Are you prepared for a Data Breach
|
|
- Willa Arnold
- 8 years ago
- Views:
Transcription
1 Are you prepared for a Data Breach October 2015
2 Agenda Introduction Incident statistics IT security controls - Preventative - Detective - Corrective Incident response tasks & investigative hurdles Mitigating costs and risks Administrative and technical controls Cyber liability insurance 1
3 Introduction
4 Andy Obuchowski - Director Summary of Experience Frederick Howell provides services and solutions for clients in preparation of and in response to matters involving data breach investigations, cyber security and incident responses, digital forensic analyses, electronically stored information (ESI) collection and intellectual property theft. With this wide range of experience, he delivers industry-leading technical and consultative expertise to law firms, corporations and government agencies. Fred is member of several organizations including HTCIA, ISSA and Infragard. He has lectured across the country on matters relating to cyber security, digital forensics, and cyber crime matters. Phone: fred.howell@mcgladrey.com Certifications: CISSP ACE Representative Experience Prior to joining McGladrey, Mr. Howell worked for the Bose Corporation s Information Security team working on security projects and initiatives, risk assessments and developing business relationships, project plans, and policies/procedures surrounding data privacy and digital forensics. Prior to Bose, he consulted Fortune 500 companies on matters relating to information security, regulatory compliance and digital forensics. He developed client service offerings related to HIPAA and digital forensics data collection and analysis. He worked for the New Hampshire and Massachusetts Attorney General s Offices for 17 years where he conducted white collar crime and computer forensic investigations. He is an adjunct professor in the graduate Information Assurance program at Northeastern University in Boston, Massachusetts, where he teaches system forensics. He also teaches at Worcester Polytechnic Institute and Curry College in their graduate and undergraduate programs in information security, computer forensics, and computer crime investigations. 20
5 Incident Statistics
6 The pace of data breaches is increasing JP Morgan Chase 70 plus million Home Depot Target Neiman Marcus Others DBLoss.org
7 Data breach statistics 2014 Verizon Data Breach Report 6
8 Security statistics Four most prevalent attack vectors 1. Hacking Traditional hacking is used post-breach not as the original entry point Current methods focus on web apps and browser plugins 2. Malware Finding and purchasing non-detectable malware in the underground market is trivial Modern anti-virus is an proposition at best 3. Social Engineering Why bother to do all the heavy lifting involved with hacking when you can just ask someone to do something for you? While there is a technical component the attack is against human nature 4. Physical Loss Rare occurrence but significant impact 7
9 DBLoss.Org
10 Cost of Data Breach Operational Cost Public Relations Cost Legal Costs - Fines - Penalties - Civil litigation Costs Government entities Federal and State Financial institutions banks and card issuers Customer law suits
11 Ponemon and IBM Have a done a Study in
12 Security statistics And now for some boring numbers Breaches detected in first 24 hours 1%-2% Breaches with data loss in first 24 hours 60% - 68% Breaches detected by an external 3 rd party 71% - 92% Breaches undetected for two years or more >14% Average days to discovery Average total cost per breach $5,407,820 Average insurance payouts $954,253 - $3.5M 11
13 Ask Yourself These Questions
14 Purpose of Preventive Controls If we had a data breach would we know? Once we knew what are we going to do? - Do we have a plan? - Is our plan comprehensive enough to deal with the potential public outcry and media storm? - Can we execute the plan? 13
15 Objective of this session Raise your awareness Provide you with a roadmap for putting together a plan that answers these questions - Identify key stakeholders - Stages of a data breach - Key goals during each stage - Approaches to an effective response plan 14
16 What is a computer security incident? Any unlawful, unauthorized, or unacceptable action that involves a computer system or computer network Security Incidents Include - Malware attacks including Spyware, Phishing and Spear Phishing, APT (Advanced Persistent Threats) - Theft by insiders - Unauthorized intrusions Data Loss that could include customer PII
17 What are the goals of Incident Response? To respond with a coordinated and cohesive response - Prevents a disjointed response - Confirms or dispels whether an incident occurred - Establishes proper retrieval and handling of evidence - Protects privacy rights established by law and policy - Minimizes disruption of business and network - Allows for criminal and civil action against perpetrators
18 What are the goals of Incident Response? Accurate reports and useful recommendations Rapid detection and containment Minimizes exposure and compromise of data Protect your organization s reputation and assets Educates senior management Promotes rapid detection - Lessons learned - Policy changes - Better coordination
