© 2015 IBM Corporation IBM Security 1 © 2015 IBM Corporation Protecting your executives’ cyber DNA Executive protection from IBM an IBM alliance with Social.

Slides:



Advertisements
Similar presentations
IBM Industry Security Electric Sector Security Awareness Rising
Advertisements

© 2009 IBM Corporation iEA16 Defining and Aligning Requirements using System Architect and DOORs Paul W. Johnson CEO / President Pragmatica Innovations.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security for Today’s Threat Landscape Kat Pelak 1.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
RTC Agile Planning Component
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
© 2014 IBM Corporation IBM Security Services 1 © 2014 IBM Corporation IBM Security Intelligence, Integration and Expertise Kawther Haciane Client Solution.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
® IBM Software Group © 2007 IBM Corporation Achieving Harmony IBM's Platform and Methodology for Systems Engineering and Embedded Software Development.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM X-Force Threat Intelligence Quarterly 2Q 2014 Diana Kelley Executive Security.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM X-Force: The Emerging Threat Landscape Michael P. Hamelin Lead X-Force Security.
Cyber Crimes.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
IBM Software Group ® Jazz Storage Service Thomas.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Topic 5: Basic Security.
IBM Software Group ® Process Sequence to call ProcessAdminService from browser Thomas.
© 2012 IBM Corporation Introducing IBM Cognos Insight.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
® IBM Software Group © 2011 IBM Corporation Innovation for a smarter planet IBM SOA Overview for MITRE “Driving SOA Program Success and Efficiency” April.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
BullGuard Identity Protection September Compatible with ANY device and ANY O/S  Identity Protection – allows users to monitor their sensitive personal.
© 2013 IBM Corporation IBM UrbanCode Deploy v6.0.1 Support Enablement Training Source Configuration and Database Upgrades Michael Malinowski
Safe Computing Practices. What is behind a cyber attack? 1.
IBM Software Group ® Jazz Team Build – Part 1 Overview Jonathan.
1 © 2016 IBM Corporation Mobile Device Management Manage smartphones, tablets & laptops featuring iOS, Android, Windows Phone, BlackBerry, Windows PC &
© 2013 IBM Corporation IBM Security Systems © 2012 IBM Corporation Offense Magnitude.
IBM Innovate 2012 Title Presenter’s Name Presenter’s Title, Organization Presenter’s Address Session Track Number (if applicable)
© 2013 IBM Corporation IBM UrbanCode Deploy v6.0 Support Enablement Training Jenkins plug-in 1 November 2013.
IBM Software Group ® Jazz Process Component —Process Template Management Thomas.
European Mobility & Endpoint Security User Group.
Work smarter, keep connected with Lotus Software Jon Crouch | Senior Technical Specialist, Lotus Software Matt Newton | Senior Technical Specialist, Lotus.
Outthink threats The next era of security. Marc van Zadelhoff General Manager, IBM Security.
The time to address enterprise mobility is now
Deployment Planning Services
Information Security.
A Project on CYBER SECURITY
SaaS Application Deep Dive
Deploy Plugins Developer 29 October 2013
How to Protect Yourself from ID Theft and Social Engineering
The utility belt for managing security and compliance in Office 365
Year 10 ICT ECDL/ICDL IT Security.
Integrating Data With Cognos
Prevent Costly Data Leaks from Microsoft Office 365
Cybersecurity Awareness
Cyber Issues Facing Medical Practice Managers
SAM GDPR Assessment <Insert partner logo here>
Embedded Software (ESW) Engineering Practices Introduction
IBM Global Technology Services
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Business Compromise and Cyber Threat
Put Treatment Cost Calculator to work for you and your employees
Microsoft Data Insights Summit
<offer name> with Microsoft 365 Business Secure Deployment
Introduction to mobile app development Module 1 - Introduction
Presentation transcript:

© 2015 IBM Corporation IBM Security 1 © 2015 IBM Corporation Protecting your executives’ cyber DNA Executive protection from IBM an IBM alliance with Social SafeGuard Overview Client Deck IBM Security Services June 8, 2016 SEP03319-USEN-01

© 2015 IBM Corporation IBM Security 2 Even a whale can get phished Whaling is the practice of pursuing upper management and their access to sensitive data whaling [hwey-ling, wey-] what who how Whaling is another evolution of phishing attacks that uses sophisticated social engineering techniques to steal confidential information, personal data, access credentials to restricted services/resources, and specifically information with relevant value from an economic and commercial perspective Target: the big fish (the whale) – relevant executives of private business and government agencies Spear phishing attacks, but the scam is designed to masquerade as a critical business sent from a legitimate authority, typically from other relevant executives why A successful attack can yield executive passwords and other account details that can open up corporate hard drives, networks, and even bank accounts

© 2015 IBM Corporation IBM Security 3 Executives have a social presence, but the risks are real and must be mitigated Personal damage Personal damage Reputation damage Loss of security Loss of security Spam and phishing Corporate espionage Identity theft Financial loss Social account takeover Privacy invasion Your cyber DNA is likely exposed Where do you live, work and travel? Where are you right now? What are your interests and hobbies? Who are your friends and family? Where do your kids go to school? How and where do you spend your time? What is your profession and career? What are your skills and reputation? What were your recent financial transactions? What kind of artwork do you have at your vacation home? Where is your boat? A large amount of information about you is likely already public and can be easily gathered with no hacking or illegal means necessary You may be a potential victim Much could be at risk Regulatory compliance

