Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things
|
|
|
- Kenneth Greene
- 10 years ago
- Views:
Transcription
1 Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things aisa.org.a u aisa.org.a u Rebecca Herold, CEO The Privacy Professor 1 [email protected]
2 Agenda Technology Evolution Privacy Perspectives Persistent Beliefs About Privacy Increasing Numbers of Privacy and Cybersecurity Incidents What is Privacy? Consumerization and Mobility Cloud Services Big Data Internet of Things Addressing Privacy aisa.org.a u 2 Case Studies
3 Things vs. More Than Things Things: Shirts and tops 3 Page 3
4 Things vs. More Than Things More than things: SMART Shirts and tops 4 Page 4
5 Things vs. More Than Things Things: Socks 5 Page 5
6 Things vs. More Than Things More than Things: Smart Socks 6 Page 6
7 Things vs. More Than Things Things: Prescription pills 7 Page 7
8 Things vs. More Than Things More than Things: Smart prescription pills 8 Page 8
9 Things vs. More Than Things Things: Tableware 9 Page 9
10 Things vs. More Than Things More than Things: Smart Tableware 10 Page 10
11 Things vs. More Than Things Things: Cars 11 Page 11
12 Things vs. More Than Things More than Things: Smart Cars 12 Page 12
13 Privacy Perspectives Real privacy threat 13 Page 13
14 Privacy Perspectives Versus perceived threat Attacks on those flying personal drones Drone shield clothing 14 Page 14
15 Privacy Attitudes/Actions Threaten Privacy There s no law against it! It s not personal information Posting about someone else Cyber attacks only are a problem for large organizations The only people talking about this are those who will profit from the scare tactics. Public Facebook post: I see you at the Train/Maroon 5 concert I m 17 rows behind you! Page 15
16 Persistent Beliefs Dangerous statements that have valid points, but must be balanced by considering privacy ramifications There is no personal information involved, so there are no privacy impacts. Encrypt it and you don t have to worry. If people put their personal information online they want you to have it! Too many privacy protections inhibit innovation and positive advances. There is no privacy anyway, so there s no use to spend time and effort on it. Page 16
17 Personal Data Sharing is Increasing Study: 75% of health wearables and apps sent personal data to 3rd parties without users' knowledge Study: Top 20 health related apps sent personal data to as many as 70 third parties 17 Page 17
18 Cybersecurity Incidents are Increasing Cisco 2014 Annual Security Report: Mobile apps regularly downloaded without any thought of security. 99% of all mobile malware target Android devices. Trojans targeting Java Micro Edition (J2ME)-capable devices in 2 nd place with 0.84% of all mobile malware encounters. 71% of Android users have the highest encounter rates with all forms of webdelivered malware, followed by Apple iphone users with 14%. 18 Page 18
19 Cybersecurity Incidents are Increasing Symantec Latin American + Caribbean Cyber Security Trends, June 2014 In total, over 552 million identities around the world were exposed in 2013, putting consumer credit card information, birth dates, government ID numbers, home addresses, medical records, phone numbers, financial information, addresses, logins, passwords, and other personal information into the criminal underground. Stolen credit cards can be sold for as high as $100 per card on the black market, making data breaches a low risk and simple, yet profitable activity for cybercriminals. Globally, 8 breaches each exposed 10 million identities or more. 19 Page 19
20 Cybersecurity Incidents are Increasing 20 Page 20
21 Cybersecurity Incidents are Increasing But business leaders refuse to take action, or even believe there are threats. I fail to see this threat ever becoming real. Cyber attacks have always been agai nst the masses not the individuals. This is more hype than anything. The only people that support this are those that will profit from the scare tactics. 21 Page 21
22 Privacy Incidents are Increasing 4th Annual Benchmark Study on Patient Privacy & Data Security by Ponemon Institute Criminal attacks on healthcare organizations increased 100% since % of organizations say employee negligence is biggest worry followed by use of public cloud services (41%), mobile device insecurity (40%) and cyber attackers (39%). Despite the concerns about employee negligence and the use of insecure mobile devices, 88% of organizations permit employees and medical staff to use their own mobile devices to connect to their organization s networks or enterprise systems such as . 40% say they use the cloud heavily, an increase from 32% in % are either somewhat confident (33%) or not confident (40% ) that their business associates would be able to detect, perform an incident risk assessment and notify their organization in the event of a data breach incident as required under the business associate agreement. Page 22 22