19 The cost goes beyond the breach Mandatory audits Litigation can linger on for years Increased Information Security costs Damage to - Brand - Sales Cost of organizational change
20 Preparing for a Data Breach Take the initiative - Executive sponsorship - Commitment Resources - Time - Appropriate Personnel - Funding
21 Where do you begin There are lots of resources available - NIST National Institute of Standards and Training - DHS Department of Homeland Security - White House Cyber Security website - CERT Computer Emergency Response Team - Organizations SANS, ISSA, ISACA, HTCIA
22 Excellent free resources Best Practices for Seizing Evidence: A Pocket Reference Guide for First Responders - Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations htm Field Guidance on New Authorities that relate to Computer Crime and Electronic Evidence enacted in the USA Patriot Act of SysAdmin, Audit, Networking, and Security - Computer Emergency Response Team - Department of Homeland Security -
23 Form a Cross Functional Team Senior Management Legal Corporate Security Information Technology Business Human Resources Public Relations
24 Phases of Data Breach Detection Investigation Response Remediation Lessons Learned
25 Detection Finding out you have lost data - Data can be lost in a variety of ways - Lost or stolen laptops or mobile phones - Lost or stolen back up media - External storage media with sensitive data
26 Detection Information Security IDS Intrusion Detection Systems - SIEM Security Information and Event Management - QRadar FIM File Integrity Monitoring Systems - Tripwire FW Firewall activity AV Anti-Virus Alerts Service Desk Calls - Users - Customers
27 Other ways to find out Third parties call and ask you to stop hacking their network Government agencies DHS, USSS and FBI Internet hackers load the data up on servers for the world to access
28 Detection Is this an incident Did you lose data? How much data and exactly what type? Is the data loss ongoing? Who knows about the data loss? This information is going to guide the next phases of the response
29 Transition from Detection to Incident Response Process Detection into Incident Response - Investigation Once data loss has been confirmed the IR Team will be activated Priority One determine the extent of the loss Strategy will be based off the findings
30 Investigation Critical questions many are repeats - What type of data was accessed and lost - Number of data records - What systems and business process are affected - How was the data accessed - How long has the activity been going on - Who was the perpetrator
31 Investigation / Response Legal and Regulatory Issues - PCI requires notification - State Data Breach notification laws 47 states - Public Relations need to address inquiries Press Public Government Federal and State regulatory and law enforcement
32 Investigation / Response Investigation may continue for sometime and additional facts may surface over time - These facts may materially alter your response Public relations - Depending on the circumstances it may be desirable to put out prepared statements to the press and the public Status of data breach investigation Actions the company is taking as a result How to get additional information
33 Response Public Relations Internal Public Relations - Are they capable of dealing with - Channels Media inquiries, Telephone calls, Internet, Social Media - Volume can they handle customer inquiries via phone and web - Can they deliver status updates in timely manner
34 Response Public Relations External third party contractors - Equipped to deal with crisis situation - Can assist Legal and Public Relations with messaging - Have call centers in place that can ramp up quickly - Website templates - Notification capabilities Printing letters Custom to your situation multi-lingual capable
35 Remediation Returning to normal state - Stop the bleeding data loss - Quantify the loss - Secure your information systems - Fix any holes in your security and operations
36 Repairing the damage to the brand For customers - Credit monitoring - Credit repair - Litigation services for any victimized by ID Theft Company Image - Good will gestures - Awareness Outreach to customers on data protection - Following up on all promises
37 Lessons learned Follow up Action Plan by team Infrastructure and security - Assigned an owner who is responsible for the fix - Given adequate resources to address problems - Required to provide regularly scheduled updates until resolution
38 IT Security Controls
39 Today s Topic: Security Controls Security controls can be preventive, detective or corrective by nature 38
40 Purpose of Preventive Controls Preventive controls are designed to keep incidents from occurring in the first place Preventive controls only serve as a deterrent against unauthorized access Often times we are too focused on preventive controls and too trusting of their efficacy For a program to be successful, these controls must be implemented with a plan for them to fail 39
