EP.72 CYBERSECURITY for 2021 with CHRIS OTT Wealth Actually
-
- Entrepreneurship
Here is the first video foray for the "Wealth Actually" podcast (a bit by accident! We had to switch formats midstream . . . so I decided to experiment with the video format).
I interviewed Christopher Ott on #Cybersecurity for the Ultra High Net Worth, High Net Worth and Family Office space. We talk about how one should view their own digital risks, how to protect yourself, and what to do when you have been compromised. We kept it to 40 minutes and probably could have discussed issues for more than three hours.
Chris is a partner at Rothwell Figg, the litigation firm based in Washington, D.C.
Successfully
litigating complex data security matters, conducting hundreds of
investigations, and winning dozens of appeals,
Prior
to entering private practice, Mr. Ott held various influential positions at DOJ
including Supervisory Cyber Counsel to the National Security Division of the
DOJ,
In these roles, he investigated and charged the largest known computer hacking and securities fraud scheme and the hack of Yahoo by Russian intelligence operatives, the largest data breach in history,
https://youtu.be/XzYwkjA1qiA
BASICS
Cybersecurity- the main concerns are around the ability to control access and use of information. Everybody has at least three types of information
PREDICTIVE DATA
This is data that will help predict what you are going to do. This is especially useful for hackers and other criminals as they figure out how to access your data.
CONTROLLING DATA
This is data that regulates the access to a client's information.
This can include: Passwords (and the need for two factor control, Phones (with automatic password access that can be migrated), and "Deep Fake" video and voice that can trick the gatekeepers into relinquishing access
INFLUENCE
This can include social, political, or economic influence.
THREE TYPES OF ADVERSARIES
Criminals
Spies
Hybrid hackers
-Russian Type
-Chinese Type
SPECIAL CONCERNS FOR HNW INDIVIDUALS
More data
More control
Much more influence
· Direct socio-political
· Indirect socio-political
WHAT IS IMPORTANT?
§ Control
· Analog passwords
· Never take shortcuts
· Device security
§ Two
Factor
INFORMATIONAL AUDITS (DATA MAPPING)
§ What
do I have?
§ How
do I control it?
§ Who
else has access to it?
CONVENIENCE VS. SECURITY
§ BEC
§ Sim
Jacking
§  Deep fake audio and video
WHAT TO DO WHEN YOU HAVE BEEN COMPROMISED
Understand What You Have and What Your Risks Are
Have Advisors In Place
Don't Panic- Assess the Situation
Implement Action Plan
Some Quick Ideas to Protect Yourself and Your Business . .
Here is the first video foray for the "Wealth Actually" podcast (a bit by accident! We had to switch formats midstream . . . so I decided to experiment with the video format).
I interviewed Christopher Ott on #Cybersecurity for the Ultra High Net Worth, High Net Worth and Family Office space. We talk about how one should view their own digital risks, how to protect yourself, and what to do when you have been compromised. We kept it to 40 minutes and probably could have discussed issues for more than three hours.
Chris is a partner at Rothwell Figg, the litigation firm based in Washington, D.C.
Successfully
litigating complex data security matters, conducting hundreds of
investigations, and winning dozens of appeals,
Prior
to entering private practice, Mr. Ott held various influential positions at DOJ
including Supervisory Cyber Counsel to the National Security Division of the
DOJ,
In these roles, he investigated and charged the largest known computer hacking and securities fraud scheme and the hack of Yahoo by Russian intelligence operatives, the largest data breach in history,
https://youtu.be/XzYwkjA1qiA
BASICS
Cybersecurity- the main concerns are around the ability to control access and use of information. Everybody has at least three types of information
PREDICTIVE DATA
This is data that will help predict what you are going to do. This is especially useful for hackers and other criminals as they figure out how to access your data.
CONTROLLING DATA
This is data that regulates the access to a client's information.
This can include: Passwords (and the need for two factor control, Phones (with automatic password access that can be migrated), and "Deep Fake" video and voice that can trick the gatekeepers into relinquishing access
INFLUENCE
This can include social, political, or economic influence.
THREE TYPES OF ADVERSARIES
Criminals
Spies
Hybrid hackers
-Russian Type
-Chinese Type
SPECIAL CONCERNS FOR HNW INDIVIDUALS
More data
More control
Much more influence
· Direct socio-political
· Indirect socio-political
WHAT IS IMPORTANT?
§ Control
· Analog passwords
· Never take shortcuts
· Device security
§ Two
Factor
INFORMATIONAL AUDITS (DATA MAPPING)
§ What
do I have?
§ How
do I control it?
§ Who
else has access to it?
CONVENIENCE VS. SECURITY
§ BEC
§ Sim
Jacking
§  Deep fake audio and video
WHAT TO DO WHEN YOU HAVE BEEN COMPROMISED
Understand What You Have and What Your Risks Are
Have Advisors In Place
Don't Panic- Assess the Situation
Implement Action Plan
Some Quick Ideas to Protect Yourself and Your Business . .
40 min