23 Privacy Incidents are Increasing 3 rd Party Risks Unauthorized access by insiders Loss and theft of devices storing personal information Non-compliance with security and privacy requirements Using information in ways they are not authorized to do Malware 23 Page 23
24 Privacy Incidents are Increasing 24 Page 24
25 What is Privacy? Informational Privacy Bodily Privacy Territorial Privacy Communications Privacy Page 25
26 Personal Information Elements Organizational Information General Information Business and personal addresses Name Gender Age and date of birth Marital status Home address Account number Social Security number License plate number Citizenship Languages spoken Veteran status Disabled status IP address (some jurisdictions) Dozens (hundreds?) more Business and personal phone numbers Business and personal addresses Must Also Consider Internal identification numbers Sensitive Information Government-issued identification numbers New Types of Information/Data Identity verification information *ANY* Data That Can Point to an Individual And the list goes on Page 26 26
27 Consumerization of IT & Privacy Page 27
28 Mobility Benefits Page 28 Page 28
29 Mobility & Privacy BYOD results in BYOA Tablets & Smartphones USBs Data collected through apps Access to the customer s device Malware Phishing Securing data in transit Securing data in storage Page 29 Page 29
30 Cloud Services & Privacy Page 30 Page 30
31 Big Data Use Limitations Retention & Disposal Availability Disclosure Controls Integrity Page 31 Page 31
32 Big Data Privacy Risks Anonymization could become impossible Data masking could become impossible People don't realize the risks Bad actions based on incorrect interpretations Ethical issues with driving behavior Discrimination Few (if any) legal protections to involved individuals Exists infinitely Concerns for e-discovery Making patents and copyrights irrelevant Page 32
33 Internet of Things Privacy Risks Creates a more pervasive "Big Brother" society Individuals don't know they are sharing their data Little to no control of data collected Traditional privacy principles (e.g., FIPPs) may not be feasible Few (if any) legal protections to involved individuals No standards for building in privacy Currently no way to communicate privacy issues from/through the devices Page 33
34 Disclosure Controls By 2015, 25 billion devices are projected Internet of Things to be connected to the Internet; this number could double to 50 billion devices by the end of the decade. Use Limitations The M2M market will expand to 24 billion smart sensors by 2020 and will be worth approximately $1.2 trillion Retention & Disposal TRENDNet failed to employ reasonable and appropriate security during the design and testing of consumer software. TRENDNet failed to monitor third-party security vulnerability reports. Availability Integrity Page 34
35 Taken from 35
36 Internet of Things: Medical Devices
37 Internet of Things: Wearable Technologies
38 Internet of Things: Mobile Linkages Page 38
39 Internet of Things: Energy Usage
40 Internet of Things: Smart Appliances Smart meter HAN Smart Grid? HAN Smart appliance Internet? Smart meter HAN Internet? Page 40
41 Address Privacy Risks by Building In Privacy Controls Page 41
42 Privacy Principles OECD Privacy Principles Collection Limitation Principle Data Quality Principle Purpose Specification Principle Use Limitation Principle Security Safeguards Principle Openness Principle Individual Participation Principle Accountability Principle The Australian Information Privacy Principles align closely with the OECD Privacy Principles: IPP 1: manner and purpose of collection IPP 2: collecting information directly from individuals IPP 3: collecting information generally IPP 4: storage and security IPPs 5 7: access and amendment IPPs 8 10: information use IPP 11: disclosure Page 42 42
43 Case Studies Drones over public national park forest Accountability Individual Participation Use to determine insect damage to trees Privacy concerns: - People in park will be recorded - Adjacent property will be recorded - Other? Possible privacy mitigation actions: - Use GPS settings in drone - Establish drone flight height requirements - Use face blurring technologies - Post signs - Only use when park is closed - Other? Openness Security Safeguards Use Limitation Purpose Specification Data Quality Collection Limitation 43 Page 43
44 Case Studies Smart prescription pills Use to track health of patient Privacy concerns: - Inapproriate sharing of health data - Inappropriate use of health data - Health data modification - Securing the transmission of data - Other? Possible privacy mitigation actions: - Use encryption - Log access to data - Other? Accountability Individual Participation Openness Security Safeguards Use Limitation Purpose Specification Data Quality Collection Limitation 44 Page 44
