SlideShare una empresa de Scribd logo
1 de 51
Cyber Security
in
Real Estate Sales
Is cyber risk really a problem?
Why is the real estate sales industry
being targeted?
How real are the threats for agents,
brokers, and office managers?
11/1/2016 www.totaldigitalsecurity.com/sdar 2
Cyber Security in Real Estate Sales
11/1/2016 3
“Urgent Alert: Sophisticated Email
Scams Targeting the Real Estate
Industry.”
“ALERT:
Wire Fraudsters
Targeting Real Estate
Transactions.”
“Cyber attacks are hitting the real
estate industry hard.”
“Scam steals closing money by hacking
agent, escrow email.”
Is Cyber Risk a Real Problem?
2015 REALTORS® Conference & Expo
“Increased Frequency of Cyber Attacks –
Millions of dollars stolen as many agents
have fallen victim.”
11/1/2016 www.totaldigitalsecurity.com/sdar 4
“Cybercrime againstlarge
retailers like Target andHome
Depothascost thesecompanies
millions in damages.Now
cybercriminals are targeting the
real estateindustry.”
“They specifically target peoplein
the real estateindustry … skulking
in the background,watching all
the information go back and
forth.”
Jessica Edgerton, Associate Counsel – National Association of Realtors.
June 22, 2016 - http://www.realtor.org/law-and-ethics
Is Cyber Risk a Real Problem?
• Is cyber risk really a problem?
• Why is the real estate sales industry being
targeted?
• What are the risks for agents, brokers, and
office managers?
11/1/2016 www.totaldigitalsecurity.com/sdar 5
Cyber Security in Real Estate Sales
11/1/2016 www.totaldigitalsecurity.com/sdar 6
Why Are Realtors® Being
Targeted?
It’snotjustwherethemoneyis,
it’swherethebig,easymoneyis.
Money.
Information.
Inmotion.
Onunprotecteddevices.
Overunsecurednetworks.
Byunawareparties.
• Is cyber risk really a problem?
• Why is the real estate sales industry being
targeted?
• What are the risks for agents, brokers, office
managers, and your clients?
11/1/2016 www.totaldigitalsecurity.com/sdar 7
Cyber Security in Real Estate Sales
11/1/2016 www.totaldigitalsecurity.com/sdar 8
“Changing regulations present added challenges, and
lawsuits are typically launched in the aftermath of a
data breach.”
“… average cost of a breached laptop today
is about $50,000.
“Legal damages include data breach fines
and remediation packages for impacted customers.”
“ … over $500,000 was wired to the fraudster’s
account.”
Financial
Legal
Reputational
Professional
Personal
What Are the Risks?
 Yes, cyber risk is a serious problem.
 The real estate industry is targeted for the high
level of money and information that is
undefended during a transaction.
 The threats are real for agents, brokers, and
office managers, and high levels of risk are at
hand.
11/1/2016 www.totaldigitalsecurity.com/sdar 9
Cyber Security in Real Estate Sales
①How did this happen?
②What do the next few years hold?
③What can you do about it?
11/1/2016 www.totaldigitalsecurity.com/sdar 10
Cyber Security
in
Real Estate Sales
11/1/2016 www.totaldigitalsecurity.com/sdar 11
How Did This Happen?
How did our personal
information and
technology become the
#1 target for criminals
from around?
The Personalization of Cyber Risk
11/1/2016
Chart courtesy
Attack Target Distribution
"Rather than a 'Cyber Armageddon' scenario that debilitates
the entire US infrastructure, we envision something different.
We foresee an ongoing series of low-to-
moderate level cyber attacks from a variety of
sources over time, which will impose cumulative
costs on US economic competitiveness and
national security.”
James Clapper, Director of National Intelligence.
Worldwide Threat Assessment of the US Intelligence
Community" presented to lawmakers on Feb. 26th,
2015.
11/1/2016 13
11/1/2016 www.totaldigitalsecurity.com/sdar 14
How Did This Happen?
The Personalization of Cyber Risk
Mobil
e
Clou
ds
Big
Data
“This changes
everything!”
SteveJobs,January9th 2007
11/1/2016 www.totaldigitalsecurity.com 15
Another Day at the Office.
11/1/2016 16
Mobile
“This
changes
everything.”
Steve Jobs, introducing
the first iPhone.
January 9th, 2007
11/1/2016 17
Mobile
The Smartphone – the fastest spreading
technology in the history of humanity.
By 2020, 80% of the
Earth’s population will
have a supercomputer in
their pocket.
The Economist
Feb, 2015
The Cloud
Information
and
Computing Power
Available to anyone, anywhere, anytime.
11/1/2016 19
Big Data
Powerful software
that enables value
extraction from raw
data.
11/1/2016 www.totaldigitalsecurity.com/sdar 20
How Did This Happen?
Digital Alchemy – Bits to Bullion
Cyber Security
in
Real Estate Sales
①What happened?
②What do the next few years hold?
③What can you do about it?
11/1/2016 www.totaldigitalsecurity.com/sdar 21
11/1/2016 www.totaldigitalsecurity.com/sdar 22
What Do the Next Few Years Hol
The IoT - Internet of Things BitCoin
“We’ve estimated that
cybercriminals today enjoy a
return-on-investment (ROI) of
1,425%”
Trustwave, June 2015..”
Anonymous,liquid,and
portablewealth.
Cyber Crime for Profit
More information, more
opportunity for
exploitation.
11/1/2016 23
ROI in Cyber Crime
“In our research into underground
markets, we’ve estimated that
cybercriminals today enjoy a return-
on-investment (ROI) of 1,425 percent.”
Trustwave – 2015 Global Security
Report.
Cisco engineers determined a typical
hacker can make $34 million a year using
today's ransomware software tools. Tools
available to anyone. For rent.
11/1/2016 www.totaldigitalsecurity.com/sdar 24
“In our research into underground
markets, we’ve estimated that
