Friday, October 23, 2015. Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.

Slides:



Advertisements
Similar presentations
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Advertisements

Travelers CyberRisk for Insurance Companies
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Protecting Customer Websites and Web Applications Web Application Security.
Securing Information Systems
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
General Awareness Training
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Overview of Cybercrime
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
AUGUST 25, 2015 Cyber Insurance:
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Cyber Security Nevada Businesses Overview June, 2014.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
Security Mindset Lesson Introduction Why is cyber security important?
New EU General Data Protection Regulation Conference 2016 Managing a Data Breach Prevention-Detection-Mitigation By Gerard Joyce Dun Laoghaire Feb 24 th.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Washington State Auditor’s Office Cybersecurity Preparing for the Inevitable Washington State Auditor’s Office Peg Bodin, CISA, Local IS Audit Manager.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Information Security and Privacy in HRIS
Securing Information Systems
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
E&O Risk Management: Meeting the Challenge of Change
Data Compromises: A Tax Practitioners “Nightmare”
Lecture 14: Business Information Systems - ICT Security
Managing a Data Breach Prevention-Detection-Mitigation
Protecting our institutional and your personal data
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Securing Information Systems
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
Threat Landscape for Data Security
Malware, Phishing and Network Policies
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Prepared By : Binay Tiwari
Cybersecurity compliance for attorneys
Ransomware and Data breaches in public libraries
Forensic and Investigative Accounting
Business Compromise and Cyber Threat
Policies and Procedures to Protect you, your Office and your Data
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

Friday, October 23, 2015

Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Kevin Bodell Systems and Infrastructure Manager City Creek Reserve, Inc. Kevin Bodell Systems and Infrastructure Manager City Creek Reserve, Inc. Smart Chick Megan Orser Smart Apartment Solutions Smart Chick Megan Orser Smart Apartment Solutions

TUESDAY, OCTOBER 20, 2015

Mark Stamford, OCCAMSEC

Symantec found that 17 percent of all android apps were actually malware in disguise. Ransomware attacks grew 113 percent in 2014, along with 45 times more crypto-ransomware attacks INTERNET SECURITY THREAT REPORT, Symantec

Small Business A recent infographic by Towergate Insurance said that last year, 97 percent of smaller businesses neglected to prioritize online security improvement for future business growth. VS

It’s not IF, It’s WHEN! It’s not IF, It’s WHEN!

Social Engineering Phishing Hacking Ransomware

A non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures Social engineering is one of the most effective ways to circumvent established security protocol Targets human “vulnerabilities” (helpfulness, fear, insecurity)

10

Building Management Systems Energy Management Systems Emergency Notification Systems Customer Portals Integrated Work Management Systems Poor Password Protection Unmonitored Access Points Rudimentary Software

Midsize Businesses The most common causes were malicious or criminal attacks (44 percent), followed by employee negligence (31 percent) and system glitches (25 percent). The intent of the breach is usually information theft leading to financial gain, rather than so-called hacktivism,

Resident/Employees Files Social Security Number Drivers License Major Credit Cards Credit Report Address History Employment History Business Reputation

Prevent What is the risk? What is your exposure? Prepare What can you do to prepare for the inevitable? What practical approaches can you take to minimize exposure? Respond How do you minimize the impact to business as usual when it does happen? How do you mitigate risk once it’s happened?

Data Classification Level 1Level 2Level 3Level 4 Data that may be freely disclosed with the public. Internal data that is not meant for public disclosure. Sensitive internal data that if disclosed could negatively affect operations. Highly sensitive corporate and customer data that if disclosed could put the organization at financial or legal risk. Example: Contact information, price lists Example: Sales contest rules, organizational charts Example: Contracts with third-party suppliers, employee reviews Example: Employee social security numbers, customer credit card numbers Prevent Prepar e Respo nd

Network & Physical Security Controls Network, Computer, and Access Controls Encryption Anti-Virus/Anti-Spyware Firewall and Internet Connection Prevent Prepare Respond

General Security Controls Visitor Policy Social Engineering Third party network security checks Network and Computer Backups Prevent Prepare Respond

Prevent Prepare Respond

Respond CONSIDER THE NUMBERS Average Organizational Cost of a Data Breach $5.9 million Estimated Cost of a General Data Breach $201 per compromised record Identify source & stabilize Notify impacted parties Be detailed, consistent & diligent with your reporting Review business loss insurance Develop plan to protect the company brand Commence “Customer Loyalty” activities Implement protocols to prevent future breaches Be ready to adjust & adapt quickly as new threats arise Prevent Prepare Respond

New forms of blackmailing & extortion schemes Ransom ware for data theft Smart Machines Smart Offices or Business BMS Systems Increased threats at the power source (public utilities, old/outdated infrastructure, banking systems, financial institutions) Are you and your organization protected ? Prevent Prepare Respond

“Are You Sitting on a Cyber Security Bombshell?”, Joseph Dobrian, JPM Sept/Oct 2015 Before and After Disaster Strikes: Developing An Emergency Procedures Manual, 4th Edition, ©2012 IREM “What You Should Know About Cybersecurity Insurance,” © IREM Blog October 15, 2015