Increasing electronic product life and reliability The Future of Data Breach Risk Management “Response and Recovery” Especially Prepared for:

Slides:



Advertisements
Similar presentations
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Advertisements

Red Flag Rules: What they are? & What you need to do
Travelers CyberRisk for Insurance Companies
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
Springfield Technical Community College Security Awareness Training.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Consumer Authentication in e-Banking & Part 748 – Appendix B Response Program Catherine Yao Information Systems Officer NCUA.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
© Chery F. Kendrick & Kendrick Technical Services.
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
General Awareness Training
Overview of Cybercrime
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
ISMS for Mobile Devices Page 1 ISO/IEC Information Security Management System (ISMS) for Mobile Devices Why apply ISMS to Mobile Devices? Overview.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
AUGUST 25, 2015 Cyber Insurance:
Security considerations for mobile devices in GoRTT
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The Best Identity Protection
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
TransArmorSM A Secure Transaction ManagementSM Solution
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Protecting the Public Trust Cyber Liability and Data Compromise; The New Risk Management Frontier Steve Spilde, Chief Executive Officer Brennan Quintus,
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Consumer Authentication in e-Banking & Part 748 – Appendix B Response Program Catherine Yao Information Systems Officer NCUA.
E&O Risk Management: Meeting the Challenge of Change
Especially Prepared For:
Protection of CONSUMER information
Business At the Speed of Cyber
Data Compromises: A Tax Practitioners “Nightmare”
Securing Information Systems
Chapter 3: IRS and FTC Data Security Rules
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Figure 1. Number of Records Breached
Las Positas College Flex Day
Looking to the Future MIS 689 Cyber Warfare Capstone.
Cyber Security: What the Head & Board Need to Know
Tom Murphy Chief Information Security Officer
Protecting Yourself from Fraud including Identity Theft
Anatomy of a Common Cyber Attack
Presentation transcript:

Increasing electronic product life and reliability The Future of Data Breach Risk Management “Response and Recovery” Especially Prepared for:

Today’s Topics Someone is a victim ID Theft every 2 seconds!  About Merchants Information Solutions, Inc.  About Mark Pribish  Data Breach Trends  Identity Theft Trends  The Threat Landscape  The Future of Data Breach Risk Management  Questions and Answers

Merchants Information Solutions Since 1912 ID Theft Risk Management Solutions Pioneer Over 10 Million Consumers Covered Business | Consumer | Data Breach – Identity Theft Solutions

About Mark Pribish Someone is a victim ID Theft every 2 seconds! Vice President & ID Theft Practice Leader  Gannett / Arizona Republic guest columnist for cyber security, data breach, identity theft, and personal privacy  Member of FBI Citizens Academy Class of 2012, FBI InfraGard Public Private Alliance, Guidepoint Global Advisors, and Risk Insurance Management Society  Certified Identity Theft Risk Management Specialist (CITRMS) and Arizona P&C License  25 years’ experience in helping consumers and enterprise organizations manage the risks associated with ID Theft and data breach events  Served in senior sales positions for Aon and AIG  Graduated from the University of Dayton in 1981

Data Breach Trends

Someone is a victim ID Theft every 2 seconds! 2015 Security and Data Breach Research Reports  Gartner, Sep the forecast for worldwide spending on information security will reach $76.9 billion annually  Grant Thornton, Sep estimates the total cost of cyber attacks to businesses worldwide has reached $315 billion annually  Trend Micro’s Data Breach Report, Sep titled “Follow the Data: Dissecting Data Breaches and Debunking Myths” found that 41 percent of data breaches since 2005 were related to lost devices

Data Breach Trends Someone is a victim ID Theft every 2 seconds! Privacy Rights Clearinghouse Data Breach Timeline for 2005 – 2016 April 2016  Since January 2005 there have been 4,815 data breaches affecting nearly 1 billion records  Only 25 percent of these data breaches were impacted by hackers and IT related events  The Majority - 75 percent of these data breaches were impacted by social engineering (the human element)

