SlideShare a Scribd company logo
1 of 32
C Y B E R S E C U R I T Y I N S U R A N C E S E M I N A R
Can You Afford NOT To Have
Cybersecurity?
March 4, 2015
TODAY’S
PRESENTERS
Reggie Dejean
Specialty Lines Manager
Lawley & Lawley Andolina Verdi
Mary Beth DiBacco
Specialty Insurance Manager
Chubb Insurance
Carl Cadregari
Executive Vice President and Practice
Lead
Bonadio IT/IS Risk Management
DIGITAL HACKING
FORENSICS
HEADLINES
HEADLINES EXPLAINED
 Identities left exposed in Indiana salvage yards - items
included medical records, bank statements, insurance
cards, employee identification cards, car registrations, a
signature, a child’s name, dates of birth, and an
application for welfare assistance.
 Stolen Pioneer bank laptop contained some customers’
data
 Pioneer Bank over the weekend alerted some of its customers that
an employee’s laptop stolen Jan. 26 contained “secured personal
information of certain customers, including names, social security
numbers, street addresses, and account and debit card
numbers.”
 Harel Chiropractic Clinic notifies 3,000 patients of breach
HEADLINES EXPLAINED CONT.
 St. Peter’s Health Partners is warning
of a possible data breach in its
email system, following the theft of
a manager’s cellphone.
 California Pacific Medical Center
discovers employee was improperly
accessing patient records for one
year
 Natural Grocers Investigating Card
Breach - traced a pattern of fraud
on customer credit and debit cards
suggesting that hackers have
tapped into cash registers at
Natural Grocers locations across the
country
HEADLINES EXPLAINED CONT.
 Data Breach Results in $4.8
Million HIPAA Settlements
from New York and
Presbyterian Hospital
 A 214 bed Medical Center
laptop stolen with data in
an excel spreadsheet -
Medical Center says data is
safe since the thief would
have to know how to
unhide columns in Excel
spreadsheet to read them
THREATS TO DATA
 Internal Threats
 External Threats
 Have You Heard About Target?
 Not just credit card information but also personal identifiable information (PII) is at risk
 According to recent surveys
 Street Cost – Social Security Number……..$ 1.00
 Street Cost – Financial Record ……........... $ 0.50
 Lost Medical Record………………………..$316.00
CSIRP
Computer Security Incident Response Plan
• Wh a t to d o wh e n y o u “ th i n k o r k n o w” y o u h a v e h a d
a d i s c l o s u r e
• Th e wh o , wh a t wh e r e a n d wh e n to f o l l o w
• S te p b y s te p p r o c e s s
• M a y b e r e q u i r e d b y s o m e l a ws a n d r e g u l a ti o n s
CSIRP
You Need a Breach Notification Policy
1. NY State, HIPAA, PCI, GLBA requires a documented policy that
includes all factors of breach notification including:
• When to alert persons whose data has been breached
• What you have to pay for
• When to send lost data information to the Attorney General
and regulatory bodies
• When you are to place conspicuous notice on your website
• When you are to alert local media and television
CSIRP
You need a plan to follow that includes:
1. What constitutes a breach
2. Who is on the team
3. Who is allowed to talk to any external entity
4. When to involve external crisis management
5. When to trigger your liability policy
CSIRP
1. How to assess the risks (likelihood and severity)
2. Does the breach fall into pre-defined categories
(and what are they)
3. What to do to investigate the breach
4. What to do to minimize the breach
5. What to do to report on the breach
6. What to do to never repeat the breach
7. How to close the incident
AFTER THE INFORMATION
HAS BEEN GATHERED
INFORMATION
WHAT IS THE IMMEDIATE EXPENSE?
• Notification
• Creating letter or
other notification
• Printing or design
• Mailing or other
transmission
• Public Relations
• Call Center
operations
• Credit Monitoring
or Identity Theft
Remediation
• Advertising &
Press Releases
• Forensics
• Legal Expenses for outside
Attorney
• Cost of Forensic
Examination
• Cost to Remediate
Discovered Vulnerabilities
KEY COSTS TO A DATA BREACH
DIRECT
COSTS
VICTIM COSTS
INDIRECT COSTS
($134)
Cost Per Record $201 (2014)
• Discovery
• Data Forensics
• Notification
• Call Center
• Identity Monitoring
• Identity Remediation
• Lawsuits
• Regulatory Fines
• Additional Security &
Audit Requirements
• Reputational
Damage/Lost Business
Source: Ponemon Institute, LLC and Symantec Corporation. 2014 Annual Study: U.S. Cost of a Data Breach.
March 2014
DATA IS VULNERABLE
Data can escape your organization in many different ways
Source: Privacy Rights Clearinghouse, Chronology of Data Breaches 2008-2013.
www.privacyrights.org
4% 6% 12% 12% 18% 23% 25%
STATIONARY
DEVICE
UNKNOWN
PHYSICAL
MALICIOUS
INSIDER
NEGLIGENCE
HACKING
PORTABLE
DEVICES
COMPUTER SECURITY vs. INFORMATION
SECURITY
 COMPUTER SECURITY
 This means the collective processes and
mechanisms by which sensitive and
valuable information and services are
protected from publication, tampering
ro collapse by unauthorized activiites or
untrustworthy individuals and unplanned
events.
 INFORMATION SECURITY
 This is the practice of defending
information from unauthorized access,
use, disclosure, disruption, modification,
perusal, inspection, recording or
destruction. It is a general term that can
be used regardless of the form the data
may take (electronic, physical, etc.).
INCIDENT RESPONSE PLAN
1. If a company does not have one they are playing with fire
2. Essential for company to have in place in order to effectively respond to a security
breach
