Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan.

Slides:



Advertisements
Similar presentations
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Advertisements

Travelers CyberRisk for Insurance Companies
Freshfields Bruckhaus Deringer LLP Global investigations What to advise your board Marius Berenbrok Edward Braham Matthew Herman Melissa Thomas 29 February.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
1 TOP TEN LEGAL OVERSIGHTS THAT CAN SHUT DOWN YOUR WEBSITE © 2007 Brett J. Trout
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Recent Trends and Insurance Considerations March 2015
Password District Data Breach Exercise [District Name] [Date] [Logo]
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
© Copyright 2012 Pearson Education. All Rights Reserved. Chapter 10 Fraud & Internal Control ACCOUNTING INFORMATION SYSTEMS The Crossroads of Accounting.
New Data Regulation Law 201 CMR TJX Video.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Business Continuity from an Insurance Perspective Presented by Jim Carter Manager, Risk & Insurance.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © 2014 CUNA Mutual Group, All Rights Reserved. Understanding Cyber Insurance.
AUGUST 25, 2015 Cyber Insurance:
Security considerations for mobile devices in GoRTT
Georgia Department of Human Services Division of Aging Services (DAS): Data Breach Presenter:Harold Johnson Acting General Counsel Presentation to: Board.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
Eleventh National HIPAA Summit 5.04 Security Incident Response – What to do if a breach occurs and how to mitigate damages Chris Apgar, CISSP.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
The Internet of Things and Consumer Protection
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Cyber Security Management Lesson Introduction ●Understand organizational context for cyber security ●Understand the people, process and technology dimensions.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
New A.M. Best Cyber Questionnaire
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Security Mindset Lesson Introduction Why is cyber security important?
Compliance, Defensibility & Usability of Information on a Global Stage Monday, October 19, :00 – 10:30 AM Global Legal Issues 1.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
What is Travel Risk Management?
The PL&B Insurance Solution Risk Counselling EPL Education Service Review Safety Wellness Return to Work Legal Compliance Continuity Planning Cyber Liability.
NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Law Firm LLP | Cyber Insurance | July 16th, 2014 Page 1 Cyber Exposure Landscape "The single biggest threat still is people inadvertently bringing down.
© Grant Thornton LLP. All rights reserved. Johnny Lee Managing Director Forensic, Investigative and Dispute Services Skip Westfall Managing Director, Forensic.
2015 TCPA WASHINGTON SUMMIT | SEPT. 27TH-29TH | WASHINGTON DC The Anatomy of a Breach Phillip Naples, Pritchard & Jerden, Inc. Jeremy Henley, ID Experts.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Risk Management and Insurance
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
TOP 5 CYBERSECURITY ISSUES CFOS NEED TO KNOW IN A CONNECTED, MOBILE WORLD BRAD FRAZER | PRESENTED ON 06/08/16.
Cyber Insurance Risk Transfer Alternatives
Law Firm Data Security: What In-house Counsel Need to Know
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
New A.M. Best Cyber Questionnaire
Cybersecurity - What’s Next? June 2017
Managing a Cyber Event Steven P. Gibson President
PENNSYLVANIA BAR ASSOCIATION PROFESSIONAL LIABILITY COMMITTEE
Cyber Incident Response When You Didn’t Have a Plan
Forensics Week 11.
Chapter 3: IRS and FTC Data Security Rules
Information Security: Risk Management or Business Enablement?
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Andy Hall – Cyber & Tech INSURANCE Specialist
Network Security Best Practices
By Joseph Carnevale, CIP Partner & Director of Sales
Keeping your data, money & reputation safe
Neil Kirton and Zoë Newman
Microsoft Data Insights Summit
Anatomy of a Common Cyber Attack
Presentation transcript:

Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan

2 Agenda Security Hack 2FA Security Concerns Case Studies Security Process Security Preparation Examples Prevention Recent Breaches Costs of a Breach Cyber Insurance

3 Security Hack Security Demo

2FA – what is it and why you should use it everywhere you can

5 Security Concerns Broad security concerns for businesses For remote users For home users For firms that hold client data (legal implications) In an Information Age, Information is Power How much is your info worth to hackers? A LOT! Info is saved, stored, and flows freely Mobility BYOD Some employees have a tendency to be careless – it takes only one!

6 Case Studies Law firm and insurance company Security issues Risk? TJX, Home Depot, Target, JP Morgan, Anthem Vermont Country Store, other smaller companies HIPAA

7 Security is a Process of Prevention Security is an ongoing process and there is no such thing as being completely secure!!! The criminals work at this all day, every day, and so must your security team. You must have a team working together to enforce security and comprised of….. Management Legal Communications IT/Security

What can small/mid-size businesses do specifically to reduce their risk of exposure to a security breach? Manage IT from a security standpoint Behavior modification – passwords, remote logins, training Ongoing monitoring, Two-factor authentication, employment policies Distrust & Caution are the Parents of Security (Ben Franklin) Security protocols, Vigilance, etc….

9 Security Preparation 30% of small business get hacked each year - of them, 60% close within in a year

Security Preparation (2) Take a proactive approach Have a written plan in place on how to protect before, during, and after an attempt to breach Developed by your IT, Security and Legal teams Put a C-level person on it Risk management Shift risk (& make yourself a good risk – see yourself through the lens of an insurer) Cycle, Prevent, Detect, Respond, Recover

Elements of a Plan Treat company information like the crown jewels Understand what you have, why/how you store & secure it, why you keep it. You cannot lose data you don’t have. Risk cannot be managed after a breach occurs when panic and confusion have set in. Calm communication of facts shows a company in control of itself, its systems, and the story.

12 Cyber Insurance Cyber insurance Policy for the business Policy for client data Coverage? Are all policies the same? Expense? Directors & Officers? Class actions? Is there a standard of care for negligence? All are good questions – get your insurance broker involved and ask the questions !!

13 Examples How small business data get hacked What has been seen out in the field and how was it handled. Law Firm Manufacturer Entertainment Company Start up

14 Recent Breaches Why are large companies like Target and Home Depot breached? What could have been done better? What lessons we take from those events that can be implemented for any business, of any size? Board of Directors, Corporate Officers How much and when to disclose/notify Penalties vs. harm to the corporate image

15 Costs of a Breach IT Costs Investigation Remediation Business Interruption Recovery & Prevention Management & P R Costs Notification (Regulatory Compliance) of Affected Parties External Communications (P R)/Loss of Reputation/Share Price Legal advise & counseling Legal Team Litigation Costs (Defense and Indemnity), Class Actions The Forensic point of view – if data needs to be analyzed as to who did what, when, how

16 Top 10 Breaches (that were published as of October 2014)

Thank You! Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan