858-848-5776.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Career Research Family Economics and Financial Education Take Charge of Your Finances.
Emerging Global Careers
2010 Region II Conference Corporate Compliance Panel June 3, 2010
Jobs For Montana’s Graduates Jobs for Montana's Graduates A5L1PP1.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
About RESNA: RESNA, the Rehabilitation Engineering & Assistive Technology Society of North America, is the premier professional organization dedicated.
Cyber Security Finance Forum 2012 Michael DuBose Managing Director & Practice Leader Cyber Investigations.
Contact Center Security Strategies Karl Walder Director - Solutions Noble Systems.
CCDBG Office Hours Learning Forum Generations United, Washington, D.C.© 2013 Child Care Aware ® of America.
Career Education and Training Family Economics and Financial Education Take Charge of Your Finances.
VOICES OF EXPERIENCE WHERE THE GOAL IS EXCELLENCE 1.
Lockton Insurance for NEPIC Members. Agenda  Overview and background  Who is behind the scheme?  Benefits – getting a better deal  Case Study  Gaining.
Cyber Security in Local Government. One of the Industry’s Most Widely Recognized and Highly Accredited Partners 1.
Putting a value on corporate health insurance: getting your client’s attention Hosted by Chris Rolland, Director, Legal & General Healthcare This is not.
Multi-country Workshop on Developing Systems
Chipotle Mexican Grill: external environment
New A.M. Best Cyber Questionnaire
The Red Cross Ready Rating ™ Program The time to prepare is now.
Career Research. STANDARD: 2. Write informative/explanatory texts to examine and convey complex ideas, concepts, and information clearly and accurately.
Please feel free to use this template, your school’s template, or create one for your Chapter!
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Conflict B Sacha worked as a journalist before she became a social worker. She still writes articles for a human interest magazine. She finds that she.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Unit 5 Tertiary Activity Chapter 14 (text). Introduction Tertiary Activity: Involves service industries which provide services for people. People “serving”
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
Using This Presentation UE encourages you to share content from Risk Research Bulletin with others on your campus who you believe will benefit from it.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Cybersecurity as a Business Differentiator
SHRM Poll: Green Jobs—Are They Here Yet?
Hospital Indemnity / Health Risk Management
Office 365 Security Assessment Workshop
Identity Theft Presentation
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Family Economics and Financial Education Take Charge of Your Finances
GDPR Awareness and Training Workshop
Health Information Security and Privacy Collaborative (HISPC) Overview
Best Dental CPA Services
[Insert University or Organization’s Name]
The leading commercial real estate professionals
Data Privacy: Essentials for Payroll
Choose Right CPA for Doctors
Hassle-free Medical Practice Accounting
HSM 541 RANK Education Your Life - hsm541rank.com.
HSM 541 RANK Education for Service-- hsm541rank.com.
Family Economics and Financial Education Take Charge of Your Finances
Tertiary Activity Chapter 14 (text)
SMB practice development: Security play
Case Study National Electronics Company
PGE Chris Nolke, Director of Cybersecurity
SMB practice development: Security play
Welcome to International SOS
Impact and Solution of an Aging Society
Welcome!.
Cyber Security Culture
CONTINUAL COMPLIANCE Abyde. HIPAA SOFTWARE WE DEVELOPED THE ABYDE SOFTWARE SOLUTION BECAUSE WE FEEL AS THOUGH DOCTORS AND STAFF ARE MOST EFFECTIVE WHEN.
Health Service Professionals:
Michael J. Bridwell John F. Kuckelman
Deloitte & Touche November 2018.
GMDCLOUD Integrated Digital Health
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE
Agenda Macro-Industry Trends Industry Technology Trends
CALIFORNIA TIME AND LABOR COMPANY ENGAGEMENT
Professional Services END TO END NETWORK SECURITY SOLUTION
Employee Cybersecurity Program
Gaspar Insurance Services is a full-service insurance agency specializing in protecting individuals and businesses of all sizes. Headquartered in Woodland.
WELCOME TO MELSAFE. Internal Audit Australia  Melsafe is represented best Internal Audit in Australia. Our group gives topic ability and industry bits.
AS90844: EXternal pressures on A Large Business
Presentation transcript:

858-848-5776

Background Information 858-848-5776 Background Information Experience Founded/Owned GSWS since 1994 Locally owned and operated 300 Clients, Across 12 States and 3 Countries HIPAA Certified Technicians Certified Product Specialists & Trainers A+ rating with BBB, SD Chamber members, 5 Star w/ Yelp, Sponsors of SD Optometric Society, etc. Primary Areas of Focus/Service Small Businesses/Organizations Security & Compliance Managed I.T., Cloud Hosting, Web Development

Current Information Overview 858-848-5776 GSWS was bought by SSO on July 1, 2018 I am now Director of Engineering for SSO Work with Rusty & Sam Sailors Immediately grown to support clients from both organizations Primary focus on Secured IT to small and mid-size organizations Primary Areas of Focus/Service SMSP (IT) MSSP (Security) SMRT (IoT) SSOWS (Web Services)

858-848-5776 Topic of Discussion For many of us, it’s our professional responsibility to protect and secure company and client data. But what happens when we leave the office and become the customer, becoming dependent on how others manage OUR personal data? Let’s take a look at the landscape of businesses within San Diego, to better understand what this means – and how it Impacts us. NEXT: Let’s take a look at data on San Diego’s small businesses landscape.

Business Sizes in the San Diego Metro Area 858-848-5776 Business Sizes in the San Diego Metro Area Overview 3,337,685 estimated population 1,590,800 workers considered part of labor force 77,326 businesses had at least 1 employee 242,035 businesses had no paid employees 57% of businesses have just 1 to 4 workers 48% considered part of services industry (business support, tourism, health care, etc.) NEXT: Let’s look at some specific data small businesses have shared on their cyber security challenges https://www.voiceofsandiego.org/business/san-diego-businesses-by-the-numbers/

State of Cybersecurity Among Small Business in North America 858-848-5776 State of Cybersecurity Among Small Business in North America https://www.bbb.org/globalassets/shared/media/state-of-cybersecurity/updates/cybersecurity_final-lowres.pdf

State of Cybersecurity Among Small Business in North America 858-848-5776 State of Cybersecurity Among Small Business in North America NEXT: Let’s take a look at some specific industries we rely on, that fall into these categories. https://www.bbb.org/globalassets/shared/media/state-of-cybersecurity/updates/cybersecurity_final-lowres.pdf

Who Are We Sharing Our Private Data With? 858-848-5776 Who Are We Sharing Our Private Data With? Some of the more common industries and professions Medical: Dentists, Doctors, Optometrists, Physical Therapists, Chiropractors, … Legal: Attorneys, Paralegals, Mediators, ... Financial: CPA’s, Bookkeepers, Financial Advisors, … Real Estate: Realtors, Inspectors, Lenders, … NEXT: Let’s take a look at what we can do to make a difference

What Can We Do To Make a Difference? 858-848-5776 What Can We Do To Make a Difference? Be Engaged Approach the situation with a positive tone Let them know you ask, because you care Ask questions: Have they ever experienced a breach? What have they done to securely manage data? What is the plan, were a breach to occur? All of this will tell you what processes, policies and procedures they have implemented. From there, you can know how safe you feel about being their customer. Offer Advice and Solutions We seek out these professionals because they are good at what they do. So are you. Take a minute to help them help themselves. Heck, refer them to us 

Additional Resources Data Resources Educational Resources 858-848-5776 San Diego Businesses, By the Numbers https://www.voiceofsandiego.org/business/san-diego-businesses-by-the-numbers/ 2018 Data Breach Investigations Report https://www.verizonenterprise.com/resources/reports/rp_DBIR_2018_Report_en_xg.pdf 2017 State of Cyber Security Among Small Businesses In North America https://www.bbb.org/globalassets/shared/media/state-of-cybersecurity/updates/cybersecurity_final-lowres.pdf Educational Resources We Live Security https://www.welivesecurity.com ESET Free GDPR Compliance Check https://encryption.eset.com/int/gdpr-compliance/#compliance California Consumer Privacy Act https://www.csoonline.com/article/3292578/privacy/california-consumer-privacy-act-what-you-need-to-know-to-be-compliant.html https://leginfo.legislature.ca.gov/faces/billVotesClient.xhtml?bill_id=201720180AB375

858-848-5776 Thank You Please reach out with any questions.