Data Breach Trends Someone is a victim ID Theft every 2 seconds! Privacy Rights Clearinghouse Types of Data Breaches  Hacking/Malware - electronic entry via outside party, malware and spyware  Insider - someone with legitimate access intentionally breaches information  Payment Card Fraud - fraud with debit and credit cards such as skimming devices at point-of-service terminals  Physical Loss – lost, discarded or stolen non-electronic records  Portable Device - lost, discarded or stolen laptop, smartphone or flash drive  Stationary Device - lost, discarded or stolen stationary electronic device or server not designed for mobility.  Unintended Disclosure - sensitive information posted publicly  Unknown or other

Data Breach Trends Someone is a victim ID Theft every 2 seconds! Ponemon Institute Study: Cost of a Data Breach March 2015  Total Costs – averaged $217 per lost or stolen record  Direct Incremental Costs – including free/discounted services, notification letters, legal/accounting fees, etc.  Lost Productivity Costs – including lost time of employees and contractors diverted from other tasks  Customer Opportunity Costs – including cost of lost customers and cost of acquiring new customers

Identity Theft Trends Someone is a victim ID Theft every 2 seconds! 2015 FTC Consumer Sentinel Network Report Identity Theft Complaints by Victims’ Age February 2016  19 and Under – 5%  20 – 29 years old – 14%  30 – 39 years old – 16%  40 – 49 years old – 20%  50 – 59 years old – 24%  60 – 69 years old – 15%  70 and Over – 6%

Identity Theft Trends Someone is a victim ID Theft every 2 seconds! 2015 FTC Consumer Sentinel Network Report How Victims’ Information is Misused February 2016  Government Documents/Benefits Fraud – 45.3%  Credit Card Fraud – 15.8%  Phone or Utilities Fraud – 9.9%  Bank Fraud – 5.9%  Employment-Related Fraud – 3.3%  Loan Fraud – 3.5%  Other Identity Theft – 19.2%

Identity Theft Trends GAO Tax and Identity Theft Report January 2016  2.1 million fraudulent returns claiming refunds of $15.7 billion were filed in 2014  It's estimated that tax refund fraud losses could hit $21 billion in 2016 Ponemon Institute 6 th Annual Healtcare Study May 2016  Patients can suffer harm if their records are lost or stolen including:  79% Increased risk that personal health facts will be disclosed  66% Increased risk of medical identity theft  61% Increased risk of financial identity theft

The Threat Landscape Someone is a victim ID Theft every 2 seconds! Ponemon Institute 2015 State of Endpoint Report: January 2015  This annual study identifies trends and changes in endpoint risk in organizations  An endpoint can include servers, desktops, laptops, smartphones, and even printers, ATMs and PoS devices  The biggest problem is the negligent or careless employee with multiple mobile devices using commercial cloud apps and working outside the office

The Threat Landscape Someone is a victim ID Theft every 2 seconds! SailPoint Study (Identity and Access Management) April 2016  25% of employees will share sensitive info outside their company  1 in 5 employees would sell their passwords to an outsider  And of those who would sell their passwords, 44%would do so for less than $1,000  One-third share passwords with their co-workers  40 percent reported having access to a variety of corporate accounts after leaving their last job

The Threat Landscape Someone is a victim ID Theft every 2 seconds! According to the FBI April 8, 2016 – LA Times  Ransomware - disables digital networks but usually don't steal data  Hacking victims in the U.S. have paid more than $209 million in ransom payments in the first 3 months of this year  Compared with $25 million in all of 2015  Paying the ransom does not guarantee the encrypted files will be released  Decrypting files does not mean the malware infection itself has been removed  Train employees to not open digital attachments or click on unfamiliar weblinks

The Threat Landscape Someone is a victim ID Theft every 2 seconds! of breaches are to businesses of 100 employees or fewer of SMBs have no formal cybersecurity plan of companies who experienced a data breach didn’t know it…Notified by 3 rd party

The Threat Landscape Someone is a victim ID Theft every 2 seconds! Data breach risk factors include people, processes and technologies: People – the insider threat, whether accidental or malicious, can include current and former employees, customers, associates, vendors, and independent contractors. Processes – including information technology, enterprise risk management, marketing/sales and human resources need to be aligned, defined, and documented. Technologies – that are relied on to conduct and grow your business are also being used to identify vulnerabilities and cyber threats on your business.