3. IRP’s should be tested at least on an annual basis using various breach scenarios
4. IRP’s typically include:
1. A. IRP Team (Ideally SR Mgmt. in Info Tech, Customer Service, Legal, Privacy & PR
2. B. Clear guidelines categorizing a risk/threat level
3. C. Documentation Instructions
4. D. Guidelines for getting third parties involved
5. E. Notification Process
-- One of the most important practices --
 Sets the security foundation
 First measure that must be taken to
reduce the risk of unacceptable use
of the company’s information
resources
 Companies define which assets are
critical and ways to protect them
 Development and implementation
of a security policy turns employees
into active participants towards
securing company information
(helps prevent human factor)
 Should be tested and reviewed on
an annual basis
INFORMATION SECURITY POLICY
 Key factors to help a company
protect their systems
 Protection starts with firewalls as they
protect resources on a private
network
 Anti-virus software can be used to
prevent, detect & remove viruses
 Intrusion detection software monitors
the network for malicious activity or
policy violations & reports back
(should be reviewed monthly at a
minimum)
 Penetration tests look for vulnerable
access points (preferred but many
small companies don’t run.
VIRUS PREVENTION, INTURSION
DETECTION & PENETRATION TESTING
 Iphones, Blackberrys & Laptops bring
on challenges to protecting data
 A mobile device security policy
should prohibit the storage of
confidential data on mobile devices
 If data is stored on a mobile devices,
the security policy should mandate
the use of data encryption (128 Bit
recommended)
 Want to see power up passwords, kill
switches, and alerts in internal system
when PII is sent
MOBILE DEVICE SERCURITY
WHAT WE CAN PROVIDE IN
PROTECTION & PREVENTION
CYBERSECURITY
THE PATH TO UNDERSTANDING
Exposure & Causes of Loss
“You hold private information”
Legal Issues
“You are obligated to protect it”
Costs of a Data Breach
“Breaches are costly and
complicated”
BBR
Key Features
“Coverage is
available”
 Consumer Information
 Credit cards, debit cards, payment info
 Social Security Numbers, ITIN’s, taxpayer records
 Protected Healthcare Information (PHI), e.g.
medical records, test results
 Personally Identifiable Information (PII), e.g.
Drivers License / Passport details
 Non-PII, like email addresses, phone lists, address
 Employee Information
 Employers have at least some of the above
information
on all of their employees
 Business Partners
 Sub-contractors and Independent Contractors
 Information received from commercial clients as
a part of
commercial transactions or services
 B2B exposures like projections, forecasts, M&A
activity,
trade secrets
INFORMATION AT RISK
PII: Personal Identifiable Information
PHI: Personal Health Information
 Many people think that without credit cards
or PHI, they don’t have a data breach risk.
 But can you think of any business without
any of the above kinds of information?
WHAT IS A DATA BREACH?
 Actual release or disclosure of information to an unauthorized
individual/entity
that relates to a person and that:
 May cause the person inconvenience or harm (financial/reputational)
 - Personally Identifiable Information (PII)
 - Protected Healthcare Information (PHI)
 May cause your company inconvenience or harm
(financial/reputational)
 - Customer Data, Applicant Data
 - Current/Former Employee Data, Applicant Data
 - Corporate Information/Intellectual Property
 Paper or Electronic
 Potential Security Threats
 - Compromises to the integrity, security or confidentiality of
information
 - Circumstances where a data breach may have happened or could
happen
in the future. (e.g. lost flash drive with PII)
KEY CAUSES OF LOSS
• Lost/Stolen Portable
Computers or Media
• Employee Misuse
• Negligent Release
• Improper Disposal of
Paper Records
• Lost/Stolen Backup
Tapes
• Computer Hacking
• Vendor Negligence
• Improper Disposal of
Computer Equipment
Hackers make the headlines, but almost
half of data breach incidents result from
“insider negligence”.
(Ponemon Institute)
815 MILLION
RECORDS
LEAKED
Since Privacy Rights Clearinghouse began tracking US data breaches
in 2005
CAUSES OF LOSS
Malicious or
Criminal
Attack
36%
System
Glitch
29%
Human
Factor
35%
• Hacking
• Virus, Malware
• Phishing
• Spear Phishing
• Network Intrusion
• Lost laptops
• Improper disposal of backup
tapes
• Accidental release
• Broken business practices
• Un-shredded documents
• Negligent release
Source: 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute ,
May 2013
64% of breaches
are accidental
TYPICAL COSTS
• Response costs – sending out notices, call center services, and the offer of
credit monitoring:
o Up to $30 per record
• Forensics, to determine the size and scope of the breach:
o $25,000 to more than $500,000
• Legal Costs:
o Very costly: $200,000 up to the millions
• A retailer with just 10 sales a day would pay $781,000 for a year’s worth of
breached records.
• An MRI facility conducting 15 scans a day would face expenses exceeding
$1 million for every year of patient records compromised.
IT TAKES 20
YEARS TO BUILD
A REPUTATION,
AND FIVE
MINUTES TO
DESTROY IT.
-- Warren
Buffett
“
”
Q&A Reggie Dejean
Specialty Lines Manager
Lawley & Lawley Andolina Verdi
Mary Beth DiBacco
Specialty Insurance Manager
Chubb Insurance
Carl Cadregari
Executive Vice President and Practice
Lead
Bonadio IT/IS Risk Management
THANK YOU
Lawley Insurance

