Data Security Breach. How to Respond



Similar documents
Data Security Incident Response Plan. [Insert Organization Name]

Guidance on data security breach management

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

SECTION-BY-SECTION ANALYSIS

Guidance on data security breach management

Data Security Breach Management - A Guide

Data Security Breach Incident Management Policy

THE MORAY COUNCIL. Guidance on data security breach management DRAFT. Information Assurance Group. Evidence Element 9 appendix 31

Top Ten Technology Risks Facing Colleges and Universities

NC s Identity Theft Protection Act

PRIVACY BREACH MANAGEMENT POLICY

REDEFINING THE BOUNDARIES OF RISK MANAGEMENT, NOW AND INTO THE FUTURE

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

DATA BREACH COVERAGE

Procedure for Managing a Privacy Breach

KEY STEPS FOLLOWING A DATA BREACH

GUIDE TO MANAGING DATA BREACHES

Anatomy of a Privacy and Data Breach

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

How to effectively respond to an information security incident

Is your Organization SAFE?

plantemoran.com What School Personnel Administrators Need to know

Logging In: Auditing Cybersecurity in an Unsecure World

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Security Incident Procedures Response and Reporting Policy

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs

INFORMATION SECURITY FOR YOUR AGENCY

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

Data Protection Breach Management Policy

Cybersecurity: What CFO s Need to Know

Data Security Breach Management Procedure

Beazley presentation master

DUUS Information Technology (IT) Incident Management Standard

California State University, Chico. Information Security Incident Management Plan

Welcome to Today s NACUBO Webcast. Our program will begin shortly with a brief introduction on how to use the desktop interface.

Information Technology Policy

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

Facilitated By: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

HIPAA Security Alert

Keeping watch over your best business interests.

Data Privacy & Security: Essential Questions Every Business Must Ask

Threat Management: Incident Handling. Incident Response Plan

e-discovery Forensics Incident Response

CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

Cybersecurity Workshop

Incident Response Plan for PCI-DSS Compliance

State of Illinois Department of Central Management Services ACTION PLAN FOR NOTIFICATION OF A SECURITY BREACH


Insurance for Data Breaches in the Hospitality Industry

FINAL NOTICE Nationwide has confirmed that it will not be referring the matter to the Financial Services and Markets Tribunal.

Integrated Incident Management process v3 1

erisks Policyholder s Guide to Privacy & Security Breach Response Planning

ACE Advantage PRIVACY & NETWORK SECURITY

Cybersecurity: Protecting Your Business. March 11, 2015

Computer Security Incident Reporting and Response Policy

Domain 1 The Process of Auditing Information Systems

Security Incident Management Policy

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Miami University. Payment Card Data Security Policy

Implementation Business Associates and Breach Notification

IMS-ISA Incident Response Guideline

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.

Cybersecurity. Are you prepared?

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

BUSINESS ASSOCIATE AGREEMENT

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

How To Protect Your Data From Theft

Cybersecurity y Managing g the Risks

Montana Tech Escalation Procedures for. Security Incidents

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE

Security Recommendations for Multifunction Printers Will Urbanski, Virginia Tech IT Security Office and Lab

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks

PACB One-Day Cybersecurity Workshop

Covered Areas: Those EVMS departments that have activities with Covered Accounts.

Your Agency Just Had a Privacy Breach Now What?

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

UCF Security Incident Response Plan High Level

HOW SECURE IS YOUR PAYMENT CARD DATA?

Network Security & Privacy Landscape

GEARS Cyber-Security Services

Information Security for the Rest of Us

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Standard: Information Security Incident Management

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cyber Liability. What School Districts Need to Know

Virginia Commonwealth University Information Security Standard

CYBERSECURITY HOT TOPICS

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

Information Security Management Systems

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

Cybersecurity and the Threat to Your Company

Transcription:

Data Security Breach How to Respond

About ERM

About The Speaker Information Security Director at ERM CISSP, CISA, CRISC, PCIP, PCI-QSA Core Experience: Information Assurance Computer Forensics Penetration Testing Regulatory Compliance and Standards Technical Security Assessment Social Engineering

Agenda What is a Data Security Breach Breach Management Plan Containment and Recovery Risk Assessment Notification of Breach Evaluation and Response Some Statistics Conclusion

What is a Data Breach A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.

Examples of Sensitive Data Name Address SSN Telephone Number Driver s License Number Account Number PIN Email Address Password Student education records Other personal Information

Security Data Breach

Breach Management Plan Containment and Recovery Risk Assessment Notification of the Breach Evaluation and Response

Containment and Recovery The Goal:limit the extent of the attack and thus the potential damage or loss. Determine who should lead the investigation. Determine the scope of the breach. Establish who needs to be aware of the situation. Determine whether there is something that you could recover. Define the response strategy.

Appropriate Strategy Strategy Goal:Limit the extent of the potential damage to and theft of resources. Need for evidence preservation. Service availability. Time and resources needed to implement the strategy. Effectiveness of the strategy. Duration of the solution.

Containment and Recovery Document details, conversations and actions. Evidence Gathering Chain of custody Preserve the evidence Follow notification escalation procedures. Apply changes to systems to control the attack.

Containment and Recovery Putting compromised resources back in service. Restore from a known good backup (before the compromise). Monitor closely for re-compromise.

Risk Assessment Determine what type of data is involved and its sensitivity. Determine how the data was protected during the incident. Analyze how many individuals were affected and who they are.

Risk Assessment Determine the harm that can come to those individuals. Determine the existence of wider consequences. If possible, determine what happened with the data.

Notification of Breach Obtain legal advice!!!! Contractual Agreement. The notification will help the individual. Number of people affected. Who, What, and How. Notify third parties (Police, Vendors, Insurers). Federal and State laws and regulations. Consider the dangers of over notifying.

Evaluation and Response Some questions to be answered: How well did staff and management perform in dealing with the incident? Were the documented procedures followed? Were they adequate? Were any steps or actions taken that might have inhibited the recovery? What corrective action can prevent similar incidents in the future? What would the staff and management do different the next time a similar incident occurs?

Some Statistics Source: http://www.verizonenterprise.com/dbir/2013/.

Some Statistics Source: http://www.verizonenterprise.com/dbir/2013/.

Some Statistics Source: http://www.verizonenterprise.com/dbir/2013/.

Cost of Data Security Breach Source: http://www.ponemon.org/

Conclusion Document Develop policies and procedures Maintain the plan Learn from the common mistakes

Your go to advisors for all matters in information security. 800 S Douglas Road #940 Coral Gables, FL 33134 Phone: 305-447-6750 Email: info@emrisk.com www.emrisk.com