Presentation is loading. Please wait.

Presentation is loading. Please wait.

Breach Monitoring and Response

Similar presentations


Presentation on theme: "Breach Monitoring and Response"— Presentation transcript:

1 Breach Monitoring and Response
Spencer Stephens

2 Current Example: AACS Breach Response
Wait for Adopter to Respond New BD Title Published Ripped Title Found AACS Determines Compromised Device Key Adopter Notified of Breach New MKB Published Ripping Tool Found Arbitration Revocation Disputed by Adopter

3 Active Breach Response
Replacement Player on Stand-by* Hacker Activity in Chat Rooms Ripped Title Found Ripping Tool Found Proactive Renewal Release Replacement Player New Title Published w/Diversity Determine Cause of Breach Prepare Replacement Player * Even if the replacement player is susceptible to the same hack there will likely be a period of time before the replacement player is hacked. This buys time to analyze the hack and generate a new replacement.


Download ppt "Breach Monitoring and Response"

Similar presentations


Ads by Google