SlideShare a Scribd company logo
1 of 56
Data Breach Notification Laws
Time for a Pimp Slap
10/21/2011
Steve Werby
Chief Information Security Officer
University of Texas at San Antonio
Pimp slap
 A powerful, backhanded slap to the face
@stevewerby
 Favorite color: Cadet blue
 Hobby: Stalking divorcees under age 25
 Favorite number: 6.0221415 × 10^23
 Pet’s name: Cujo
 Favorite movie: Santa with Muscles
 Last 4 of my SSN: 6497
 Place of birth: Delta City
 Infosec since ’99 - ran 2 IT consultancies ’99-’04
 Analyst at a university
 Infosec since ’99 - ran 2 IT consultancies ’99-’04
 Analyst at a university, CISO at state agency
@stevewerby
 Infosec since ’99 - ran 2 IT consultancies ’99-’04
 Analyst at a university, CISO at state agency,
CISO at a university
 Infosec since ’99 - ran 2 IT consultancies ’99-’04
 Analyst at a university, CISO at state agency,
CISO at a university^2
Today’s menu
 Incidents I was involved in
 Data breach notification laws - what and why
 Issues
 Alternatives to achieve desired goal
Definitions
 Exposed
 Made accessible to unauthorized person
 Breached / compromised
 Access gained by unauthorized person
 Misused
 Used by authorized person for unauthorized purpose
 Potential
 Possible != actual
Getting to know you
 Received a data breach notification?
 Been involved in handling one?
 Investigated the incident that led to it?
 Participated in decision about whether to notify?
 Identified contact information?
 Wrote notification content?
 Handled notification logistics?
 Answered calls from affected individuals?
 Caused an incident that led to a notification?
Example exposures…maybe
 Data sanitization vendor’s driver sold laptops
 Medical provider’s computers stolen
 Grade processing system stolen
 Personal info exposed to unauthorized employees
 Web hosting provider’s password DB compromised
 Data sanitization vendor’s driver sold laptops
 Medical provider’s computers stolen
 Grade processing system stolen
 Personal info exposed to unauthorized employees
 Web hosting provider’s password DB compromised
$
 Sony - $10s of millions
 Those I’ve been involved in – 5-6 figures
 3rd-party forensic analysis - $222,000
 Legal consultant - $100,000
 Communications consultant - $50,000
 Notification and credit protection - $3,700,000
 Reputational damage - ?
 Employee time - ?
$
 12/15/2010
Ohio State exposure of 760,000 individuals
names, DOBs, SSNs
2 recent examples
 TRICARE
 Stanford Hospital
Tip of the iceberg
 Only a tiny fraction of data exposures are disclosed
In the beginning
 Enacted in 2002, effective in 2003
 Limited to data related to financial identity fraud
Motivation
 Perception that breaches of electronic data
involving personally identifiable information was
increasing
Increase in electronic breaches?
 Actual increase not verifiable
 Doesn’t consider growth in electronic data storage
 Substantial % of identity fraud not due to electronic data
 Remote system accessibility & portable storage increase
 Breach stats combine actual and potential
 Has led to a cycle
=> More/broader/improved laws
=> more reporting
=> more individual awareness & more media coverage
=> improved security resources, processes, posture
=> more breaches discovered
=> more/broader/improved laws
Rationale
 Provides necessary information for affected
individuals to make informed decisions to mitigate
impact
 Negative consequences associated with disclosure
will result in improved security practices
Boom goes the dynamite
Types of harm
 Death and physical harm
 Financial loss
 Loss of $, loss of property, property damage
 Credit score damage
 Financial identity fraud
 Account takeover
 Account creation
 Social harm
 Loss of job, damage to professional opportunities
 Relationships, embarrassment
AYCE notification
 Death and physical harm
 Murderers, violent offenders, mentally unstable
 People with contagious disease, speeders, drunk drivers
 Financial loss
 Robbery, burglary, vandalism (robber, burglar, vandal)
 Fraud, customer complaints, charlatans
 Social harm
 Insecure Wi-Fi APs, people who own binoculars
 Provides necessary information for at risk
individuals to make informed decisions to
mitigate impact
 Negative consequences associated with
disclosure will result in reduction in risk
Data breach notification laws
 Federal laws
 Health records – HITECH Act (via HHS and FTC)
 Financial records – GLBA, FTC Safeguards Rule
 Education records – FERPA
 Federal agencies’ records – FISMA, OMB, VA
 State+ laws
 46 states (MA+NC cover paper)
 DC + Puerto Rico + Virgin Islands
 International
 Europe
 Japan
 And more
Data breach notification laws
Data breach laws - future
 Federal laws
 Existing laws are in flux
 Overarching national law could be coming
 State+ laws
 Scope and other details changing
 Alabama, Kentucky, New Mexico, South Dakota
 Texas healthcare, California beefing theirs up
 International
 Europe considering expanding beyond telecom
 Canada
 Taiwan
Components
 Who the law applies to
 Types of data covered
 State/format of data covered
 What constitutes a breach
 Disclosure obligations
 Non-compliance ramifications
 Exceptions
Who the law applies to
 Entity || individual May specify type
 Conducts biz in state
|| Maintains data of residents of state
|| Resulted in or may result in a type of harm to a
resident of the state
Types of data covered
 (First name || first initial) && last name
+
(SSN || DL || unique government ID)
||
((Financial account # || CC # || debit card #)
&&
(Security code || password))
||
(Medical info || health insurance info)
State/format of data covered
 Electronic In some cases paper too
 Unencrypted
|| Encrypted, but key breached
|| Not redacted or altered SSN <5, DL last 4
What constitutes a breach
 Unauthorized access and acquisition that
compromises
security || confidentiality || integrity
