Third Party Risks. Mick Atteberry Nebraska CERT Conference August 2006. August 2006 1



Similar documents
Guidance on data security breach management

Guidance on data security breach management

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

ACE-1/onearm #show service-policy client-vips


Data Protection and Information Security. Procedure for reporting a breach of data security. April 2013

Data Security Incident Response Plan. [Insert Organization Name]

DATA BREACH COVERAGE

PRIVACY BREACH MANAGEMENT POLICY

7 A MANAGEMENT MODEL STUDY

Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation

Policy for Protecting Customer Data

Pulaski Bank. Electronic Funds Transfer ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Information Security Incident Management Guidelines

Cloud Agreements: Do s, Don ts, and Cautions

David Jones Storecard and David Jones American Express Card Member Agreement, Financial Services Guide and Purchase Protection. Terms and Conditions

AUTHORIZED SERVICE CENTER AGREEMENT

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

Anatomy of a Hotel Breach

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

Brief. The BakerHostetler Data Security Incident Response Report 2015

Burke and Herbert Bank 100 S. Fairfax Street Alexandria, VA (703) ELECTRONIC FUND TRANSFER DISCLOSURE

Procedure for Managing a Privacy Breach

WHY DO I NEED DATA PROTECTION SERVICES?

Personal Information Protection Act Information Sheet 11

Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS

Diners Club Corporate Travel System Terms and Conditions

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Donna S. Sheperis, PhD, LPC, NCC, CCMHC, ACS Sue Sadik, PhD, LPC, NCC, BC-HSP Carl Sheperis, PhD, LPC, NCC, MAC, ACS

Cyber and Data Security. Proposal form

By Directors, Officers and Employees of Hellaby Holdings Limited and its Subsidiaries ( The Company )


Student Data Breaches: Is Your District Prepared?

ONLINE BANKING APLICATION

Bank of Nebraska 7223 South 84th Street La Vista, NE (402) ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE

Case 1:15-cr JEM Document 15 Entered on FLSD Docket 06/11/2015 Page 1 of 6 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA

Know Your Rights and Responsibilities Electronic Funds Transfer Disclosure

First Citizens' Federal Credit Union 200 Mill Road, Suite 100 PO Box 270 Fairhaven, MA

Online Banking Agreement and Disclosures

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

Gramm Leach Bliley Act. GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev. 7/1/2007

credit card Conditions of Use

Your privacy is important to CPABC. This Privacy Policy explains how CPABC collects, uses, discloses and retains your information. Who is CPABC?

*DD8108* ELECTRONIC FUND TRANSFER DISCLOSURE

SPECIFIC TERMS APPLICABLE TO YOUR HIGH YIELD CHECKING ACCOUNT

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management

Utica College. Information Security Plan

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

The potential legal consequences of a personal data breach

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct

INTERNET BANKING AGREEMENT & DISCLOSURE

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

Terms of Service. Your Information and Privacy

ONLINE BANKING DISCLOSURE AND AGREEMENT

Hackers, Slackers & Packers: Preventing Data Loss & Dealing with the Inevitable. Data Breaches Are All Too Common

Merchants Bank, National Association With our corporate office located at: 102 East Third St, Winona, MN 55987, , toll-free

The Growing Problem of Data Breaches in America

Prairie State Bank & Trust ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES

Standard: Information Security Incident Management

Protection of Privacy

1. About Some of the Words in this Agreement 2. Account and Cards

Prairie State Bank & Trust ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES

Insuring Innovation. CyberFirst Coverage for Technology Companies

CIVIL SERVICE SPORTS COUNCIL (CSSC) QUESTIONS & ANSWERS

Terms and Conditions For Online-Payments

Information Security Operational Procedures Banner Student Information System Security Policy

Terms and Conditions For Online-Payments

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

ONLINE ACCESS AND BILL PAY AGREEMENT AND DISCLOSURE STATEMENTS

MICHAEL HILL INTERNATIONAL LIMITED SECURITIES TRADING POLICY AND GUIDELINES

DEBIT CARD & ELECTRONIC FUNDS TRANSFER DISCLOSURE

Stay ahead of insiderthreats with predictive,intelligent security

Terms and Conditions For Online-Payments

Information Security

Software Support and Maintenance Terms

NOTICE TO CONSUMER DEBTOR(S) UNDER 342(b) OF THE BANKRUPTCY CODE

Independent Bank 230 W Main St Ionia, MI ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE

Acceptable Use of Information Systems Standard. Guidance for all staff

Transcription:

Third Party Risks Mick Atteberry Nebraska CERT Conference August 2006 August 2006 1

