Deep Threat: Security Lessons from the Online Adult Entertainment Industry

Presented by

Richard Hollis, Director, Risk Factory

About this talk

Gross revenues for the online adult entertainment industry exceeded $150 billion dollars last year from transactions conducted over more than 5 million websites offering adult content. Every second $3,075.64 is being spent on adult entertainment websites. The annual revenues from this industry alone exceed the top ten online companies in the world combined (Microsoft, Google, Amazon, E-Bay, Yahoo, Dell etc). This industry is credited for creating the very financial model used by virtually everyone doing business on the Internet today in addition to being primarily responsible for launching the very technologies we now come to expect from service providers from broadband to streaming media. This is an industry that understands the financial benefits of aligning their technology to their business objectives. The industry is also reputed to be the largest purveyor of SPAM, viruses, Trojans, worms, adware and spyware. This fact along with the product it sells and enormous revenue it generates make it an extremely high value target for crackers, fraudsters, organised crime and vigilante groups. And yet, we never hear about a breach to their systems do we? Why is that? What is their secret? What do they know about data security that other industries don’t? The presentation covers the statistics of the industry and then explains the ten basic information security principles that online adult entertainment providers implement to ensure the security integrity of their systems. The material is based upon actual case studies and interviews with Directors of online adult entertainment provider companies.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (447)
Subscribers (38567)
With over 280,000 members, the Information Security Community is the largest community of cybersecurity professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.