Network Security and Privacy Liability: How to Prepare for a Cyber Breach

Size: px
Start display at page:

Download "Network Security and Privacy Liability: How to Prepare for a Cyber Breach"

Transcription

1 Wells Fargo Insurance Services Risk Series Seminar Presents: Network Security and Privacy Liability: How to Prepare for a Cyber Breach July 18, 2012 Panelists: Melissa Krasnow, Dorsey & Whitney Anne De Vries, Digital Risk Managers (A division of Wells Fargo Special Risks, Inc.) Ryan Wakeham, NetSPI Mario Paez (Moderator), Wells Fargo Insurance Services Professional Risk Group This presentation was created by Dorsey & Whitney LLP, 50 South Sixth Street, Suite 1500, Minneapolis, MN This presentation is intended for general information purposes only and should not be construed as legal advice or legal opinions on any specific facts or circumstances. An attorney-client relationship is not created or continued by sending and/or receiving this presentation. Members of Dorsey & Whitney will be pleased to provide further information regarding the matters discussed in this presentation.

2 Agenda Network Security and Privacy Risk Overview: What Are the Threats? Data Breach Facts & Figures Data Security and Privacy Threats Costs if Threats are Realized Network Security and Privacy Risk Legal Discussion Legislation is driving exposure! Expanding Laws Which should be carefully considered? Network Security and Privacy Risk Management Outsourcing Risk and Vendor Management Data Breach Preparation and Response Digital Risk Management Insurance Coverage Issues 2

3 Some High Profile Breaches Radisson Hotels announced unauthorized access of company computer systems resulting in access personal information of an unknown number of guests. Vermont ski area, Okemo, reports data breach. Data from more than 46,000 credit / debit transactions compromised. Hannaford Bros: Supermarket chain reported breach of computer system exposing 4.2 million credit and debit card numbers with over 1800 cases of resulting fraud already reported. Pfizer: revealed its third data breach in three months, this time affecting the personal information of an estimated 34,000 people. Disney Movie Club: An employee who works for a company that processes DMC transactions was caught trying to sell customer credit card information. Fidelity National Information Services has admitted that personal information on 2.3 million people has been illegally removed from its database. The breach occurred at Certegy Check Services. Neiman Marcus: stolen computer with personal data of nearly 160,000 employees. TJX: Unauthorized intruder gained access to 46 million customers info Starbucks Corp. lost laptops with private information on 60,000 employees 3

4 Some Data Breach Facts & Figures The 2011 Cost of Data Breach Study by Symantec and The Ponemon Institute revealed the following: The average cost per breached record was $194 with roughly 1/3 of this cost being direct expenses, the rest being indirect costs (customer churn / productivity) The average total cost of a breach for the companies included in the study was $5.5 million Malicious attacks (from outside) and negligent insiders remain the top 2 causes of data breach. 41% of data breaches were caused by a third party vendor this would include protected data in the hands of outsourcers, cloud providers and business partners 39% of companies had data breaches that involved lost or stolen devices, such as laptops, tablets, smart phones and USB drives that contained confidential and sensitive information Only 22% of organizations surveyed indicated that this was their first security breach. 37% engaged consultants to assist with their data breach response and remediation. 4

5 Most Prevalent Threats Relating to Data Security and Privacy Unauthorized access/use of information or networks from outsiders (hackers), from insiders (rogue employees); unknown sources Virus, worms or other malware Hardware theft/loss (laptops, PDA s, storage media) Disruption of network traffic (DDOS Attacks) HUMAN ERROR Increasing Use of Social Media 5

6 Why Is This a Problem? The Internet is an open network Many companies have a transactional website; also many web-facing applications are poorly coded Businesses collect and store private customer data More data collected and stored than is needed Stored for too long or improperly stored Business servers (websites) are often very porous and need constant care (hardening & patching) Tools that help hackers are readily available and shared on the Internet at no cost to malicious attackers Bad guys rely on the prevalence of human error Poor passwords Unchanged default settings Lack of tested back-up process Poor patch management Inadequate use of encryption Failure to properly dispose of paper records 6

