SlideShare a Scribd company logo
1 of 15
Download to read offline
Privileged and Confidential Information Twitter:@RevInnovator
CyberSecurity
Five Ways for Boards to Prepare
October 2015
Privileged and Confidential Information Twitter:@RevInnovator
The Last Year of High Profile Breaches
1
11,000,000	
  
Bank	
  Accounts	
  
Social	
  Security	
  Numbers	
  
80,000,000	
  
Social	
  Security	
  Numbers	
  
eMail	
  Addresses	
  
Physical	
  Addresses	
  
47,000	
  
Proprietary	
  Info	
  
Employee	
  info	
  
	
  
109,000,000	
  
Credit	
  Cards	
  
eMail	
  Addresses	
  
83,000,000	
  
eMail	
  Addresses	
  
Physical	
  Addresses	
  
145,000,000	
  
eMail	
  Addresses	
  
Physical	
  Addresses	
  
Login	
  CredenIals	
  
110,000,000	
  
Credit	
  Card	
  Numbers	
  
Source:	
  Bloomberg.com	
  -­‐	
  A	
  Quick	
  Guide	
  to	
  the	
  Worst	
  Corporate	
  Hack	
  AQacks	
  
Privileged and Confidential Information Twitter:@RevInnovator
High Profile Firings: Not Just IT
2
Mailroom Employee
Highmark
MDF Transcription
Boston Medical Group
Two hospital workers
Georgia Hospital
“Terrific Employee”
Goold Health System
Target	
  CIO	
  –	
  Beth	
  Jacobs	
  
Maricopa	
  County	
  Community	
  
College	
  District	
  –	
  Miguel	
  Corozo	
  
The	
  Texas	
  State	
  Comptroller's	
  
office	
  –	
  Susan	
  Combs	
  
Target	
  CEO	
  Gregg	
  Steinhafel	
  
The	
  Utah	
  state	
  Department	
  of	
  
Technology	
  Service	
  
Privileged and Confidential Information Twitter:@RevInnovator 3
A primary responsibility of every board is
to secure the future of the organization.
- Tom Horton – Boards & Directors
Privileged and Confidential Information Twitter:@RevInnovator
The New Normal
•  Every company is an IT Company
•  Every company is a Big Data Company
•  BYOX will continue to grow
•  Most security is perimeter security
•  ~25% of HIPAA breaches involve a trusted
partner
– That number is poised to increase as business
associates are now liable under the new HIPAA
rule
4
Privileged and Confidential Information Twitter:@RevInnovator
Top Three Industry Breaches
5
Number	
  of	
  Incidents Confirmed	
  Data	
  Loss
Total Small Large Unknown Total Small Large Unknown
Public 50,315	
   19 49,596 700 303 6 241 56
InformaIon 1,496 36 34 1,426 95 13 17 65
Financial 642 44 177 421 277 33 136 108
Dollar loss is difficult to calculate
Boards and Executives care about business
impact
Privileged and Confidential Information Twitter:@RevInnovator 6
Privileged and Confidential Information Twitter:@RevInnovator
30 years later: Why do Companies still #Fail?
•  Security and Compliance treated as “IT
problems” and not as core Business Operations
•  Security spend is perceived as a burden
expense
–  Consider it in the same as your Accounting function
•  Most compliance and security needs primarily
addresses the complex internal IT requirements
–  Governance, human and wider partner network
vulnerabilities are lightly considered
7
Privileged and Confidential Information Twitter:@RevInnovator
According to a 2014 Verizon Report,
only 10% of Merchants/Service
Providers were fully compliant with
DSS 2.0 standards*
8
*Verizon 2014 Pci Compliance Report - http://www.verizonenterprise.com/pcireport/2014/
Compliance ≠ Security!
Privileged and Confidential Information Twitter:@RevInnovator
Five Mandates for the Board
Understanding
People
Process
Technology
Preparedness
9
•  Understanding
–  What are the risks?
–  Chain of trust?
–  Do they understand Cyber?
•  People
–  Are the right people in place?
–  Do they have the resources they need?
–  Do they understand the companies
strategic risks?
•  Process
–  Is there are breach response plan?
–  Do you have partners ready to support?
–  How often is it tested?
•  Technology
–  Cyber-risk is not an IT problem.
–  IT is one of the enablers
•  Preparedness
–  Is business continuity ready?
–  Is it tested?
–  Are out-of-band methods in place?
Privileged and Confidential Information Twitter:@RevInnovator
Cyber Insurance is a Reality
10
Privileged and Confidential Information Twitter:@RevInnovator
Example of a Prepared Team
11
April 2014: A Dutch teenage girl
sends a “prank” tweet
threatening American Airlines.
American Airlines’ response was
direct and got media airplay.
@AmericanAir tweeted
“@QueenDemetriax_ Sarah, we take
these threats very seriously. Your IP
address and details will be forwarded to
security and the FBI.”
@QueenDemetriax_ tweeted
"@AmericanAir hello my name's Ibrahim
and I'm from Afghanistan. I'm part of Al
Qaida and on June 1st I'm gonna do
something really big bye.”
Privileged and Confidential Information Twitter:@RevInnovator
Five Questions for Executives and Boards
•  Is an up to date security framework in
place?
•  Does a breach response plan exist?
•  How much does (cyber) insurance cover?
•  Are both internal and external (partner)
resources considered?
•  Do employee’s understand their role in
relation to company security?
12
excellence.perspective.innovation.
Privileged and Confidential Information Twitter:@RevInnovator
NACD Five Principles
1.  Cyber security is an enterprise-wide risk management
issues, not just an IT problem.
2.  Address the serious legal consequences of cyber risks.
3.  Cyber security must be addressed with professionals
and given board-level priority.
4.  Directors must advise management to take all steps
necessary to comprehensively address cyber risk with
personnel and resources.
5.  Determine how your organization would deal with a
breach and whether liability can be addressed via
insurance.
14

