Russell Grant | DealerVault | Vice President | Vice President, DealerVault Russell Grant Russell Grant | DealerVault | Vice.

Slides:



Advertisements
Similar presentations
Reputation Management: The Internet Doesn’t Forgive and Forget
Advertisements

State of Rhode Island Retirement Website Informational PowerPoint
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
What is identity theft, and how can you protect yourself from it?
Fundraising in a Challenging Economy Did you sign in and take a handout packet? Please turn off your cell phones! Welcome to the Foundation Center’s.
Enter your personal details select the Prepaid customer radio button and click on the submit button.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
Protect Yourself from Your Customer Kristin A. Stedman, AAP Senior Vice President Education Services 1 © 2014 TACHA. All Rights Reserved.
Business Organisation & Environment Stakeholders
CS CS 5150 Software Engineering Lecture 27 People 2.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Turning Ideas Into Businesses George Johnson Extranet for Security Professionals Secure Extranet Portal Services.
Fall 2014 Kate Walker, Vice President for Finance and Treasurer
Network security policy: best practices
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
How To Prepare To Sell Your Business: Steps To Take Now Susan Wissink Fennemore Craig.
NEADS CONFERENCE “Right On” Transition From School to Work Ottawa 2004 Clint Davis Co-Director, Diversity & Workplace Equity BMO Financial Group Stephen.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
© 2003 SHRM SHRM Weekly Online Poll: March 9, 2004 QOTW - Identity Theft Analyzing 340 responses of s sent, 1628 received (response rate = 20.9%).
Presented by Natasha N. Hellerich UCF Associate General Counsel Contracts Workshop 2015.
Scams & Schemes Common Sense Media.
Providing Best Practice Compliance Solutions for Employer Groups.
1 TOUR PACKAGES. 2 Include 2 or more components –Air –Hotel –Transfers –Sightseeing –Meals Can be customized to fit the independent traveler Terms to.
Performance Management  Performance Management Cycle  Organizational Success  Shared Responsibilities  Setting Goals and Expectations.
We deliver. Quality Translations International, Inc. Q.
Executive Compensation After “TARP” Right Management Workshop June 2, 2009 Right Management Workshop June 2, 2009.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
How to get started… Register as a member on the Blue Cross of Idaho Web site at bcidaho.com to have access to WellConnected The registration process is.
NHASFAA Membership. Dues paid annually on July 1 If not paid by September 1 inactivate account Individual members can be swapped out during the year (ie.
Motor Vehicle Auctions. Car Dealership pricing – market forces Demand Curve There is typically only a small price margin that can be negotiated at a dealership.
Unit 1 By Louise Fattizzo. Setting up an account- technical Step 1: Select the type of website that you would like to use: I am using Gmail to show.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Strategic Planning Workshop  Presented by: Jason P Aubee.
Unit 9 Seminar Business Organizations. Things to do this unit: UNIT 9 – Read Chapter 13 and 14 – Respond to the Discussion Board – Attend the Weekly Seminar.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
FCPA Compliance Conducting Due Diligence on Third Parties November 10, 2015 Introductions: Michelle; how we are here, International Trade intersects.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Push Partner Program: Private Sector Helping the Public Sector Push Partner Program: Private Sector Helping the Public Sector August 2010 Robbie Roberts.
Leading firms through the next generation of change™
Applicant sends request for username and password to; Applicant sends request for username and password.
Brad Korner | DealerVault | Vice President of Sales | THE SEVEN “MUST-ASK” QUESTIONS REGARDING YOUR DEALERSHIP’S DATA BRAD.
 Three things are necessary in order for there to be a contract: an offer, acceptance and consideration  Consideration is something promised mutually.
Turning Managers into Coaches Matt Lasco Full Name I Company I Job Title I Matt Lasco I Lasco Ford I Vice President I
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Administrative Cost Savings through Invoice Verification.
UNIT ONE COMPETENCY 5B ANALYZE THE PRACTICES THAT EFFECT EMPLOYER AND EMPLOYEE DECISION MAKING General Resume Format.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
Informal Business Valuation and Business Planning Report NEW and IMPROVED! For financial professional use only. Not for distribution to the public.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Phase II Financial Review Guidance
Full Name I Company I Job Title I Dealer-Vendor Collaboration
COMPUTER PRIVACY.
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
CorVel is the Worker’s Comp Vendor
Red Flags Rule An Introduction County College of Morris
Cybersecurity compliance for attorneys
Five Star Event Planning System
Considerations for Cybersecurity and Data Security in Today’s World
Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang
Smart Cookies – Volunteer Registration
Handling Information Securely
Guidelines for building security policies. Building a successful set of security policies will ensure that your business stands the best possible chance.
Anatomy of a Common Cyber Attack
Presentation transcript:

Russell Grant | DealerVault | Vice President | Vice President, DealerVault Russell Grant Russell Grant | DealerVault | Vice President |

Mitigating Data Risk: 5 Simple Steps

Russell Grant | DealerVault | Vice President | Ask Yourself… If you knew your DMS was going to be attacked tomorrow, would you change the way you did business today? If you would want to change your plan, would you know where to start or where to turn for guidance?

Russell Grant | DealerVault | Vice President | What We Know… Each cyber attack has had immense repercussions and led to world-wide attention being focused upon the issue of data security. Recent national news events emphasize the need for all to take the necessary steps to protect the data they’re responsible for now.

Russell Grant | DealerVault | Vice President | What Would Happen if Your DMS was Hacked? Your dealership DMS contains inventory, sales and service data but may also contain your customers’ birth dates, Social Security numbers, corporate financial statements, employee payroll data, VIN numbers and inventory cost. Do all vendors have access to all of this information? What happens to the reputation and future sales of your dealership if your customers’ private info is compromised from your DMS?

Russell Grant | DealerVault | Vice President | Five Simple Steps… 1. Have an Understanding of Applicable Law Similar to the DOJ and FTC, the reality of private rights of action (lawsuits) demand attention and consideration. Ensure a staff member is up-to-date on all applicable laws.

Russell Grant | DealerVault | Vice President | Five Simple Steps… 2. Have Control Over Who Has Access to Your Data Currently, an innumerable amount of unmonitored vendors have access to dealerships DMS data. Generate a list of all usernames and passwords that grant access to your DMS and verify that all are tied to valid data recipients.

Russell Grant | DealerVault | Vice President | Five Simple Steps… 3. Have Control Over How Your Data is Moved Best practice and NADA recommendations agree that all dealerships should push DMS data to their vendors. Reconsider how you send data to your vendors.

Russell Grant | DealerVault | Vice President | Five Simple Steps… 4. Have Binding Agreements in Place It is best practice for a dealership to have pertinent agreements in place prior to any and all data movement. Confirm that you have a valid contract with each data-receiving vendor and be sure to review all contracts annually.

Russell Grant | DealerVault | Vice President | Five Simple Steps… 5. Have a Fail-Safe No plan can sufficiently address all potential risks and the protection DMS providers, OEMs, and vendors have may lack dealer focus. Discuss your plan with a professional and independent third-party consultant.

Russell Grant | DealerVault | Vice President | Contact Info Full Name: Company: Job Title : Russell Grant DealerVault Vice President