7 Data Security and Privacy Events: Impacts and Costs Tangible Costs of a Data Breach: Lost revenue Impact on availability of breached networks or lost business linked directly to customers fleeing to a safer environment (competitors). Lost productivity costs for lost employee or contractor time and productivity diverted from other usual tasks. Crisis Management Costs - Public relations expenses, consumer breach notification, credit/identity monitoring expenses, forensics Defense and other legal costs for ensuing third party claims and regulatory action, including fines and penalties Total cost of data breach - $194 per record* *Source: Ponemon Institute, LLC 2011 Annual Study: Cost of a Data Breach 7

8 Data Security and Privacy Events: Impacts and Costs Intangible Costs of a Data Breach: Damage to brand / reputation / customer trust Abnormal Customer Churn Rate Impact on growth from inability to retain customers or difficulty in acquiring new customers. Average customer churn rate following a data breach was 3.2%.* In a related survey of over 9000 consumers who had received breach notifications, 60% said that they had terminated or had considered terminating their relationship with the company. Loss of competitive edge *Source: Ponemon Institute, LLC 2011 Annual Study: Cost of a Data Breach 8

9 Data Security and Privacy Events: Impacts and Costs Third party claims arising from a network event: Failure to protect customer information/privacy Failure to notify / timely notification Cost to cancel or reissue payment cards/open new accounts (financial institutions) Costs of fraudulent purchases Consumer Redress credit and identity monitoring / restoration Regulatory Actions defense as well as fines and penalties 9

10 Most states including Minnesota have breach notification laws Cover personal information, meaning name, plus any of: social security number driver s license number financial account information (e.g., credit card, bank account, etc.) in some cases, health information 2012 amendments to state breach notification laws (e.g., California, Connecticut, Illinois, Texas, Vermont) Calls for national breach notification law 10

11 Enforcement of state breach notification laws varies State attorney general enforcement in Minnesota Private right of action in California Administrative fines in Florida 11

12 Massachusetts privacy regulation Covers any entity (regardless of whether in Massachusetts) with access to Massachusetts resident personal information Written information security program (WISP) must be implemented: encryption of personal information transmitted wirelessly and stored on portable devices third party service provider to an entity by contract provision must implement and maintain appropriate security measures for personal information 12

13 Massachusetts privacy regulation documentation of actions taken in response to incident involving a breach and mandatory postincident review to make changes in business practices for protection Reporting a breach to the Massachusetts attorney general (which is required under the Massachusetts breach notification law) could trigger an investigation of a reporting entity, including that the entity submit its WISP for review Massachusetts attorney general privacy enforcement actions 13

14 State social security number laws Could be implicated in a breach involving social security numbers 14

15 Federal HIPAA / HITECH Act breach notification Applies to covered entities and business associates Covered entity means (i) health plan, (ii) health care clearinghouse or (iii) health care provider Business associate that (i) on behalf of a covered entity, performs activity involving use or disclosure of individually identifiable health information or (ii) provides legal, actuarial, accounting, consulting, management, administrative, accreditation or financial services for the covered entity involving the disclosure of individually identifiable health information from the covered entity to the person 15

16 Federal HIPAA / HITECH Act breach notification Protected health information means individually identifiable health information relating to health care treatment, a health condition or payment for the provision of health care Covered entity notification to each individual, U.S. Department of Health and Human Services (if breach involves more than 500 individuals) and prominent media outlet (if breach involves more than 500 residents of state or jurisdiction) Business associate notification to covered entity 16

17 Enforcement of federal HIPAA / HITECH Act U.S. Department of Health and Human Services enforcement Civil penalties Criminal penalties State attorney generals also can bring civil actions No private right of action 17

18 International Privacy Laws Countries throughout the world continue to adopt privacy laws Information crosses country borders Data breaches can be global Canada: Alberta Personal Information Protection Act security breach notification 18

19 PCI DSS: Payment Card Industry Data Security Standard A security standard that requires all merchants to enforce critical protective measures security management policies and procedures network architecture software design Helps organizations proactively protect customer account data Developed by American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International Now governed by independent PCI Council 19

20 Outsourcing: Benefits vs. Risks Benefits: Companies can achieve growth and tremendous cost savings by outsourcing business practices (i.e. call centers, payroll, credit card processing) or technology Companies can leverage managing technology to another person Risks: Company must ensure that the outsourcer complies with all applicable laws Transferring control of company processes, IT functions and DATA reduces the ability to control or monitor the services and security Agreements must require the outsourcer to implement changes in laws and maintain adequate security, privacy and confidentiality of customer information Although your outsourcer is maintaining the information on your behalf, you as the data owner are responsible for breach notification and other liabilities 20

21 The Security Issues of Outsourcing Specific regulatory requirements for third party contracts (i.e. GLBA, HIPAA, PCI DSS) The agreement of security policies and procedures The need for regular compliance audits or third party certification monitoring and enforcement to ensure that service provider is meeting contractual obligations Disaster recovery, business continuity and incident response plans Issues related to off-shoring multi-jurisdicational risk and transborder data flow Allocation of risk and insurance 21

22 Outsourcing: Benefits vs. Risks Making a Move to the CLOUD Many companies, especially smaller ones, are transitioning from upfront IT investment to sleeker, more affordable hosted systems. But with this new business model comes new risks. Cloud Benefits: Reduced upfront IT costs Reduced maintenance and staffing Ability to scale systems up or down on demand Access to data from anywhere with Internet connection Cloud Risks: Lack of control reliance on faith that information is protected. One-sided contracts. Data movement/availability issues inability to recover all data in event of an outage. Also international law considerations. Data aggregation Cloud providers become targets for hackers. Move from anonymity to headliner. 22

23 Who is Behind Data Breaches? 98% stemmed from external agents (+6%) 4% implicated internal employees (-13%) <1% committed by business partners (<>) 58% of all data theft tied to activist groups How do Breaches Occur? 81% utilized some form of hacking (+31%) 69% incorporated malware (+20%) 10% involved physical attacks (-19%) 7% employed social tactics (-4%) 5% resulted from privilege misuse (-12%) Source: Verizon s 2012 Data Breach Investigations Report 23

24 What Commonalities Exist? 79% of victims were targets of opportunity (-4%) 96% of attacks were not highly difficult (+4%) 94% of all data compromised involved servers (+18%) 85% of breaches took weeks or more to discover (+6%) 92% of incidents were discovered by a third party (+6%) 97% of breaches were avoidable through simple or intermediate controls (+1%) 96% of victims subject to PCI DSS had not achieved compliance (+7%) Source: Verizon s 2012 Data Breach Investigations Report 24

25 Industry Groups Represented by % of Breaches Source: Verizon s 2012 Data Breach Investigations Report 25

26 Industry Groups Represented by % of Breaches Larger Organizations Source: Verizon s 2012 Data Breach Investigations Report 26

27 Threat Agents Over Time By % of Breaches Source: Verizon s 2012 Data Breach Investigations Report 27

28 Motive of External Agents by % of Breaches Source: Verizon s 2012 Data Breach Investigations Report 28

29 Threat Action Categories Over time by % of Breaches (and % of Records) (0%) (<1%) (<1%) (<1%) (37%) (99%) (95%) (0%) (<1%) (<1%) (<1%) (38%) (97%) (99%) Source: Verizon s 2012 Data Breach Investigations Report 29

30 Hacking Methods by % of Breaches Source: Verizon s 2012 Data Breach Investigations Report 30

31 Role of Organization Size on Variety of Data Compromise Trade Secrets Sensitive Organizational Data System Information Personal Information Bank Account Numbers/Data Classified Information Medical Records Copyrighted/Trademarked Material Authentication Credentials Payment Card Numbers/Data Source: Verizon s 2012 Data Breach Investigations Report 31

32 What are the biggest risks? Flaws in custom web application code Ubiquitous Attackers can circumvent controls to access data in the application or access the backend systems Lack of security processes / standards Weak configurations allow for easier exploitation (e.g., password guessing) Weak security awareness training Social engineering targets the end user People are always one of the weakest links 32

33 Where should efforts be focused? Smaller Organizations Change default credentials Implement a regular patching process Ensure that only necessary services are allowed through your firewall If you rely on third parties for the above, make sure they ve done them Larger Organizations Eliminate unnecessary data, systems, etc. Implement secure development processes Engage in periodic assessments to identify weaknesses and then remediate Monitor your environment (log and audit) 33

