The Trust Catalyst Data Breach Prep Kit
|
|
|
- Sherman Ryan
- 10 years ago
- Views:
Transcription
1 TrustCatalystDataBreachPrepKit Page1of21 The Trust Catalyst Data Breach Prep Kit Preparingyourorganization sresponsebefore navigatingadatabreach Copyright(c)2009TrustCatalyst AllRightsReserved
2 TrustCatalystDataBreachPrepKit Page2of ExecutiveSummary Thenumberofrecordsexposedindatabreachincidentsoverthelastdecadehasreachedepicproportionsputting customersinavulnerable,anxiousposition.accordingtothedatalossdatabasecreatedbytheopensecurity Foundation,overhalfabillionrecordshavebeenexposedinover1,990incidentssince2000andthisnumberisquickly growingasunreportedcasesareaddeddaily.and,whileaccidentaldisclosureshaveputcompaniesintheheadlines,a newenemyinthewarondatabreachisemerging cybercriminalswillingandabletoprofitfromidentityfraud.theu.s. DepartmentofJusticerecentlytestifiedtoCongressthatidentitytheftconvictionshaveincreased138%overthelastfour years.thefederaltradecommissionestimatedthatoverninemillionamericansarevictimsofidentitythefteachyear costingtheu.s.business$50billionindamagesannually. Increasingly,identitytheftcrimesaretargetedandorganizedbycriminalswhohaveacyberconnection.Perhapsnopieceofresearchhasputthe profitsofcybercriminalsmoreonthemapthantherecentverizondatabreachinvestigationreport,whichdocumentedthefindingsof258 compromisedrecordsstolenfromover600corporatenetworksinvestigatedbyverizon.unliketheopensecurityfoundation sdatabase,this reportfocusedonlyonthesubsetofcompromisedrecordsthatwereinvestigatedinconnectionwithidentityfraudcrimes.ninety eightpercent ofthesecasesinvolvedanoutsideintruderhackingintothecorporatenetworkthroughvulnerability,installingmalwareandcollectingdata. Ninety ninepercentofthetime,thetargetofthebreachwasaserver(asopposedtodatalossincidentswhichofteninvolvethelossofsensitive informationviaunencryptedbackuptapes,laptopsor dumpsterdiving ).Inover90percentofthecasesreportedbyVerizon,theattackerwas connectedtoaglobalcybercriminalringalreadyknowntolawenforcement.probablythemostdisturbingfindingwasthatforthemajorityof compromisedorganizations,theywereunawareofthebreach.mostoften,theseorganizationswerenotifiedbyeithertheircustomers,law enforcement,acreditcardcompanyorabusinesspartnerthatverifiedanidentityfraudcrimehadbeencommittedbeforeitwasdiscoveredby thevictimorganization. Inthisenvironment,ifyoustorecustomersensitivedata,youneedtobethinkingabouthowyourorganizationwillbepreparedtohandleadata breach.mostorganizationscollectingpersonaldataabouttheircustomerswillnotbeimmune.infact,webelieveorganizationsshouldprepare themselvesnowforbreachesthatmayhappeninthefuture.dependingontheseverityandsizeofthebreach,youwillfaceadifferentsetof managementchallenges.whenoutsidepressurefromcustomers,mediaandregulatorsmount,youwillnotwantthistobethefirsttimewhere yourdatabreachmanagementskillsaretested.inaddition,asmoreofourcustomersareactuallyvictimsinidentityfraudcrimes,wemuststep upourresponsesoasnottotallydestroycustomertrust.webelievethewaysuccessfulorganizationshandlebreacheventswillraisethestakes oftheytypicalresponseweareseeingtoday.organizationsinterestedinmaintainingarelationshipwiththeircustomerspost breachwillbe moreopenandtransparentandexchangemorecriticalinformationwithcustomersandlawenforcementagencies. Copyright(c)2009TrustCatalyst AllRightsReserved
3 TrustCatalystDataBreachPrepKit Page3of TheDataBreachPrepKitwasdesignedtohelpyoustartthinkingabouthowyouwanttohandlebreaches.Itcanhelpyouprepareanincident responseplaninadvanceofabreach,helpyouthinkthroughhowtoeducatekeystakeholdersinyourcompanyandevenestimatepotentialcosts ofbreachessoyoucanbuildtherightplantoprotectyourcustomerstoday.unfortunately,thisprepkitalonecannotaccuratelypredicthowa databreachcrisiswillimpactyourspecificorganization,butitcanhelpyougetprepared,gatherthefactsandmakeimportanttrade offsrequired todeveloplong termstrategiestoprotectthevalueofyourcompany.ifyoufindyouneedmorehelpplanningyourresponseandweighingthe costs,contactusandwewillbehappytodevelopacustomizedplanforyourorganization. TheDataBreachPrepKitincludesanumberofhelpfulresourcesandisagreatforstepfor: Definingthethreetypesofdatabreaches Creatingadatabreachincidentresponseplan Managingthecrisis howtodefinestrategyforthreatlevel Databreachestimatedcostsworksheet Databreachincidentsresponsereportworksheets Databreachchecklist Referencesandhelpfulresourcesforfuturereading Wehopethisreferencehelpsyouuncoversomeofthequestionsyourbusinessneedstoaddressnowandhelpsyoucalculatetherisksandcosts tosellstrategiesthatwillhelpyouprotectyourcustomers. Bestregards, KimberlyGetgen FounderandPrincipal,TrustCatalyst direct: Copyright(c)2009TrustCatalyst AllRightsReserved