of a record Sometimes must be 2+ records
Disclosure obligations - who
 Notify affected individual
|| the affected owner/licensee
 Notify Office of Attorney General
 Notify consumer reporting agencies
Disclosure obligations - when
 Without reasonable delay
Sometimes immediately || within specific
timeframe
 Can delay to determine scope
&& restore system integrity
&& if LEA advises disclosure will impede
investigation or national security
Disclosure obligations - method
 Written notice
 Email notice if email address is valid
&& individual permits communication via email
 Telephone
 Media || email || org’s website if
cost > defined threshold
|| # of recipients > defined threshold
|| contact info is unreliable or unknown
|| can’t identify affected individuals
Disclosure obligations - detail
 General incident overview
 Type of personally identifiable information
 Steps that will be taken to protect further
unauthorized access
 Contact phone number (if one exists)
 Advice to review account information
and free credit reports
Non-compliance ramifications
 Attorney general may bring action to
 Obtain actual damages
 Seek civil penalty for willful and knowing violation of
notification requirements
 Federal agencies can sanction orgs
 Mandate controls
 Mandate audits
 Affected individual can seek to recover direct
economic damages
 But not $ for the time they put into doing so
Exceptions
 Notification not required if affected individuals
unlikely to experience fraud as a result of incident
 Some types of organization/sectors excluded
Data breach notification laws
Issues – scope
 Not comprehensive enough
 Mostly electronic – 30% of reported breaches involve
paper; some reports indicate most breaches involve paper
 What about spoken word…and smoke signals?
 Focus almost entirely on financial identity fraud
 Excessive notification
 Only 3% of those notified of a breach experience identity
fraud as a result
 Leads to ignoring, considering all the same, failure to take
action
Issues – ambiguity
 Reasonable
 Without reasonable delay
 Likely
 May result in harm
 Likely to result in harm
 Validity of contact information
 Must other states’ laws be adhered to?
Issues – difficulty complying
 Inconsistencies
 Follow each state’s requirement or adhere to the
state’s requirement that’s limiting
 Incompatibilities
 LEA allows for delay in notification, but another state
doesn’t allow for that
 Individual / small org vs. large org
Issues – inequitable treatment
 Single incident could result in
 Notification not required for some individuals
 Some individuals provided different information
 Some individuals less likely to receive notification
Issues – miscellaneous
 Ways of identifying a person are myopic
 Username, email address, phone number
 Don’t always know residency of individual
 Residency information not collected
 Residency information could be stale
 Phone # portability
Issues – incentives
 Avoidance $ < notification $ + notification impact
$?
Issues - rationale reality
 Provides necessary
information for affected
individuals to make informed
decisions to mitigate impact
 Information overload – useless information
 Many actions should be taken regularly anyway
 Account review, credit report review
 Some actions can’t be taken
 Can’t get issued new SSN or stop doing biz with gov
 Risk is overblown – impact likelihood / liability
Issues - rationale reality
 Many incidents are people failures
 Affected individuals’ memories are short
 Orgs’ efforts like Iridium-192
 Orgs’ efforts sub-optimized
 Proof’s in the pudding
 Negative consequences
associated with disclosure
will result in improved
security practices
Pimp slap
Alternatives
Plan 1
 Play Angry Birds and just don’t sweat it
Plan 2
 Fine violators $100 billion
Plan 3
 Make all information public
Alternatives – the elements
 Focus on preventing unauthorized access
 Focus on preventing misuse of data
 Encourage individual behavior
 Improve breach notification laws
Prevent unauthorized access
 Mandate or encourage
 Limiting access to unauthorized personnel
 Limiting use to authorized purposes
 Protection and transmission of data
 Risk management
 Educate authorized personnel
 Increase personnel’s accountability
Prevent misuse of data
 Focus on preventing misuse of data
 Make it more difficult to access financial accounts
 Make it more difficult to create financial accounts
 Make it more difficult to access any accounts
 Increase penalties for data theft and misuse
Encourage individual behavior
 Preventive
 Use unique passwords everywhere
 Use unique usernames (I don’t eat my own dog food)
 Protect your email account – keys to the kingdom
 Protect the personal information you control
 Detective
 Check financial accounts routinely
 Check credit reports routinely
Improve breach notification laws
 Increase scope beyond financial fraud risk
 Oh, Canada!
 And include all types of orgs
 Increase consistency in state laws
 Risk-based approach
 Likelihood of access, likelihood of misuse, potential impact,
org’s ability to mitigate, compensating controls, affected
individual’s ability to mitigate
 Compliance status – infosec program, risk-based approach
 Sanction status
 Leave up to org? Or scoring system
Improve breach notification laws
 Consistent reporting format
 Increase information that’s shared
 Reduce PR speak
 Clearly describe risk
 Clearly describe recommended actions
Improve breach notification laws
 Tiered notification
 Tier 1 – track internally, make available for audit,
notify internal personnel
 Tier 2 – notify national authority and internal
personnel
 Tier 3 – notify affected individuals
 Notification methods
 To affected individual – base on org’s size
 National database – public and private views
Questions and discussion
?
Contact me
 <myfirstname>@<mylastname>.com
 @stevewerby
 3 blocks from 29.431057° N, 98.490522° W

More Related Content

What's hot

Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detectingscstatelibrary
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law padler01
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutionslegalshieldofficial
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Servicegorsline
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft- Mark - Fullbright
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacymkeane
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawCharles Mudd
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceCase IQ
 

What's hot (20)

Id theft avoiding and detecting
Id theft avoiding and detectingId theft avoiding and detecting
Id theft avoiding and detecting
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
White Paper 2011 BOC
White Paper 2011 BOCWhite Paper 2011 BOC
White Paper 2011 BOC
 
CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law CSI 2008, Legal Developments In Security and Privacy Law
CSI 2008, Legal Developments In Security and Privacy Law
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Child Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business SolutionsChild Identity Theft LegalShield Business Solutions
Child Identity Theft LegalShield Business Solutions
 
Fa qs
Fa qsFa qs
Fa qs
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacy
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
HIPAA Overview
HIPAA OverviewHIPAA Overview
HIPAA Overview
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 

Viewers also liked

Mandatory data breach notification for Australia
Mandatory data breach notification for AustraliaMandatory data breach notification for Australia
Mandatory data breach notification for AustraliaPatrick Dwyer
 
Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)AdvogadaZuretti
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...AlienVault
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response SwimlanesDaniel P Wallace
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response TriageAlbert Hui
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response Darren Pauli
 

Viewers also liked (6)

Mandatory data breach notification for Australia
Mandatory data breach notification for AustraliaMandatory data breach notification for Australia
Mandatory data breach notification for Australia
 
Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)Keeping Client Data Safe (Final)
Keeping Client Data Safe (Final)
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response Swimlanes
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response Triage
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 

Similar to Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werby at BSides Missouri 2011