cybercriminals today enjoy a return-
on-investment (ROI) of 1,425
percent.”
Trustwave – 2015 Global Security
Report. Cisco engineers determined a typical
hacker can make $34 million a year using
today's ransomware software tools. Tools
available to anyone. For rent.
What Do the Next Few Years Hol
• Ransomware
• Phishing
• Hacking-for-Hire
• Crime-as-a-Service
 Rapidconvergenceofcybercrimewithphysicalandtraditional
crime.
 Theft
 Extortion
 Fraud
 Blackmail
www.totaldigitalsecurity.com11/1/2016 25
Cyber Security
in
Real Estate Sales
①What happened?
②What do the next few years hold?
③What can you do about it?
11/1/2016 www.totaldigitalsecurity.com/sdar 26
Exponential Progress in Technology
Linear vs. Exponential Change
“Life” is here Y
X You are here
www.totaldigitalsecurity.com11/1/2016 27
11/1/2016 28
Exponential Change – Living in the Digital Age
You are here
X
“Life” is here Y
Watch the Delta
• Apathy
• Fear
• Confusion
• Denial
The rate of change in our every day lives is accelerating.
www.totaldigitalsecurity.com11/1/2016 29
www.totaldigitalsecurity.com11/1/2016 30
11/1/2016 www.totaldigitalsecurity.com 31
The New York Post
April 18th, 2016
“A former Lehman Brothers executive
unwittingly wired a $2 million deposit for
a $20 million Manhattan apartment to
cyber criminals - and now he is blaming
his real estate attorney and her
vulnerable AOL email address for the
breach."A former Lehman Brothers executive unwittingly wired a $2 million deposit for a
$20 million Manhattan apartment to cyber criminals — and now he’s blaming
his real estate attorney and her vulnerable AOL email address for the breach.
Robert Millard, who was a managing director at Lehman and now runs the
private investment firm Realm Partners, and his wife Bethany Millard hired Long
Island lawyer Patricia Doran to help them buy a co-op last year.
W T F !
“Our intuition about the future is
linear.
But the reality of information
technology is exponential, and
that makes a profound difference.
If I take 30 steps linearly, I get to
30. If I take 30 steps exponentially,
I get to a billion.”
11/1/2016 32
Exponential Change
Ray Kurzweil
Director of Engineering at Google -
prolific inventor and author, futurist.
11/1/2016 www.totaldigitalsecurity.com 33
Digital Darwinism
11/1/2016 34
Misevaluation of our
personal information has
created an arbitrage
trade that is minting
history’s greatest
fortunes over the
shortest periods of time.
The Trade That Hacked Our Democracy
Isn’t it great
that we have
to pay nothing
for the barn?
Yes! And
even the
food is free.
Etc…
11/1/2016 35
Better, easier, faster
and cheaper. As the
Internet has
democratized cyber-
risk, so is it
commoditizing cyber-
security solutions.
What Can You Do About it?
Use exponentially progressing improvements in cyber-security technology to
protect yourself.
11/1/2016 36
Trends in Cyber Security Technology
• Real-time, remote monitoring and
management of devices eliminates the need
for user-input and behavioral modifications.
• Automatic updating and patching of operating
system software and other, vulnerable 3rd
party applications such as Adobe and Java.
• Increasingly, collaborative threat intelligence
resources are coming to bear for real-time,
preemptive defenses.
• AI and algorithms will increase in effectiveness
and application to predict and defend from
future threats as they morph and evolve.
11/1/2016 www.totaldigitalsecurity.com 37
What Can You Do About It?
Protect Your
Devices
#1 #2
Encrypt Your
Online Activities
#3
Own a Private
Email Domain
#4
Use a Digital
Vault
• AntiVirus
• IntruderProtection
• DataLossProtection
• AppControls
• AutomaticEncryption
• IPMasking
• WiFiPrivacy
• InternetTunneling
• BuiltforSecurity
• OfftheGrid
• Pre-emptiveFiltering
• SpamControl
• OfftheCloud
• DoubleEncryption
• ControlledSharing
• ProtectedStorage
11/1/2016 www.totaldigitalsecurity.com 39
Network Ops for RMM – Remote Monitoring and Management of Devices
11/1/2016 www.totaldigitalsecurity.com 40
Network Ops for RMM – Remote Monitoring and Management of Devices
Without a VPN
11/1/2016 41
With a VPN
11/1/2016 42
11/1/2016 www.totaldigitalsecurity.com/sdar 43
VPN – Don’t Leave Home Without It.
11/1/2016 www.totaldigitalsecurity.com 44
Privatize Your Email
11/1/2016 www.totaldigitalsecurity.com/sdar 45
Fidelity National Title Group
April 2016
Re: Cyber-attacks on Free Email Services
 Increased Frequency of Cyber
Attacks
 Protection of NPPI
 Professionalism
“ … many lenders are beginning to tie the
use of free email addresses and domains
with an increased potential for cyber-
attacks and email scams. “
“… these are three big reasons to make
the switch ASAP. “
1) The Gatekeeper Scan.
2) Message Sniffer.
3) Cloudmark Advanced Fingerprinting.
4) Clam AV AntiVirus
Four Layers of
Incoming Protection
11/1/2016 www.totaldigitalsecurity.com 47
Off-Cloud Digital Vaults
Swiss Ft Knox for Digital Assets
48
11/1/2016 www.totaldigitalsecurity.com 49
• Controlyourtechnology,oritwillcontrolyou.
• Actasaleadertowardawarenessandbest-
practices.
• Personalizetheissuesanddon’tleaveitupto
theITdepartment,government,corporation,
ormilitarytoprotectyourself.
• Focusonyourindividuals(family,employees,
advisors,etc.) andperimeteroperating
environments.
• Positionyourselftobenefitfromrecent
innovationinthecybersecurityindustry.
11/1/2016 www.totaldigitalsecurity.com/sdar 50
Cyber Security
in
Real Estate Sales
Conclusion
11/1/2016 www.totaldigitalsecurity.com/sdar 51