4 TrustCatalystDataBreachPrepKit Page4of DataBreachesDefined Therearethreedifferenttypesofdatabreachincidentsasillustratedintheillustrationandtablebelow.Eachtypeofbreachcanelicitadifferent typeofresponsefromtheorganization,whichiscriticalintheeducationofyourorganization,creationofyourresponseplananddetermining yourcosts. Copyright(c)2009TrustCatalyst AllRightsReserved
5 TrustCatalystDataBreachPrepKit Page5of DataBreachesDefined AShortSummary DataLoss DataTheft IdentityTheft/Fraud Definition Common examples HowcanI reduce therisk? Accidentallossordisclosureofunencryptedcustomer PIIorothersensitiveinformation particularlythat usedinidentitytheft/fraudcrimes. Lostlaptop Losttapeormedia accidents UseencryptionandDataLeakagePrevention(DLP): 1. EncryptPIIthatleavestheorganization especiallyonlaptops,backuptapesandin . 2. Discoverwheresensitivedataislocatedwithin theorganization 3. MonitorPIIinmotionoverthenetworkfordata leaksofpiigoingtopartnersorthirdparties. 4. MonitorPIIleavingtheorganizationormistakes inwebapplications. Impacts Estimatedthereareoverhalfabillionrecords currentlyexposedandover1,990reporteddata lossincidentssince2000. Costsorganizationsmillionsindatabreach notificationprocess. TheaveragecostperrecordinUSis$202 Losttrustfromcustomerscancauselost business dependingonhowtheorganization respondstotheircustomers,lostbusinesscan accountfor69%ofthecostsofabreach TheftofPIIorsensitivedatausedinidentity theft/fraudcrimes.oftentheresultofacomputer intrusion(hacker)ormaliciousinsider(employeeor businesspartner)withpermissionstothedatawho stealsandusesinacrime. Computer/networkintrusion Exploitmistaketogainaccesstonetwork/hack intonetwork,installmalwareandcollectdata SQLinjections Malwareinyourcustomer scomputer Businesspartners;supplychain,vendors Insidermaliciousthreat Regularsecurityassessmentsandvulnerabilityscans conductedbyanoutsideforensicsorsecurity professionalservicefirm.duetopcirequirements, yourorganizationmayberequiredtoconductthese byqualifiedqsaacertainnumberoftimesayear. EvenifyouarenotregulatedbyPCI,youcan dramaticallydecreaseyourrisksbyconductingthese typesofauditsregularly. Oneforensicfirmhasestimatedtheircaseloadto accountforover258millioncompromised accounts thereareover600individualcases. Costsorganizationsmillionsindatabreach notificationprocess TheaveragecostperrecordinUSis$202in2008 Lostbusiness dependingonhowthe organizationresponds,lostbusinesscanaccount for69%ofthecostsofabreach. Regulatoryfines Coststomakecustomers whole Lawsuitsfromdamagedcustomers Lostorstolendataisactuallyusedinfor identitytheftorfraud.now,the customer/consumerisdamagedandavictim. Newaccountcreation Accounttakeover ATMorPINcompromise Fraudulentcharges(i.e.cardnotpresent fraud) Opennewloansandapplications Ifyouacceptpaymentforservicesonlineor offeronlinebanking/paymentproductsyou willbeinapositiontoacceptorreject transactionsyouthinkarefraudwith: Riskprofiling/riskscoringalgorithms Backendautomatedandmanualfraud detectionprocesses Cross industryinformationsharing databases Estimatedthereare9MUSIDtheft victimsayear USIDtheftconvictionshaverisen138% lastfouryears IDtheftcoststheUSbusiness$50million in2008 Averagecosttotheconsumerwhoisa victimofidtheftis$5,720 OnlinefraudcostseCommerce merchantsanestimated$10billion annually Copyright(c)2009TrustCatalyst AllRightsReserved
6 TrustCatalystDataBreachPrepKit Page6of CreatingaDataBreachIncidentResponsePlan Ifyourorganizationexperiencesadatabreach,therearealotofmovingpartsandpeoplethatmustbemanagedeffectivelytoreducedamages fromdiminishedcustomertrust.youwillneedtogettherightinformationouttotherightpeopleveryquickly.businessleadersinyour organizationwhomayhaveneverworkedtogetherinacrisismayformyourincidentresponseteamand,asitoftenturnsout,different stakeholdershaveconflictingagendas.thisishardenoughtomanageundernormalconditionsbutamplifiedwhenmanagingacrisislikedata breach. Dependingontheseverityofthebreachandnumberofvictimsimpacted,youmayalsohavetobringinoutsiderstomanagedifferentaspectsof thecrisisincludinginvestigatorsandevenlawenforcement.and,asoutsidepressuresfromcustomers,mediaandauditorsorregulatorsmount, yourmanagementskillswillbetested.putsimply,theaftermathofdatabreachisnotthefirsttimewhereyouwillwanttobetested.putting togetheryourresponseplaninadvancecanbeinvaluablelearningexperience.inevitably,youwilluncoverquestionsintheplanningthatyour organizationmaynothaveconsidered.nowisthetimetouncovertheunknowns,getanswersfromkeystakeholdersandbuildingawarenessand recommendationsforhowdifferenttypesofbreachesshouldbehandledaswellasestimatetheircosttoyourbusiness. Gettingeveryoneonthesamepage Notalldatabreachesarethesame.Therearedifferentlevels,responsesandcostsbasedonthetypeofbreachyouencounter,numberof customersimpactedandtypeoffraud(ifany)found.and,ifyouareinthefortunatepositiontoactquickly,youcanbeginpreventingadataloss situationfromturningintoadatatheft/identityfraudcrisiswherecostsandstakesaredramaticallyincreased. Theworksheetbelowsimplifiesthetypesofbreachestofourdifferentscenariosthatrequiredifferentresponseplans.Thisworksheetwillhelp