34 Strategies for Risk Managers Network Security and Privacy Risk Management: People Vigilant employees, board-level commitment to security and privacy issues, network security and privacy team in place and active Processes Network Asset Policies in place network security, privacy, document retention and acceptable use policies Legal vetting process for contracts and compliance Incident Response and Business Continuity plans Technology Basic network security controls that meet industry standards. Including monitoring/log review, DMZ Zones, Firewalls, Intrusion Detection Systems, anti-virus/spam/spyware software (updated daily), VPN/Remote Access authentication, vulnerability scans, backup, hot-site etc. Vendor Contract Requirements defintions, warranties/duties, monitoring and enforcement, incident response/reporting, indemnification/insurance requirements Insurance 34

35 Basic Questions Regarding Data Risk How does the organization identify critical or sensitive information assets and risks to those assets? Is the frequency and scope of the risk evaluation and compliance audits sufficient to take evolving threats into account? Are risks to critical or sensitive information assets managed in a similar fashion to other key business risks? What is the structure, activities, and decision-making process relating to network / data risk management? What are the due diligence and financial responsibility (insurance) requirements for other companies that connect to your network or provide outsourced services? 35

36 Review information and documentation and determine applicable laws Personally identifiable information what, where and in which form is it? Which company policies and procedures and agreements have provisions relating to privacy and confidentiality? Determine which laws apply and what the requirements are (e.g., policies and procedures and agreements) Sometimes, policies and procedures are advisable, though not required by law Which federal and state and other laws apply? 36

37 Be prepared Prepare policies and procedures and ensure they are consistent and integrated with company policies and procedures Devise a roadmap of what to do in the event of a possible breach Consider handling of investigations How should a company respond internally and externally to media, employees and others about breach circumstances and status? 37

38 SEC guidance on cybersecurity and cyber incident disclosure Securities and Exchange Commission (SEC) guidance about public company disclosure of cybersecurity risks and cyber incidents: not a rule, regulation or statement of the SEC no disclosure requirement specifically refers to cybersecurity risks and cyber incidents certain disclosure obligations may require discussion of cybersecurity risks and cyber incidents 38

39 SEC guidance on cybersecurity and cyber incident disclosure risk factors (if among the most significant factors that make an investment in the company speculative or risky), for example: aspects of the company s business that give rise to material cybersecurity risks and the potential costs and consequences description of material cyber incidents experienced by the company and the costs and other consequences 39

40 SEC guidance on cybersecurity and cyber incident disclosure management s discussion and analysis of financial condition and results of operations description of business (if materially affects its products, services, relationships with customers or suppliers or competitive conditions) legal proceedings (where a party to a material pending legal proceeding that involves a cyber incident) disclosure controls and procedures (where poses a risk to the company s ability to record, process, summarize and report information required to be disclosed in SEC filings) financial statement disclosure 40

41 Privacy developments Federal Trade Commission final privacy report Obama administration consumer privacy framework Federal HIPAA / HITECH Act rule modifications Cybersecurity legislation Federal and state enforcement actions 41

42 Data Breach Preparation Checklist How is the incident reported and documented? Do you know who you are going to call? Internal response team External response team Breach Counsel / Coach first call Process for determining compliance requirements Understanding of specific laws When / how to engage law enforcement Timeline obligations Breach Quarterback External breach response team in place? Breach Counsel / Coach Forensic investigator Notification letters / call center Credit / Identity Monitoring Consumer fraud protection reporting agencies, banks 42

43 Network & Privacy Risk Management Summary Network & privacy risk should be part of an enterprise-wide risk management strategy which includes employee training and network security related policies and procedures Strive for more/better communication between the IT department, risk management and other senior-level management Evaluate business activities and operations that are performed electronically or that involve sensitive information (PII / PHI) Evaluate financial impact should these activities or operations be negatively impacted by a network-related event Determine best approach to mitigating digital risks loss control (assessments / technology), contract language, risk retention and/or transfer to an insurance product. 43

44 Issues With Traditional Insurance Bodily Injury / Property Damage Triggers direct physical loss or damage Data is not tangible property Do not address theft or disclosure of third party information Intentional acts exclusions Do not address breach response / crisis management costs Contingent / Service Provider Risks (from external hosting, etc.) Crime policies require intent to cause harm. Only cover money, securities and tangible property. Territory restrictions 44

