1 Combatting Breach Fatigue Presented to MidSouth Users Group October 2015.

Slides:



Advertisements
Similar presentations
Kaiser Family Foundation December 7, 2007 Views about the Quality of Long-Term Care Services in the United States.
Advertisements

Facebook in the public sector Getting senior management buy-in Darren Caveney I 14 March 2012.
My Favorite Love Poems By: Sookie.
Gallup Q12 Definitions Notes to Managers
All data from the 12 th Annual MetLife U.S. Employee Benefit Trends Study unless otherwise noted Metropolitan Life Insurance Company, NY, NY L [exp0715][All.
Buckeye Community Hope Foundation All Schools Meeting Sept. 19, 2014 Presented by: Catherine West.
STATISTICS. SOME BASIC STATISTICS MEAN (AVERAGE) – Add all of the data together and divide by the number of elements within that set of data. MEDIAN –
HOW TO LEAD BY EXAMPLE IF YOU CAN’T LEAD YOURSELF, YOU CANNOT LEAD OTHERS.
©2009 Justin C. Klein Keane PHP Code Auditing Session 6 Auditing Strategies & Demonstration Justin C. Klein Keane
BALANCE & Keys to a successful year! TIME MANAGEMENT 101.
Implementing Security Education, Training, and Awareness Programs
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Providing Stellar Service Sally Schmall, MSW, SPHR Organizational Development Manager.
purposes: scientific, business, diploma
Words of Wisdom from the exiting 239 students Spring 2008 to the entering 139 students Fall 2008.
How to Set-up Your Local Listing. Welcome This tutorial will take you through the steps to set-up (or edit) your Local listing to ensure you get the most.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Password Management Strategies for Online Accounts Shirley Gaw, Edward W. Felten Princeton University.
Assumed Trust What It Is, How to Keep and Build It and Why Your Organization Won’t Survive Without It Presenter: Andrew Sanderbeck.
Successfully Conducting Employee Performance Appraisals Wendy L. McCoy Director HR & Benefits Florida Conference of The United Methodist Church.
HIPAA Security A Quantitative and Qualitative Risk Assessment Rosemary B. Abell Director, National Healthcare Vertical Keane, Inc. HIPAA Summit VII September.
B BB Billing Solutions Proven Strategies, Higher RevenuesProven Strategies, Higher Revenues.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Find Your Calm & Enjoy Life Now. Partnership Manager at Blackcard Books Author of Power of Pets.
Planning a Communication Strategy Pat Melgares, Marketing Coordinator K-State Research and Extension Kansas State University Department of Communications.
Department of Commerce & Consumer Affairs Business Registration Division Office of the Securities Commissioner Investor Education Program.
COLD READING UNIT. WHAT DO YOU THINK ABOUT WHEN YOU HEAR “COLD READING?”
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
New Life. I N S T R U C T I O N S F O R L I F E 1.Take into account that great love and great achievements involve great risk 2.When you lose, don't lose.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Implementation of Insurance Core Principles and FSAP Evaluations The Portuguese FSAP experience Gabriel Bernardino Instituto de Seguros de Portugal.
Time Management By Josh Bregar Intro To Career Education - CRED-CE Mohawk College.
Welcome to AB140 Introduction to Management Unit 3 Seminar – Planning.
Devon LMC workshop Kai Winterbottom, Group Manager, Good Practice Jonathan Kay, Lead Auditor, Good Practice Maria Dominey, Team Manager, Good Practice.
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
Implementing Security Education, Training, and Awareness Programs By: Joseph Flynn.
Presentation to Leadership Forum Change Leadership and Management David Keenan Chief Executive Officer SDRC.
Domestic abuse It is never OK. By the end of the lesson you will… Know …what domestic abuse is Understand …why it is unacceptable Be able to …avoid abusive.
Build an Enterprise IT Security Training Program
[Internal Use] for Check Point employees​
Market Surveillance of Conformity Marks
Multi Rater Feedback Surveys FAQs for Participants
Multi Rater Feedback Surveys FAQs for Participants
What YOU Need to Know About Risk Management
Cybersecurity Awareness
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Strong Security for Your Weak Link:
Week ___ ✓ Team Member Category Task Donor Engagement
Network Security Best Practices
Supporters Timeline Week ___ ✓ Team Member Category Task Donors Board
Supporters Timeline Week ___ ✓ Team Member Category Task Donors Board
Supporters Timeline Week ___ ✓ Team Member Category Task Donors Board
Week ___ ✓ Team Member Category Task Donor Engagement
Week ___ ✓ Team Member Category Task Donor Engagement
Week ___ ✓ Team Member Category Task Donor Engagement
Supporters Timeline Week ___ ✓ Team Member Category Task Donors Board
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
Week ___ ✓ Team Member Category Task Donor Engagement
Week ___ ✓ Team Member Category Task Donor Engagement
Supporters Timeline Week ___ ✓ Team Member Category Task Donors Board
Employee Cybersecurity Program
Employee Cybersecurity Program
Week ___ ✓ Team Member Category Task Donor Engagement
Week ___ ✓ Team Member Category Task Donor Engagement
Supporters Timeline Week ___ ✓ Team Member Category Task Donors Board
Week ___ ✓ Team Member Category Task Donor Engagement
Values Based Goals Values-Based Goals: (45-50 minutes)
Disaster Recovery Planning Process
Supporters Timeline Week ___ ✓ Team Member Category Task Donors Board
What YOU Need to Know About Risk Management
Presentation transcript:

1 Combatting Breach Fatigue Presented to MidSouth Users Group October 2015

2 The Problem at Home 63%* of all Americans say in the past year, they or someone in their immediate household received at least one message that their confidential information had been exposed in a data breach. Americans know its no longer a matter of “if” their information is compromised, but rather “when”. *US News Report; November 2014

3 The Problem at Work Information Overload 5029 data breaches were reported from * Banking/Financial sector increased to 13.8% of reported breaches in 2014* had an AVERAGE of 15 data breaches a week* New Regulations addressing Cybersecurity are CONSTANT *Verizon Security Report 2015

4 The Result Simply explained: the more breaches you are exposed to about without experiencing a direct and tangible financial consequence, the less likely you are to care or worry about the next breach, or the next one, or the one after that, to the point that data breaches won’t even be news anymore. That can result in a HUGE risk for all involved. Lorem Ipsum has two main statistical methodologies are used in data analysis which summarizes data. Recent Large Data Breaches Updated 10/2015

Give 1-2 tactical steps to take after a reported breach that your people can take to secure themselves from being a victim of a similar attack. Give Tactical Steps When a breach is publically reported, let your people know what category it is. Don’t let the news channels set the tone. Raise Awareness of Severity Like hurricane’s, breaches should fall into ranked categories. Try a 1-5 scale. Categorize Breaches Give constant reminders of information security best practices. It’s the small things that really matter. Publically catch them doing good! Reinforce the Basics 04 Combatting Breach Fatigue – Customers, Employees and the Board

6 Combatting Breach Fatigue – Information Technology Understand the cause and type of breaches, so your effort can focus where the greatest threats are. Make sure your staff knows what is affecting banks!breaches 1 Use checklists to ensure you have the basics covered consistently. It’s easy to forget things that aren’t on fire.checklists Participate in Users Groups and Peer Groups. Don’t just show up, but get involved. It helps to know you’re not alone in the battle. When completing the FFIEC Cybersecurity Self- Assessment tool, start with the Baselines first. Don’t try and tackle everything from the get-go.Baselines Remember the categorization. Not all breaches (or regulations!) are a category 5, no matter how loud someone yells Start where you are. If you wait for everything to be perfect, you’ll never begin. Taking one step is progress.

7 Causes of Breaches

8 Questions? Beth Fox