Bank Fraud &amp; Data Forensics
Bank Fraud &amp; Data ForensicsBank Fraud &amp; Data Forensics
Bank Fraud &amp; Data Forensicswhbrown5
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theftmherr_riskconsult
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
International Perspectives on Data Breach
International Perspectives on Data BreachInternational Perspectives on Data Breach
International Perspectives on Data BreachConstantine Karbaliotis
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Lawguest8b10a3
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Robert MacLean
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachCBIZ, Inc.
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisiswieringa
 

Similar to Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werby at BSides Missouri 2011 (20)

Bank Fraud &amp; Data Forensics
Bank Fraud &amp; Data ForensicsBank Fraud &amp; Data Forensics
Bank Fraud &amp; Data Forensics
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
International Perspectives on Data Breach
International Perspectives on Data BreachInternational Perspectives on Data Breach
International Perspectives on Data Breach
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2HealthCo Accelerate 2016 speaker deck #2
HealthCo Accelerate 2016 speaker deck #2
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)Protection of Personal Information Bill (POPI)
Protection of Personal Information Bill (POPI)
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 

More from Steve Werby

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Steve Werby
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Steve Werby
 
Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014Steve Werby
 
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...Steve Werby
 
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...Steve Werby
 
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...Steve Werby
 
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...Steve Werby
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Steve Werby
 

More from Steve Werby (8)

Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
 
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
Forget Malicious Links and Fear the QR Code Presented by Steve Werby at ConSe...
 
Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014Information Security Threat Level Snapshot Template by Steve Werby 2014
Information Security Threat Level Snapshot Template by Steve Werby 2014
 
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
Building Dictionaries and Destroying Hashes Using Amazon EC2 [Presented by St...
 
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
A Fistful of Fire Hoses: Putting out Fires Without Crossing Streams [Presente...
 
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
Crunching the Top 10000 Websites' Password Policies and Controls [Presented b...
 
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
You're Bleeding Sensitive Data: Find it Before They Do [Presented by Steve We...
 
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
Bad Advice, Unintended Consequences, and Broken Paradigms: Think & Act Di...
 

Recently uploaded

589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)Delhi Call girls
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 

Recently uploaded (20)

589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 

Data Breach Notifications Laws - Time for a Pimp Slap Presented by Steve Werby at BSides Missouri 2011