45 Case Studies Smart Meters Use to track and control energy usage to save energy Privacy concerns: - Activities within the house will be revealed - Energy usage may be inappropriately shared - Energy usage could be controlled - Other? Possible privacy mitigation actions: - Lengthen energy usage readings - Send aggregate data to utility - Restrict data sharing - Other? Accountability Individual Participation Openness Security Safeguards Use Limitation Purpose Specification Data Quality Collection Limitation 45 Page 45
46 Case Studies Use of Drones in Farming Accountability Individual Participation Openness Use to check crops and livestock Privacy concerns: - Others would obtain the images - Farmers would use inappropriately - Other? Possible privacy mitigation actions: - Establish limits via GPS settings - Require drones to be registered and logs subject to monitoring - Other? Security Safeguards Use Limitation Purpose Specification Data Quality Collection Limitation 46 Page 46
47 Case Studies Smart Glasses Accountability Individual Participation Manufacturer wants to include privacy protections Privacy concerns: - Those in vicinity will be recorded w/o their consent - Used to steal IP (e.g., movies, etc.) - Other? Possible privacy mitigation actions: - Have visible light/sound when it is recording - Other? Openness Security Safeguards Use Limitation Purpose Specification Data Quality Collection Limitation 47 Page 47
48 Managing the Risks Use most appropriate privacy principles (e.g., OECD) Assign responsibility Establish information security and privacy policies Create supporting procedures and standards Provide training and ongoing awareness Establish oversight Ask: Will the way in which you use, share, present, retain, etc. data about individuals be viewed as creepy? Page 48
49 Initiatives U.S. NIST Privacy Engineering Workshop Beginning to address the technical engineering issues Page 49
50 Questions? Rebecca Herold & Associates, LLC The Privacy Professor Des Moines, Iowa Phone Web sites: Blog: Rebecca Herold, CIPM, CIPP/US, CIPT, CISSP, CISM, CISA, FLMI TwitterID: Page 50 Page 50
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
EHS Privacy and Information Security
EHS Privacy and Information Security Resident Orientation 26 June 2015 Steve Winter CISSP, CNE, MCSE Senior Information Security Engineer Privacy and Information Security Office Erlanger Health System
2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
INFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus
cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends
Business Associates and HIPAA
Business Associates and HIPAA What BAs need to know to comply with HIPAA privacy and security rules by Dom Nicastro White paper The lax days of complying with privacy and security laws are over for business
ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
CYBERSECURITY IN HEALTHCARE: A TIME TO ACT
share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare
Security Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
Perception and knowledge of IT threats: the consumer s point of view
Perception and knowledge of IT threats: the consumer s point of view It s hard to imagine life without digital devices, be it a large desktop computer or a smartphone. Modern users are storing some of
Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Ponemon Institute Research Report
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
BYOD At Your Own Risk Working in the BYOD Era. Shane Swilley [email protected] (503)276-6074
BYOD At Your Own Risk Working in the BYOD Era Shane Swilley [email protected] (503)276-6074 Remember when mobile technology was more Hollywood fantasy than reality The original Smart Phone By the
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
1. Understanding Big Data
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte
Cyber Security Awareness. Internet Safety Intro. www.staysafeonline.org
Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage
Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida
2015 SCCE Compliance & Ethics Institute Wednesday, October 7, 2015 (10:00 11:45) Session W14 Bring Your Own Device(BYOD) They are here and they are not going away. Understanding the benefits, risks, and
CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY
CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY MATTHIAS YEO Chief Technology Officer - APAC CISSP, CISA, CISM, PMP 1 OVER REACTING VS UNDER REACTING Reason for the world today
Security and Privacy
Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices
Adopting a Cybersecurity Framework for Governance and Risk Management
The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
Why Email Encryption is Essential to the Safety of Your Business
Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations
Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com
Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report
Moving Beyond User Names & Passwords Okta Inc. [email protected] 1-888-722-7871
Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 Moving Beyond
Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media
January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document
PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs.