45 Network And Privacy Risk Policies: Property and Business Income Loss Property (Data Asset Coverage) Direct financial loss arising out of the damage, destruction, corruption or theft of electronic data due to a network security event Data restoration coverage typically includes cost to restore, replace or recreate the data Business Income/Extra Expense Coverage for loss of earnings (online and offline) Extra expense covers the actual costs incurred to minimize the suspension of business and continue operations until normal network operations are restored 45

46 Network & Privacy Risk Policies: Crisis Management Public Relations Expenses Coverage provided for the actual and necessary costs you incur to plan and execute a public relations campaign in order to protect or restore your professional reputation following a security breach Consumer Notification Expenses Coverage provided for the actual and necessary costs you incur to notify consumers if their personal identity information was compromised, as required by law Credit / Identity Monitoring / Restoration Coverage provided for the actual and necessary costs you incur to provide credit or identity monitoring and restoration services. Not typically required by law but generally offered in conjunction with the notification. Investigative/Forensic Expenses Coverage provided for the necessary expenses incurred to investigate a network security incident for the purposes of preventing or mitigating resulting damage, making a determination of coverage and preserving critical forensic evidence 46

47 Network And Privacy Risk Policies: Additional Coverage Cyber Extortion Involves a threat made against an insured to damage their computer system (i.e. by introducing a virus) or to divulge, disseminate or utilize their electronic information assets without authorization Coverage includes necessary expenses to investigate and settle the threat, including payment of extortion monies Regulatory Claim Expenses Covers the defense (and in some cases fines and penalties) of regulatory actions by governmental agencies against the insured for alleged violations of privacy regulations/laws 47

48 Network And Privacy Risk Policies: Network Security and Privacy Liability Provides for damages and defense expenses arising out of a covered claim due to a network security or privacy event Includes downstream liability of the insured for transmission of a computer virus or their participation in promulgating an attack against a 3 rd party Includes coverage for the insured s liability for: Damage to, theft of or destruction of data Prevention or hindrance of access to the insured network for those otherwise authorized to do so 48

49 Network And Privacy Risk Policies: Digital Content and IP Infringement Liability Provides coverage for electronic infringement of copyright, trademark, service mark, trade name, trade dress, title, slogan, etc. Defamation or other tort related to the disparagement or harm to the reputation or character of any person or organization. Misappropriation, plagiarism, or unauthorized use of ideas, material, titles, literary or artistic formats, or style, or performances in connection with advertising. 49

50 Who is buying Network Security & Privacy Insurance? Financial Institutions Banks, Insurers, Investment, other financial services Technology Service providers Combining E&O / Cyber Healthcare MCOs, TPAs, hospitals, physicians, insurers Retail/Hospitality PII / privacy key issue Mfg/Wholesale/Distribution supply chain management Public Entities Availability and Privacy are key issues Universities Liability to alumni/endowment Media/TelCom Combining E&O and Cyber How Much Does It Cost?? 3 rd Party Liability only: $1,000-$25,000 per Million of (liability) limit (depending on size) By adding 1 st party coverage, add approximately 10-20% in premium. 50

51 Why You Must Take Action Network Security & Privacy risks represent significant civil liability and regulatory exposures, as well as exposures arising from direct losses to data and network assets. Reputation loss is a significant danger to your business New privacy laws are increasing your need to be pro-active and are causing security breaches to be made more public, leading to significant direct costs and liability claims (class action suits) GL, Property, Crime and E&O continue to come up short on coverage. ISO GL 2001 & 2004 explicit about data being intangible property excludes damage to Electronic Data. Network Security & Privacy Insurance has broadened considerably due to maturity in marketplace: Privacy, Programming E&O, short waiting periods on Business Interruption, Breach Counsel/Notification/Credit Monitoring/Forensic costs, Regulatory Expense including fines / penalties DATA BREACHES ARE INEVITABLE and Losses are being paid by underwriters 51

52 Questions? Anne De Vries Managing Director Digital Risk Managers A division of Wells Fargo Special Risks, Inc. P: (503) anne.devries@drisk.com Melissa J. Krasnow Partner Dorsey & Whitney LLP P: (612) krasnow.melissa@dorsey.com Ryan Wakeham Director of Assessment Services NetSPI P: (612) Ryan.Wakeham@netspi.com Mario Paez Vice President Professional Risk Group Wells Fargo Insurance Services P: (952) Mario.Paez@wellsfargo.com wfis.wellsfargo.com 52

The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide

The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide Practising Law Institute January 9, 2012 Melissa J. Krasnow, Partner, Dorsey & Whitney LLP, and Certified Information Privacy Professional

More information

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

Managing Cyber & Privacy Risks

Managing Cyber & Privacy Risks Managing Cyber & Privacy Risks NAATP Conference 2013 NSM Insurance Group Sean Conaboy Rich Willetts SEAN CONABOY INSURANCE BROKER NSM INSURANCE GROUP o Sean has been with NSM Insurance Group for the past

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Pam Townley, AVP / Eastern Zonal Manager AIG Professional Liability Division Jennifer Bolling, Account Executive Gallagher Management Liability Division

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

Managing Cyber Risk through Insurance

Managing Cyber Risk through Insurance Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

Privacy Rights Clearing House

Privacy Rights Clearing House 10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

Data Breach Response Planning: Laying the Right Foundation

Data Breach Response Planning: Laying the Right Foundation Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA

More information

Updates within Network Security and Privacy Risk Management

Updates within Network Security and Privacy Risk Management Updates within Network Security and Privacy Risk Management RIMS Minneapolis Meeting Melissa Krasnow, Partner, Dorsey & Whitney LLP (Minneapolis, MN) Mario Paez, Midwest Practice Leader for Tech., Privacy,

More information

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

Cyber and data Policy wording

Cyber and data Policy wording Please read the schedule to see whether Breach costs, Cyber business interruption, Hacker damage, Cyber extortion, Privacy protection or Media liability are covered by this section. The General terms and

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

ISO? ISO? ISO? LTD ISO?

ISO? ISO? ISO? LTD ISO? Property NetProtect 360 SM and NetProtect Essential SM Which one is right for your client? Do your clients Use e-mail? Rely on networks, computers and electronic data to conduct business? Browse the Internet

More information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP

More information

Privacy and Data Breach Protection Modular application form

Privacy and Data Breach Protection Modular application form Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while

More information

Cyber Liability. What School Districts Need to Know

Cyber Liability. What School Districts Need to Know Cyber Liability What School Districts Need to Know Data Breaches Growing In Number Between January 1, 2008 and April 4, 2012 314,216,842 reported records containing sensitive personal information have

More information

Zurich Security And Privacy Protection Policy Application

Zurich Security And Privacy Protection Policy Application Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE

More information

Willis Healthcare Practice 11 th Annual Forum July 10,2007. Managing and Insuring Risks in Network Privacy/Cyber Risk

Willis Healthcare Practice 11 th Annual Forum July 10,2007. Managing and Insuring Risks in Network Privacy/Cyber Risk Willis Healthcare Practice 11 th Annual Forum July 10,2007 Managing and Insuring Risks in Network Privacy/Cyber Risk What is Network Security & Privacy Insurance? Created to cover gaps in traditional insurance

More information

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10) MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...

More information

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual

More information

Cyber Threats: Exposures and Breach Costs

Cyber Threats: Exposures and Breach Costs Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals

More information

plantemoran.com What School Personnel Administrators Need to know

plantemoran.com What School Personnel Administrators Need to know plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

The Age of Data Breaches:

The Age of Data Breaches: The Age of Data Breaches: HOW TO AVOID BEING THE NEXT HEADLINE MARCH 24, 2015 2015 Epstein Becker & Green, P.C. All Rights Reserved. ebglaw.com This presentation has been provided for informational purposes

More information

Cyber Liability Insurance: It May Surprise You

Cyber Liability Insurance: It May Surprise You Cyber Liability Insurance: It May Surprise You Moderator Eugene Montgomery, President & CEO Community Financial Insurance Center Panelists Antonio Trotta, Senior Claim Counsel, CNA Specialty William Heinbokel,

More information

Cybersecurity: Emerging Exposures for Technology Companies. October 7, 2010

Cybersecurity: Emerging Exposures for Technology Companies. October 7, 2010 Cybersecurity: Emerging Exposures for Technology Companies October 7, 2010 Your panelists David Allred, Head of the Technology Segment for North America Commercial at Zurich Liesyl Franz, Vice President

More information

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Thank you for joining us. We have a great many participants in today s call. Your phone is currently

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business TAKING OUR CUSTOMERS BUSINESS FORWARD The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment

More information

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C. Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.

