Information Security Jim Cusson, CISSP. Largest Breaches 110,000 2009-11-27 NorthgateArinso, Verity Trustees 6,400 2009-11-25 Aurora St. Luke's Medical.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Protecting Personal Information Guidance for Business.
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Copyright Security-Assessment.com 2006 Protecting The Data Data security, compliance, disclosure requirements and what can happen if you get it wrong Presented.
Ch.5 It Security, Crime, Compliance, and Continuity
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Why Comply with PCI Security Standards?
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Desktop 1 Owning the Desktop: Is.edu like.com? Scott Bradner Harvard University University Technology Security Officer 28 June 2006.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
PCI requirements in business language What can happen with the cardholder data?
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Topic 5: Basic Security.
Get Safe Online Expert advice for everyone In association with.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Identity Theft How it happens and how to avoid it.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Computer Security By Duncan Hall.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Protecting Yourself from Fraud including Identity Theft Personal Finance.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Risky Business Week Protecting Your Identity: What to Know, What to Do Legal Division CSAA Insurance Group, a AAA Insurer.
Protecting Your Identity:
Tax Identity Theft Presenter Date
When you get caught for Identity Theft
Chapter 3: IRS and FTC Data Security Rules
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Protecting Your Identity:
Protecting Your Identity
Protecting Your Credit Identity
Presentation transcript:

Information Security Jim Cusson, CISSP

Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical Center 1,500, Health Net 80, Universal American Insurance Recent Breaches 130,000, Heartland Payment Systems 94,000, TJX Companies Inc. 90,000, TRW, Sears Roebuck 76,000, National Archives and Records Administration

Cost of a Breach 40,000, CardSystems, Visa, MasterCard, American Express 30,000, America Online 26,500, U.S. Department of Veterans Affairs 25,000, HM Revenue and Customs, TNT 17,000, T-Mobile, Deutsche Telekom 16,000, Canada Revenue Agency Largest Breaches In its study of 43 companies that suffered a data breach last year, the Ponemon Institute found the cost per compromised record in 2008 to be $202 per record

Actual Costs Legal, Credit Monitoring, Reputation, Mailings, Stock Price, etc The security breach at TJX Companies Inc. could cost the company $100 per lost record, or a total of $4.5 billion Heartland Breach Cost Company $32 Million So Far (August 2009) According to the Ponemon Institute's study, the Heartland breach will likely be more costly than the theft of data from TJX In $6.6 million per incident Costs include the costs of detecting and responding to the loss of data, along with legal and administrative expenses, customer defections and opportunity loss

Identity Theft As of November 24, 2009 the total number of breaches reported by the ITRC (Identity Theft Resource Center) is 444 The taking of the victim’s identity to obtain credit, credit cards from banks and retailers, steal money from the victim’s existing accounts, apply for loans, establish accounts with utility companies, rent an apartment, file bankruptcy or obtain a job using the victim’s name Identity theft is "an absolute epidemic”. Increased in the last four or five years. It is nationwide. Affects everybody You can't detect it until it's probably too late.

Types Of Breaches Document Disposal – Paper documents improperly disposed Stolen Laptops – Laptop stolen and info retrieved from hard drive Virus – Malicious software, key loggers, etc send info off site Web – Vulnerability in web server exploited Lost Disk Drive – Lost/sold hard drive accessed to retrieve data Hack – Password guessed, system hacked Fraud – Social Engineering, people duped into giving bank accounts Lost Backup Tape – Backup tapes lost/stolen, accessed to retrieve data Internal – Trusted employees steal data and sell it

What Is Information Security Information security is the process of protecting information. It protects its confidentiality, integrity and availability. Confidentiality – Ensuring data is accessed only by those who should Integrity – Ensuring data is not modified Availability – Ensuring data is accessible

How To Secure Information Network Design Access Control Firewalls Intrusion Detection/Protection Systems Anti-Virus Backups Disaster Recovery/Business Continuity

Challenges Cost – Protection is expensive Compliance – GLBA, HIPPA, PCI, SOX Proving Effectiveness – How to show they’re getting value

Communication! Communication is huge! Project Teams – Most members don’t know security Management – Often aren’t technical Enforcement – How to tell someone “it’s not secure” Policy – Writing for end users, enforcement