Beruflich Dokumente
Kultur Dokumente
2
Pillar Overview
3
Only You Can Mitigate Security Risks
4
Target’s Cybersecurity Breach
https://www.welivesecurity.com/2018/12/18/target-targeted-five-years-breach-shook-cybersecurity/
https://www.thesslstore.com/blog/2013-target-data-breach-settled/ 5
Cybersecurity at Seagate
FY2020 Goals Actions You Can Take
6
Intel’s Product Security Catastrophe
https://investorplace.com/2018/01/intc-stock-meltdown-issues/
https://redmonk.com/rstephens/2018/02/09/cost-of-meltdown-spectre/ 7
Product Security at Seagate
FY2020 Goals Actions You Can Take
8
Barclays’ Physical Security Nightmare
https://www.cso.com.au/article/527083/gang_exploits_both_physical_system_security_during_bank_robbery/ 9
Physical Security at Seagate
FY2020 Goals Actions You Can Take
10
Facebook’s Data Woes
https://www.cnbc.com/2018/10/02/facebook-data-breach-social-network-could-face-eu-fine.html 11
Data Privacy and Data Protection at Seagate
FY2020 Goals Actions You Can Take
Develop a unified
data experience to
solve unmet IT 4.0
needs
Establish clear
leadership position
in our existing
device markets
Seagate Confidential 13
Six Crucial Behaviors
1) Stop. Think. Protect.
• Security is your responsibility. Know what to do, what not to do, and who to go to
2) If you see something, say something
• Know the right contacts and process for reporting across all four pillars (resources and process on slide 8)
3) Design for protection
• Be proactive and design our products, services, and processes for protection (given)
4) Protect Seagate data
• Do not work on, share, or discuss Seagate business including business, personal, customer, and third party data where
it might be overheard, seen, or taken
5) Protect Seagate sites, people, and property
• Keep out unauthorized access. Always badge in, do not leave devices/property unattended in office, home, or vehicle;
lock computers and devices
6) Be vigilant
• Watch for phishing, tailgating, and social engineering, and always keep your devices up-to-date and compliant with
policies. Phishing is the initial vector for 91% of cyber breaches!
You can also use the anonymous ethics helpline as a means of reporting any concern or issue Seagate Confidential 15