More Related Content

What's hot

Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Kevin Duffey
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearIronCore Labs
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesWhoisXML API
 
Easy security presentation 1
Easy security presentation 1Easy security presentation 1
Easy security presentation 1Michael Buschmann
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupAccellis Technology Group
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Kevin Duffey
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Alexandru Turcu
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 4iQ
 
Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015Brian Levine
 
Social Engineering Team Talk 1 PhishMe Leader Guide Final
Social Engineering Team Talk 1 PhishMe  Leader Guide FinalSocial Engineering Team Talk 1 PhishMe  Leader Guide Final
Social Engineering Team Talk 1 PhishMe Leader Guide FinalSteve Gavora
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutionsCyberhunter Cyber Security
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCybera Inc.
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityJamie Hutt
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityJamie Hutt
 
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...Black Duck by Synopsys
 

What's hot (20)

Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breaches
 
Easy security presentation 1
Easy security presentation 1Easy security presentation 1
Easy security presentation 1
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology Group
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
 
Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015
 
Productivity 3.0
Productivity 3.0Productivity 3.0
Productivity 3.0
 
Social Engineering Team Talk 1 PhishMe Leader Guide Final
Social Engineering Team Talk 1 PhishMe  Leader Guide FinalSocial Engineering Team Talk 1 PhishMe  Leader Guide Final
Social Engineering Team Talk 1 PhishMe Leader Guide Final
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Phishing
PhishingPhishing
Phishing
 
State of Security
State of SecurityState of Security
State of Security
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And Security
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
 

Similar to Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board

5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at RiskClearDATACloud
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Grant Barker
 
Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511Stan Stahl, PhD
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Privacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesPrivacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesArt Hall
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604ISSA LA
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarMarty Miller
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 
Ten Steps to Help Avoid a Major Privacy or Security Headache
Ten Steps to Help Avoid a Major  Privacy or Security Headache Ten Steps to Help Avoid a Major  Privacy or Security Headache
Ten Steps to Help Avoid a Major Privacy or Security Headache Ryan Boyles
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime SecureAuth
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxchristalgrieg
 

Similar to Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board (20)

5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Privacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesPrivacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service Representatives
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Ten Steps to Help Avoid a Major Privacy or Security Headache
Ten Steps to Help Avoid a Major  Privacy or Security Headache Ten Steps to Help Avoid a Major  Privacy or Security Headache
Ten Steps to Help Avoid a Major Privacy or Security Headache
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
 