Más contenido relacionado

La actualidad más candente

Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPPhilippe Boivineau
 
Precious ore, precious data
Precious ore, precious dataPrecious ore, precious data
Precious ore, precious dataBrunswick Group
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalMorgan Jones
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Ludmila Morozova-Buss
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)Kate Dalakova
 
Cyber security money men
Cyber security money menCyber security money men
Cyber security money mengiorgiogarrido6
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secureKonica Minolta
 
[Webinar Slides] The Simplest Route to Security and Compliance
[Webinar Slides] The Simplest Route to Security and Compliance[Webinar Slides] The Simplest Route to Security and Compliance
[Webinar Slides] The Simplest Route to Security and ComplianceAIIM International
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassaultMohammad Husain
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
CYBERSECURITY 3.0: The Single Most Important Event of this Century
CYBERSECURITY 3.0: The Single Most Important Event of this CenturyCYBERSECURITY 3.0: The Single Most Important Event of this Century
CYBERSECURITY 3.0: The Single Most Important Event of this CenturyCasey Fleming
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 

La actualidad más candente (20)

Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 
Precious ore, precious data
Precious ore, precious dataPrecious ore, precious data
Precious ore, precious data
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Cyber security money men
Cyber security money menCyber security money men
Cyber security money men
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secure
 
[Webinar Slides] The Simplest Route to Security and Compliance
[Webinar Slides] The Simplest Route to Security and Compliance[Webinar Slides] The Simplest Route to Security and Compliance
[Webinar Slides] The Simplest Route to Security and Compliance
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
CYBERSECURITY 3.0: The Single Most Important Event of this Century
CYBERSECURITY 3.0: The Single Most Important Event of this CenturyCYBERSECURITY 3.0: The Single Most Important Event of this Century
CYBERSECURITY 3.0: The Single Most Important Event of this Century
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 

Destacado

DFC Evaluation 2012-03-22
DFC Evaluation 2012-03-22DFC Evaluation 2012-03-22
DFC Evaluation 2012-03-22J Valdez
 
Robert Shemin - ARE YOU READY FOR A NEW GAME PLAN
Robert Shemin - ARE YOU READY FOR A NEW GAME PLANRobert Shemin - ARE YOU READY FOR A NEW GAME PLAN
Robert Shemin - ARE YOU READY FOR A NEW GAME PLANRobert Shemin
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksTripwire
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacksmasoud khademi
 
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-NetherlandsDominika Rusek
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskDominika Rusek
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Digital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskDigital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskMosoco Ltd
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsRahul Neel Mani
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Catheynwrecruit
 
Frequently Asked Questions sulla Cyber Risk Insurance
Frequently Asked Questions sulla Cyber Risk InsuranceFrequently Asked Questions sulla Cyber Risk Insurance
Frequently Asked Questions sulla Cyber Risk InsuranceLuca Moroni ✔✔
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Sergey Gordeychik
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 

Destacado (20)

DFC Evaluation 2012-03-22
DFC Evaluation 2012-03-22DFC Evaluation 2012-03-22
DFC Evaluation 2012-03-22
 
Robert Shemin - ARE YOU READY FOR A NEW GAME PLAN
Robert Shemin - ARE YOU READY FOR A NEW GAME PLANRobert Shemin - ARE YOU READY FOR A NEW GAME PLAN
Robert Shemin - ARE YOU READY FOR A NEW GAME PLAN
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
 