youworkthroughthetypeofresponseyouwillwanttoproducebasedonthestageofdatabreachencountered.itshouldhelpyoustartto identifythekeyresourcesyouwillneedtosuccessfullymanagethebreach.whilethisisnotacompleteresponseplan,wherepossiblewehave providedeitherrecommendationsorquestionsforyoutoconsidertobegintheprocessofbuildingyourown.werecommendusingthis worksheetasastartingpointtocreateachartinyourorganizationthatyoucanuseasaneducationaltooltopreparedifferentstakeholders abouttheactionthatwillberequiredandquestionsthatwillcomeupintheprocesstomanageadatabreach.trainyourorganizationonthe differencebetweenthedifferentlevelsofbreachesandhowissueswillbeescalatedandtreateddifferentlydependingonthestageofthebreach. Someorganizationsmayevenwanttoorganizemockbreachincidentslikeafiredrilltotesttheirteaminadvance.Also,becauseeach organizationisregulateddifferently,youmaywanttoaddwhatcompliancerequirementsyouwillspecificallyencounterateachstage. Copyright(c)2009TrustCatalyst AllRightsReserved
7 TrustCatalystDataBreachPrepKit Page7of DataBreachIncidentResponsePlanWorksheet Stage0 Data Loss Lostlaptop,PDA, backuptapeorstorage mediawithsensitive datawaslost. Thisdatawasencrypted andthereisanauditlog thatprovesdatais protected. Response/ActionRequired Nonotificationprocessrequiredbecausesensitivedatahasbeenadequatelyprotected. RecommendedActions: Haveaninternalteaminvestigatewhatwaslostandproduceareportthatshowsresponseprovingthedatawas protected.includethenumberofrecords/customersyouprotectedinthisincidenceandestimatethecosthaving theseprotectionsinplacesavetheorganization. Reportonthesetypesofbreachestothebusinessasappropriatetobuildacaseforthereturnoninvestment technologiesyou veputinplacetoprotecttheorganizationareproducing. Questionsforthebusiness: Whoistheinternalteamandkeystakeholders? Isthereeveracasewhereencryptedlostdatawouldneedtobereportedpublicly?Ifso,documenttheseexamples andincludethemintheappropriatestageinthisresponseplan. Ifyouarenotencryptinghigh riskdata,whatispreventingthisfromhappening?perhaps,goingthroughacostbasedriskassessmentofthecostsofpreventinganotificationeventisrequiredtogetinvestmentforthesetypesof solutionsinyourorganization(forexample,seethecostworksheetprovidedinthisdocument). Copyright(c)2009TrustCatalyst AllRightsReserved
8 TrustCatalystDataBreachPrepKit Page8of Data Loss Stage1 Lostlaptop,PDA, backuptapeorstorage mediawithsensitive datawaslost. Datalostwasnot encrypted. Response/ActionRequired Notificationprocessrequired.Customersatriskforidentitytheft. Recommendedactions: Securityteamproducesareportwithcriticalinformationforexample:customersaffected,numberaffected,where theyreside,dateinformationwaslost,typeofinformationthatwaslost(e.g.ssn,ccn ). Inyouropinion,whatriskexistsforthesecustomerstobecomevictimsofidentitytheft/fraud?Whatstepswould youtaketopreventcustomersfrombeingfinanciallydamagediftheybecomevictimsofidentitytheft(e.g.canyou workwithlawenforcement?shouldyouoffercreditmonitoringservicesoridentitytheftinsurance?whoshould receivetheseservices?) Createassessmentofsituationandoffertheorganizationarecommendedcourseofactiondependingonthetype ofinformationdisclosed/potentialrisk.howmuchwouldthiscost?arethecostsjustifiedbytheamountof businessyouwillsavefromnegativecustomerreactionanddiminishedtrust? Implementrecommendedcourseofaction Questionsforthebusiness: Whatwouldbetheimpactoflosingrevenuefrom30%ofyourcustomersfollowingthebreachnotification? Whoarethesecurityteamandkeystakeholders?Willyourequireoutsidesecurity,PRorlegalservices? Copyright(c)2009TrustCatalyst AllRightsReserved
9 TrustCatalystDataBreachPrepKit Page9of Data Theft Stage2 Datatheftoccurred knowtheorigin/how theftwascommitted Response/ActionRequired Notificationprocessrequired.Customersatelevatedriskforidentitytheft. Recommendedactions: Appointteamthatproducesareportwithcriticalinformationforexample:customersaffected,numberaffected, wheretheyreside,dateinformationwaslost,typeofinformationthatwaslost(e.g.ssn,ccn ),howthedatawas compromisedandwhatstepsarebeingtakentopreventthisfromhappeninginthefuture. Inyouropinion,whatriskexistsforthesecustomerstobecomevictimsofidentitytheft/fraud?Whatstepswould youtaketopreventcustomersfrombeingfinanciallydamagediftheybecomevictimsofidentitytheft(e.g.canyou workwithlawenforcement?shouldyouoffercreditmonitoringservicesoridentitytheftinsurance?whoshould receivetheseservices?) Createassessmentofsituationandoffertheorganizationarecommendedcourseofactiondependingonthetype ofinformationdisclosed/potentialrisk.howmuchwouldthiscost?arethecostsjustifiedbytheamountof businessyouwillsavefromnegativecustomerreactionanddiminishedtrust? Implementrecommendedcourseofaction Questionsforthebusiness: Whatwouldbetheimpactoflosingrevenuefrom30%ofyourcustomersfollowingthebreachnotification?What canyoudotomakediminishtheimpactsoflostcustomertrustandlostcompetitiveadvantage? Whoistheteaminvestigatingthebreach?Isitthesameasinalevelonebreachordoesitchange? Willyourequireoutsidesecurity,PRorlegalservices? Whattypeofcasecanyoupulltogetherforlawenforcementsothattheycanactquickly,beforetherearefinancial damages?wouldthisbethesamecourseofactioniftherewereaninsiderwhostoledataversusahacker? Copyright(c)2009TrustCatalyst AllRightsReserved
