Communicating a Breach: Best Practices and Examples



Similar documents
White Paper September 2013 By Peer1 and CompliancePoint PCI DSS Compliance Clarity Out of Complexity

Crisis Communications Plan

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience

The Legal Pitfalls of Failing to Develop Secure Cloud Services

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

The Role of Media Influencers is Changing. The Media s Appetite for Digital Content is Strong

COMPLIANCE MANAGEMENT SOLUTIONS THOMSON REUTERS ACCELUS COMPLIANCE MANAGEMENT SOLUTIONS

Using Social Media to Grow Your Brand. we give brands life

Data Privacy & Security: Essential Questions Every Business Must Ask

Redefining Incident Response

Standard: Information Security Incident Management

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY

The Essential CMO Guide to an Agile B2B Marketing Plan

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

Attributes and Objectives of Social Media. What is Social Media? Maximize Reach with Social Media

How To Use Social Media To Improve Your Business

SOCIAL MEDIA. About Infosys. The Rise of Social Media in Financial Services Balancing Risk and Reward

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

5 Point Social Media Action Plan.

Emergency Preparedness requires a Communications Plan

The Pitfalls of DIY Approaches to Disaster Recovery

Bottomline Healthcare. Privacy and Data Security

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Understanding and managing data: The benefits of data governance and stewardship

Continuity of Operations Planning. A step by step guide for business

A NEW APPROACH TO CYBER SECURITY

WHITE PAPER. 7 Keys to. successful. Organizational Change Management. Why Your CRM Program Needs Change Management and Tips for Getting Started

ASAE s Job Task Analysis Strategic Level Competencies

SOLUTION WHITE PAPER. Align Change and Incident Management with Business Priorities

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

Data Breach and Senior Living Communities May 29, 2015

Accenture Cyber Security Transformation. October 2015

DATA RECOVERY SOLUTIONS EXPERT DATA RECOVERY SOLUTIONS FOR ALL DATA LOSS SCENARIOS.

Sample Reporting. Analytics and Evaluation

CONTACT CENTER 09: Five Steps to a Lean, Customer-Centric Service Organization

A Primer on Cyber Threat Intelligence

Analyzing the Impact of Social Media From Twitter to Facebook

Preparing for and coping with a crisis online. White Paper 2 Crisis management in a digital world

FireScope + ServiceNow: CMDB Integration Use Cases

The Social Media and Communication Manager will implement the. Company s Social Media Strategy, develop brand awareness, generate

Rogers Insurance Client Presentation

KEY STEPS FOLLOWING A DATA BREACH

Benchmark. On-line recruiting has come a long way... How does YOUR organization measure up?

The IBM data governance blueprint: Leveraging best practices and proven technologies

How To Protect Your Brand From Harm

AB Volvo, Göteborg, Sweden. Ref No , August The Volvo Way

Health Consumers Council - Strategic Plan

SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

MODULE 10 CHANGE MANAGEMENT AND COMMUNICATION

WHAT IS LEAD NURTURING?

The Growing Importance of Corporate Social Responsibility for Reputation Management

CYBER SECURITY TRAINING SAFE AND SECURE

Building a Culture of Quality in Food and Beverage Manufacturing. The Role of Integrated Business Systems in a Volatile Regulatory Environment

Aftermath of a Data Breach Study

Your presenters. Brian McIlravey, CPP Executive Vice-President Former CEO PPM Brian Link VP, GRC Strategy Former E&Y Partner

Managing Your REPUTATION. Before Someone Else Does it for You

Cybersecurity y Managing g the Risks

Texas System of Care Social Marketing Plan

Getting Started in Currency Trading. Winning in Today's Market + Companion Website. 4th Edition. Getting Started In...

Reputation. Further excellence. business continuity. risk management. Data security

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

Following Up with Patients Discharged from the Emergency Department: A Look at Voice and UCSF

COMPETITION TRIGGERS BATTLE FOR TALENT AND ACQUISITIONS

Executive s Guide to. Social Media and Crisis Management

Vistara Lifecycle Management

8 New Year s Resolutions for B2B Marketers. Take your content marketing to the next level in the new year!

Building Confidence by Building Awareness

HOW WALMART FOUND ITS VOICE. An Interview with Director of Social Strategy Umang Shah

the social media ecosystem

Web Protection for Your Business, Customers and Data

DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET

Volume Challenges? Technology Can Help A look at the many ways in which technology is a resource for managing peaks and unpredictable volume.

PRIVACY & DATA PROTECTION ANNUAL REPORT

Transcription:

Communicating a Breach: Best Practices and Examples Overview How a company communicates about a breach is an essential part of breach response. In the age of social media and the 24/7 news cycle, the amount of public scrutiny companies face as they go through a major incident is at an all-time high and can have significant long-term impact on corporate reputation. This interactive discussion will examine how, what and when companies need to communicate about a data breach. We will take attendees through a hypothetical breach scenario examining the proper tactics and messages to deliver throughout the lifecycle of the incident; from discovery through resolution.