Cyber liaility insurance the basics
Cyber liaility insurance   the basicsCyber liaility insurance   the basics
Cyber liaility insurance the basics
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-risk
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Digital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskDigital transformation: introduction to cyber risk
Digital transformation: introduction to cyber risk
 
Threat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
 
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 
Frequently Asked Questions sulla Cyber Risk Insurance
Frequently Asked Questions sulla Cyber Risk InsuranceFrequently Asked Questions sulla Cyber Risk Insurance
Frequently Asked Questions sulla Cyber Risk Insurance
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016Greater China Cyber Threat Landscape - ISC 2016
Greater China Cyber Threat Landscape - ISC 2016
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk 7 Strategies for Reducing IoT Cyber Risk
7 Strategies for Reducing IoT Cyber Risk
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 

Similar a Cyber Risk in Real Estate Sales - Workshop Presentation

[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010- Mark - Fullbright
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCigniti Technologies Ltd
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security EconomyBehnaz Aria
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeprcircle
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...PECB
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data SecurityRazor Technology
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Jeremiah Grossman
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 

Similar a Cyber Risk in Real Estate Sales - Workshop Presentation (20)

[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security Economy
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrimeNearly 80 billion dollars were spent in 2016 to fight cybercrime
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 

Último

Low Rate Call girls in Sant Nagar{Delhi }8447779280} Service Escorts In South...
Low Rate Call girls in Sant Nagar{Delhi }8447779280} Service Escorts In South...Low Rate Call girls in Sant Nagar{Delhi }8447779280} Service Escorts In South...
Low Rate Call girls in Sant Nagar{Delhi }8447779280} Service Escorts In South...asmaqueen5
 
Low Rate ✨➥9711108085▻✨Call Girls In East Of Kailash (E.K) (Delhi)
Low Rate ✨➥9711108085▻✨Call Girls In East Of Kailash (E.K) (Delhi)Low Rate ✨➥9711108085▻✨Call Girls In East Of Kailash (E.K) (Delhi)
Low Rate ✨➥9711108085▻✨Call Girls In East Of Kailash (E.K) (Delhi)delhi24hrs1
 
Low Density Living New Project in BPTP THE AMAARIO Sector 37D Gurgaon Haryana...
Low Density Living New Project in BPTP THE AMAARIO Sector 37D Gurgaon Haryana...Low Density Living New Project in BPTP THE AMAARIO Sector 37D Gurgaon Haryana...
Low Density Living New Project in BPTP THE AMAARIO Sector 37D Gurgaon Haryana...ApartmentWala1
 
Prestige Sancoale Goa Residneces Brochure.pdf
Prestige Sancoale Goa Residneces Brochure.pdfPrestige Sancoale Goa Residneces Brochure.pdf
Prestige Sancoale Goa Residneces Brochure.pdfkishor21012022
 
Nyati Elite NIBM Road Pune E Brochure.pdf
Nyati Elite NIBM Road Pune E Brochure.pdfNyati Elite NIBM Road Pune E Brochure.pdf
Nyati Elite NIBM Road Pune E Brochure.pdfabbu831446
 
MEQ Mainstreet Equity Corp Q2 2024 Investor Presentation
MEQ Mainstreet Equity Corp Q2 2024 Investor PresentationMEQ Mainstreet Equity Corp Q2 2024 Investor Presentation
MEQ Mainstreet Equity Corp Q2 2024 Investor PresentationMEQ - Mainstreet Equity Corp.
 
Call Girls In Sarai Rohilla ☎️8447779280{Sarai Rohilla Escort Service In Delh...
Call Girls In Sarai Rohilla ☎️8447779280{Sarai Rohilla Escort Service In Delh...Call Girls In Sarai Rohilla ☎️8447779280{Sarai Rohilla Escort Service In Delh...
Call Girls In Sarai Rohilla ☎️8447779280{Sarai Rohilla Escort Service In Delh...asmaqueen5
 
Kohinoor Teiko Hinjewadi Phase 2 Pune E-Brochure.pdf
Kohinoor Teiko Hinjewadi Phase 2 Pune  E-Brochure.pdfKohinoor Teiko Hinjewadi Phase 2 Pune  E-Brochure.pdf
Kohinoor Teiko Hinjewadi Phase 2 Pune E-Brochure.pdfManishSaxena95
 
Best Interior Design Services in Haldwani
Best Interior Design Services in HaldwaniBest Interior Design Services in Haldwani
Best Interior Design Services in HaldwaniGeomatrix
 
Jaipur Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Jaipur Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsJaipur Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Jaipur Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
Kohinoor Courtyard One Wakad Pune | Elegant Living Spaces
Kohinoor Courtyard One Wakad Pune | Elegant Living SpacesKohinoor Courtyard One Wakad Pune | Elegant Living Spaces
Kohinoor Courtyard One Wakad Pune | Elegant Living Spacesaidasheikh47
 
Bptp The Amaario Launch Luxury Project Sector 37D Gurgaon Dwarka Expressway...
Bptp The Amaario Launch  Luxury Project  Sector 37D Gurgaon Dwarka Expressway...Bptp The Amaario Launch  Luxury Project  Sector 37D Gurgaon Dwarka Expressway...
Bptp The Amaario Launch Luxury Project Sector 37D Gurgaon Dwarka Expressway...ApartmentWala1
 