10 TrustCatalystDataBreachPrepKit Page10of Identity Theft or Fraud Stage3 Identitytheftoccurred becausenotifiedby outsidesource(e.g. consumer,customer) theyareseeing fraudulentactivitiesand youarethesourceof origin. Youdonotknowhow datawasstolen. ResponseActionRequired Notificationprocessrequired.Customershavebecomevictimsofidentitytheft. Recommendedactions: Bringinoutsideforensicsinvestigationteamtofindsourceoforiginanddetermine:customersaffected,number affected,wheretheyreside,dateinformationwaslost,typeofinformationthatwaslost(e.g.ssn,ccn ),howthe datawascompromisedandwhatstepsarebeingtakentofixtheproblemandpreventthisfromhappeninginthe future. Contactlawenforcementtodeterminewhatstepscanbetakentofindcriminalsandwhentonotifycustomers. Beginnotificationprocess.Whatstepscanyoutaketopreventmorecustomersfrombeingfinanciallydamagedas victimsofidentitytheft(e.g.offercreditmonitoringservicesand/oridentitytheftinsurance). Createassessmentofsituationandrecommendedcourseofactionthroughacostjustificationbytheamountof businessyouwillsavefrommorecustomersbecomingvictims,publicreactionanddiminishedtrust? Implementrecommendedcourseofaction. Questionsforthebusiness: Whatwouldbetheimpactoflosingrevenuefrom30%ofyourcustomersfollowingthebreachnotification?What canyoudotomakediminishtheimpactsoflostcustomertrustandlostcompetitiveadvantage? Whoistheoutsideforensicsteamyouwillcallintoinvestigate?Howoftenaretheyassessingyournetwork? Willyourequireoutsidesecurity,PRorlegalservices? Whatisyourrelationshipwithlawenforcement? Whattypeofcasecanyoupulltogetherforlawenforcementsothattheycanactquicklytocatchcriminals?Would thisbethesamecourseofactioniftherewereaninsiderwhostoledataversusahacker? Howmuchcashshouldbeputinreservefordamagesresultingfromlawsuits,settlementandfines? Copyright(c)2009TrustCatalyst AllRightsReserved
11 TrustCatalystDataBreachPrepKit Page11of DataBreachEstimatedCostsWorksheet Thespreadsheetbelowgivesabreakdownofthevariouscostsinvolvedwithcleaningupadatabreach.Costswillvarydependingontypeof breach,numberofcustomersinvolvedandseverityofbreach.youcancustomizethistoyourorganizationorestimatesfordifferenttypesof breaches. Typeofbreach(dataloss,datatheft): Numberofcustomerrecordsexposed: Whatwasdisclosed(e.g.Creditcard,debitcard,socialsecurity,address ): Numberofcustomersexposed: Howmanycustomershavebecomevictimsofidentitytheft: CustomerManagement Costs Notification(letters,website,pressreleases,costofcreation,printingandmailing) Creditmonitoringservice Identitytheftinsurance Customerretentionprogram Customersupporthelpdesk Coststocreatenewaccountsorreplacementcards Coststomakecustomers whole EmployeeManagement Employeetrainingprograms Lostemployeeproductivity OutsideServices Legal PR/CrisisManagement/Communication Marketing ForensicInvestigators SecurityExperts RegulatoryFines/Lawsuits Fines Lawsuits NetworkUpgrades Securityupgrades(encryption,dataleakagemonitoring,services,etc.) TotalEstimatedCosts Copyright(c)2009TrustCatalyst AllRightsReserved
12 TrustCatalystDataBreachPrepKit Page12of DefinitionsofCosts Notifications:Ifthebreachrequiresnotification,theorganizationwillneedtocreatethenotificationanddecidehowtheyintendtonotifythose impacted.theorganizationwillneedtodecideiftheywillbehandlingthenotificationoroutsourcingthisactivitytoanoutsidefirm. CreditMonitoringServices:Toimprovecustomersatisfactionanddependingontheseverityandtypeofinformationdisclosed,organizations maychosetoenrollthevictimsinacreditmonitoringserviceasanadditionallayerofprotection. IdentityTheftInsurance:Toimprovecustomersatisfactionanddependingontheseverityandtypeofinformationdisclosed,organizationsmay chosetogivevictimsidentitytheftinsuranceasanadditionallayerofprotectionandcustomerservice. CustomerRetentionProgram:Someorganizations(especiallyorganizationswhoareserviceproviders)createcustomerretentionprogramsin theaftermathofdatabreachtoexplainoutcomestotheircustomersinface to facemeetings.forexample,thistypeofinteractionwas encouragedaftertheheartlandbreachandthecostswerereportedintheirquarterlyearningscallafterthebreach. CustomerSupportHelpDesk:Dependingonthenotificationstrategy,itmaybecomenecessarytotrain,assignoroutsourcecustomersupport personneltoanswerquestionscustomers. Coststocreatenewaccountsorreplacementcards:Dependingonwhatwasbreached,someorganizationsmayneedtocreatereplacement cardsorprovidenewaccountcredentialstocustomersinvolvedinthebreach. Coststomakecustomers