©2015 Experian Information Solutions, Inc. All rights reserved. Experian and the Experian marks used herein are trademarks or registered trademarks of.

Slides:



Advertisements
Similar presentations
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Advertisements

The following 10 questions test your knowledge of desired configuration management in Configuration Manager Configuration Manager Desired Configuration.
Red Flag Rules: What they are? & What you need to do
Identity Theft Ta’Mar Boyd Adam Devin. What is Identity Theft  Identity theft occurs when someone uses your personally identifying information, like.
1 Experian Data Breach Resolution 101 Confidential & Proprietary Experian Data Breach Solution.
©2014 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
1 ©2012 Experian Information Solutions, Inc. All rights reserved. Experian Public ©2012 Experian Information Solutions, Inc. All rights reserved. Experian.
Computers, Freedom and Privacy April 23, 2004 Identity Theft: Addressing the Problem in California Joanne McNabb, Chief CA Office of Privacy Protection.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
© 2009 Experian Limited. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
©2014 Experian Information Solutions, Inc. All rights reserved. Experian Confidential.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
© Experian Information Solutions, Inc All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
©2014 Experian Information Solutions, Inc. All rights reserved. Experian Confidential.
©2014 Experian Information Solutions, Inc. All rights reserved. Experian Confidential.
1 ©2012 Experian Information Solutions, Inc. All rights reserved. Experian Public. ©2012 Experian Information Solutions, Inc. All rights reserved. Experian.
© Experian Information Solutions, Inc All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
© 2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
1 ©2013 Experian Information Solutions, Inc. All rights reserved. Experian Public ©2013 Experian Information Solutions, Inc. All rights reserved. Experian.
© 2010 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
© Experian Information Solutions, Inc All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
© 2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
1 ©2012 Experian Information Solutions, Inc. All rights reserved. Experian Public. ©2012 Experian Information Solutions, Inc. All rights reserved. Experian.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
© 2011 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
A m e r i c a n A s s o c i a t i o n o f I n s u r a n c e S e r v i c e s 1745 S. Naperville Road, Wheaton, IL Phone: | Toll.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
A m e r i c a n A s s o c i a t i o n o f I n s u r a n c e S e r v i c e s 1745 S. Naperville Road, Wheaton, IL Phone: | Toll.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
Identity Theft Project By: Timmy Townsend And Eric Fields.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
1 ©2016 Experian Limited. All rights reserved. Experian Public. ©2016 Experian Limited. All rights reserved. Experian and the marks used herein are trademarks.
©2013 Experian Limited & BII. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
© 2011 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
© 2009 Experian Limited. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
You’ve Been Hacked! What to do when your personal information has been compromised Paul T. Yoder, Information Systems Security Specialist.
What is ? Launched in 1999 Born in Napa Valley 100% Web-based Customer & order centric All channels, Single database Accessible.
Using Parallelspace TEAM Models to Design and Create Custom Profiles
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Accelerated underwriting
How to Protect Yourself from ID Theft and Social Engineering
IDENTITY Theft Financial Literacy Identity Theft.
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Cyber Issues Facing Medical Practice Managers
Presented (insert date) By (insert organization’s name)
Automation in an XML Authoring Environment
Security Awareness Training: System Owners
Millions of T-Mobile customers exposed in Experian breach
Disaster Recovery as a Service
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
Introduction to K2 Designer
Company Name | Phone Number | Website | Address
Colorado “Protections For Consumer Data Privacy” Law
Schoolnet Data Protection Policies
Anatomy of a Common Cyber Attack
Presentation transcript:

©2015 Experian Information Solutions, Inc. All rights reserved. Experian and the Experian marks used herein are trademarks or registered trademarks of Experian Information Solutions, Inc. Other product and company names mentioned herein are the trademarks of their respective owners. No part of this copyrighted work may be reproduced, modified, or distributed in any form or manner without the prior written permission of Experian. Experian Public. What should organizations tell a consumer after a data breach? Not all approaches provide the best advice

3 ©2015 Experian Information Solutions, Inc. All rights reserved. Experian Public. What happened? We are very sorry to inform you The attack started on May 21, 2014 It included SSN, address, insurance card, Passport Acme was the victim of a sophisticated intrusion We discovered the attack on June 1, 2015 We believe the information that was viewed is limited to This is not a serious event Many companies are effected by these events in our industry

4 ©2015 Experian Information Solutions, Inc. All rights reserved. Experian Public. Why it happened An administrator lost his credentials A non production server was left in production Criminals broke into our offices and had access to servers We had not implemented the new authentication process No mention Forensics is still determining the exact cause(that never comes out) This was a sophisticated attack Recent events have been attributed to terrorist states

5 ©2015 Experian Information Solutions, Inc. All rights reserved. Experian Public. How do I protect myself? It is important to take these steps to protect yourself We encourage you to enroll in 2 years of Protect My ID In addition to enrolling in the FREE services, consumers should Consumers should sign up as soon as possible No action is required at this time If you detect an issue on your own, call XXX-XXXX Consumers have the option of a number of services We are standing by if you need assistance You are automatically enrolled

6 ©2015 Experian Information Solutions, Inc. All rights reserved. Experian Public. Best Practices for ID Theft Protection Credit Report- the average time to detecting a breach is 229 days Fraud Surveillance-looking for your PII on the Dark Web Credit Monitoring-real time alerts for any changes to your file $1M insurance-for out of pocket expenses like wire fraud Customer Service-to answer ANY questions about the incident Fraud Resolution-that help fix EVERY issue no matter what or when

7 ©2015 Experian Information Solutions, Inc. All rights reserved. Experian Public. What advice to give your business leaders Communicate upfront with you(your AG) and ask for a heads up Work with law enforcement Have a pre-breach plan in place BEFORE an event Practice the plan regularly Rely on the experts(Data breach resolution, legal, forensics, PR) State the facts and be transparent to consumers Commit to a specific action plan Execute

8 ©2015 Experian Information Solutions, Inc. All rights reserved. Experian Public.