Data Breach What kind of target are you?. Agenda The Problem Legal Landscape Risk Mitigation.

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Travelers CyberRisk for Insurance Companies
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
Massachusetts privacy law and your business  Jonathan Gossels, President, SystemExperts Corporation  Moderator: Illena Armstrong  Actual Topic: Intersecting.
Springfield Technical Community College Security Awareness Training.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Protecting Personal Information Guidance for Business.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Responding to a Data Security Breach
Brief Synopsis of Computer Security Standards. Tenets of Information Systems Security Confidentiality Integrity Availability Over the years, standards.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Gift Card Landscape & Competitive Report July 2012.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Overview of Cybercrime
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
AUGUST 25, 2015 Cyber Insurance:
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Preventing a Sensitive Data Loss: Laptops Marc Scarborough.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
CYBER INSURANCE Luxury or necessary protection?. What is a data breach? A breach is defined as an event in which an individual’s name plus personal information.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Compliance August 18, Agenda Outline Status Draft of Answers.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
An Information Security Management System
E&O Risk Management: Meeting the Challenge of Change
Protection of CONSUMER information
Regulatory Compliance
E&O Risk Management: Meeting the Challenge of Change
What Business Owners Need to Know About Data Privacy
Chapter 3: IRS and FTC Data Security Rules
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Protecting Personal Information Guidance for Business.
Cyber Issues Facing Medical Practice Managers
Red Flags Rule An Introduction County College of Morris
Cyber Trends and Market Update
Cyber Security: What the Head & Board Need to Know
Anatomy of a Common Cyber Attack
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

Data Breach What kind of target are you?

Agenda The Problem Legal Landscape Risk Mitigation

The Problem

There’s an app for that! Our Reality

Is there anyone in the U.S. who has NOT received a notification that their data has been compromised?

– Malicious – seeking to steal/expose/ embarrass – Insidious – trying to gain foothold in organization and monitor – Accidental – lost equipment, accidents, systems crash etc. Threat Characteristics Source: Corporate Executive Board

How can you cripple a major news organization’s website?

How can you cause the Dow Jones Industrial Average to drop 150 points in 7 minutes?

How can you cause the U.S. to lose billions in exports?

Entry point: Then what happens?

Economics Of A Security Breach Forensics Notification Call centers Credit protection Legal Fees Fines Public relations Lost business Lost productivity Increased security Mandated audits Other…

Simulated Incident Based on the results of the event analysis, the assessment has established the following list of minimum recommended actions: – Under jurisdictional regulatory requirements – Notify 11 state attorneys general – Notify 94,000 consumers in 47 jurisdictions – Notify credit agency of 54,000 exposures in 27 jurisdictions – Notify local media in 2 jurisdictions – Provide other general notifications – Notify 7 special offices in 5 jurisdictions – Also advised: 8 optional tasks Estimated fine liability: $7,700,000

Data Risk 1 – TMI! Companies tend to over-collect/retain in the interest of customer service – “We might need that”… More records = more expense

Data Risk 2 – TMI! Companies try to track and monitor too much, or the wrong things – Have you ever seen what is generated by an intrusion detection system? Narrow down to the truly important Risk based approach Secure vs. compliant

Data Risk 3 – TMI! Do you need to keep processing in-house? Tokenization – Some ROI available What risk goes away, what stays

Laws and Standards

U.S. and privacy/security Fair information practices approach – Notice and choice (opt in or out) By Sector – Education – Financial – Health – Marketing – Other Data breach

Education Family Education Rights and Privacy Act – Right for only certain parties to view records – Right to inspect and correct records

Financial Gramm Leach Bliley Fair Credit Reporting Act Red Flags Rule Others…

Health Health Insurance Portability and Accountability Act – Health records – Privacy and Security HITECH/GINA

Marketing CAN SPAM Do not call Others…

California SB 1386 Passed to prevent identity theft Defined personal information Landmark law that affected the rest of the country Influenced other states

Massachusetts Data Security Law Set data security standards for records Specific rules for data protection

Other U.S. Payment Card Industry standard FTC Act – Unfair and deceptive trade practices FCC regulations COPPA Pending federal legislation Others…

Global perspective Different focus and expectations Many new and pending global developments

PCI Data Security Standard (PCI DSS) Actionable framework for developing a robust payment card data security process -- including prevention, detection and appropriate reaction to security incidents Regularly evolving as threats and technologies change

Retail Breaches U.S. heavily targeted for credit card theft Target, Home Depot, Neiman Marcus, Michaels, etc….. Stolen magnetic stripe data can be used create a fake credit card with an encoding device Over $11 billion in losses in 2014

Fraud Statistics in the U.S. The United States accounted for 47% of total global payment-card fraud losses according to the Nilson Report A survey released in 2012 by the Aite Group and ACI Worldwide, a research and a payment-software firm respectively, found that 42% of Americans had experienced some form of payment-card fraud in the preceding five years Source:

Does fraud live near you? Source:

EMV and PCI DSS EMV chip: – Authentication technology for the point of sale part of the transaction when the physical card is actually present PCI DSS: – Security controls to protect the cardholder's confidential information on payment cards, not just at the moment the card is swiped or dipped, but all the way through the transaction process – Controls also apply when payments are made online or via telephone, where the card is not present Source: _with_emv_chip_and_pci.php

Vulnerabilities Not Address by EMV Transmission and storage of card data – Ex: thieves siphoning card data as it is transmitted to merchant’s central server in the clear Card not present (CNP) transactions – Rollouts of EMV in other countries have initially shown an increase in CNP fraud Led to more stringent fraud measures for CNP

Risk Mitigation

What challenges do you face? !Prioritize Crown Jewels !Understand/Address Risk !Reduce Targets Protection/Retention Priorities

Controls Framework ISO, NIST, etc. 4 controls have a big impact Layer on controls depending on your risk profile

Incident Response-Are You Ready? All companies will experience a security incident Planning ahead is important – many security and legal issues involved All companies should go through incident simulations 36

Legacy SystemsNew Systems Sensitive data visibleData masking enabled Limited monitoringEnhanced monitoring Legacy contract languageIncreased contractual liability for vendors SSN as identifierNew identifiers used PasswordsMulti-factor 37

Reducing the Target Don’t forget non-production and “shadow IT” Data on mobile devices Retired applications Unstructured data Data held by third parties Data on backup media or offsite storage

Encryption and Tokenization Encrypt all clear transmission of cardholder data for additional security Tokens replace legacy data in storage – Can reduce PCI scope and maintenance costs – Takes sensitive data out of cardholder data environment (CDE) – Keep in mind a lot of tokenization is “go forward” only

3 rd Parties and Insurance Many breaches start with a compromised 3 rd party – Vetting vendors – Contractual obligations – Regular audits – Entry into and out of company Cyber liability insurance coverage Your security “credit score”

Questions?