  • 1. Data Breach Notification Laws Time for a Pimp Slap 10/21/2011 Steve Werby Chief Information Security Officer University of Texas at San Antonio
  • 2. Pimp slap  A powerful, backhanded slap to the face
  • 3. @stevewerby  Favorite color: Cadet blue  Hobby: Stalking divorcees under age 25  Favorite number: 6.0221415 × 10^23  Pet’s name: Cujo  Favorite movie: Santa with Muscles  Last 4 of my SSN: 6497  Place of birth: Delta City
  • 4.  Infosec since ’99 - ran 2 IT consultancies ’99-’04  Analyst at a university  Infosec since ’99 - ran 2 IT consultancies ’99-’04  Analyst at a university, CISO at state agency @stevewerby  Infosec since ’99 - ran 2 IT consultancies ’99-’04  Analyst at a university, CISO at state agency, CISO at a university  Infosec since ’99 - ran 2 IT consultancies ’99-’04  Analyst at a university, CISO at state agency, CISO at a university^2
  • 5. Today’s menu  Incidents I was involved in  Data breach notification laws - what and why  Issues  Alternatives to achieve desired goal
  • 6. Definitions  Exposed  Made accessible to unauthorized person  Breached / compromised  Access gained by unauthorized person  Misused  Used by authorized person for unauthorized purpose  Potential  Possible != actual
  • 7. Getting to know you  Received a data breach notification?  Been involved in handling one?  Investigated the incident that led to it?  Participated in decision about whether to notify?  Identified contact information?  Wrote notification content?  Handled notification logistics?  Answered calls from affected individuals?  Caused an incident that led to a notification?
  • 8. Example exposures…maybe  Data sanitization vendor’s driver sold laptops  Medical provider’s computers stolen  Grade processing system stolen  Personal info exposed to unauthorized employees  Web hosting provider’s password DB compromised  Data sanitization vendor’s driver sold laptops  Medical provider’s computers stolen  Grade processing system stolen  Personal info exposed to unauthorized employees  Web hosting provider’s password DB compromised
  • 9. $  Sony - $10s of millions  Those I’ve been involved in – 5-6 figures
  • 10.  3rd-party forensic analysis - $222,000  Legal consultant - $100,000  Communications consultant - $50,000  Notification and credit protection - $3,700,000  Reputational damage - ?  Employee time - ? $  12/15/2010 Ohio State exposure of 760,000 individuals names, DOBs, SSNs
  • 11. 2 recent examples  TRICARE  Stanford Hospital
  • 12. Tip of the iceberg  Only a tiny fraction of data exposures are disclosed
  • 13. In the beginning  Enacted in 2002, effective in 2003  Limited to data related to financial identity fraud
  • 14. Motivation  Perception that breaches of electronic data involving personally identifiable information was increasing
  • 15. Increase in electronic breaches?  Actual increase not verifiable  Doesn’t consider growth in electronic data storage  Substantial % of identity fraud not due to electronic data  Remote system accessibility & portable storage increase  Breach stats combine actual and potential  Has led to a cycle => More/broader/improved laws => more reporting => more individual awareness & more media coverage => improved security resources, processes, posture => more breaches discovered => more/broader/improved laws
  • 16. Rationale  Provides necessary information for affected individuals to make informed decisions to mitigate impact  Negative consequences associated with disclosure will result in improved security practices
  • 17. Boom goes the dynamite
  • 18. Types of harm  Death and physical harm  Financial loss  Loss of $, loss of property, property damage  Credit score damage  Financial identity fraud  Account takeover  Account creation  Social harm  Loss of job, damage to professional opportunities  Relationships, embarrassment
  • 19. AYCE notification  Death and physical harm  Murderers, violent offenders, mentally unstable  People with contagious disease, speeders, drunk drivers  Financial loss  Robbery, burglary, vandalism (robber, burglar, vandal)  Fraud, customer complaints, charlatans  Social harm  Insecure Wi-Fi APs, people who own binoculars  Provides necessary information for at risk individuals to make informed decisions to mitigate impact  Negative consequences associated with disclosure will result in reduction in risk
  • 20. Data breach notification laws  Federal laws  Health records – HITECH Act (via HHS and FTC)  Financial records – GLBA, FTC Safeguards Rule  Education records – FERPA  Federal agencies’ records – FISMA, OMB, VA  State+ laws  46 states (MA+NC cover paper)  DC + Puerto Rico + Virgin Islands  International  Europe  Japan  And more
  • 22. Data breach laws - future  Federal laws  Existing laws are in flux  Overarching national law could be coming  State+ laws  Scope and other details changing  Alabama, Kentucky, New Mexico, South Dakota  Texas healthcare, California beefing theirs up  International  Europe considering expanding beyond telecom  Canada  Taiwan
  • 23. Components  Who the law applies to  Types of data covered  State/format of data covered  What constitutes a breach  Disclosure obligations  Non-compliance ramifications  Exceptions
  • 24. Who the law applies to  Entity || individual May specify type  Conducts biz in state || Maintains data of residents of state || Resulted in or may result in a type of harm to a resident of the state
  • 25. Types of data covered  (First name || first initial) && last name + (SSN || DL || unique government ID) || ((Financial account # || CC # || debit card #) && (Security code || password)) || (Medical info || health insurance info)
  • 26. State/format of data covered  Electronic In some cases paper too  Unencrypted || Encrypted, but key breached || Not redacted or altered SSN <5, DL last 4
  • 27. What constitutes a breach  Unauthorized access and acquisition that compromises security || confidentiality || integrity of a record Sometimes must be 2+ records