The Future of Data Breach Risk Management Someone is a victim ID Theft every 2 seconds! Confronting the Widening Infosec Skills Gap May 15, 2015  CSO provides news, analysis and research on a broad range of security and risk management topics  The demand for cybersecurity pros has grown more than 3.5 times faster than the demand for other IT jobs over the past five years  Cybersecurity jobs have increased more than 12 times faster than the demand for all other non-IT jobs  The gap between the demand for information security professionals and the supply to grow to 1.5 million by 2020.

The Future of Data Breach Risk Management Someone is a victim ID Theft every 2 seconds! The Emergence of Cybersecurity Law Indiana University Mauer School of Law by Hanover Research February 2015  Cybersecurity is a growing priority for legal practitioners – numerous law firms have formed cybersecurity practice groups  Cybersecurity has become as much a legal issue - lawyers must play a role in designing the procedures, training, and risk assessments required to implement managerial, operational, and technical controls needed to protect data.  Lawyers are becoming more proactive in addressing cybersecurity concerns - until very recently, companies primarily involved lawyers in the response to cybersecurity incidents, rather than in the planning against such crises.

The Future of Data Breach Risk Management Someone is a victim ID Theft every 2 seconds! The Emergence of Cyber Insurance Sep 2015 – Insurance 2020 & beyond: Reaping the dividends of cyber resilience Insurance 2020 & beyond: Reaping the dividends of cyber resilience 71 percent of insurance CEOs, 79 percent of banking CEOs, and 61 percent of business leaders across all industries see cyber attacks as a threat to growth  $500 million  $805 million  $1 billion  $2 billion  $2.5 billion  $7.5 billion estimate  $25 billion estimate Cyber insurance is no replacement for robust IT security, but rather creates a second line of defense to mitigate cyber incidents.

The Future of Data Breach Risk Management International Association of Privacy Professionals CIPP - Certified Information Privacy Professional - The CIPP shows that you understand the laws, regulations and standards of privacy in your jurisdiction or discipline CIPM – Certified Information Privacy Manager - The CIPM says that you understand how to use process and technology to manage privacy in an organization—regardless of the industry or jurisdiction. CIPT – Certified Information Privacy Technologist - The CIPT shows that your know how to manage and build privacy requirements and controls into technology

The Future of Data Breach Risk Management InfraGard is a non-profit organization serving as a public- private partnership between U.S. businesses and the Federal Bureau of Investigationnon-profit organizationpublic- privateFederal Bureau of Investigation InfraGard Chapters o3ju04Y% Dhttps:// o3ju04Y% D!

The Future of Data Breach Risk Management Response and Recovery  Make an initial assessment of cyber/data breach event – including nature and scope; accidental or malicious; type of information and type of damage  Implement measures to minimize continuing damage - whether cyber intrusion or an accidental release, determine next steps to stop ongoing damage and take steps to prevent it from happening again  Record and collect Information - make a “forensic image” of the affected computers and/or a record of the data-breach event to preserve a record of the incident for later analysis and potentially for use as evidence at trial  Public relations and communications – create a positive and consistent message for internal and external use

The Future of Data Breach Risk Management Response and Recovery  Notify - contact employees within the organization and affected individuals outside the organization  Notify - law enforcement if criminal activity is suspected  Notify - know that 47 states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have notification laws in place to notify any individual whose personally identifiable information has been breached  Notify – know the two Federal laws including the FTC Red Flag Rule and HIPAA HITECH Data Breach Notification Rule

24 Mark Pribish VP & ID Theft Practice Leader Contact Information Integrity Matters – since 1912