Disclaimer Views expressed in this presentation are those of my own and do not reflect those of my employer. Examples given in this presentation are not all inclusive and will be different for each organization. The examples are intended to demonstrate a thought process. August 2006 2

Objectives Develop an understanding of third party business risk. Establish a list of risk areas for prioritization. Establish methodology for assigning priorities. August 2006 3

Definition Third Party Risk The possibility of adverse impact from a dependent resource to a primary supplier or service provider. Example: We, the first party, contract with a second party to provide a service. The second party is dependent on a third party in the provision of that service. A third party can affect the success of the second and first party or present downstream liabilities. August 2006 4

Issues List for Discussion 01 02 03 04 05 06 07 Issue Effect Action August 2006 5

Mind Set - Business Impact area: Every business is dependent on someone else. Background: Using examples from others will always support the issues you are presenting. Fact: A basic statement that is irrefutable to the issue. Effect: A negative effect on the organization that will require a mitigation plan. August 2006 6

Case Study 01: Electrical Power Impact area: Business Continuity - Shutdown Background: In July 2006, record high temperatures were reported across the United States resulting in peak demands for electricity. Fact: Some electrical providers announced and enforced rolling blackouts within their service areas. Effect: A corrugated box manufacturer reported the time required for structured production restart procedures to take two days for each blackout. The control of glue through pipes affects quality of the end product. Unexpected expenses take away from net income. August 2006 7

Case Study 01 - Utility Notes Every utility represents a third party risk scenario. We contract for their services, and in return they are dependent on a number of downstream third parties to provide that service. Electricity Water Sewer Telecommunications Third party risk management is a business issue that can affect business operations. August 2006 8

Case Study 02: Alaska Oil Pipeline Impact area: Operational Costs Increase Background: On August 7, 2006, British Petroleum announced they will shut down the Alaskan pipeline for an unknown period of time to fix a sixteen mile section of corroded pipe. Fact: The Alaskan pipeline carries 8% of total U. S. oil production, or 2% of total U. S. oil consumption. Effect: Supply decreases while demand remains the same. Cost of oil and oil products will increase during the shutdown as downstream refineries search and compete for additional oil resources to draw from. August 2006 9

Case Study 02 - Commodities Every provider of commodities represents a third party risk scenario. We contract for their services, and in return they are dependent on a number of downstream third parties to provide that service. Fuel and oil Basic process inputs Paper Office supplies Virtually nothing in a modern day enterprise is exempt from the third party risk management evaluation process. August 2006 10

Mind Set - Information Impact area: Interaction with dependent businesses require an exchange of information, some of which is protected by law. Background: The press and Internet have given us multiple examples of how information can be unintentionally lost or disclosed. Fact: Example, the Nebraska Privacy law quietly went into effect on July 13, 2006 affecting all citizens of Nebraska and those doing business with citizens of Nebraska. Effect: Improper handling of private data will result in negative consequences and unexpected expenses to the organization. August 2006 11

Case Study 03: Theft of Credit Card Data Impact area: Downstream Liability - Litigation Background: Multiple examples of credit card information loss disclosures in the past twenty four months. (lost laptops, lost backup tapes, web sites hacked, fraud) Fact: Credit card issuers sue companies for the recovery of costs to issue new credit cards to individuals whose credit card information was compromised. Effect: Unexpected expenses take money and labor resources away from planned activities - reducing net income or budget. $ x to cover costs for each new card issued $ x to cover costs to prove liability of the first party $unknown for individual credit monitoring costs August 2006 12

Case Study 03 Credit Card Data Every provider of credit card services represents a third party risk scenario. We contract for their services, and in return they are dependent on a number of downstream third parties to provide that service. Merchant license Bank Internet service providers Telecommunications lines Online stores Privacy laws in multiple states and countries require the protection of private data associated with an individual. August 2006 13

Case Study 04: Background Checks Impact area: Downstream Liability - Litigation Background: Choice Point announced that multiple parties accessed information on individuals through fraudulent means. (these individuals used social engineering tactics) Fact: Choice Point collects information through methods they declare to produce high quality information on individuals. Effect: Decisions must be made from possible high quality derogatory information must be validated from a second source. August 2006 14

Case Study 04 Background Checks Every provider of background services represents a third party risk scenario. We contract for their services, and in return they are dependent on a number of downstream third parties to provide that service. Credit services Court services Internet content providers Privacy laws in states and countries require the protection of private data associated with an individual. Most foreign countries require consent before storing the data, the U.S. does not. August 2006 15