41 Purpose of Detective Controls Detective controls are designed to identify and alert on malicious or unauthorized activity Preventative Control Provide support for post-incident activities (corrective controls) Allow an organization to understand its compliance state or adherence to operational control sets (e.g. change management) To be successful, deploying detective controls must be done with some framework in mind (e.g. data classification) Detective Control 40
42 Understanding Corrective Controls Corrective controls are designed to limit the scope of an incident and mitigate unauthorized activity Detective Controls Preventative Control Provide support for preparing for future post-incident activities Allows an organization to understand how to improve its preventative and corrective controls moving forward Corrective controls are not always technical. They are also categorized as physical (door locks), procedural (incident response), and legal or regulatory (policies) Corrective Control 41
43 Incident Response & Hurdles
44 Incident Response & Investigation Process 43
45 Incident Response Containment and Preservation Incident Response Tasks Investigative Hurdles Mitigating Costs & Risks The initial objective is to learn about your organization and IT infrastructure and incident - What actions have been performed to date? - What information did the attacker ask for and what did he receive? - What known systems/information did the attacker access? - Are there any remote tracking or wiping tools installed on the device? - Does an employee have remote access to network? - Do logs show unusual network activity or failed login attempts? Identifying potential evidence sources followed by the preservation/collection of data. Ask yourself: Is my staff appropriately trained to handle an information security incident? Do they have the skill sets to conduct a forensic investigation? Have we been through this type of incident before? Do we know where our data is physically located? 44
46 Incident Response Evidence Collection Incident Response Tasks Investigative Hurdles Mitigating Costs & Risks Evidence sources: Network Servers and Applications Computer system memory Firewall, VPN, , Building Access Logs Network and system backups Information from third-party providers (Cloud services) Video surveillance Ask yourself: Is my staff appropriately trained to handle an information security incident? Do they have the skill sets to conduct a forensic investigation? Have we been through this type of incident before? Do we know where our data is physically located? 45
47 Investigative hurdles Trust but verify Incident Response Tasks Investigative Hurdles Mitigating Costs & Risks Investigating Unknowns - Unable to identify appropriate resources - Third-party providers and custom applications Evidence preservation afterthought - Deleted digital evidence expands scope/risk of harm - Lack of documentation, misconfigured applications, log retention Data pooling - Human capital, accounting, user share data combined Data quality Non-standardized data formats Manual review for protected information Ask yourself: Is my staff appropriately trained to handle an information security incident? Do they have the skill sets to conduct a forensic investigation? 46
48 Mitigating Costs & Risks
49 Mitigating costs & risks Administrative tasks Incident Response Tasks Investigative Hurdles Mitigating Costs & Risks Organizational Programs - Written Information Security Program (WISP) - Vendor management - Business continuity & disaster recovery plans Specific Preparation Tasks - IT risk assessment - Incident response plan - Mock incident response drills - Security awareness training Response - Documentation How was the incident discovered? Who performed what action? what? When did the change or event occur? What was the result? 48
50 Mitigating costs & risks (con t) Technical tasks Incident Response Tasks Investigative Hurdles Mitigating Costs & Risks Data segregation - Data classification/identification program Network and application patch management Backup and archiving solutions - Access to data backup and offsite facilities - Test archiving solutions ( , data vaults) - Speed of exports, change in file properties, search functionality Network vulnerability testing Enterprise monitoring solutions - Event logging (VPN, file audit, network access, building access) - Data Loss Prevention (DLP) solutions Ask yourself: Is our company sensitive data on the same server as our employee home directories? Have we tested the input and output or our backup/archiving solution? Are there logs available to show who has accessed our network in the past week? Do we know what files they accessed? 49
51 Cyber Liability Insurance
52 Risk Financing for Data Breach Exposures Not if, but when! Data breach events may result in significant costs More damage is caused by a poor response to a data reach than by the data breach itself Insurance provides important balance sheet protection and is ideal for difficult to predict events that create large losses An insurance carrier can provide significant expertise in order to facilitate an effective and efficient response - Not the insurer s first rodeo!