Overview of Current Landscape

The Reputational Risks are Significant 74.8% 72.5% 40% of U.S. consumers worry about the security of their personal information. Temkin Group "Consumer Benchmark Survey", May 5, 2014 of U.S. consumers don t believe organizations care about their private data and keeping it safe and secure. HyTrust Inc., the Cloud Security Automation Company, March 2014 of global consumers believe failure to keep customer information secure has a significant negative impact on trust in a company. 2014 Edelman Trust Barometer: Financial Services Industry

The Reality of the Data Breach News Landscape Today Incidents are often leaked to the press prior to completion of a full investigation The pressure from the media to disclose more information quicker is higher than ever before Companies often face several waves of news cycles over the course of the breach that must be managed Social media is making it possible for information about a breach to spread quickly

Breaking Down a Breach

Overview We will walk everyone through the various phases of a typical Payments Breach from a media perspective For each phase we will explain: 1. The trigger that prompts a communications action 2. Key considerations that must be discussed on how to move forward 3. A sample of what a press statement or other material might look like

Phase 1: Prior to a Breach The CEO asks if your company has a plan to respond to a breach.

Preparation is Key Proactive steps to take: Identify internal and external crisis team Develop communications chain of command for multiple scenarios Meet your state s legislators, regulators and policy makers Determine your lobbying, forensics and legal firm before a crisis Conduct a mock crisis situation Keep the team lean and empower a decision-maker

Phase 2: Learning of the Breach Trigger: You are alerted from either your IT team or payments brands or processor that there is a breach, but it is not public yet

Phase 2: Key Considerations Based on the limited amount of information are we at the point where we have something to disclose? What information do we need to craft a response? What can we start preparing now that we will likely need later when we have more information (dedicated page of website, call center QA, media statements etc.)? Will this require formal notification under state laws?

Phase 2: Key Actions Convene the incident response team to gain situational awareness and discuss approach Develop a holding statement to use with press focused on it being under investigation Start social and traditional media monitoring for leaks Identify the potential avenues for a leak

Phase 3: Breach Gets Leaked Trigger: Brian Krebs or Robin Sidel/WSJ learns that you have been breached and is going to make it public midinvestigation

Phase 3: Key Considerations Do you want to provide a statement? What would you disclose (do you give numbers or other details or actions taken)? Are you ready to confirm the breach at this point? How far along are you in the investigation and can you confirm a breach?

Phase 3: Key Actions Provide a holding statement focused on the actions taken as part of the investigation. Including: Who is engaged/you are working with Steps taken and being taken Promise to provide updates DO NOT speculate on numbers affected Continue preparing materials for a larger disclosure WHEN you have more information

Phase 4: Breach Confirmed; Forensics Ongoing You learn from IT and forensics that there was in fact a breach and have a understand of the potential size and scope. You know the type of information affected, but there is still uncertainty of the scope pending a complete investigation.

Phase 4: Key Considerations What do you communicate at this point? Do you offer interviews and who would do them? Are you sharing with regulators and policymakers at this point? How are you getting your message out (press release, website, social media)? What are you doing for customers? Do you offer credit monitoring or fraud resolution Call center

Phase 4: Key Actions Communicate with the customer as the North Star Be careful claiming the issue is fully resolved; be cautious of numbers being communicated Focus on steps to protect them versus getting caught up in technical discussion or how to get them back in stores Rely on controlled communications channels to keep messaging consistent Create a centralized place on your website for all information that s made public Set up a call center to answer questions from concerned customers Engage regulators and policymakers on what s known and commitment to update Prepare formal notification process (if necessary) Prepare for AG and Congressional inquires

Phase 4: Website Example

Phase 5: Investigation Complete Forensics issues their final report confirming the extent of the incident. Media coverage has died down, but customers may still be unsettled.

Brand Recovery From a business perspective, the goals are clear: Strategies: Protect client relationships through the initial forensics report and subsequent industry dialogue. Respond swiftly to client concerns, reinforcing the company commitment to data security and citing improvements already underway. Chart an operational course to help inoculate the company from future risk. Creating a consistent, credible story about company s strengths, areas for improvement and commitment to excellence in data security. Setting a sustained course to build awareness, comprehension and thought leadership for the company and its executives. Maximizing our efforts through an engagement model that crosses multiple channels, drives message penetration across audiences and leverages third parties for credibility, where applicable.

Brand Recovery Tactics: Develop a message framework that will and address information security to demonstrate the company s commitment to setting a new standard for security within the industry Establish relationships with information security industry influencers, including NGOs, media, industry experts, etc. Partner with a group such as the RILA, the Ponemon Institute or many others Leverage existing industry events and their attendees as expanded platforms for the company to demonstrate it s commitment to information security Create content whether it s in the form of bylines/op-eds, infographics, Q&A series, videos, etc. Develop an expert positioning document that can be easily shared, identifying individuals as thought leaders to key media

Other Considerations Size, scope and brand recognition largely influence media and policymaker attention You may never know the complete size/scope of the incident Applying a typical crisis model doesn t work for modern attacks/breaches

Questions