More Related Content

What's hot

Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachFletcher Media
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsShawn Tuma
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsResilient Systems
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeMedSafe
 

What's hot (20)

Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Healthcare Cyber Security Webinar
Healthcare Cyber Security WebinarHealthcare Cyber Security Webinar
Healthcare Cyber Security Webinar
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity Regulations
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafe
 

Viewers also liked

PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNeha Gupta
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
 

Viewers also liked (7)

Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015
Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015
Når det verste skjer, Bård Fossli Jensen, Pasientsikkerhetskonferansen 2015
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Similar to Cybersecurity Seminar March 2015

Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Craig Rispin
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension Inc.
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachCBIZ, Inc.
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for NonprofitsNPowerCR
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Healthcare data breach
Healthcare data breachHealthcare data breach
Healthcare data breachhealthsoftware
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 

Similar to Cybersecurity Seminar March 2015 (20)

Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Healthcare data breach
Healthcare data breachHealthcare data breach
Healthcare data breach
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 

More from Lawley Insurance

How to Prevent a Bad Hire
How to Prevent a Bad Hire How to Prevent a Bad Hire
How to Prevent a Bad Hire Lawley Insurance
 
Key Person Total Rewards for Small & Mid-Size Businesses (Human Resources & E...
Key Person Total Rewards for Small & Mid-Size Businesses (Human Resources & E...Key Person Total Rewards for Small & Mid-Size Businesses (Human Resources & E...
Key Person Total Rewards for Small & Mid-Size Businesses (Human Resources & E...Lawley Insurance
 