53 Insurance Overview Security & Privacy Liability - Judgments, settlements and defense costs for a claim seeking damages from a loss, theft or unauthorized disclosure of information Regulatory Defense & Penalties Payment Card Industry (PCI) Fines and penalties - Contractual fines and assessments for a failure to maintain PCI data security standards Breach Response Costs - Expenses for: Computer forensics, notifications, credit monitoring, pre-claim legal, call center services and public relations Other coverage options typically available - Media Liability - Business Interruption - Data Protection - Cyber Extortion
54 Questions and contact information Frederick J. Howell, MBA, MSISM, CISSP Manager, Security and Privacy Services McGladrey, LLP 80 City Square Boston, MA (O) (M) (E) Experience the power of being understood. SM 53
55 McGladrey LLP is the U.S. member of the RSM International ( RSMI ) network of independent accounting, tax and consulting firms. The member firms of RSMI collaborate to provide services to global clients, but are separate and distinct legal entities which cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. McGladrey, the McGladrey signature, The McGladrey Classic logo, The power of being understood, Power comes from being understood and Experience the power of being understood are trademarks of McGladrey LLP. McGladrey LLP One South Wacker Drive Suite 800 Chicago, IL
T H E R E A L C O S T O F A D ATA B R E A C H
T H E R E A L C O S T O F A D ATA B R E A C H Hosted by AllClear ID www.allclearid.com/business WELCOME // QUICK NOTES Presentation is being recorded and will be available within 2-3 business days at www.allclearid.com/business
More informationTen Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
More informationLogging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
More informationLessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd
Lessons Learned from Recent HIPAA and Big Data Breaches Briar Andresen Katie Ilten Ann Ladd Recent health care breaches Breach reports to OCR as of February 2015 1,144 breaches involving 500 or more individual
More informationPanel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices
Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers
More informationWhat Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 marc.tucker@smithmoorelaw.com Presented by: Rob D. Moseley, Jr. 2 West
More informationTop Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services cwatson@schneiderdowns.com April 23, 2012 Overview Technology
More informationInto the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
More informationSINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry
SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :
More informationPrivacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
More informationPrivacy and Data Breach Protection Modular application form
Instructions The Hiscox Technology, Privacy and Cyber Portfolio Policy may be purchased on an a-la-carte basis. Some organizations may require coverage for their technology errors and omissions, while
More informationData Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
More informationInformation Security Addressing Your Advanced Threats
Information Security Addressing Your Advanced Threats Where We are Going Information Security Landscape The Threats You Face How To Protect Yourself This Will Not Be Boring What Is Information Security?
More informationAnatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow
Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned
More informationDEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
More informationplantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
More informationHow To Protect Yourself From Cyber Threats
Cyber Security for Non- Profit Organizations Scott Lawler CISSP- ISSAP, ISSMP, HCISPP Copyright 2015 LP3 May 2015 Agenda IT Security Basics e- Discovery Compliance Legal Risk Disaster Plans Non- Profit
More informationBelmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
More informationBest Practices in Incident Response. SF ISACA April 1 st 2009. Kieran Norton, Senior Manager Deloitte & Touch LLP
Best Practices in Incident Response SF ISACA April 1 st 2009 Kieran Norton, Senior Manager Deloitte & Touch LLP Current Landscape What Large scale breaches and losses involving credit card data and PII
More informationJefferson Glassie, FASAE Whiteford, Taylor & Preston
Jefferson Glassie, FASAE Whiteford, Taylor & Preston 2 * 3 PII = An individuals first name and last name or first initial and last name in combination with any one or more of the following data elements
More informationCyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor
Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection
More informationStandard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
More informationCyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationPrivacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec
Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,
More informationCyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s
Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s 1 Agenda Data Security Trends Root causes of Cyber Attacks How can we fix this? Secure Infrastructure Security Practices
More informationMitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
More informationAgenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree
Cyber Security: Potential Threats Impacting Organizations January 10, 2015 Scott Petree Agenda 2 Data Security Trends Root Causes of Cyber Attacks How Can We Fix This? Secure Infrastructure User Awareness
More informationNetwork Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
More informationHow a Company s IT Systems Can Be Breached Despite Strict Security Protocols
How a Company s IT Systems Can Be Breached Despite Strict Security Protocols Brian D. Huntley, CISSP, PMP, CBCP, CISA Senior Information Security Advisor Information Security Officer, IDT911 Overview Good
More informationINCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
More information2 0 1 4 F G F O A A N N U A L C O N F E R E N C E
I T G OV E R NANCE 2 0 1 4 F G F O A A N N U A L C O N F E R E N C E RAJ PATEL Plante Moran 248.223.3428 raj.patel@plantemoran.com This presentation will discuss current threats faced by public institutions,
More informationPrivilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
More information2014: A Year of Mega Breaches
2014: A Year of Mega Breaches Sponsored by Identity Finder Independently conducted by Ponemon Institute LLC Publication Date: January 2015 Ponemon Institute Research Report Part 1. Introduction 2014: A
More information3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
More informationPrivilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
More informationCyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029
Cyber Liability Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group 877-337-3200 Ext. 7029 Today s Agenda What is Cyber Liability? What are the exposures? Reality of a
More informationCybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
More informationAdvice from the Trenches: Preparing for the Challenges and Pressures of a Security Incident Investigation
Advice from the Trenches: Preparing for the Challenges and Pressures of a Security Incident Investigation Marshall Heilman Managing Director Craig A. Hoffman Partner Who we are Marshall Heilman Craig Hoffman
More informationHow To Protect Yourself From A Hacker Attack
Cybersecurity Demystified: Information Technology Security Trends Joe Oleksak, Plante Moran Agenda Data Security Trends Example Attacks Industry Examples An Answer 1 Who Are The Victims? Targets - victims
More informationSupplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
More informationTRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationBest practices and insight to protect your firm today against tomorrow s cybersecurity breach
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach July 8, 2015 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently
More informationBy: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
More informationO N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security
More informationData Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir.
Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir. Stroz Friedberg Gerard M. Stegmaier, Esq. Wilson Sonsini
More informationPersonal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach
Personal Information Threats & Risks: Responding to an Evolving Landscape with an Integrated Data Protection Approach Don MacPherson January 2012 Discussion Items 1. Threats and risks to personal information
More informationExternal Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
More informationThrough the Security Looking Glass. Presented by Steve Meek, CISSP
Through the Security Looking Glass Presented by Steve Meek, CISSP Agenda Presentation Goal Quick Survey of audience Security Basics Overview Risk Management Overview Organizational Security Tools Secure
More informationTHE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
More informationCYBER SECURITY SPECIALREPORT
CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber
More informationRISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
More informationInformation Security and Risk Management
Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management
More informationHow to Secure Your Environment
End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge
More informationManaging Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec
Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec Jeremy Ong Divisional Vice-President Great American Insurance Company November 13, 2010 1 Agenda Overview of data breach statistics
More informationHow To Buy Cyber Insurance
10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationData Breach Response Planning: Laying the Right Foundation
Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA
More informationCyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
More information2011 2012 Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.
