BEYOND CYBERSECURITY

We Increase Your Revenue By Mitigating Your Cyber Risks & Showing The World You Are Cybersecure

BEYOND CYBERSECURITY

We Increase Your Revenue By Mitigating Your Cyber Risks & Showing The World You Are Cybersecure

OUR APPROACH:

REVENUE-CENTRIC CYBERSECURITY

1. HOW IT INCREASES REVENUE

graphic of approach to cybersecurity

Revenue-Centric Cybersecurity is an innovative system that (1) increases revenue by helping organizations invest in only the cyber risk mitigation needed to reduce business-threatening cyber risks to an acceptable level and (2) provides the proof to clients, partners, and strategic buyers that they and their offerings are cybersecure.

2. DEPLOYS THIS CYBER RISK MITIGATION CYCLE

graphic of cyber risk mitigation cycle

The 4-Part Cyber Risk Mitigation Cycle introduced above is the focal point of Revenue-Centric Cybersecurity. This Cycle helps you efficiently organizes how to mitigate your unique cyber risks and develop the cybersecurity proof to best drive revenue.

3. LEVERAGES A MULTIDISCIPLINARY TEAM

leverages a multidisciplinary team

A Multidisciplinary Team covering the disciplines listed above will help you successfully implement every aspect of Revenue-Centric Cybersecurity. To maximize performance, assign strong leadership, give the leadership proper authority and budget, and allow the leadership to create, develop and leverage a multidisciplinary mitigation team.

4. APPLIES ALL FIVE CYBER RISK MITIGATION TOOLS + AUDITING & ADJUSTING

applies all five cyber risk mitigation tools

Traditional cybersecurity – i.e., the technologies, people, and processes used to prevent and mitigate cyber-attacks – is just one tool for mitigating your unique cyber risks.

The infographic above introduces all 5 Cyber Risk Mitigation Tools and the fact that you need an auditing and adjustment system for all your mitigation efforts.

icon

QUICK STARTS

Three Quick Ways To Get Started With Practical Cyber

icon

1. C-Level Sanity Check

  • 1-hour initial online consultation with Professor Marc Rogers and Elliot Turrini.
  • Immediately delivers valuable, customized advice to help C-Suites make better cyber risk mitigation decisions now and in the future.
  • Cost $1,975.
  • Written report for an additional $2,500.
icon

2. Board of Directors Consultation

  • 1-hour initial online consultation with Professor Marc Rogers and Elliot Turrini.
  • 2-hour online consultation among your board, Professor Marc Rogers and Elliot Turrini.
  • Immediately delivers valuable, customized advice to help boards better execute their cyber risk mitigation oversight responsibilities.
  • Cost $2,875.
  • Written report for an additional $2,500.
icon

3. Technological Intro to Revenue-Centric Cybersecurity

  • 1-hour initial online discussion among Professor Marc Rogers, Elliot Turrini and your technology team – e.g., CIO, CTO, and/or CISO
  • Helps your technology team better understand how it can leverage Revenue-Centric Cybersecurity
  • Cost $1,975.
  • Written report for an additional $2,500.
icon

ABOUT

Purdue University’s
Dr. Marc Rogers

Marcus Rogers

Internationally known cybersecurity expert & Founder of MKR Forensics

Executive Director Purdue Cyber Security and Forensics Lab and graduate program (the number one program in the nation)

Excellent practical experience while a professor at Purdue:

  • Led over 125 cyber incident response investigations – including several for Fortune 100 companies;
  • Created over 100 cyber incident response plans – including for several Fortune 50 companies.
  • His clients have spanned various industries including technology, financial services, healthcare, manufacturing, etc.

Former Federal Cybercrime
Prosecutor Elliot Turrini

Elliot Turrini

Former federal cybercrime prosecutor where he handled the Melissa Virus prosecution; the UBS insider attack case; and other major investigations and prosecutions

Cyberlaw and privacy attorney in private practice – covering all aspects of cyber and privacy law

Medical device cybersecurity expert

Editor & Author of Cybercrimes: A Multidisciplinary Analysis book published 2010

VP of Consulting Services Arete Advisors, a cybersecurity firm, 2017

General Counsel & EVP of 300 employee IT services firm 2004-07

Enterprise risk management and cyber liability insurance expert

The Story Behind Practical Cyber

This is a story of crime, common sense, and outrage over price gauging. It explains why Elliot Turrini, a former federal cybercrime prosecutor, general counsel, and IT consultant EVP, and current entrepreneur, started Practical Cyber.

Bottom line: He started it to remove the fear and mystique from cybersecurity and cyber insurance; and to help small and medium sized business cost-effectively secure and insure their cyber-related assets without unnecessarily interferring with their daily operations.

Practical Cyber's job is to keep you profitable.

Beginning: federal prosecutions & the cybercrime book

In March 1999, while Elliot Turrini was a federal cybercrime prosecutor in New Jersey, the Melissa virus infected millions of computer around the world and caused over $77 million in damage. As the lead prosecutor, Elliot Turrini learned firsthand about (1) the dangerous battle for control over computing technologies between criminals and businesses and (2) the scary fact that criminals will always find ways to win.

Three years later, Elliot prosecuted a system administrator for UBS PaineWebber. He had installed a “logic bomb” that deleted the hard drives of over 1,000 personal computers in the UBS branch offices around the United States. But for a legacy terminal in each branch office prepared for decommission, UBS would have suffered far more than the $3 Million in damages reported during the prosecution.

Because Elliot recognized that protecting business from cybercrime required a complex mix of law, economics, technology, psychology, and insurance, he recruited a group of world-class experts to collaborate on his book, Cybercrimes: A Multidisciplinary Analysis. Edited and organized by Elliot Turrini and Professor Sumit Ghosh, these experts wrote a first of its kind multidisciplinary treatise about how to better protect your computing-related resources from cybercriminals.

The right balance between productivity and cybersecurity

While the general counsel and EVP of a 300 employee IT consulting company from 2004 to 2007, Elliot Turrini learned about how small to medium sized businesses were using computing-related technologies to generate profits. He saw their need to balance end—user simplicity and robust (but not overly intrusive) security. He also learned that many SMBs were relied too heavily and blindly on IT personnel who didn’t fully understand just how vulnerable their operations were to cyber attack; and that those who engaged cybersecurity experts, often adopted security practices that went over-board and hindered employee productivity.

Heightened cybersecurity threats & price gauging

In 2017, a group of sophisticated cyber criminals hacked into the NSA, stole its most sophisticated cyber weapons, and posted them on the Internet for everyone to use. Almost every credible cybersecurity and cybercrime expert agrees that the distribution of these tools significantly heighted the risk of cyber attack for all businesses worldwide.

In June 2017, these tools via the WannaCry ransonsome ware virus helped cybercriminals almost shut down FedEx and the international law firm, DLA Piper, causing hundreds of millions in damage. The tools were also used to hold thousands of small and medium sized business hostage, locking them out of their computers until they paid the attackers a ransom.

In late July 2017, Equifax learned that hackers had stolen the personally identifiable information (including social security numbers) of at least 143 million people. This attack will cost Equifax about one billion dollars from a mix of investigation, reporting and other liability costs. And, its stock lost nearly 4 billion in value.

Finally, from August 2017 to October 2017, while consulting for a high-end cybersecurity company, Elliot learned that all businesses using computers shared the same fundamental cybersecurity challenges, and that many cybersecurity vendors were over-charging for their services. He also learned that cyber insurance could be bought for a fair price, but that few people understood how to negotiate and buy cyber insurance customized for each business. So, he put together a team of experts to help him create Practical Cyber.