How Captive Insurance Has Helped Improve the Bottom Line
How Captive Insurance Has Helped Improve the Bottom LineHow Captive Insurance Has Helped Improve the Bottom Line
How Captive Insurance Has Helped Improve the Bottom LineLawley Insurance
 
OSHA Cooperative Programs for Small Business
OSHA Cooperative Programs for Small BusinessOSHA Cooperative Programs for Small Business
OSHA Cooperative Programs for Small BusinessLawley Insurance
 
Lawley Seminar | ACSI Retirement Planning
Lawley Seminar | ACSI Retirement PlanningLawley Seminar | ACSI Retirement Planning
Lawley Seminar | ACSI Retirement PlanningLawley Insurance
 
Lawley Seminar | Navigating the Retirement Minefield
Lawley Seminar | Navigating the Retirement MinefieldLawley Seminar | Navigating the Retirement Minefield
Lawley Seminar | Navigating the Retirement MinefieldLawley Insurance
 
Lawley Insurance - Saving Money Through Workplace Safety Best Practices
Lawley Insurance - Saving Money Through Workplace Safety Best PracticesLawley Insurance - Saving Money Through Workplace Safety Best Practices
Lawley Insurance - Saving Money Through Workplace Safety Best PracticesLawley Insurance
 
Lawley Insurance - Private Exchnages In The Era Of The Affordable Care Act
Lawley Insurance - Private Exchnages In The Era Of The Affordable Care Act Lawley Insurance - Private Exchnages In The Era Of The Affordable Care Act
Lawley Insurance - Private Exchnages In The Era Of The Affordable Care Act Lawley Insurance
 
Lawley Insurance - New York State Workers Compensation
Lawley Insurance - New York State Workers CompensationLawley Insurance - New York State Workers Compensation
Lawley Insurance - New York State Workers CompensationLawley Insurance
 

More from Lawley Insurance (9)

How to Prevent a Bad Hire
How to Prevent a Bad Hire How to Prevent a Bad Hire
How to Prevent a Bad Hire
 
Key Person Total Rewards for Small & Mid-Size Businesses (Human Resources & E...
Key Person Total Rewards for Small & Mid-Size Businesses (Human Resources & E...Key Person Total Rewards for Small & Mid-Size Businesses (Human Resources & E...
Key Person Total Rewards for Small & Mid-Size Businesses (Human Resources & E...
 
How Captive Insurance Has Helped Improve the Bottom Line
How Captive Insurance Has Helped Improve the Bottom LineHow Captive Insurance Has Helped Improve the Bottom Line
How Captive Insurance Has Helped Improve the Bottom Line
 
OSHA Cooperative Programs for Small Business
OSHA Cooperative Programs for Small BusinessOSHA Cooperative Programs for Small Business
OSHA Cooperative Programs for Small Business
 
Lawley Seminar | ACSI Retirement Planning
Lawley Seminar | ACSI Retirement PlanningLawley Seminar | ACSI Retirement Planning
Lawley Seminar | ACSI Retirement Planning
 
Lawley Seminar | Navigating the Retirement Minefield
Lawley Seminar | Navigating the Retirement MinefieldLawley Seminar | Navigating the Retirement Minefield
Lawley Seminar | Navigating the Retirement Minefield
 
Lawley Insurance - Saving Money Through Workplace Safety Best Practices
Lawley Insurance - Saving Money Through Workplace Safety Best PracticesLawley Insurance - Saving Money Through Workplace Safety Best Practices
Lawley Insurance - Saving Money Through Workplace Safety Best Practices
 
Lawley Insurance - Private Exchnages In The Era Of The Affordable Care Act
Lawley Insurance - Private Exchnages In The Era Of The Affordable Care Act Lawley Insurance - Private Exchnages In The Era Of The Affordable Care Act
Lawley Insurance - Private Exchnages In The Era Of The Affordable Care Act
 
Lawley Insurance - New York State Workers Compensation
Lawley Insurance - New York State Workers CompensationLawley Insurance - New York State Workers Compensation
Lawley Insurance - New York State Workers Compensation
 

