Cybersecurity for Marketing
-
Upload
alert-logic -
Category
Technology
-
view
325 -
download
4
Transcript of Cybersecurity for Marketing
![Page 1: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/1.jpg)
MARKETING AND CYBERSECURITY
Jessica Dickerson – Product Manager
![Page 2: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/2.jpg)
What has Happened in 2014 so far?
![Page 3: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/3.jpg)
Malicious Actors
Rescator
Darklife.WS
Communication
Channels
Graberz.com
Lampeduza, LA
Odessa, Ukraine
Java Developer
Victims
Retail - Target
Retail – Home Depot
Retail – P.F. Changs
Retail – Sally Beauty
Harbour Freight
40Mil Debit & Credit Cards Subtopic
53Mil Debit & Credit Cards Subtopic
2008 One of Three Founders
Profile “Hel”
ICQ 643287365 ICQ 261333 - First Name: Alex | Last Name: Alex
HelKem_Skype
Motivations Political
Attacked Russian site CIH.MS during Ukrainian/Russian Conflict
Hacked CIH.MS CIH.MS Returned Hack & released Data Profile, Pictures & Communication Channels
Online Transactions
Kaddafi.HK Octavian.SU CPRO.SU VOR.CC Tupac.CC Swipe.LU
Attack Vectors
Original prior to late 2013
SQL Injection X-Site Script
Current Attack Vectors Subtopic
Sold 5.3Mil Credit Cards 151,720 Cards actually Sold 421,801 Expired before Sale 28% of the 151,720 Expired while on Market for Sale
![Page 4: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/4.jpg)
WHAT TO EXPECT IN 2015
![Page 5: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/5.jpg)
More and More
• Retail will continue to be a primary target • E-Commerce POS exploits released • The list 300 vulnerable medical devices will grow • The first online paid contract murder to take place • Healthcare and Retail to implement $$ into security programs • Energy sector to continue to be under attack from state
sponsored and hacktivist groups • Emergence of offense security teams
![Page 6: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/6.jpg)
WHY IS MARKETING
DATA AT RISK?
![Page 7: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/7.jpg)
A Lot of Information in a Lot of Places
• Salesforce
• SurveyMonkey
• Customer databases
• POS software
• Servers
• Employee’s computers
![Page 8: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/8.jpg)
Threats in the Cloud are Increasing
• Increase in attack frequency
• Traditional on-premises threats are moving to the cloud
• Majority of cloud incidents were related to web application attacks, brute force attacks, and vulnerability scans
• Brute force attacks and vulnerability scans are now occurring at near-equivalent rates in both cloud and on-premises environments
• Malware/Botnet is increasing year over year
![Page 9: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/9.jpg)
Challenges for Marketing Information
• Malicious employees • Snooping, tweaking data for desired result, sabotage
• Non-malicious disasters or accidents • Everything from a hurricane to a dead hard drive to a lost password
• Corporate espionage • Costs industry 300 billion dollars annually
• Mimicking your company • Phishing, hacktivists
• Stealing data to sell • Credit card data, market profiles, customer information
![Page 10: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/10.jpg)
WHAT TO DO ABOUT IT?
![Page 11: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/11.jpg)
Seven Best Practices of Cloud Security
1. Secure your data 2. Create access management policies 3. Adopt a patch management approach 4. Review logs regularly 5. Stay informed of the latest vulnerabilities that might affect you 6. Understand your cloud service providers security model 7. Understand the shared security responsibility
![Page 12: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/12.jpg)
Organizations and Standards
• Protect Credit Card Data • PCI DSS 3.0
• Protect Medical Data • HiTECH, HIPAA
• Secure coding practices
• International groups working together
![Page 13: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/13.jpg)
What Can You Do?
• Protect your data
• Work with reliable companies
• Create and protect backups
• Test recovery scenarios
• Run anti-malware
• Install patches
![Page 14: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/14.jpg)
It Will Happen – Be Prepared!
• Create a response plan before you’re attacked
• Different approaches for different attacks
• Different levels of communication for different audiences
• What have you put in place?
![Page 15: Cybersecurity for Marketing](https://reader031.fdocuments.in/reader031/viewer/2022032217/55a889861a28abd6288b478f/html5/thumbnails/15.jpg)
Thank you.