Presentation is loading. Please wait.

Presentation is loading. Please wait.

A PM’s Guide to Surviving A Data Breach. Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster.

Similar presentations


Presentation on theme: "A PM’s Guide to Surviving A Data Breach. Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster."— Presentation transcript:

1 A PM’s Guide to Surviving A Data Breach

2 Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster Recovery Electronic Litigation Support and Forensic Recovery Penetration Testing Business Continuity Planning Network Architecture Design Crisis Communications Insurance and Liability Planning We Are Cyber Risk Managers

3 The first rule of survival: Don’t Cross the Street Blindfolded

4 In cyberspace, you have to be right 100% of the time. A hacker only has to be right ONCE.

5 How does it happen? User Credentials Phishing User Errors Malware Misuse Unpatched Systems Web App Attacks

6 Companies spend money on the wrong things.

7 2% of Revenue $112 Billion How much businesses* spend on physical security Global losses to physical theft**: $300 Billion How much businesses spend on cybersecurity Global losses to cyber attacks**:.4% of Revenue * $10M - $100M in revenue (Bloomberg) ** 2013 (Ponemon Institute)

8 Consider… US credit card fraud in 2013 equaled $7.1B The entire rest of the world totaled $6.8B 71% of cyber attacks happen to businesses with less than 100 employees The forecasted average loss for a breach of 1,000 records is between $52,000 and $87,000 60% of SMB that experience a data breach are out of business within 6 months Extremely effective hacking tools are cheap or free and are easy to obtain and use Social engineering and employee error are common causes of a breach, followed by application vulnerability

9 Technology does not equal security...

10 Defense-In-Depth: Technology 99% of exploited vulnerabilities had an available patch More than half of vulnerabilities have an exploit available within 30 days 70-90% of malware is unique to an organization

11 …neither does compliance.

12

13 We trade convenience for security every day.

14 Commonly Stolen: Personal Information Credit Information Medical Records Intellectual Property Customer/Partner Data Network Credentials Email Addresses/Passwords Convenient: Online Banking E-Commerce Medical Portals Cloud Storage/Access Anywhere Vendor Access Remote Management Single Sign-On Across Platforms

15 The second rule of survival: Diamonds vs. Toothbrush

16 Risk Mitigation: Pre-Planning Identify critical information and map it Determine data retention requirements Know compliance and legal requirements Identify vendors Conduct a risk analysis Determine your threshold Identify gaps

17 What’s Most Important? Banking Credentials Banking Credentials Cloud Storage Cloud Storage Vendor Access Vendor Access Remote Management Remote Management Employee PII Employee PII Credit Information Credit Information Medical Records Medical Records Social Media Presence Social Media Presence Intellectual Property Customer Data Supply Chain Data Network Credentials Email Addresses Legal Data Financial Records Payroll and Accounting Data

18 The third rule of survival: Don’t Go to Costco the Day of the Storm

19 Risk Mitigation: Response Breach response begins before a breach IR planning is critical Know your networks and devices Train employees to recognize and respond Success is measured in hours

20 Risk Mitigation: Response Your team: Legal Counsel Network and Security Administrators Insurance Agents PR/Crisis Communications Forensics and Recovery Decision Makers (CIO, COO, CEO) HR Breach Resolution Service

21 Risk Mitigation: Compliance Guidelines and standards for protecting critical information Most standards allow flexibility based on risk Prioritizes spending and drives response criteria May require technology solutions Best defense against fines, fees, litigation Compliance does NOT make a company bulletproof

22 Risk Mitigation: Insurance The policy must meet the needs of the business Forensics, legal, PR, notification and lost revenue are all insurable events with the right policy More information is better when calculating need Watch for exclusions Catastrophic protection vs. Cyber HMO

23 The fourth rule of survival: Exercise is good for you.

24 Risk Mitigation: Exercise Training, training, training Tabletop or Simulation Walk-through responsibility Evaluate for currency Allow enough time Debrief Repeat at least annually

25 The fifth rule of survival: It’s best to solve the problem with the simplest method.

26 Data Breach: When it’s not a drill Remove affected devices from the network, don’t turn it off! Call your lawyer Activate the IRP Interview and document Determine the extent of the breach Engage your forensic team Identify legal obligations Manage communications Remediate and recover

27 Final Thoughts: By 2020, the global Cyber Security market is expected to skyrocket to more than $140 billion It isn’t possible to manage risk through technology and hardware alone Cyber is a component of risk management Vendors are an important part of cyber risk People make mistakes Companies must re-think insurance, compliance, liability, and training to include cyber www.sera-brynn.com | info@sera-brynn.com | 757-243-1257

28 “There are two kinds of companies in America: those who’ve been breached and those who don’t know they’ve been breached.” FBI Director James Comey

29 Helping Your Company or Client: Ask them simple questions about compliance and risk management… Have you thought about what you would do in a data breach situation? What critical information do you have? Is your legal team ready to handle your data breach? Do you know if you are compliant? Does your cyber insurance product meet your needs? www.sera-brynn.com | info@sera-brynn.com | 757-243-1257

30 Protect Yourself: Take Personal Responsibility Consider a credit freeze if you’ve been breached Secure your home network, use separate networks for sensitive information Backup your data Avoid coffee shop Wi-Fi Evaluate the convenience vs. privacy tradeoff Vary your passwords

31 www.sera-brynn.com | info@sera-brynn.com | 757-243-1257 Heather Engel heather.engel@sera-brynn.com Questions?


Download ppt "A PM’s Guide to Surviving A Data Breach. Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster."

Similar presentations


Ads by Google