Rohan Harita Tathawade Pune Brochure.pdf
Rohan Harita Tathawade Pune Brochure.pdfRohan Harita Tathawade Pune Brochure.pdf
Rohan Harita Tathawade Pune Brochure.pdfabbu831446
 
BPTP THE AMAARIO Luxury Project Invest Like Royalty in Sector 37D Gurgaon Dwa...
BPTP THE AMAARIO Luxury Project Invest Like Royalty in Sector 37D Gurgaon Dwa...BPTP THE AMAARIO Luxury Project Invest Like Royalty in Sector 37D Gurgaon Dwa...
BPTP THE AMAARIO Luxury Project Invest Like Royalty in Sector 37D Gurgaon Dwa...ApartmentWala1
 
SVN Live 5.6.24 Weekly Property Broadcast
SVN Live 5.6.24 Weekly Property BroadcastSVN Live 5.6.24 Weekly Property Broadcast
SVN Live 5.6.24 Weekly Property BroadcastSVN International Corp.
 
BPTP THE AMAARIO For The Royals Of Tomorrow in Sector 37D Gurgaon Dwarka Expr...
BPTP THE AMAARIO For The Royals Of Tomorrow in Sector 37D Gurgaon Dwarka Expr...BPTP THE AMAARIO For The Royals Of Tomorrow in Sector 37D Gurgaon Dwarka Expr...
BPTP THE AMAARIO For The Royals Of Tomorrow in Sector 37D Gurgaon Dwarka Expr...ApartmentWala1
 
Parksville 96 Surrey Floor Plans May 2024
Parksville 96 Surrey Floor Plans May 2024Parksville 96 Surrey Floor Plans May 2024
Parksville 96 Surrey Floor Plans May 2024VickyAulakh1
 
Eldeco Dwarka Project In Delhi-brochure.pdf.pdf
Eldeco Dwarka Project In Delhi-brochure.pdf.pdfEldeco Dwarka Project In Delhi-brochure.pdf.pdf
Eldeco Dwarka Project In Delhi-brochure.pdf.pdfkratirudram
 
Low Rate ✨➥9711108085▻✨Call Girls In Majnu Ka Tilla (Mt) (Delhi)
Low Rate ✨➥9711108085▻✨Call Girls In Majnu Ka Tilla (Mt) (Delhi)Low Rate ✨➥9711108085▻✨Call Girls In Majnu Ka Tilla (Mt) (Delhi)
Low Rate ✨➥9711108085▻✨Call Girls In Majnu Ka Tilla (Mt) (Delhi)delhi24hrs1
 
Ganga Platinum Kharadi Pune brochure.pdf
Ganga Platinum Kharadi Pune brochure.pdfGanga Platinum Kharadi Pune brochure.pdf
Ganga Platinum Kharadi Pune brochure.pdfsabhyara24
 

Último (20)

Low Rate Call girls in Sant Nagar{Delhi }8447779280} Service Escorts In South...
Low Rate Call girls in Sant Nagar{Delhi }8447779280} Service Escorts In South...Low Rate Call girls in Sant Nagar{Delhi }8447779280} Service Escorts In South...
Low Rate Call girls in Sant Nagar{Delhi }8447779280} Service Escorts In South...
 
Low Rate ✨➥9711108085▻✨Call Girls In East Of Kailash (E.K) (Delhi)
Low Rate ✨➥9711108085▻✨Call Girls In East Of Kailash (E.K) (Delhi)Low Rate ✨➥9711108085▻✨Call Girls In East Of Kailash (E.K) (Delhi)
Low Rate ✨➥9711108085▻✨Call Girls In East Of Kailash (E.K) (Delhi)
 
Low Density Living New Project in BPTP THE AMAARIO Sector 37D Gurgaon Haryana...
Low Density Living New Project in BPTP THE AMAARIO Sector 37D Gurgaon Haryana...Low Density Living New Project in BPTP THE AMAARIO Sector 37D Gurgaon Haryana...
Low Density Living New Project in BPTP THE AMAARIO Sector 37D Gurgaon Haryana...
 
Prestige Sancoale Goa Residneces Brochure.pdf
Prestige Sancoale Goa Residneces Brochure.pdfPrestige Sancoale Goa Residneces Brochure.pdf
Prestige Sancoale Goa Residneces Brochure.pdf
 
Nyati Elite NIBM Road Pune E Brochure.pdf
Nyati Elite NIBM Road Pune E Brochure.pdfNyati Elite NIBM Road Pune E Brochure.pdf
Nyati Elite NIBM Road Pune E Brochure.pdf
 
MEQ Mainstreet Equity Corp Q2 2024 Investor Presentation
MEQ Mainstreet Equity Corp Q2 2024 Investor PresentationMEQ Mainstreet Equity Corp Q2 2024 Investor Presentation
MEQ Mainstreet Equity Corp Q2 2024 Investor Presentation
 
Call Girls In Sarai Rohilla ☎️8447779280{Sarai Rohilla Escort Service In Delh...
Call Girls In Sarai Rohilla ☎️8447779280{Sarai Rohilla Escort Service In Delh...Call Girls In Sarai Rohilla ☎️8447779280{Sarai Rohilla Escort Service In Delh...
Call Girls In Sarai Rohilla ☎️8447779280{Sarai Rohilla Escort Service In Delh...
 