Recently uploaded

(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCREscort Service
 
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝thapagita
 
BHOPAL CALL GIRL 92628*71154 BHOPAL CALL
BHOPAL CALL GIRL 92628*71154 BHOPAL CALLBHOPAL CALL GIRL 92628*71154 BHOPAL CALL
BHOPAL CALL GIRL 92628*71154 BHOPAL CALLNiteshKumar82226
 
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...riyaescorts54
 
Call Girls In Lahore || 03010449222 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03010449222 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03010449222 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03010449222 ||Lahore Call Girl Available 24/7Ayesha Khan
 
Call Girls in Lahore || 03090999379 || Get 30% Off on Hot Call Girls Service
Call Girls in Lahore || 03090999379 || Get 30% Off on Hot Call Girls ServiceCall Girls in Lahore || 03090999379 || Get 30% Off on Hot Call Girls Service
Call Girls in Lahore || 03090999379 || Get 30% Off on Hot Call Girls ServiceAyesha Khan
 
Call Girls In Sector 90, (Gurgaon) Call Us. 9711911712
Call Girls In Sector 90, (Gurgaon) Call Us. 9711911712Call Girls In Sector 90, (Gurgaon) Call Us. 9711911712
Call Girls In Sector 90, (Gurgaon) Call Us. 9711911712Delhi Escorts Service
 
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...Ayesha Khan
 
NAGPUR CALL GIRL 92628*71154 NAGPUR CALL
NAGPUR CALL GIRL 92628*71154 NAGPUR CALLNAGPUR CALL GIRL 92628*71154 NAGPUR CALL
NAGPUR CALL GIRL 92628*71154 NAGPUR CALLNiteshKumar82226
 
(9818099198) Call Girls In Noida Sector 88 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 88 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 88 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 88 (NOIDA ESCORTS)riyaescorts54
 
Call Girls In Islamabad 💯Call Us 🔝03090999379🔝
Call Girls In Islamabad 💯Call Us 🔝03090999379🔝Call Girls In Islamabad 💯Call Us 🔝03090999379🔝
Call Girls In Islamabad 💯Call Us 🔝03090999379🔝Ayesha Khan
 
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝Lipikasharma29
 
NASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNiteshKumar82226
 
Call Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts ServiceCall Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts ServiceLipikasharma29
 
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Pooja Nehwal
 
Call Girls in Calangute Beach 8588052666 Goa Escorts ...
Call Girls in Calangute Beach 8588052666 Goa Escorts ...Call Girls in Calangute Beach 8588052666 Goa Escorts ...
Call Girls in Calangute Beach 8588052666 Goa Escorts ...nishakur201
 
Call Girls In Karachi || 03070433345 || Sexy & Affordable Call Girls In Karachi
Call Girls In Karachi || 03070433345 || Sexy & Affordable Call Girls In KarachiCall Girls In Karachi || 03070433345 || Sexy & Affordable Call Girls In Karachi
Call Girls In Karachi || 03070433345 || Sexy & Affordable Call Girls In KarachiAyesha Khan
 
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Availablenitugupta1209
 
Call Girls in Janakpuri Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Janakpuri Delhi 💯 Call Us 🔝9667422720🔝Call Girls in Janakpuri Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Janakpuri Delhi 💯 Call Us 🔝9667422720🔝Lipikasharma29
 

Recently uploaded (20)

(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
(9599264170) ↫ Call Girls In Rk Puram ↫ Delhi NCR
 
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
 
BHOPAL CALL GIRL 92628*71154 BHOPAL CALL
BHOPAL CALL GIRL 92628*71154 BHOPAL CALLBHOPAL CALL GIRL 92628*71154 BHOPAL CALL
BHOPAL CALL GIRL 92628*71154 BHOPAL CALL
 
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
 
Call Girls In Lahore || 03010449222 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03010449222 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03010449222 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03010449222 ||Lahore Call Girl Available 24/7
 
Call Girls in Lahore || 03090999379 || Get 30% Off on Hot Call Girls Service
Call Girls in Lahore || 03090999379 || Get 30% Off on Hot Call Girls ServiceCall Girls in Lahore || 03090999379 || Get 30% Off on Hot Call Girls Service
Call Girls in Lahore || 03090999379 || Get 30% Off on Hot Call Girls Service
 
Call Girls In Sector 90, (Gurgaon) Call Us. 9711911712
Call Girls In Sector 90, (Gurgaon) Call Us. 9711911712Call Girls In Sector 90, (Gurgaon) Call Us. 9711911712
Call Girls In Sector 90, (Gurgaon) Call Us. 9711911712
 
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...
Book Call Girls in Lahore || 03070433345 || Young, Hot, Sexy, VIP Girls Avail...
 