The OCR Auditors are coming - Are you next? What to Expect and How to Prepare On June 10, 2011, the U.S. Department of Health and Human Services Office for Civil Rights ( OCR ) awarded KPMG a $9.2 million
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
More informationCyber Insurance Presentation
Cyber Insurance Presentation Presentation Outline Introduction General overview of Insurance About us Cyber loss statistics Cyber Insurance product coverage Loss examples Q & A About Us A- Rated reinsurance
More informationIncident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
More informationPresented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
More informationZurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
More informationASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
More informationSecurity Overview. BlackBerry Corporate Infrastructure
Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security
More informationCybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
More informationIncident Response. Proactive Incident Management. Sean Curran Director
Incident Response Proactive Incident Management Sean Curran Director Agenda Incident Response Overview 3 Drivers for Incident Response 5 Incident Response Approach 11 Proactive Incident Response 17 2 2013
More informationDiscussion on Network Security & Privacy Liability Exposures and Insurance
Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter
More informationFINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
More informationIntroduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com
More informationSecurely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
More informationCyber Security Issues - Brief Business Report
Cyber Security: Are You Prepared? This briefing provides a high-level overview of the cyber security issues that businesses should be aware of. You should talk to a lawyer and an IT specialist for a complete
More informationHIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
More information2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012
2012 雲 端 資 安 報 告 黃 建 榮 資 深 顧 問 - Verizon Taiwan August 2012 1 It s All About Security Protecting assets from threats that could impact the business Protecting Assets... Stationary data Data in transit
More informationwww.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
More informationCyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
More informationCybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
More informationACE Advantage PRIVACY & NETWORK SECURITY
ACE Advantage PRIVACY & NETWORK SECURITY SUPPLEMENTAL APPLICATION COMPLETE THIS APPLICATION ONLY IF REQUESTING COVERAGE FOR PRIVACY LIABILITY AND/OR NETWORK SECURITY LIABILITY COVERAGE. Please submit with
More informationSBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
More informationDesigning & Building an Information Security Program. To protect our critical assets
Designing & Building an Information Security Program To protect our critical assets Larry Wilson Version 1.0 March, 2014 Instructor Biography Larry Wilson is responsible for developing, implementing and
More informationCyber/Information Security Insurance. Pros / Cons and Facts to Consider
1 Cyber/Information Security Insurance Pros / Cons and Facts to Consider 2 Presenters Calvin Rhodes, Georgia Chief Information Officer Ron Baldwin, Montana Chief Information Officer Ted Kobus, Partner
More informationInsurance for Data Breaches in the Hospitality Industry
The Academy of Hospitality Industry Attorneys The Pl Palmer House Hilton Chicago, IL April 25, 2014 Insurance for Data Breaches in the Hospitality Industry Presenters: David P. Bender, Jr. dbender@andersonkill.com
More informationDefending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
More informationTOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
More informationData Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked
Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked Linda Vincent, R.N., P.I., CITRMS Vincent & Associates Founder The Identity Advocate San Pedro, California The opinions expressed
More informationGALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
More informationDATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE
DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE ACC-Charlotte February 4, 2015 THIS WILL NEVER HAPPEN TO ME! Death, Taxes & Data Breach Not just Home Depot, Target or Sony Do you employ the next
More informationCybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
More informationData Breach Lessons Learned. June 11, 2015
Data Breach Lessons Learned June 11, 2015 Introduction John Adams, CISM, CISA, CISSP Associate Director Security & Privacy 410.707.2829 john.adams@protiviti.com Powerful Insights. Proven Delivery. Kevin
More informationCyber Risks in Italian market
Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends
More informationSecurity and Privacy
Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices
More informationWhat s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
More informationHow are we keeping Hackers away from our UCD networks and computer systems?
How are we keeping Hackers away from our UCD networks and computer systems? Cybercrime Sony's Hacking Scandal Could Cost The Company $100 Million - http://www.businessinsider.com/sonys-hacking-scandal-could-cost-the-company-100-million-2014-12
More informationJoe A. Ramirez Catherine Crane
RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract
More informationTODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures
TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing
More informationPII Compliance Guidelines
Personally Identifiable Information (PII): Individually identifiable information from or about an individual customer including, but not limited to: (a) a first and last name or first initial and last
More informationWritten Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
More informationHow To Protect Your Data From Theft
Understanding the Effectiveness of a Data Protection Program IIA: Almost Free Seminar 21 June 2011 Agenda Data protection overview Case studies Ernst & Young s point of view Understanding the effectiveness
More information