Kohinoor Teiko Hinjewadi Phase 2 Pune E-Brochure.pdf
Kohinoor Teiko Hinjewadi Phase 2 Pune  E-Brochure.pdfKohinoor Teiko Hinjewadi Phase 2 Pune  E-Brochure.pdf
Kohinoor Teiko Hinjewadi Phase 2 Pune E-Brochure.pdf
 
Best Interior Design Services in Haldwani
Best Interior Design Services in HaldwaniBest Interior Design Services in Haldwani
Best Interior Design Services in Haldwani
 
Jaipur Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Jaipur Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsJaipur Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Jaipur Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Kohinoor Courtyard One Wakad Pune | Elegant Living Spaces
Kohinoor Courtyard One Wakad Pune | Elegant Living SpacesKohinoor Courtyard One Wakad Pune | Elegant Living Spaces
Kohinoor Courtyard One Wakad Pune | Elegant Living Spaces
 
Bptp The Amaario Launch Luxury Project Sector 37D Gurgaon Dwarka Expressway...
Bptp The Amaario Launch  Luxury Project  Sector 37D Gurgaon Dwarka Expressway...Bptp The Amaario Launch  Luxury Project  Sector 37D Gurgaon Dwarka Expressway...
Bptp The Amaario Launch Luxury Project Sector 37D Gurgaon Dwarka Expressway...
 
Rohan Harita Tathawade Pune Brochure.pdf
Rohan Harita Tathawade Pune Brochure.pdfRohan Harita Tathawade Pune Brochure.pdf
Rohan Harita Tathawade Pune Brochure.pdf
 
BPTP THE AMAARIO Luxury Project Invest Like Royalty in Sector 37D Gurgaon Dwa...
BPTP THE AMAARIO Luxury Project Invest Like Royalty in Sector 37D Gurgaon Dwa...BPTP THE AMAARIO Luxury Project Invest Like Royalty in Sector 37D Gurgaon Dwa...
BPTP THE AMAARIO Luxury Project Invest Like Royalty in Sector 37D Gurgaon Dwa...
 
SVN Live 5.6.24 Weekly Property Broadcast
SVN Live 5.6.24 Weekly Property BroadcastSVN Live 5.6.24 Weekly Property Broadcast
SVN Live 5.6.24 Weekly Property Broadcast
 
BPTP THE AMAARIO For The Royals Of Tomorrow in Sector 37D Gurgaon Dwarka Expr...
BPTP THE AMAARIO For The Royals Of Tomorrow in Sector 37D Gurgaon Dwarka Expr...BPTP THE AMAARIO For The Royals Of Tomorrow in Sector 37D Gurgaon Dwarka Expr...
BPTP THE AMAARIO For The Royals Of Tomorrow in Sector 37D Gurgaon Dwarka Expr...
 
Parksville 96 Surrey Floor Plans May 2024
Parksville 96 Surrey Floor Plans May 2024Parksville 96 Surrey Floor Plans May 2024
Parksville 96 Surrey Floor Plans May 2024
 
Eldeco Dwarka Project In Delhi-brochure.pdf.pdf
Eldeco Dwarka Project In Delhi-brochure.pdf.pdfEldeco Dwarka Project In Delhi-brochure.pdf.pdf
Eldeco Dwarka Project In Delhi-brochure.pdf.pdf
 
Low Rate ✨➥9711108085▻✨Call Girls In Majnu Ka Tilla (Mt) (Delhi)
Low Rate ✨➥9711108085▻✨Call Girls In Majnu Ka Tilla (Mt) (Delhi)Low Rate ✨➥9711108085▻✨Call Girls In Majnu Ka Tilla (Mt) (Delhi)
Low Rate ✨➥9711108085▻✨Call Girls In Majnu Ka Tilla (Mt) (Delhi)
 
Ganga Platinum Kharadi Pune brochure.pdf
Ganga Platinum Kharadi Pune brochure.pdfGanga Platinum Kharadi Pune brochure.pdf
Ganga Platinum Kharadi Pune brochure.pdf
 