NAGPUR CALL GIRL 92628*71154 NAGPUR CALL
NAGPUR CALL GIRL 92628*71154 NAGPUR CALLNAGPUR CALL GIRL 92628*71154 NAGPUR CALL
NAGPUR CALL GIRL 92628*71154 NAGPUR CALL
 
(9818099198) Call Girls In Noida Sector 88 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 88 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 88 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 88 (NOIDA ESCORTS)
 
Call Girls In Islamabad 💯Call Us 🔝03090999379🔝
Call Girls In Islamabad 💯Call Us 🔝03090999379🔝Call Girls In Islamabad 💯Call Us 🔝03090999379🔝
Call Girls In Islamabad 💯Call Us 🔝03090999379🔝
 
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Paharganj Delhi 💯 Call Us 🔝9667422720🔝
 
NASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALL
 
Call Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts ServiceCall Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts Service
 
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
 
Call Girls in Calangute Beach 8588052666 Goa Escorts ...
Call Girls in Calangute Beach 8588052666 Goa Escorts ...Call Girls in Calangute Beach 8588052666 Goa Escorts ...
Call Girls in Calangute Beach 8588052666 Goa Escorts ...
 
Call Girls In Karachi || 03070433345 || Sexy & Affordable Call Girls In Karachi
Call Girls In Karachi || 03070433345 || Sexy & Affordable Call Girls In KarachiCall Girls In Karachi || 03070433345 || Sexy & Affordable Call Girls In Karachi
Call Girls In Karachi || 03070433345 || Sexy & Affordable Call Girls In Karachi
 
Call Girls In Saket Delhi 9953056974 (Low Price) Escort Service Saket Delhi
Call Girls In Saket Delhi 9953056974 (Low Price) Escort Service Saket DelhiCall Girls In Saket Delhi 9953056974 (Low Price) Escort Service Saket Delhi
Call Girls In Saket Delhi 9953056974 (Low Price) Escort Service Saket Delhi
 
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
9811611494,Low Rate Call Girls In Connaught Place Delhi 24hrs Available
 
Call Girls in Janakpuri Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Janakpuri Delhi 💯 Call Us 🔝9667422720🔝Call Girls in Janakpuri Delhi 💯 Call Us 🔝9667422720🔝
Call Girls in Janakpuri Delhi 💯 Call Us 🔝9667422720🔝
 