whole :Forcustomerswhobecomevictimsofidentitytheftorfraudasaresultofthebreach,organizationswillfind thattheyincurcostsmakingcustomers whole forfraudulentchargesordamages. EmployeeTrainingPrograms:Someorganizationsrollouttrainingprogramsforemployeesintheaftermathofsignificantdatabreachestoarm employeeswiththerighttypesofinformationthatcanimprovecustomertrust. LostEmployeeProductivity:Organizationsfacelostemployeeproductivityastheyaretakenoffrevenue generatingactivitiestodealwiththe aftermathofdatabreach.whatwouldbethecosttoyourorganizationifyoulostfive,tenoreven20percentofemployeeproductivity? LegalServices:Toeffectivelymanagethedatabreachcrisis,someorganizationsfindtheyneedtopayoutsidelawfirmswhohavespecialized expertiseindatabreach.theseservicesoftenrequireretainersormoneypaidupfrontforlegalfees. Copyright(c)2009TrustCatalyst AllRightsReserved
13 TrustCatalystDataBreachPrepKit Page13of PR/CrisisManagement/CommunicationServices:Toeffectivelycommunicateandmanagethemediaandtheirbrand,someorganizationsturn tooutsideprfirmsthatspecializeincrisismanagementanddatabreach.anoutside,objectivepointofviewisoftenaninvaluableresourceto effectivelymanageadatabreachcrisisandimprovethehandlingofthebreachintheeyesofcustomersandvictims. MarketingServices:Tohelpplanthestrategytomanagethecustomersandbrandintheaftermathofdatabreach,someorganizationsturnto outsidemarketingandresearchfirmstoplanstrategyorhelpincreasecustomersatisfactionratingstodecreasethecostsinlostbusinessthat followdatabreach. ForensicInvestigationServices:Fororganizationsvictimofdatatheft,itisimperativethataforensicinvestigationfirmfindthesourceofthe breachandhelptheorganizationcaptureevidencethatcouldbeusedtocatchthecriminals. InformationSecurityProfessionalServices:DependingonthesourceofthebreachandinternalexpertiseoftheITorganization,some organizationsmayneedtoretainadditionalinformationsecurityprofessionalstohelpdeployorexecutemodificationsrequiredinthetechnology infrastructureintheaftermathofbreach. RegulatoryFines:Iftheorganizationhascomplianceorregulatoryrequirements,theycouldhavefinesassessedagainsttheorganizationfornot meetingtheserequirements. Lawsuits:Theorganizationmayfindtheyfaceanumberofdifferentlawsuitsfromclassactiononbehalfofcustomerstolawsuitsfromother businesspartnerswhoneedtoreclaimdamagesasaresultofthebreach. SecurityUpgrades:Manyorganizationsfindtheyneedtomakeupgradestotheirtechnologyinfrastructuretoprotectagainstfutureattacksor breaches.technologyinvestmentsoftenincludeencryptionprojectsanddataleakagemonitoringtechnology. Copyright(c)2009TrustCatalyst AllRightsReserved
14 TrustCatalystDataBreachPrepKit Page14of IncidentResponseReportInformation PartI:Informationaboutthetypeofcustomersensitivedatayoustoreandregulationswithwhichyoucomply Thisinformationcanbecompletedinadvancesoyouhaveapictureofthesensitivedataresidinginternallyandregulationsthathave requirementsforprotectingthistypeofinformation.youmayfindthatyouwanttotakestepstoprotectadditionaltypesofinformationevenif notrequiredbylaw. Whattypeoforganizationarewe: []DataOwner []ServiceProvider WestorethefollowingPIIaboutcustomers: [] addresses []CreditCardNumbers []DateofBirth []AccountInformation []Mother smaidenname []DebitAccountNumbers []EmployeeIDNumber []PINs []SocialSecurityNumber []CVVsorCardSecurityCodes []PassportNumber []CreditCardMagneticStripTrack1or2Data []Driver slicensenumber []Passwords,secretcodesoraccessnumbersforaccountinfo []Passwordsforonlineaccounts []BillingAddress []HealthData []ShippingAddress []Payrollinformation []PhoneNumber []Creditscores []Other: Wearerequiredtocomplywith: []StateDataNotificationLaws(U.S.) []PCIDSS []GLBA []HIPAA []UKDataProtectionAct []Other: Copyright(c)2009TrustCatalyst AllRightsReserved
15 TrustCatalystDataBreachPrepKit Page15of PartII:DataBreachIncidentResponseTeam InternalTeam Completetheinformationforthekeypersonnelthatwillmakeupyourinternalteam,theircontactinformationandwhoistheprojectlead. DataBreachIncidentResponseTeam ContactInformation;IndicateProjectLead []ChiefExecutiveOfficer []ChiefRiskOfficer []ChiefFinancialOfficer []ChiefPrivacyOfficer []ChiefInformationSecurityOfficer []ChiefInformationOfficer []ChiefComplianceOfficer []GeneralCounsel []Marketing []Sales []CustomerRelations/CustomerSupport []Other []Other Copyright(c)2009TrustCatalyst AllRightsReserved
16 TrustCatalystDataBreachPrepKit Page16of PartIII:LawEnforcementContacts Insertinformationaboutthelawenforcementcontactsthatyouwouldneedtocontactineventofacrimehasbeencommitted.Themore relationshipsyouhavewiththesepeoplepriortotheincident,theeasieritwillbetogetanappropriateresponse.attendindustrymeetingswith lawenforcementpresenceorestablishrelationshipswiththekeypersonnelwhenpossible. DataBreachIncidentResponseTeam ContactInformation Locallawenforcement: FBI U.S.SecretService U.S.PostalInspections InternationalLawEnforcement Agencies Copyright(c)2009TrustCatalyst AllRightsReserved