More information

Anatomy of a Privacy and Data Breach

Anatomy of a Privacy and Data Breach Anatomy of a Privacy and Data Breach Understanding the Risk and Managing a Crisis Adam Kardash: Partner, Heenan Blaikie LLP Robert Parisi: Senior Vice President, Marsh Leadership, Knowledge, Solutions

More information

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach Best practices and insight to protect your firm today against tomorrow s cybersecurity breach July 8, 2015 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Cyber Exposure for Credit Unions

Cyber Exposure for Credit Unions Cyber Exposure for Credit Unions What it is and how to protect yourself L O C K T O N 2 0 1 2 www.lockton.com Add Cyber Title Exposure Here Overview #1 financial risk for Credit Unions Average cost of

More information

Enterprise PrivaProtector 9.0

Enterprise PrivaProtector 9.0 IRONSHORE INSURANCE COMPANIES 75 Federal St Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING FOR A CLAIMS

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

Attachment A. Identification of Risks/Cybersecurity Governance

Attachment A. Identification of Risks/Cybersecurity Governance Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

Cyber Risk in Healthcare AOHC, 3 June 2015

Cyber Risk in Healthcare AOHC, 3 June 2015 Cyber Risk in Healthcare AOHC, 3 June 2015 Kopiha Nathan, Senior Healthcare Risk Management and Data Specialist James Penafiel, Underwriting Supervisor, Insurance Operations CFPC Conflict of Interest -

More information

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411

IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 IRONSHORE SPECIALTY INSURANCE COMPANY 75 Federal St. Boston, MA 02110 Toll Free: (877) IRON411 Enterprise PrivaProtector 9.0 Network Security and Privacy Insurance Application THE APPLICANT IS APPLYING

More information

HCCA Compliance Institute 2013 Privacy & Security

HCCA Compliance Institute 2013 Privacy & Security HCCA Compliance Institute 2013 Privacy & Security 704 Conducting a Privacy Risk Assessment A Practical Guide to the Performance, Evaluation and Response April 23, 2013 Presented By Eric Dieterich Session

More information

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics

More information

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

PCI Compliance. Top 10 Questions & Answers

PCI Compliance. Top 10 Questions & Answers PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements

More information

cyber invasions cyber risk insurance AFP Exchange

cyber invasions cyber risk insurance AFP Exchange Cyber Risk With cyber invasions now a common place occurrence, insurance coverage isn t found in your liability policy. So many different types of computer invasions exist, but there is cyber risk insurance

More information

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider 1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

Cybersecurity Workshop

Cybersecurity Workshop Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153

More information

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 Risky Business Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015 What We ll Cover About Me Background The threat Risks to your organization What your organization can/should

More information

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

4/30/2015 CYBER LIABILITY AND AVIATION AGENDA LEARNING OBJECTIVES. Presented by Hal Hunt May 3, 2015

4/30/2015 CYBER LIABILITY AND AVIATION AGENDA LEARNING OBJECTIVES. Presented by Hal Hunt May 3, 2015 CYBER LIABILITY AND AVIATION Presented by Hal Hunt May 3, 2015 AGENDA Introduction Leaning Objectives Threat Examples Underwriting Protection/Cyber Policy Summary 2 LEARNING OBJECTIVES Understand Key Terms

More information

Privacy & Data Security

Privacy & Data Security Privacy & Data Security May 9, 2014 Presented at: SWBA 39 TH ANNUAL CONFERENCE by: James E. Prendergast, Esq. Overview Data Privacy Concerns: Unauthorized access, use, acquisition or disclosure of information

More information

HIPAA Security Rule Compliance

HIPAA Security Rule Compliance HIPAA Security Rule Compliance Caryn Reiker MAXIS360 HIPAA Security Rule Compliance what is it and why you should be concerned about it Table of Contents About HIPAA... 2 Who Must Comply... 2 The HIPAA

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson

More information

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

CYBER & PRIVACY LIABILITY INSURANCE GUIDE CYBER & PRIVACY LIABILITY INSURANCE GUIDE 01110000 01110010 011010010111011001100001 01100 01110000 01110010 011010010111011001100001 0110 Author Gamelah Palagonia, Founder CIPM, CIPT, CIPP/US, CIPP/G,