  • 28. Disclosure obligations - who  Notify affected individual || the affected owner/licensee  Notify Office of Attorney General  Notify consumer reporting agencies
  • 29. Disclosure obligations - when  Without reasonable delay Sometimes immediately || within specific timeframe  Can delay to determine scope && restore system integrity && if LEA advises disclosure will impede investigation or national security
  • 30. Disclosure obligations - method  Written notice  Email notice if email address is valid && individual permits communication via email  Telephone  Media || email || org’s website if cost > defined threshold || # of recipients > defined threshold || contact info is unreliable or unknown || can’t identify affected individuals
  • 31. Disclosure obligations - detail  General incident overview  Type of personally identifiable information  Steps that will be taken to protect further unauthorized access  Contact phone number (if one exists)  Advice to review account information and free credit reports
  • 32. Non-compliance ramifications  Attorney general may bring action to  Obtain actual damages  Seek civil penalty for willful and knowing violation of notification requirements  Federal agencies can sanction orgs  Mandate controls  Mandate audits  Affected individual can seek to recover direct economic damages  But not $ for the time they put into doing so
  • 33. Exceptions  Notification not required if affected individuals unlikely to experience fraud as a result of incident  Some types of organization/sectors excluded
  • 35. Issues – scope  Not comprehensive enough  Mostly electronic – 30% of reported breaches involve paper; some reports indicate most breaches involve paper  What about spoken word…and smoke signals?  Focus almost entirely on financial identity fraud  Excessive notification  Only 3% of those notified of a breach experience identity fraud as a result  Leads to ignoring, considering all the same, failure to take action
  • 36. Issues – ambiguity  Reasonable  Without reasonable delay  Likely  May result in harm  Likely to result in harm  Validity of contact information  Must other states’ laws be adhered to?
  • 37. Issues – difficulty complying  Inconsistencies  Follow each state’s requirement or adhere to the state’s requirement that’s limiting  Incompatibilities  LEA allows for delay in notification, but another state doesn’t allow for that  Individual / small org vs. large org
  • 38. Issues – inequitable treatment  Single incident could result in  Notification not required for some individuals  Some individuals provided different information  Some individuals less likely to receive notification
  • 39. Issues – miscellaneous  Ways of identifying a person are myopic  Username, email address, phone number  Don’t always know residency of individual  Residency information not collected  Residency information could be stale  Phone # portability
  • 40. Issues – incentives  Avoidance $ < notification $ + notification impact $?
  • 41. Issues - rationale reality  Provides necessary information for affected individuals to make informed decisions to mitigate impact  Information overload – useless information  Many actions should be taken regularly anyway  Account review, credit report review  Some actions can’t be taken  Can’t get issued new SSN or stop doing biz with gov  Risk is overblown – impact likelihood / liability
  • 42. Issues - rationale reality  Many incidents are people failures  Affected individuals’ memories are short  Orgs’ efforts like Iridium-192  Orgs’ efforts sub-optimized  Proof’s in the pudding  Negative consequences associated with disclosure will result in improved security practices
  • 45. Plan 1  Play Angry Birds and just don’t sweat it
  • 46. Plan 2  Fine violators $100 billion
  • 47. Plan 3  Make all information public
  • 48. Alternatives – the elements  Focus on preventing unauthorized access  Focus on preventing misuse of data  Encourage individual behavior  Improve breach notification laws
  • 49. Prevent unauthorized access  Mandate or encourage  Limiting access to unauthorized personnel  Limiting use to authorized purposes  Protection and transmission of data  Risk management  Educate authorized personnel  Increase personnel’s accountability
  • 50. Prevent misuse of data  Focus on preventing misuse of data  Make it more difficult to access financial accounts  Make it more difficult to create financial accounts  Make it more difficult to access any accounts  Increase penalties for data theft and misuse
  • 51. Encourage individual behavior  Preventive  Use unique passwords everywhere  Use unique usernames (I don’t eat my own dog food)  Protect your email account – keys to the kingdom  Protect the personal information you control  Detective  Check financial accounts routinely  Check credit reports routinely
  • 52. Improve breach notification laws  Increase scope beyond financial fraud risk  Oh, Canada!  And include all types of orgs  Increase consistency in state laws  Risk-based approach  Likelihood of access, likelihood of misuse, potential impact, org’s ability to mitigate, compensating controls, affected individual’s ability to mitigate  Compliance status – infosec program, risk-based approach  Sanction status  Leave up to org? Or scoring system
  • 53. Improve breach notification laws  Consistent reporting format  Increase information that’s shared  Reduce PR speak  Clearly describe risk  Clearly describe recommended actions
  • 54. Improve breach notification laws  Tiered notification  Tier 1 – track internally, make available for audit, notify internal personnel  Tier 2 – notify national authority and internal personnel  Tier 3 – notify affected individuals  Notification methods  To affected individual – base on org’s size  National database – public and private views
  • 56. Contact me  <myfirstname>@<mylastname>.com  @stevewerby  3 blocks from 29.431057° N, 98.490522° W