17 TrustCatalystDataBreachPrepKit Page17of PartIV:DataBreachIncidentResponseChecklist Thefollowingisachecklistoftheitemsthatyoumayormaynotneedtocompletedependingontheseverityandnumberofrecordsbreached. Thiswillallowyoutodecidewhichitemsfityourbusinessneedsandassignownershipofthetaskswithacompletiondate. ProjectLead: IncidentStage(0 3): Planning: []Willyouprovidecustomerswithacreditmonitoringservice? []Willyouprovidecustomerswithanidentitytheftprotectioninsurance? []Willyoucreationnewaccountsorplasticforcustomers? []Ifcustomerisdamagedwithidentityfraud,howcantheyreportthistoyou? Tasks Owner Completion []AssignwhowillmanagePRaboutthebreach(currentfirm,crisismanagementfirmorinternalresource) []Determinecorporatespokespersonforbreachquestionsfrommedia []Writewebsitecopyaboutbreachandstepstakentoprotectcustomersfromidentitytheft []Approvewebsitecopyaboutbreach []Posttowebsite []Draftcopyforpressrelease []Approvepressrelease []Postpressrelease []DraftFAQforcustomers []ApproveFAQforcustomers []PostFAQforcustomersonwebsite []Createdatabreachnotificationletterstobreachedcustomers(oreditsampleletter) []Approvedatabreachnotificationletters []Createde dupedcustomermailinglist []Printandmailletters []CreateFAQforemployees(toeducateallemployeesaboutthesituation []ApproveFAQforallemployees []Posttointernalcorporatewebsite []Write tonotifyemployeesaboutbreach []Approve tonotifyemployeesaboutbreach Copyright(c)2009TrustCatalyst AllRightsReserved
18 TrustCatalystDataBreachPrepKit Page18of Tasks Owner Completion []Send toemployees []Determineifadditionalemployee/salestrainingrequired(concall,webcastormeeting??) []Scheduletraining []Sendinvitationstoemployeesrequiredfortraining []Writecustomersupport/helpdesktrainingFAQ []ApprovehelpdesktrainingFAQ []Trainhelpdeskpersonnelonhowtohandlecustomercallsaboutbreach Notes: Copyright(c)2009TrustCatalyst AllRightsReserved
19 TrustCatalystDataBreachPrepKit Page19of PartV:IncidentResponseForm FrequentlyAskedQuestions Thequestionsbelowarefrequentlyaskedintheprocesstocreatenotificationletters,writeFAQsforcustomersandmanagethebreach. Marketing,PRandcustomer facingemployeeswillneedtoknowhowtoanswerthesequestions. Whatstageisthebreach(0 3) Whenwasitreported? Whendiditoccur? Howwasitdiscovered? Whowasimpacted? Hasitbeenremediated? Howwasitremediated? Howmanycustomersimpacted? Wherearecustomerslocated? Areyouworkingwithlaw enforcement? Havearrestsbeenmade? Copyright(c)2009TrustCatalyst AllRightsReserved
20 TrustCatalystDataBreachPrepKit Page20of Conclusion WhilethepreventionofdatabreachismostlyanITfunction,managingtheaftermathofabreachturnsouttobealessofanITfunctionandmore ofamarketing/customerrelationsprogram.organizationsfindtheseeventschallengingbecausetheyareacrisisthatteststheleadershipof differentbusinessunitswithintheorganization.wehopethisdatabreachprepkitcanhelpyouplantheappropriateactionplanfordealingwith abreachbeforeoneaffectsyourorganization.wealsohopeyouareabletostarttoassembletherightinter departmentalteaminadvanceto helpprotectcustomers,theirtrustinyourorganizationtomanagetheirsensitiveinformationandyourbrand. WewillbeupdatingthisDataBreachPrepKitoverthecourseofthenextyear,aswereceivemorefeedbackfromtheorganizationsthatputitto forupdatedversionsandnewresourcestomanagedatabreaches.weverymuchwouldliketohearfromyou.youcanalsojoinusatthe LinkedinGroup PreventDataBreaches toexchangeupdatesandquestionswithcolleaguesandpeersaboutthesubjectofdatabreachanddata protection. ResourcesMentionedinThisDocument: OpenSecurityProjectDataLossDatabaseat: 2009VerizonDataBreachInvestigationReport: 2009OnlineFraudBenchmarkSurveyReport: EncryptionandKeyManagementBenchmarkSurvey: ConsumerSurveyonDataBreachNotification,JavelinStrategyandResearch2008 AboutTrustCatalyst TrustCatalysthelpscompaniesmakecriticaldecisionsabouthowtoprotecttheirmostvaluableresource theircustomer strust.weunderstand thattheadoptionofasuccessfuldataprotectionorsecurityprogramisaboutsellingastrategytoalargeraudience.wespeakthelanguage businessexecutivesunderstandandquantifytheneedforsecuritybyhelpingestablishthecostsoflostcustomertrustandthedisruptionto businesswhenthattrustisbroken.asmoreinsidiousattacksfromcybercriminalsspecificallytargetingorganizationswithcustomer ssensitive datagrows,wehelpbusinessesunderstandthethreats,thecostsofthethreatsandhowtomaintaintrustedrelationshipswiththeircustomers. Learnmoreanddownloadhelpfultoolsthatcanhelpyouprepareforthesetypesofattacksatwww.trustcatalyst.com Copyright(c)2009TrustCatalyst AllRightsReserved
21 TrustCatalystDataBreachPrepKit Page21of NoticeAboutThisDocument Thisdocumentisnotintendedaslegaladvice.Thisdocumentisintendedtoassistcompaniesgetajump startonpreparingtheirresponsetodata breachincidents.eachorganizationisdifferentandweencourageyoutocustomizetheseworksheetstoyourparticularsituation.ifyouhave feedbackoradvicetomakethisabetterguide,pleasecontactussowecanupdatethisguide.ifyouwouldliketoshareanyfeedback,please Copyright(c)2009TrustCatalyst AllRightsReserved