© 2015 IBM Corporation IBM Security 4 Your social data – your cyber DNA – can be used against you Source: InfoWorld, “How to stop your executives from being harpooned”, May 23, 2011, stop-your-executives-from-being-harpooned.htmlhttp:// stop-your-executives-from-being-harpooned.html Real world example: business data leveraged Social data leveraged Company, title, work address Target Senior executive of customer satisfaction Method Whaling titled “customer complaint” Content Appeared to be sent from Better Business Bureau Action Outcome Executive clicked on link to see details of the “complaint” Embedded malware Social data leveraged Personal background and address Target Systems administrator with 5 children Method Whaling about premium health plan Content Details on premium health care plan for families of 4 or more Action Outcome Administrator opened the attached form Malware, compromising company network and sensitive data Real world example: personal data leveraged

© 2015 IBM Corporation IBM Security 5 Executive protection from IBM: stay social, while keeping your cyber DNA protected “Did I say something risky publicly? What have others said about me that I should be concerned about?” View high-level and detailed risk and threat insights into social content by you, and about you “Did I say something risky publicly? What have others said about me that I should be concerned about?” View high-level and detailed risk and threat insights into social content by you, and about you “This could impact my organization’s and my brand and reputation. Could I be out of compliance?” Help better manage regulatory compliance by retaining your social activity and related documentation “This could impact my organization’s and my brand and reputation. Could I be out of compliance?” Help better manage regulatory compliance by retaining your social activity and related documentation “I am a busy executive and need to be able to maintain a safe social presence while I’m on the go.” Get mobile, easy-to-view access of your risk dashboard and details, and view recommendations “I am a busy executive and need to be able to maintain a safe social presence while I’m on the go.” Get mobile, easy-to-view access of your risk dashboard and details, and view recommendations Executive protection from IBM: key benefits Know your social risksHelp stay compliant Stay protected on the go Social media is a powerful marketing and communications tool, however it carries inherent legal and regulatory risks

© 2015 IBM Corporation IBM Security 6 Designed specifically for executives, it can help you assess your social risks z Retain Retain social activity for future reference or discovery z Monitor Monitor social content to help identify risks and review emerging threat data Authorize Enable the application to access the social accounts you select Assess View recommendations on threats, potential risks or emerging security trends Executive protection from IBM – an IBM alliance with Social SafeGuard Gain the confidence that you’re covered and can take action, with a single end-to-end platform for your personal risk management and remediation Gather intelligence and start protecting yourself today Get on-the-go access with our mobile application, designed for ease of use, to help protect you against cyber threats and risks Obtain visibility and awareness with our real-time risk engine, assessing executive risk exposure through social media Help better manage regulatory compliance through retention of social activity in the event of a future audit or request for documentation

© 2015 IBM Corporation IBM Security 7 Risk dashboard: know your social risk at a glance Executive protection from IBM – risk dashboard Quickly view your current overall risk level View the detailed risks identified for a given social network Multidimensional risk engine assesses risk levels to determine severity of threats to privacy, security and reputation Powered by Social SafeGuard an industry-leading 1 social risk management platform 1

© 2015 IBM Corporation IBM Security 8 Risk details: drill down to review details and recommendations Executive protection from IBM – risk details View the detailed risks identified for a given social network and recommendations for identified social risks or threats Opt in to any or all of key supported social networks – Facebook, LinkedIn and Twitter Monitoring of content posted by you, as well as your friends and connections, for potential risk, including: Private business information leaks Inappropriate language Personal information leaks Potential identity theft Malware received and sent Monitoring of content posted by you, as well as your friends and connections, for potential risk, including: Private business information leaks Inappropriate language Personal information leaks Potential identity theft Malware received and sent

© 2015 IBM Corporation IBM Security 9 Mobile access: get your risk data on the go Executive protection from IBM – mobile views Available: In iOS and Android for mobile devices For both phone and tablet Via Apple App Store and GooglePlay Available: In iOS and Android for mobile devices For both phone and tablet Via Apple App Store and GooglePlay Quick and easy access from the web, tablet, phone or any mobile device Includes offline access on your mobile device and push notifications to alert you of any changes in your social risk level

© 2015 IBM Corporation IBM Security 10 How it works: a few simple steps Register, receive an invitation, and authorize executive protection from IBM 1 Access your mobile device to review threats when you’re on the go 4 Review overview of threats and risk levels, over a selected period of time 2 Review specific risk and mention details, as well as recommendations 3

© 2015 IBM Corporation IBM Security 11 Learn more about IBM Security Visit our website IBM Security Website IBM Security Website Watch our videos IBM Security YouTube Channel IBM Security YouTube Channel Read new blog posts SecurityIntelligence.com SecurityIntelligence.com Follow us IBM Security Intelligence. Integration. Expertise.

© 2015 IBM Corporation IBM Security 12 © Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY