40 min

EP.72 CYBERSECURITY for 2021 with CHRIS OTT Wealth Actually

    • Entrepreneurship

Here is the first video foray for the "Wealth Actually" podcast (a bit by accident! We had to switch formats midstream . . . so I decided to experiment with the video format).







I interviewed Christopher Ott on #Cybersecurity for the Ultra High Net Worth, High Net Worth and Family Office space. We talk about how one should view their own digital risks, how to protect yourself, and what to do when you have been compromised. We kept it to 40 minutes and probably could have discussed issues for more than three hours.







Chris is a partner at Rothwell Figg, the litigation firm based in Washington, D.C.







Successfully

litigating complex data security matters, conducting hundreds of

investigations, and winning dozens of appeals,







Prior

to entering private practice, Mr. Ott held various influential positions at DOJ

including Supervisory Cyber Counsel to the National Security Division of the

DOJ,







In these roles, he investigated and charged the largest known computer hacking and securities fraud scheme and the hack of Yahoo by Russian intelligence operatives, the largest data breach in history,









https://youtu.be/XzYwkjA1qiA









BASICS  







Cybersecurity- the main concerns are around the ability to control access and use of information. Everybody has at least three types of information







PREDICTIVE DATA







This is data that will help predict what you are going to do. This is especially useful for hackers and other criminals as they figure out how to access your data.







CONTROLLING DATA







This is data that regulates the access to a client's information.







This can include: Passwords (and the need for two factor control, Phones (with automatic password access that can be migrated), and "Deep Fake" video and voice that can trick the gatekeepers into relinquishing access







INFLUENCE







This can include social, political, or economic influence.







THREE TYPES OF ADVERSARIES







Criminals







Spies







Hybrid hackers







-Russian Type







-Chinese Type







SPECIAL CONCERNS FOR HNW INDIVIDUALS







More data







More control







Much more influence







·         Direct socio-political







·         Indirect socio-political







WHAT IS IMPORTANT?







§  Control







·         Analog passwords







·         Never take shortcuts







·         Device security







§  Two

Factor







INFORMATIONAL AUDITS (DATA MAPPING)







§  What

do I have?







§  How

do I control it?







§  Who

else has access to it?







CONVENIENCE VS. SECURITY







§  BEC







§  Sim

Jacking







§  Deep fake audio and video







WHAT TO DO WHEN YOU HAVE BEEN COMPROMISED







Understand What You Have and What Your Risks Are







Have Advisors In Place







Don't Panic- Assess the Situation







Implement Action Plan







Some Quick Ideas to Protect Yourself and Your Business . .

Here is the first video foray for the "Wealth Actually" podcast (a bit by accident! We had to switch formats midstream . . . so I decided to experiment with the video format).







I interviewed Christopher Ott on #Cybersecurity for the Ultra High Net Worth, High Net Worth and Family Office space. We talk about how one should view their own digital risks, how to protect yourself, and what to do when you have been compromised. We kept it to 40 minutes and probably could have discussed issues for more than three hours.







Chris is a partner at Rothwell Figg, the litigation firm based in Washington, D.C.







Successfully

litigating complex data security matters, conducting hundreds of

investigations, and winning dozens of appeals,







Prior

to entering private practice, Mr. Ott held various influential positions at DOJ

including Supervisory Cyber Counsel to the National Security Division of the

DOJ,







In these roles, he investigated and charged the largest known computer hacking and securities fraud scheme and the hack of Yahoo by Russian intelligence operatives, the largest data breach in history,









https://youtu.be/XzYwkjA1qiA









BASICS  







Cybersecurity- the main concerns are around the ability to control access and use of information. Everybody has at least three types of information







PREDICTIVE DATA







This is data that will help predict what you are going to do. This is especially useful for hackers and other criminals as they figure out how to access your data.







CONTROLLING DATA







This is data that regulates the access to a client's information.







This can include: Passwords (and the need for two factor control, Phones (with automatic password access that can be migrated), and "Deep Fake" video and voice that can trick the gatekeepers into relinquishing access







INFLUENCE







This can include social, political, or economic influence.







THREE TYPES OF ADVERSARIES







Criminals







Spies







Hybrid hackers







-Russian Type







-Chinese Type







SPECIAL CONCERNS FOR HNW INDIVIDUALS







More data







More control







Much more influence







·         Direct socio-political







·         Indirect socio-political







WHAT IS IMPORTANT?







§  Control







·         Analog passwords







·         Never take shortcuts







·         Device security







§  Two

Factor







INFORMATIONAL AUDITS (DATA MAPPING)







§  What

do I have?







§  How

do I control it?







§  Who

else has access to it?







CONVENIENCE VS. SECURITY







§  BEC







§  Sim

Jacking







§  Deep fake audio and video







WHAT TO DO WHEN YOU HAVE BEEN COMPROMISED







Understand What You Have and What Your Risks Are







Have Advisors In Place







Don't Panic- Assess the Situation







Implement Action Plan







Some Quick Ideas to Protect Yourself and Your Business . .

40 min