Foster Care/Texas State Adoption Frequently Asked Questions
FosterCare/TexasStateAdoption FrequentlyAskedQuestions Q:WhyshouldIbecomepartoftheInternationalFamilyServicesfamily? A:Therearealotofreallygreatagenciesthatyoucanworkwith.Wefeelthatourbestassetisthat whenyouworkwithus,wetreatyoulikefamily.weknowthatwhenyoubringachildintoyourhome
Doctorate(in(Leadership(Ed.D.)
T e xt DoctorateinLeadershipEd.D.) AdmissionMaterials Allmaterialsmustbereceivedin thehsugraduatestudiesoffice by April 11 at 1:00 p.m. IrvinSchoolofEducation HardinMSimmonsUniversity http:www.hsutx.edudoctorateinleadership
VDI and snapshots: A winning combination
ANALYSTVIEW VDIandsnapshots:Awinningcombination ByRayLucchesi January2009InfoStor Theproliferationofuserdesktopsisrapidlybecominganadministrativequagmire fortoday'sdatacenters.however,desktopvirtualizationproductshaverecently
Threat!and!Vulnerability!Assessments!
ThreatandVulnerabilityAssessments https://www.cybersecdefense.com @cybersecdefense 13720JetportCommerceParkway STE13 Ft.Myers,FL33913 COPYRIGHT 2015,CybersecurityDefenseSolutions,LLC ALLRIGHTSRESERVED
Identity Theft Repair Kit
Identity Theft Repair Kit The Identity Theft Repair Kit contains a resolution checklist and resolution worksheets. The checklist will help you keep track of the companies and organizations you should contact
PRIVACY AND SECURITY SURVIVAL TRAINING
PRIVACY AND SECURITY SURVIVAL TRAINING 1.Typeorcutandpastethislinkintothe addressbar: http://hrwebdev.dhs.lacounty.gov/attestation/ 2.Clickthe downarrow 3.Select 2013Privacyand SecuritySurvivalHandbook
CSR Breach Reporting Service Frequently Asked Questions
CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
Data Privacy & Security: Essential Questions Every Business Must Ask
Data Privacy & Security: Essential Questions Every Business Must Ask Presented by: Riddell Williams P.S. Riddell Williams P.S. May 6, 2015 #4841-4703-9779 Innocent? 2 Overview 3 basic questions every business
Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data
Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data Printer Security Challenges Executive Summary Security breaches can damage both your operations
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)
Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00) May 15, 2009 LLP US Information Security Framework Historically industry-specific HIPAA Fair Credit Reporting
Data Loss Prevention and HIPAA. Kit Robinson Director [email protected]
Data Loss Prevention and HIPAA Kit Robinson Director [email protected] ID Theft Tops FTC's List of Complaints For the 5 th straight year, identity theft ranked 1 st of all fraud complaints. 10 million
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C
UNIVERSITY OF MAINE SYSTEM STANDARDS FOR SAFEGUARDING INFORMATION ATTACHMENT C This Attachment addresses the Contractor s responsibility for safeguarding Compliant Data and Business Sensitive Information
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
Protect your organization s sensitive information and reputation with high-risk data discovery
www.pwc.com Protect your organization s sensitive information and reputation with high-risk data discovery Locate, identify, and classify sensitive data to reduce data privacy risks, lower potential data
Andrews University Payment Card Acceptance Policies & Procedures. Prepared by Financial Administration
Andrews University Payment Card Acceptance Policies & Procedures Prepared by Financial Administration July 12, 2011 Part I: Introduction of Policy and Purpose Formatted: Font: 12 pt In order to protect
Reclaiming your identity
Reclaiming your identity A resource for victims of identity theft If you think you are the victim of identity theft, use this resource guide to assist you in reclaiming your identity. You will find a checklist
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
Vulnerability Management Policy
Vulnerability Management Policy Policy Statement Computing devices storing the University s Sensitive Information (as defined below) or Mission-Critical computing devices (as defined below) must be fully
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach
Best practices and insight to protect your firm today against tomorrow s cybersecurity breach July 8, 2015 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently
Responding to New Identity Theft Laws
Responding to New Identity Theft Laws March 2011 Privacy Expectations Today, there is increasing recognition that an individual has a legitimate interest in controlling the collection, use and disclosure/dissemination
2005 -- H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.