Cybersecurity Seminar March 2015

  • 1. C Y B E R S E C U R I T Y I N S U R A N C E S E M I N A R Can You Afford NOT To Have Cybersecurity? March 4, 2015
  • 2. TODAY’S PRESENTERS Reggie Dejean Specialty Lines Manager Lawley & Lawley Andolina Verdi Mary Beth DiBacco Specialty Insurance Manager Chubb Insurance Carl Cadregari Executive Vice President and Practice Lead Bonadio IT/IS Risk Management
  • 5. HEADLINES EXPLAINED  Identities left exposed in Indiana salvage yards - items included medical records, bank statements, insurance cards, employee identification cards, car registrations, a signature, a child’s name, dates of birth, and an application for welfare assistance.  Stolen Pioneer bank laptop contained some customers’ data  Pioneer Bank over the weekend alerted some of its customers that an employee’s laptop stolen Jan. 26 contained “secured personal information of certain customers, including names, social security numbers, street addresses, and account and debit card numbers.”  Harel Chiropractic Clinic notifies 3,000 patients of breach
  • 6. HEADLINES EXPLAINED CONT.  St. Peter’s Health Partners is warning of a possible data breach in its email system, following the theft of a manager’s cellphone.  California Pacific Medical Center discovers employee was improperly accessing patient records for one year  Natural Grocers Investigating Card Breach - traced a pattern of fraud on customer credit and debit cards suggesting that hackers have tapped into cash registers at Natural Grocers locations across the country
  • 7. HEADLINES EXPLAINED CONT.  Data Breach Results in $4.8 Million HIPAA Settlements from New York and Presbyterian Hospital  A 214 bed Medical Center laptop stolen with data in an excel spreadsheet - Medical Center says data is safe since the thief would have to know how to unhide columns in Excel spreadsheet to read them
  • 8. THREATS TO DATA  Internal Threats  External Threats  Have You Heard About Target?  Not just credit card information but also personal identifiable information (PII) is at risk  According to recent surveys  Street Cost – Social Security Number……..$ 1.00  Street Cost – Financial Record ……........... $ 0.50  Lost Medical Record………………………..$316.00
  • 9. CSIRP Computer Security Incident Response Plan • Wh a t to d o wh e n y o u “ th i n k o r k n o w” y o u h a v e h a d a d i s c l o s u r e • Th e wh o , wh a t wh e r e a n d wh e n to f o l l o w • S te p b y s te p p r o c e s s • M a y b e r e q u i r e d b y s o m e l a ws a n d r e g u l a ti o n s
  • 10. CSIRP You Need a Breach Notification Policy 1. NY State, HIPAA, PCI, GLBA requires a documented policy that includes all factors of breach notification including: • When to alert persons whose data has been breached • What you have to pay for • When to send lost data information to the Attorney General and regulatory bodies • When you are to place conspicuous notice on your website • When you are to alert local media and television
  • 11. CSIRP You need a plan to follow that includes: 1. What constitutes a breach 2. Who is on the team 3. Who is allowed to talk to any external entity 4. When to involve external crisis management 5. When to trigger your liability policy
  • 12. CSIRP 1. How to assess the risks (likelihood and severity) 2. Does the breach fall into pre-defined categories (and what are they) 3. What to do to investigate the breach 4. What to do to minimize the breach 5. What to do to report on the breach 6. What to do to never repeat the breach 7. How to close the incident
  • 13. AFTER THE INFORMATION HAS BEEN GATHERED INFORMATION
  • 14. WHAT IS THE IMMEDIATE EXPENSE? • Notification • Creating letter or other notification • Printing or design • Mailing or other transmission • Public Relations • Call Center operations • Credit Monitoring or Identity Theft Remediation • Advertising & Press Releases • Forensics • Legal Expenses for outside Attorney • Cost of Forensic Examination • Cost to Remediate Discovered Vulnerabilities
  • 15. KEY COSTS TO A DATA BREACH DIRECT COSTS VICTIM COSTS INDIRECT COSTS ($134) Cost Per Record $201 (2014) • Discovery • Data Forensics • Notification • Call Center • Identity Monitoring • Identity Remediation • Lawsuits • Regulatory Fines • Additional Security & Audit Requirements • Reputational Damage/Lost Business Source: Ponemon Institute, LLC and Symantec Corporation. 2014 Annual Study: U.S. Cost of a Data Breach. March 2014
  • 16. DATA IS VULNERABLE Data can escape your organization in many different ways Source: Privacy Rights Clearinghouse, Chronology of Data Breaches 2008-2013. www.privacyrights.org 4% 6% 12% 12% 18% 23% 25% STATIONARY DEVICE UNKNOWN PHYSICAL MALICIOUS INSIDER NEGLIGENCE HACKING PORTABLE DEVICES
  • 17. COMPUTER SECURITY vs. INFORMATION SECURITY  COMPUTER SECURITY  This means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering ro collapse by unauthorized activiites or untrustworthy individuals and unplanned events.  INFORMATION SECURITY  This is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc.).
