View
284
Download
0
Embed Size (px)
Citation preview
DATA BREACH RISK INTELLIGENCEFOR REGIONAL AND COMMUNITY
BANKSPredict and present data breach risk using the
language of bankers - dollars
WHY?Regional and community banks have extraordinary relationships with their communities.
A data breach has very high stakes:
- Customer trust
- Millions of dollars in fees
- Potential litigation for officers
Find bank-specific data, like ACH details
Detect with one tool: - Data- Vulnerabilities- Access permissions
Translate data breach risk into dollars
But current tools cannot:
PREDICTthe cost of a data breach by device
PREVENTa breach by remediating
highest liability devices first
WITH ISCAN RISK INTELLIGENCE
PRESENTevidence to
management and the Board in
dollars
FINANCIALLY PRIORITIZE YOUR DATA BREACH RISK
One tool answers:What data is at risk and who has access to it?
How can attackers get to it?
What will it cost when breached?
HOW IT WORKS
Data Breach Risk Report(Device view)
Devices are prioritized for remediation and justification.
Financial metrics are ready to present to non-IT management and the Board
Sensitive data (including ACH and PII data), vulnerabilities and access permissions are detected.
Risk Intelligence Dashboard (Organization
view)
The dollar liability is automatically calculated for each device.
1 2 3 4
HOW IT WORKS: ACH DISCOVERY
A detailed list of ACH data is included in the Data Breach Risk Report to expedite remediation.
Unprotected ACH files are detected on a server, PC/Mac or mobile device.
1 2 3The liability in dollars for unprotected ACH data is automatically calculated.
PATENTED DISCOVERY
Mobileapp
Commandline
Cloud-based lightweight deployment with same day results
Millions of devices at one time
No loss of productivity during scans
Active directory
Potential liability $Data at Risk• ACH• Social Security
numbers• Driver’s licenses• Birthdates• Telephone numbers• Credit card numbers• Bank accounts• Intellectual property• Custom files
DATA BREACH RISK REPORTPER DEVICE
VulnerabilitiesBy severityBy vendor
Unauthorized accessConfigurations
INTELLIGENCE DASHBOARD
Know where your unprotected assets are - like a cyber security “Google map”
Immediate prioritization for decision-making
Trend reporting for evidence of impact
Boardroom ready
INTEGRATION
Works with existing technology investments in Systems Management and RMM tools.
RECOGNITION
Industry Innovator: Analysis & Control
REMOTE SECURITY SELF-ASSESSMENT FRAMEWORK
Patent 9,032,520Patent 8,819,773
Trial iScan5 devices for 14 days
https://app.iscanonline.com/
THANK YOU
iscanonline.com