More information

Insuring Innovation. CyberFirst Coverage for Technology Companies

Insuring Innovation. CyberFirst Coverage for Technology Companies Insuring Innovation. CyberFirst for Technology Companies TECHNOLOGY IS EVERYWHERE. SO ARE THE THREATS. protection that goes well beyond a traditional general liability policy. CyberFirst CyberFirst is

More information

CyberSecurity for Law Firms

CyberSecurity for Law Firms CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a

More information

10 Smart Ideas for. Keeping Data Safe. From Hackers

10 Smart Ideas for. Keeping Data Safe. From Hackers 0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000

More information

How To Buy Cyber Insurance

How To Buy Cyber Insurance 10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

WHITE PAPER. PCI Basics: What it Takes to Be Compliant WHITE PAPER PCI Basics: What it Takes to Be Compliant Introduction A long-running worldwide advertising campaign by Visa states that the card is accepted everywhere you want to be. Unfortunately, and through

More information

Top Ten Technology Risks Facing Colleges and Universities

Top Ten Technology Risks Facing Colleges and Universities Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology

More information

Brief. The BakerHostetler Data Security Incident Response Report 2015

Brief. The BakerHostetler Data Security Incident Response Report 2015 Brief The BakerHostetler Data Security Incident Response Report 2015 The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 the year of the

More information

Mastering Data Privacy, Protection, & Forensics Law

Mastering Data Privacy, Protection, & Forensics Law Mastering Data Privacy, Protection, & Forensics Law April 15, 2015 Data Breach Notification and Cybersecurity Developments in 2015 Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy

More information

PCI Compliance Top 10 Questions and Answers

PCI Compliance Top 10 Questions and Answers Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs

More information

HIPAA Compliance and the Protection of Patient Health Information

HIPAA Compliance and the Protection of Patient Health Information HIPAA Compliance and the Protection of Patient Health Information WHITE PAPER By Swift Systems Inc. April 2015 Swift Systems Inc. 7340 Executive Way, Ste M Frederick MD 21704 1 Contents HIPAA Compliance

More information

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment Card Industry Data Security Standards

More information

2011 2012 Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

2011 2012 Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec. The OCR Auditors are coming - Are you next? What to Expect and How to Prepare On June 10, 2011, the U.S. Department of Health and Human Services Office for Civil Rights ( OCR ) awarded KPMG a $9.2 million

More information

Mastering Data Privacy, Social Media, & Cyber Law

Mastering Data Privacy, Social Media, & Cyber Law Mastering Data Privacy, Social Media, & Cyber Law October 22, 2014 Data Breach Notification and Cybersecurity Developments in 2014 Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

How To Protect Yourself From Cyber Threats

How To Protect Yourself From Cyber Threats Cyber Security for Non- Profit Organizations Scott Lawler CISSP- ISSAP, ISSMP, HCISPP Copyright 2015 LP3 May 2015 Agenda IT Security Basics e- Discovery Compliance Legal Risk Disaster Plans Non- Profit

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What? Introduction This material is designed to answer some of the commonly asked questions by business associates and other organizations

More information

Rogers Insurance Client Presentation

Rogers Insurance Client Presentation Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com

More information

Managing data security and privacy risk of third-party vendors

Managing data security and privacy risk of third-party vendors Managing data security and privacy risk of third-party vendors The use of third-party vendors for key business functions is here to stay. Routine sharing of critical information assets, including protected

More information

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America CYBER INSURANCE Cyber Insurance and Gaps in Traditional Insurance Cyber and E&O Team Willis FINEX North America Privacy & Network Security (Cyber) Insurance COVERAGE MODULES Privacy Expense Consumer Notification

More information

Data Privacy & Security: Essential Questions Every Business Must Ask

Data Privacy & Security: Essential Questions Every Business Must Ask Data Privacy & Security: Essential Questions Every Business Must Ask Presented by: Riddell Williams P.S. Riddell Williams P.S. May 6, 2015 #4841-4703-9779 Innocent? 2 Overview 3 basic questions every business

More information

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations Enabling a HITECH & HIPAA Compliant Organization: Addressing Meaningful Use Mandates & Ensuring Audit Readiness Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard Compliance Mandates Increased

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information