PREP Course #25: Hot Topics in Cyber Security and Database Security Presented by: Joe Baskin Manager, Information Security, OCIO [email protected] Objectives Discuss hot topics in cyber security and database
a new approach to IT security
REPRINT FEBRUARY 2013 healthcare financial management association hfma.org a new approach to IT security FEATURE STORY REPRINT FEBRUARY 2013 healthcare financial management association hfma.org a new approach
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
Enhancing Cybersecurity with Big Data: Challenges & Opportunities
Enhancing Cybersecurity with Big Data: Challenges & Opportunities Independently Conducted by Ponemon Institute LLC Sponsored by Microsoft Corporation November 2014 CONTENTS 2 3 6 9 10 Introduction The
POLICIES TO MITIGATE CYBER RISK
POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
DESTINATION MELBOURNE PRIVACY POLICY
DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally
The SMB Cyber Security Survival Guide
The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
Clevertar Privacy Policy
Clevertar Privacy Policy At Clevertar, we take privacy very seriously. We encourage you to read this Privacy Policy Policy carefully. The defined terms in this Policy have the same meaning as in our Terms
Digital Consumer s Online Trends and Risks
Digital Consumer s Online Trends and Risks Modern consumers live a full-scale digital life. Their virtual assets like personal photos and videos, work documents, passwords to access social networking and
2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
Moving Beyond User Names & Passwords
OKTA WHITE PAPER Moving Beyond User Names & Passwords An Overview of Okta s Multifactor Authentication Capability Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871
Data Security in Development & Testing
Data Security in Development & Testing Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: July 31, 2009 Ponemon Institute Research Report Data Security in Development
Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice
Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice Agenda Learning objectives for this session Fundamentals of Mobile device use and correlation to HIPAA compliance HIPAA
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
2011 NATIONAL SMALL BUSINESS STUDY
2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
H&R Block Digital Tax Preparation, Online, and Mobile Application Privacy Practices and Principles
Privacy Notice H&R Block Digital Tax Preparation, Online, and Mobile Application Privacy Practices and Principles Protecting your information is important to us. The following guidelines set forth our
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
In 2015, just under half (43%) of the world s population has an Internet connection: 3.2 billion people, compared to 2.9 billion in July 2014.
Contents Introduction... 1 Main findings... 2 Methodology... 3 Section 1. Device usage... 4 Section 2. Online and on the move: Internet activity... 6 Section 3. The connected treasure chest: what is stored
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Privacy Policy and Notice of Information Practices
Privacy Policy and Notice of Information Practices Effective Date: April 27, 2015 BioMarin Pharmaceutical Inc. ("BioMarin") respects the privacy of visitors to its websites and online services and values
HIPAA and Health Information Privacy and Security
HIPAA and Health Information Privacy and Security Revised 7/2014 What Is HIPAA? H Health I Insurance P Portability & A Accountability A - Act HIPAA Privacy and Security Rules were passed to protect patient
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
Privacy and Security in a Connected Life: A Study of European Consumers
Privacy and Security in a Connected Life: A Study of European Consumers Sponsored by Trend Micro Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research
Privacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
Mobile E-Commerce: Friend or Foe? A Cyber Security Study
Research February 2015 Mobile E-Commerce: Friend or Foe? A A J.Gold Associates Research Report Many consumers now interact with the Internet primarily through mobile devices, avoiding traditional PC devices
Best Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