Cyber Risk in Real Estate Sales - Workshop Presentation

  • 2. Is cyber risk really a problem? Why is the real estate sales industry being targeted? How real are the threats for agents, brokers, and office managers? 11/1/2016 www.totaldigitalsecurity.com/sdar 2 Cyber Security in Real Estate Sales
  • 3. 11/1/2016 3 “Urgent Alert: Sophisticated Email Scams Targeting the Real Estate Industry.” “ALERT: Wire Fraudsters Targeting Real Estate Transactions.” “Cyber attacks are hitting the real estate industry hard.” “Scam steals closing money by hacking agent, escrow email.” Is Cyber Risk a Real Problem? 2015 REALTORS® Conference & Expo “Increased Frequency of Cyber Attacks – Millions of dollars stolen as many agents have fallen victim.”
  • 4. 11/1/2016 www.totaldigitalsecurity.com/sdar 4 “Cybercrime againstlarge retailers like Target andHome Depothascost thesecompanies millions in damages.Now cybercriminals are targeting the real estateindustry.” “They specifically target peoplein the real estateindustry … skulking in the background,watching all the information go back and forth.” Jessica Edgerton, Associate Counsel – National Association of Realtors. June 22, 2016 - http://www.realtor.org/law-and-ethics Is Cyber Risk a Real Problem?
  • 5. • Is cyber risk really a problem? • Why is the real estate sales industry being targeted? • What are the risks for agents, brokers, and office managers? 11/1/2016 www.totaldigitalsecurity.com/sdar 5 Cyber Security in Real Estate Sales
  • 6. 11/1/2016 www.totaldigitalsecurity.com/sdar 6 Why Are Realtors® Being Targeted? It’snotjustwherethemoneyis, it’swherethebig,easymoneyis. Money. Information. Inmotion. Onunprotecteddevices. Overunsecurednetworks. Byunawareparties.
  • 7. • Is cyber risk really a problem? • Why is the real estate sales industry being targeted? • What are the risks for agents, brokers, office managers, and your clients? 11/1/2016 www.totaldigitalsecurity.com/sdar 7 Cyber Security in Real Estate Sales
  • 8. 11/1/2016 www.totaldigitalsecurity.com/sdar 8 “Changing regulations present added challenges, and lawsuits are typically launched in the aftermath of a data breach.” “… average cost of a breached laptop today is about $50,000. “Legal damages include data breach fines and remediation packages for impacted customers.” “ … over $500,000 was wired to the fraudster’s account.” Financial Legal Reputational Professional Personal What Are the Risks?
  • 9.  Yes, cyber risk is a serious problem.  The real estate industry is targeted for the high level of money and information that is undefended during a transaction.  The threats are real for agents, brokers, and office managers, and high levels of risk are at hand. 11/1/2016 www.totaldigitalsecurity.com/sdar 9 Cyber Security in Real Estate Sales
  • 10. ①How did this happen? ②What do the next few years hold? ③What can you do about it? 11/1/2016 www.totaldigitalsecurity.com/sdar 10 Cyber Security in Real Estate Sales
  • 11. 11/1/2016 www.totaldigitalsecurity.com/sdar 11 How Did This Happen? How did our personal information and technology become the #1 target for criminals from around? The Personalization of Cyber Risk
  • 13. "Rather than a 'Cyber Armageddon' scenario that debilitates the entire US infrastructure, we envision something different. We foresee an ongoing series of low-to- moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on US economic competitiveness and national security.” James Clapper, Director of National Intelligence. Worldwide Threat Assessment of the US Intelligence Community" presented to lawmakers on Feb. 26th, 2015. 11/1/2016 13
  • 14. 11/1/2016 www.totaldigitalsecurity.com/sdar 14 How Did This Happen? The Personalization of Cyber Risk Mobil e Clou ds Big Data “This changes everything!” SteveJobs,January9th 2007
  • 16. 11/1/2016 16 Mobile “This changes everything.” Steve Jobs, introducing the first iPhone. January 9th, 2007
  • 17. 11/1/2016 17 Mobile The Smartphone – the fastest spreading technology in the history of humanity. By 2020, 80% of the Earth’s population will have a supercomputer in their pocket. The Economist Feb, 2015
  • 19. 11/1/2016 19 Big Data Powerful software that enables value extraction from raw data.
  • 20. 11/1/2016 www.totaldigitalsecurity.com/sdar 20 How Did This Happen? Digital Alchemy – Bits to Bullion
  • 21. Cyber Security in Real Estate Sales ①What happened? ②What do the next few years hold? ③What can you do about it? 11/1/2016 www.totaldigitalsecurity.com/sdar 21
  • 22. 11/1/2016 www.totaldigitalsecurity.com/sdar 22 What Do the Next Few Years Hol The IoT - Internet of Things BitCoin “We’ve estimated that cybercriminals today enjoy a return-on-investment (ROI) of 1,425%” Trustwave, June 2015..” Anonymous,liquid,and portablewealth. Cyber Crime for Profit More information, more opportunity for exploitation.
  • 23. 11/1/2016 23 ROI in Cyber Crime “In our research into underground markets, we’ve estimated that cybercriminals today enjoy a return- on-investment (ROI) of 1,425 percent.” Trustwave – 2015 Global Security Report. Cisco engineers determined a typical hacker can make $34 million a year using today's ransomware software tools. Tools available to anyone. For rent.