More from LERNER Consulting

How to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptxHow to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptxLERNER Consulting
 
Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019LERNER Consulting
 
Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...LERNER Consulting
 
RChain Developer Conference pithia investments 04-2018
RChain Developer Conference   pithia investments 04-2018RChain Developer Conference   pithia investments 04-2018
RChain Developer Conference pithia investments 04-2018LERNER Consulting
 
Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018LERNER Consulting
 
Leadership: A Journey Planner
Leadership: A Journey PlannerLeadership: A Journey Planner
Leadership: A Journey PlannerLERNER Consulting
 
CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018LERNER Consulting
 
SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017LERNER Consulting
 
Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017LERNER Consulting
 
Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017LERNER Consulting
 
Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016LERNER Consulting
 
Change Management: A Journey Planner
Change Management: A Journey Planner Change Management: A Journey Planner
Change Management: A Journey Planner LERNER Consulting
 
There's always room for Growth
There's always room for GrowthThere's always room for Growth
There's always room for GrowthLERNER Consulting
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardLERNER Consulting
 
Alternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER ConsultingAlternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER ConsultingLERNER Consulting
 
Block Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingBlock Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingLERNER Consulting
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfLERNER Consulting
 
Client Case Study/Citations Template
Client Case Study/Citations TemplateClient Case Study/Citations Template
Client Case Study/Citations TemplateLERNER Consulting
 

More from LERNER Consulting (20)

How to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptxHow to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptx
 
Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019
 
Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...
 
RChain Developer Conference pithia investments 04-2018
RChain Developer Conference   pithia investments 04-2018RChain Developer Conference   pithia investments 04-2018
RChain Developer Conference pithia investments 04-2018
 
Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018
 
Leadership: A Journey Planner
Leadership: A Journey PlannerLeadership: A Journey Planner
Leadership: A Journey Planner
 
CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018
 
SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017
 
Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017
 
Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017
 
Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016
 
Change Management: A Journey Planner
Change Management: A Journey Planner Change Management: A Journey Planner
Change Management: A Journey Planner
 
ERM Symposium Agenda FINAL
ERM Symposium Agenda FINALERM Symposium Agenda FINAL
ERM Symposium Agenda FINAL
 
SR Developer Job Posting
SR Developer Job PostingSR Developer Job Posting
SR Developer Job Posting
 
There's always room for Growth
There's always room for GrowthThere's always room for Growth
There's always room for Growth
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
 
Alternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER ConsultingAlternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER Consulting
 
Block Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingBlock Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER Consulting
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask Yourself
 
Client Case Study/Citations Template
Client Case Study/Citations TemplateClient Case Study/Citations Template
Client Case Study/Citations Template
 

Recently uploaded

CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Availablepr788182
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSkajalroy875762
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...pujan9679
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistanvineshkumarsajnani12
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 

Recently uploaded (20)

CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 

Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board

  • 1. Privileged and Confidential Information Twitter:@RevInnovator CyberSecurity Five Ways for Boards to Prepare October 2015
  • 2. Privileged and Confidential Information Twitter:@RevInnovator The Last Year of High Profile Breaches 1 11,000,000   Bank  Accounts   Social  Security  Numbers   80,000,000   Social  Security  Numbers   eMail  Addresses   Physical  Addresses   47,000   Proprietary  Info   Employee  info     109,000,000   Credit  Cards   eMail  Addresses   83,000,000   eMail  Addresses   Physical  Addresses   145,000,000   eMail  Addresses   Physical  Addresses   Login  CredenIals   110,000,000   Credit  Card  Numbers   Source:  Bloomberg.com  -­‐  A  Quick  Guide  to  the  Worst  Corporate  Hack  AQacks  
  • 3. Privileged and Confidential Information Twitter:@RevInnovator High Profile Firings: Not Just IT 2 Mailroom Employee Highmark MDF Transcription Boston Medical Group Two hospital workers Georgia Hospital “Terrific Employee” Goold Health System Target  CIO  –  Beth  Jacobs   Maricopa  County  Community   College  District  –  Miguel  Corozo   The  Texas  State  Comptroller's   office  –  Susan  Combs   Target  CEO  Gregg  Steinhafel   The  Utah  state  Department  of   Technology  Service  
  • 4. Privileged and Confidential Information Twitter:@RevInnovator 3 A primary responsibility of every board is to secure the future of the organization. - Tom Horton – Boards & Directors
  • 5. Privileged and Confidential Information Twitter:@RevInnovator The New Normal •  Every company is an IT Company •  Every company is a Big Data Company •  BYOX will continue to grow •  Most security is perimeter security •  ~25% of HIPAA breaches involve a trusted partner – That number is poised to increase as business associates are now liable under the new HIPAA rule 4
  • 6. Privileged and Confidential Information Twitter:@RevInnovator Top Three Industry Breaches 5 Number  of  Incidents Confirmed  Data  Loss Total Small Large Unknown Total Small Large Unknown Public 50,315   19 49,596 700 303 6 241 56 InformaIon 1,496 36 34 1,426 95 13 17 65 Financial 642 44 177 421 277 33 136 108 Dollar loss is difficult to calculate Boards and Executives care about business impact
  • 7. Privileged and Confidential Information Twitter:@RevInnovator 6
  • 8. Privileged and Confidential Information Twitter:@RevInnovator 30 years later: Why do Companies still #Fail? •  Security and Compliance treated as “IT problems” and not as core Business Operations •  Security spend is perceived as a burden expense –  Consider it in the same as your Accounting function •  Most compliance and security needs primarily addresses the complex internal IT requirements –  Governance, human and wider partner network vulnerabilities are lightly considered 7
  • 9. Privileged and Confidential Information Twitter:@RevInnovator According to a 2014 Verizon Report, only 10% of Merchants/Service Providers were fully compliant with DSS 2.0 standards* 8 *Verizon 2014 Pci Compliance Report - http://www.verizonenterprise.com/pcireport/2014/ Compliance ≠ Security!
  • 10. Privileged and Confidential Information Twitter:@RevInnovator Five Mandates for the Board Understanding People Process Technology Preparedness 9 •  Understanding –  What are the risks? –  Chain of trust? –  Do they understand Cyber? •  People –  Are the right people in place? –  Do they have the resources they need? –  Do they understand the companies strategic risks? •  Process –  Is there are breach response plan? –  Do you have partners ready to support? –  How often is it tested? •  Technology –  Cyber-risk is not an IT problem. –  IT is one of the enablers •  Preparedness –  Is business continuity ready? –  Is it tested? –  Are out-of-band methods in place?
  • 11. Privileged and Confidential Information Twitter:@RevInnovator Cyber Insurance is a Reality 10
  • 12. Privileged and Confidential Information Twitter:@RevInnovator Example of a Prepared Team 11 April 2014: A Dutch teenage girl sends a “prank” tweet threatening American Airlines. American Airlines’ response was direct and got media airplay. @AmericanAir tweeted “@QueenDemetriax_ Sarah, we take these threats very seriously. Your IP address and details will be forwarded to security and the FBI.” @QueenDemetriax_ tweeted "@AmericanAir hello my name's Ibrahim and I'm from Afghanistan. I'm part of Al Qaida and on June 1st I'm gonna do something really big bye.”
  • 13. Privileged and Confidential Information Twitter:@RevInnovator Five Questions for Executives and Boards •  Is an up to date security framework in place? •  Does a breach response plan exist? •  How much does (cyber) insurance cover? •  Are both internal and external (partner) resources considered? •  Do employee’s understand their role in relation to company security? 12
  • 15. Privileged and Confidential Information Twitter:@RevInnovator NACD Five Principles 1.  Cyber security is an enterprise-wide risk management issues, not just an IT problem. 2.  Address the serious legal consequences of cyber risks. 3.  Cyber security must be addressed with professionals and given board-level priority. 4.  Directors must advise management to take all steps necessary to comprehensively address cyber risk with personnel and resources. 5.  Determine how your organization would deal with a breach and whether liability can be addressed via insurance. 14