Case Study 05: Expense Reports Impact area: Downstream Liability Litigation Scenario: Inadvertent loss of information associated with an expense report may result in identity theft of the individual submitting the report. Fact: Many expense reports require the name of the individual and the credit card number used for paying the expenses. Effect: (1) Identity theft will cause unexpected expenses to the individual, and possible costs to the company if the inadvertent loss is attributed to the company. (2) The credit card company may charge the attributed company for replacement costs and credit monitoring services for the individual. August 2006 16

Case Study 05 Expense Reports Every organization processes expense reports for their employees. Follow the process flow, the real one. Where does that report really go e-mail approvals external payment services. Private data Credit cards or bank accounts External processors for payment Privacy laws in states and countries require the protection of private data associated with an individual. Most foreign countries require consent before storing the data, the U.S. does not. August 2006 17

Case Study 06: U. S. V. A. Lost Laptop Impact area: Downstream Liability, Abnormal Expense Background: In May 2006, The United States Veterans Administration (VA) announced they lost a lap-top computer containing the identity information for 24 million veterans. Fact: The VA offers a $50,000 bounty for recovery of the lap-top. This value sets a new public threshold for the value of information. Effect: Unexpected expenses to budget take money and labor resources away from planned activities. $15 million in investigative expenses $50,000 bounty offered for recovery of lap-top $unknown for individual credit monitoring costs August 2006 18

Case Study 06 Hardware Thefts Every organization must be prepared for physical loss of equipment. The hardware is trivial today the information is paramount. A process is required to profile the lost equipment for possibility of lost private data. Prevent negative press scenarios from third party disclosure on findings. A police report is frequently required for lost or stolen equipment. But they do not ask about the contents of the device. August 2006 19

Case Study 07: Disposal of Equipment Impact area: Downstream Liability, Abnormal Expense Background: Most of today s machines contain from 0GB to 80GB+ of end user data in file format or cache format. The time to determine what the data is not warranted compared to the time required to run an overwrite utility against the machine. Fact: End users or applications will store a multitude of information on the local hard drive. Effect: Litigation, publicity, and investigative expenses take money and labor resources away from planned activities. Note: Watch dog groups will require large organization to have an environmentally friendly disposal process. August 2006 20

Case Study 07 Disposal of Equipment Every organization must dispose of equipment with data eradication procedures and environmental cognizance. Almost every piece of hardware has local storage the proper eradication of information is key to protect the perception of unintentional loss of information. Prevent negative press scenarios from third party disclosure on findings. Most third party recycling firms will offer a procedure for data eradication at additional cost; while also being environmentally friendly with the disposal process. Documentation is a must for each asset. August 2006 21

Issues List for Discussion Is s ue E ffec t A c tion 01 E lec tric al P ow er - Rolling B lac k outs D ow ntim e and rec overy tim e are unex pec ted ex pens es that tak e away from revenue. R ec om m endation for or agains t bac k up power s upplies or generators, or both. 02 A las k a O il P ipeline S upply dec reas es w hile dem and rem ains the s am e w ill res ult in higher pric es. D eterm ine near term ac tions to abs orb pric e inc reas e or avoid c ons um ption. 03 Los s or Theft of C redit C ard D ata U nex pec ted ex pens es tak e m oney and labor res ourc es away from planned ac tivities - reduc ing net inc om e or budget. R eview bus ines s proc es s data flow for pos s ible leak age or los s points. 04 B ac k ground C hec k s D ec is ions m ade from pos s ible high quality derogatory inform ation m us t be validated from a s ec ond s ourc e. 05 E x pens e R eports The c redit c ard c om pany m ay c harge the attributed c om pany for replac em ent c os ts and c redit m onitoring s ervic es for the individual. 06 H ardw are Theft U nex pec ted ex pens es to budget tak e m oney and labor res ourc es aw ay from planned ac tivities. 07 D is pos al of E quipm ent Litigation, public ity, and inves tigative ex pens es tak e m oney and labor res ourc es aw ay from planned ac tivities. R eview bus ines s proc es s w ith hum an res ourc es to determ ine s ec ondary validation proc es s. R eview bus ines s proc es s w ith financ e to determ ine pos s ible leak age or los s points. D evelop proc es s to profile the los t m ac hine for pos s ible "private" inform ation los s. D evelop proc es s to as s ure eac h m ac hine is overwritten to prevent los s of " private" data. August 2006 22

Prioritization Meeting Human Resources Business Operations You CIO Legal Finance Note: The issues list only starts the discussion. The meeting will take a life of it s own and the issues list will grow during the meeting. The objective is to have a top priority, an action item for resolution or mitigation, and a next meeting date. August 2006 23

Questions August 2006 24

Issues List for Discussion 01 Issue Effect Action 02 03 04 05 06 August 2006 25