Information Security in 2015 What to Expect Presented by: Noor Aarohi Senior Risk and Compliance Analyst GW Division of Information Technology 1.

Slides:



Advertisements
Similar presentations
October 28, Who? What? When? Why? Comply with PCI compliance policies set forth by industry Create internal policies and procedures to protect.
Advertisements

1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Data Security Laws and the Rising Cybersecurity Debate
© 2004 Property Casualty Insurers Association of America The Alphabet of Federal Legislation Kathleen Jensen Property and Casualty Insurers Association.
Surviving a Privacy Exam Barbara B. Fitch 2 nd VP–Market Conduct & Compliance National Life Insurance Company October 3, 2005.
Visa Confidential1 Card Regulation; Pricing and Security Paul Russinoff State Government Relations.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Dino Tsibouris (614) Information Security – What’s New In the Law?
Developing a Records & Information Retention & Disposition Program:
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
EMV’s Impact on U.S. Retailers – It’s Coming! Presented by: Chris Francis VP, Market Development February 21, 2014.
Emerging Technologies
Travillon Consultants
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
De Nederlandsche Bank Eurosysteem Card Payments and Internet Banking Thijs Kettenis 2nd Conference of the Macedonian Financial Sector on Payments and Securities.
Electronic Payment Systems
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
Write True or False for the following questions #1-20
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Healthcare Reform Update HAMA Fall Meeting October 6, 2010.
Group 06-From Lecture 06 Member 02 Presented by: Xu Wei iTunes B2C SUCCESS STORY&CONTROVERSIAL ISSUES.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
1 Healthcare Privacy and Security: Concepts and Challenges Dixie B. Baker, Ph.D. Chair, HIMSS Privacy and Security Advocacy Task Force.
Contact Center Security Strategies Karl Walder Director - Solutions Noble Systems.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
Florida Information Protection Act of 2014 (FIPA).
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Agenda EMV – What Is It? EMV In The UK EMV Is Coming To The US
Information Security 101 Five things you should learn to protect your data and privacy February 26/27, 2014.
Patient Portal Friday, September 16, 2011 Larry Bradley Director, Patient Financial Services.
Vendor Relations Policy. Why Is There A Policy? The Patient Protection and Affordable Care Act was signed into law March 23, The new law contains.
Data Security in a Mobile World Emmitt Wells – Getronics.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
HEALTH POLICY – A PRIMER. WHAT IS POLICY? A PLAN OR COURSE OF ACTION DESIGNED TO DEFINE ISSUES, INFLUENCE DECISION-MAKING, AND PROMOTE BROAD COMMUNITY.
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
FERPA AND HIPAA COMPLIANCE AS COMMUNITY PARTNERS Written and presented by Nicole M. Thompson School Board Attorney, School Board of the City of Richmond.
SMARTER. TOGETHER. The Mobility of Fraud Michael Loox, CFI Director of Loss Prevention & Safety Coffee Bean and Tea Leaf David Johnston.
Ready for the Turn 2009 Boston Financial Client Forum What Can We Expect in a New Regulatory Environment?
Data Security and Privacy Overview and Update Peter Moldave October 28, 2015.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Chapter 4: Laws, Regulations, and Compliance
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Fall  Comply with PCI compliance policies set forth by industry  Create internal policies and procedures to protect cardholder data  Inform and.
AND CE-Prof, Inc. January 28, 2011 The Greater Chicago Dental Academy 1 Copyright CE-Prof, Inc
Protecting the Public Trust Cyber Liability and Data Compromise; The New Risk Management Frontier Steve Spilde, Chief Executive Officer Brennan Quintus,
Laws and Regulations. Family Educational Rights and Privacy Act Children’s Online Privacy Protection Act Protection of Pupil Rights Amendment Health Insurance.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.
Incident Response Comes of Age
Take Charge of your Finances
The Pennsylvania State University
Student Data Privacy and Security
Director, Regulation and Strategy
Regulatory Compliance
Take Charge of your Finances
CYBER SECURITY MARKET Global Cyber Security Market, Size, Share, Market Intelligence, Company Profiles, Market Trends, Strategy, Analysis, Forecast
Privacy & Access to Information
DATA BREACHES & PRIVACY Christine M
Lesson 1: Introduction to HIPAA
Student Privacy in the age of big data
Take Charge of your Finances
Student Data Privacy: National Trends and Wyoming’s Role
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Information Security in 2015 What to Expect Presented by: Noor Aarohi Senior Risk and Compliance Analyst GW Division of Information Technology 1

Agenda What to expect Impact ‘Preparation’ versus ‘Vigilance’ - will you be prepared for the changes or will you wait for the changes to occur and then deal with them? Resources 2

What to expect 2014 fallout Payment Card Industry Healthcare Student Data 2015 Trends to Come 3

2014 fallout 2014 was a landmark year for data security issues Massive (quantity and scope) security breaches - Retailers, White House, Sony (direct impact on use of technology, decision-making related to entertainment, financial impact to P&L, consumer disengagement continues)Massive (quantity and scope) security breaches 4

Payment card industry Move to EMV (Europay Mastercard Visa) a.k.a. ‘Chip & PIN’ Liability shift Faster adoption of mobile based transaction terminals - Apple Pay Point to Point Encryption (P2PE) 5

Healthcare Use of mobile health apps and devices Privacy versus convenience - convenience appears to be winning Healthcare costs bubble burst - (or close to) Push for research and innovation - more data to protect Customized care management and marketing strategies 6

Student Data – Laws & Regulations FERPA ( Federal Education Records Privacy Act) prohibits federal funding of an educational agency or institution that has a policy or practice of disclosing a student’s “education record” without the consent of the parent or eligible student. 7

Student Data – Laws & Regulations State breach notification laws Forty-seven states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring private or government entities to notify individuals of security breaches of information involving personally identifiable information. 8

Student Data – Laws & Regulations PPRA (Protection of Pupil Rights) affords certain rights to parents of minor students with regard to surveys that ask questions of a personal nature. 9

Student Data : New & proposed laws Sep 2014 California : Student Online Personal Information Protection Act (SOPIPA): aggressively protects the use of student educational data by third-party vendors. Jan 2015 : Proposed Student Digital Privacy Act 10

National look at Student Privacy Legislations GW Information Security Policy Information Security Policy Guidance – Data Storage and Custodial PracticesInformation Security Policy Guidance – Data Storage and Custodial Practices Security Breaches Involving Non-Public Personal InformationSecurity Breaches Involving Non-Public Personal Information 11 Reference and Resources

Expected Trends in 2015 Changes to terms and conditions of contracts related to online accounts Concept of sharing/unsharing data rather than ing Embedded file protection; expect that endpoints are not to be trusted Disposable endpoints Emphasis on data archival and disposition - if a file is not accessed or used for ‘x’ years, it should be encrypted and then archived (if not disposed). 12

Expected Trends in 2015 (continued) Social media - continues to be an influencer, avenue of communication and threat to privacy Federal data - more strict rules to access data Two-factor authentication - increasing use More state sponsored and political motivated hacks 13

Privacy – know your options 14

Privacy As of today is largely unprotected Regulations are weak and less proactive Rules are not standardized across geopolitical boundaries Your information translates to money Nothing is free. So, apply conscious subscriptions 15

Privacy - How to fix things Stronger legislations Standardized rules Privacy incorporated into software engineering and services You’d be millionaire right now, if you could bill anytime a company used your information to sell you something 16

Interesting Resources botnet-map/ breaches-hacks/ 17

Contact : Questions? 18