring people and procurement of additional products and services to safeguard our data.”
PRESENT THE DOLLAR RISK TO THE BOTTOM LINEEffectively communicate risk in dollars to the Board and CFO
DETECT•Unprotected data• Vulnerabilities• Access permissions
SEE THE SECURITY NUMBERPrioritize the highest risk devices
1 2 3
Real-time, agentless intelligence
Scan liability data is a proprietary calculation of the cost of a breach.
Real-time sensitive data, vulnerabilities and access permissions are weighted by an industry-standard cost.
Dollars automatically calculated