Predicting Insider Threats (PIT)™

Slides:



Advertisements
Similar presentations
Integrated Product Management SVPMA March 5, 2003 Darlene K. Mann, CEO Siperian
Advertisements

Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
SAS solutions SAS ottawa platform user society nov 20th 2014.
Get Complete IT Compliance: Reduce Risk and Cost Jonathan CISO, Qualys Seth Automation Specialist, BMC.
2012 IASA Advanced Boot Camp: Mastering the Art of Marketing & Selling to Insurance Companies! Thursday, March 15 th & Friday, March 16 th Omni Amelia.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
5th International Istanbul Insurance Conference
CoreLogic Credit & Transportation Services. What Do We Do? Credit Services  Mortgage  Automotive  RV  Marine  Motorcycle  Capital Markets  Servicing.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Fraud and Prevention: Lessons from the Fire Service August 24,
Introduction to Accounting. SO 1 Explain what accounting is. Purpose of accounting is to: 1.identify, record, and communicate the economic events of.
Idea Name Team Members. Market Need What problems or needs your product will solve?
THOMSON REUTERS TAX & ACCOUNTING Rick Kursik December 2, 2011.
© 2012 Datameer, Inc. All rights reserved. Page 1 © 2012 Datameer, Inc. All rights reserved. Hadoop in Financial Services Adam Gugliciello, Solutions Engineer.
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Leveraging Information to Detect and Prevent Insider Attacks Phoram Mehta Senior.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Safe’n’Sec IT security solutions for enterprises of any size.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
2013 Cost of Data Breach Survey: Global Analysis Ponemon Institute (2013) 1.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
9 - 1 Chapter 9 Management Control Systems and Responsibility Accounting.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Predictive Analytics Market to Global Analysis and Forecasts by Applications, Business Function, Deployment Model No of Pages: 150 Publishing Date:
Cybersecurity as a Business Differentiator
First Industrial Smart Robot X-1: how and why?
Understanding DATA LOSS PREVENTION
The Accountant’s Role in the Organization
Insiders are Today’s Biggest Security Threat
Healthcare Cybersecurity: State of Industry
BUSINESS CONTINUITY BY HUI ZHENG.
Business At the Speed of Cyber
Real-time protection for web sites and web apps against ATTACKS
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
Fraud Risk Management at Digital Insurance Market
MIGRATING TO NEW TECHNOLOGY
Today’s Risk. Today’s Solutions. Cyber security and
Data Privacy: Essentials for Payroll
Varonis Overview.
Marketing leads Optimization at Fortis RBB
Navigating Security Seas in a Small Ship with a Limited Crew
Based on Oil & Gas Industry Averages
Cybersecurity compliance for attorneys
ITP Maturity Model Survey 2018
12/6/ :19 AM Customer story: How to protect against security breaches and insider threats Edward Panzeter Sr. Systems Engineer Universal Health Services.
Cyber Security Culture
This is where we need to “bee” Nyenrode Business Consultancy
The Accountant’s Role in the Organization
InCyber Block Diagram User “1 User “n” Customer Site
Protect Your Ecommerce Site From Hacking and Fraud
Forensic and Investigative Accounting
Strategic threat assessment
Cyber Security in a Risk Management Framework
Microsoft Data Insights Summit
Figuring out CyberSecurity Return On Investment
STEALTHbits Technologies, Inc.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Predicting Insider Threats (PIT)™ www.incyber1.com

How Did We Not See Him Coming? Edward Snowden CIA/NSA

The Team 20+ years of experience in startups and fortune 500 companies including NASDAQ IPO of Giltronix inc Former Chairman of the Technology Management Dept. at Jerusalem College of Technology More than 20 years of experience in the fields of Fraud prevention and investigation Risk Project Manager at Price Waterhouse Coopers - Internal fraud prevention Founder and CEO of Ivy League Gradates, a company that disrupted the US MBA applications market International Mergers & Acquisitions and Taxation Specialist for Ernst & Young

69% of breaches are caused by insiders (1) The Problem 69% of breaches are caused by insiders (1) Less than half of companies have a dedicated budget for insider threats (3) >50% 74% of security professionals say they’re organizations are vulnerable to insider thefts (2) 74% 84% of the S&P 500’s value now consists of IP (3) 69% EMA report LinkedIn’s Information Security Community and Crowd Research Partners, 2017 Forcepoint Global Threat Report 2016

$4,295,568 Containment Costs (1) $206,933 $347,130 $493,093 The average total annual cost of containment/remediation for all types of insider threats Average cost per attack: $206,933 Negligent insider $347,130 malicious insider $493,093 Credential Theft Ponemon Institute Cyber report 2016

Current Solutions Over 20 Years of User Behavior Analysis (UBA) solutions  Continued increase in thefts UBA is not a prediction tool  By the time the system reacts under the rule based system the money/IP is long gone UBA does not take into consideration life events of employees UBA does not include industry factor

Initial Prediction Score Critical Prediction Scores InCyber’s 3 Step Solution True Prediction of Insider Threats ™ (TPIT)™ Machine Learning Advanced and Custom Machine Learning algorithms to detect suspicious behavior indicative of planning an inside attacks Initial Prediction Score ™ (IPS)™ Integrative Data inputs of both internal (HR meta data) and external (corporate and public sources) sources Critical Prediction Score (CPS) Using smart mathematics and the Crystal Ball Ranking Method™ we calculate the CPS and report to CISO or CIO Machine Learning Initial Prediction Score Critical Prediction Scores

Who We Are Looking For Irregular Activities User ID #z123w9 Activities cluster of insurance company exec that we caught Irregular Activities User ID #z123w9

Our Strengths Very profitable Only product to predict insider threats Only product to use internal and external information Red flagging is done automatically 25 times less false positives Marking only the truly dangerous employees Implementation can be done in any company No need to study companies’ systems before implementing No Big Data algorithms Product is at least 4 times cheaper than competition Tested on over 12,000 employees and counting Very profitable

GDPR InCyber’s product is inline with the GDPR Processing Information necessary to protect company’s vital interests Employees should receive information about InCyber’s product GDPR asserts that employees have a right not to be subject to a decision made solely by automated processing, and that employers should incorporate human intervention into automated processes that significantly affect employees This is exactly what InCyber does

Market Size -$20B More than 8,000 banks in the US alone(2) Over 105,000 companies worldwide with >500 employees (1) More than 27,000 financial institutions worldwide(1) 14,000 + financial institutions in US (2) DMDatabase 2015 survey Quara.com – 2016 survey

* All monetary figures are in 1,000$ Financials 3 Years financial projection Summary * * All monetary figures are in 1,000$ Years post Inv’ 1 2 3 Direct Clients 16 197 Direct Sales 590 16,787 52,756 Integrator Sales 348 8,550 31,785 Total Revenue 974 25,344 84,541 Expenses 1,438 9,290 18,785 Profit/Loss 494 15,220 63,246 12

THANK YOU!