00 -- H 11 SUBSTITUTE A AS AMENDED LC0/SUB A/ STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D. 00 A N A C T RELATING TO IDENTITY THEFT PROTECTION Introduced By: Representatives Gemma, Sullivan,
Data Management Standard
Data Management Standard Revision: Version 1.0 Date: 11/2015 Status: Approved by ISAC, Reviewed by Chancellor s Cabinet 1. Objectives Page 1 2. Scope Statement. Page 1 3. Requirements..Page 1 4. Definitions
Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!
Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption Thisdocumentcontainsthenecessarystepstoencryptthecontentsofaharddrive usingbitlockerandwindows7. Thefollowinginstructionsarederivedfromdocumentationat:
Information Security Risk Management
Information Security Risk Management June 11, 2013 Patrick Perreault Daniel Gaudreau Agenda Current State of Affairs Why Information Security? The Role of Risk Management Information Security Threats,
The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development
The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment Card Industry Data Security Standards
BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment
BYOD and Its Impact on IT Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment BYOD and IT D means Apple products Macs iphones ipads Android phones IT means Microsoft
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator
HIPAA Happenings in Hospital Systems Donna J Brock, RHIT System HIM Audit & Privacy Coordinator HIPAA Health Insurance Portability and Accountability Act of 1996 Title 1 Title II Title III Title IV Title
http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html
Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available
<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
Cloudy With a Chance Of Risk Management
Proudly presents Cloudy With a Chance Of Risk Management Toby Merrill, ACE USA John Mullen, Nelson Levine de Luca & Hamilton Shawn Melito, Immersion Ltd. Michael Trendler, ACE INA Canada What is Cloud
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard Abhinav Goyal, B.E.(Computer Science) MBA Finance Final Trimester Welingkar Institute of Management ISACA Bangalore chapter 13 th February 2010 Credit Card
3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?
HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA? 1 DEFINITIONS HIPAA Health Insurance Portability and Accountability Act of 1996 Primarily designed
Property of CampusGuard. Compliance With The PCI DSS
Compliance With The PCI DSS Today s Agenda PCI DSS Introduction How are Colleges and Universities Affected? How Do You Validate Compliance? Best Practices Q&A CampusGuard Full-Service QSA/ASV Firm We Know
8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year
Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions
Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015
Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015 Katherine M. Layman Cozen O Connor 1900 Market Street Philadelphia, PA 19103 (215) 665-2746
INFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
Identity Theft Victim Checklist
Identity Theft Victim Checklist THE FOLLOWING CHECKLIST PROVIDES THE STEPS YOU SHOULD TAKE TO MINIMIZE DAMAGE TO YOUR FUNDS, FINANCIAL ACCOUNTS AND PERSONAL REPUTATION. Before you start Telephone calls
Use Our FREE Tool to Scan for HIPAA and Meaningful Use Security Compliance Risks
Use Our FREE Tool to Scan for HIPAA and Meaningful Use Security Compliance Risks Did you know that nearly half of all data breaches now occur in healthcare? That attacks by hackers on providers are up
ID Theft Toolkit and Affidavit
ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
Management and Storage of Sensitive Information UH Information Security Team (InfoSec)
Management and Storage of Sensitive Information UH Information Security Team (InfoSec) Who Are We? UH Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Taylor Summers
PII = Personally Identifiable Information
PII = Personally Identifiable Information EMU is committed to protecting the privacy of personally identifiable information of its students, faculty, staff, and other individuals associated with the University.
TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business
TAKING OUR CUSTOMERS BUSINESS FORWARD The Cost of Payment Card Data Theft and Your Business Aaron Lego Director of Business Development Presentation Agenda Items we will cover: 1. Background on Payment
Mastering Data Privacy, Social Media, & Cyber Law
Mastering Data Privacy, Social Media, & Cyber Law October 22, 2014 Data Breach Notification and Cybersecurity Developments in 2014 Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
David Coble Internal Control Officer
WESTERN WASHINGTON UNIVERSITY S RED FLAGS IDENTITY THEFT PREVENTION PROGRAM IMPLEMENTING SECTIONS 114 AND 315 OF THE FAIR AND ACCURATE CREDIT TRANSACTIONS ACT OF 2003 David Coble Internal Control Officer
Payment Card Industry Data Security Standard PCI DSS
Payment Card Industry Data Security Standard PCI DSS What is PCI DSS? Requirements developed by the five card brands: VISA, Mastercard, AMEX, JCB and Discover. Their aim was to put together a common set
Identity Theft Affidavit
Identity Theft Affidavit VICTIM INFORMATION 1. My full legal name is: (First) (Middle) (Last) (Suffix: Jr., Sr., III) 2. (If different from above) When the events described in this affidavit took place,
HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals
HIPAA New Breach Notification Risk Assessment and Sanctions Policy Incident Management Policy For breaches affecting 1 3 individuals +25 individuals + 500 individuals Focus on: analysis documentation PHI
RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015
RETHINKING ORC: NRF S CYBER SECURITY EFFORTS OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015 No Organization is Secure Source: http://www.informationisbeautiful.net An Average