  • 24. 11/1/2016 www.totaldigitalsecurity.com/sdar 24 “In our research into underground markets, we’ve estimated that cybercriminals today enjoy a return- on-investment (ROI) of 1,425 percent.” Trustwave – 2015 Global Security Report. Cisco engineers determined a typical hacker can make $34 million a year using today's ransomware software tools. Tools available to anyone. For rent.
  • 25. What Do the Next Few Years Hol • Ransomware • Phishing • Hacking-for-Hire • Crime-as-a-Service  Rapidconvergenceofcybercrimewithphysicalandtraditional crime.  Theft  Extortion  Fraud  Blackmail www.totaldigitalsecurity.com11/1/2016 25
  • 26. Cyber Security in Real Estate Sales ①What happened? ②What do the next few years hold? ③What can you do about it? 11/1/2016 www.totaldigitalsecurity.com/sdar 26
  • 27. Exponential Progress in Technology Linear vs. Exponential Change “Life” is here Y X You are here www.totaldigitalsecurity.com11/1/2016 27
  • 28. 11/1/2016 28 Exponential Change – Living in the Digital Age
  • 29. You are here X “Life” is here Y Watch the Delta • Apathy • Fear • Confusion • Denial The rate of change in our every day lives is accelerating. www.totaldigitalsecurity.com11/1/2016 29
  • 31. 11/1/2016 www.totaldigitalsecurity.com 31 The New York Post April 18th, 2016 “A former Lehman Brothers executive unwittingly wired a $2 million deposit for a $20 million Manhattan apartment to cyber criminals - and now he is blaming his real estate attorney and her vulnerable AOL email address for the breach."A former Lehman Brothers executive unwittingly wired a $2 million deposit for a $20 million Manhattan apartment to cyber criminals — and now he’s blaming his real estate attorney and her vulnerable AOL email address for the breach. Robert Millard, who was a managing director at Lehman and now runs the private investment firm Realm Partners, and his wife Bethany Millard hired Long Island lawyer Patricia Doran to help them buy a co-op last year. W T F !
  • 32. “Our intuition about the future is linear. But the reality of information technology is exponential, and that makes a profound difference. If I take 30 steps linearly, I get to 30. If I take 30 steps exponentially, I get to a billion.” 11/1/2016 32 Exponential Change Ray Kurzweil Director of Engineering at Google - prolific inventor and author, futurist.
  • 34. 11/1/2016 34 Misevaluation of our personal information has created an arbitrage trade that is minting history’s greatest fortunes over the shortest periods of time. The Trade That Hacked Our Democracy Isn’t it great that we have to pay nothing for the barn? Yes! And even the food is free. Etc…
  • 35. 11/1/2016 35 Better, easier, faster and cheaper. As the Internet has democratized cyber- risk, so is it commoditizing cyber- security solutions. What Can You Do About it? Use exponentially progressing improvements in cyber-security technology to protect yourself.
  • 36. 11/1/2016 36 Trends in Cyber Security Technology • Real-time, remote monitoring and management of devices eliminates the need for user-input and behavioral modifications. • Automatic updating and patching of operating system software and other, vulnerable 3rd party applications such as Adobe and Java. • Increasingly, collaborative threat intelligence resources are coming to bear for real-time, preemptive defenses. • AI and algorithms will increase in effectiveness and application to predict and defend from future threats as they morph and evolve.
  • 38. What Can You Do About It? Protect Your Devices #1 #2 Encrypt Your Online Activities #3 Own a Private Email Domain #4 Use a Digital Vault • AntiVirus • IntruderProtection • DataLossProtection • AppControls • AutomaticEncryption • IPMasking • WiFiPrivacy • InternetTunneling • BuiltforSecurity • OfftheGrid • Pre-emptiveFiltering • SpamControl • OfftheCloud • DoubleEncryption • ControlledSharing • ProtectedStorage
  • 39. 11/1/2016 www.totaldigitalsecurity.com 39 Network Ops for RMM – Remote Monitoring and Management of Devices
  • 40. 11/1/2016 www.totaldigitalsecurity.com 40 Network Ops for RMM – Remote Monitoring and Management of Devices
  • 43. 11/1/2016 www.totaldigitalsecurity.com/sdar 43 VPN – Don’t Leave Home Without It.
  • 45. 11/1/2016 www.totaldigitalsecurity.com/sdar 45 Fidelity National Title Group April 2016 Re: Cyber-attacks on Free Email Services  Increased Frequency of Cyber Attacks  Protection of NPPI  Professionalism “ … many lenders are beginning to tie the use of free email addresses and domains with an increased potential for cyber- attacks and email scams. “ “… these are three big reasons to make the switch ASAP. “
  • 46. 1) The Gatekeeper Scan. 2) Message Sniffer. 3) Cloudmark Advanced Fingerprinting. 4) Clam AV AntiVirus Four Layers of Incoming Protection
  • 48. Swiss Ft Knox for Digital Assets 48
  • 50. • Controlyourtechnology,oritwillcontrolyou. • Actasaleadertowardawarenessandbest- practices. • Personalizetheissuesanddon’tleaveitupto theITdepartment,government,corporation, ormilitarytoprotectyourself. • Focusonyourindividuals(family,employees, advisors,etc.) andperimeteroperating environments. • Positionyourselftobenefitfromrecent innovationinthecybersecurityindustry. 11/1/2016 www.totaldigitalsecurity.com/sdar 50 Cyber Security in Real Estate Sales Conclusion

Notas del editor

  1. Is cyber risk a real problem for the real estate industry? Why is the real estate industry being targeted? How real are the threats – for sales, agents, brokers, and office managers?
  2. Not just where the money is, but where the big, easy money is.