  • 18. INCIDENT RESPONSE PLAN 1. If a company does not have one they are playing with fire 2. Essential for company to have in place in order to effectively respond to a security breach 3. IRP’s should be tested at least on an annual basis using various breach scenarios 4. IRP’s typically include: 1. A. IRP Team (Ideally SR Mgmt. in Info Tech, Customer Service, Legal, Privacy & PR 2. B. Clear guidelines categorizing a risk/threat level 3. C. Documentation Instructions 4. D. Guidelines for getting third parties involved 5. E. Notification Process -- One of the most important practices --
  • 19.  Sets the security foundation  First measure that must be taken to reduce the risk of unacceptable use of the company’s information resources  Companies define which assets are critical and ways to protect them  Development and implementation of a security policy turns employees into active participants towards securing company information (helps prevent human factor)  Should be tested and reviewed on an annual basis INFORMATION SECURITY POLICY
  • 20.  Key factors to help a company protect their systems  Protection starts with firewalls as they protect resources on a private network  Anti-virus software can be used to prevent, detect & remove viruses  Intrusion detection software monitors the network for malicious activity or policy violations & reports back (should be reviewed monthly at a minimum)  Penetration tests look for vulnerable access points (preferred but many small companies don’t run. VIRUS PREVENTION, INTURSION DETECTION & PENETRATION TESTING
  • 21.  Iphones, Blackberrys & Laptops bring on challenges to protecting data  A mobile device security policy should prohibit the storage of confidential data on mobile devices  If data is stored on a mobile devices, the security policy should mandate the use of data encryption (128 Bit recommended)  Want to see power up passwords, kill switches, and alerts in internal system when PII is sent MOBILE DEVICE SERCURITY
  • 22. WHAT WE CAN PROVIDE IN PROTECTION & PREVENTION CYBERSECURITY
  • 23. THE PATH TO UNDERSTANDING Exposure & Causes of Loss “You hold private information” Legal Issues “You are obligated to protect it” Costs of a Data Breach “Breaches are costly and complicated” BBR Key Features “Coverage is available”
  • 24.  Consumer Information  Credit cards, debit cards, payment info  Social Security Numbers, ITIN’s, taxpayer records  Protected Healthcare Information (PHI), e.g. medical records, test results  Personally Identifiable Information (PII), e.g. Drivers License / Passport details  Non-PII, like email addresses, phone lists, address  Employee Information  Employers have at least some of the above information on all of their employees  Business Partners  Sub-contractors and Independent Contractors  Information received from commercial clients as a part of commercial transactions or services  B2B exposures like projections, forecasts, M&A activity, trade secrets INFORMATION AT RISK PII: Personal Identifiable Information PHI: Personal Health Information  Many people think that without credit cards or PHI, they don’t have a data breach risk.  But can you think of any business without any of the above kinds of information?
  • 25. WHAT IS A DATA BREACH?  Actual release or disclosure of information to an unauthorized individual/entity that relates to a person and that:  May cause the person inconvenience or harm (financial/reputational)  - Personally Identifiable Information (PII)  - Protected Healthcare Information (PHI)  May cause your company inconvenience or harm (financial/reputational)  - Customer Data, Applicant Data  - Current/Former Employee Data, Applicant Data  - Corporate Information/Intellectual Property  Paper or Electronic  Potential Security Threats  - Compromises to the integrity, security or confidentiality of information  - Circumstances where a data breach may have happened or could happen in the future. (e.g. lost flash drive with PII)
  • 26. KEY CAUSES OF LOSS • Lost/Stolen Portable Computers or Media • Employee Misuse • Negligent Release • Improper Disposal of Paper Records • Lost/Stolen Backup Tapes • Computer Hacking • Vendor Negligence • Improper Disposal of Computer Equipment Hackers make the headlines, but almost half of data breach incidents result from “insider negligence”. (Ponemon Institute)
  • 27. 815 MILLION RECORDS LEAKED Since Privacy Rights Clearinghouse began tracking US data breaches in 2005
  • 28. CAUSES OF LOSS Malicious or Criminal Attack 36% System Glitch 29% Human Factor 35% • Hacking • Virus, Malware • Phishing • Spear Phishing • Network Intrusion • Lost laptops • Improper disposal of backup tapes • Accidental release • Broken business practices • Un-shredded documents • Negligent release Source: 2013 Cost of Data Breach Study: Global Analysis, Ponemon Institute , May 2013 64% of breaches are accidental
  • 29. TYPICAL COSTS • Response costs – sending out notices, call center services, and the offer of credit monitoring: o Up to $30 per record • Forensics, to determine the size and scope of the breach: o $25,000 to more than $500,000 • Legal Costs: o Very costly: $200,000 up to the millions • A retailer with just 10 sales a day would pay $781,000 for a year’s worth of breached records. • An MRI facility conducting 15 scans a day would face expenses exceeding $1 million for every year of patient records compromised.
  • 30. IT TAKES 20 YEARS TO BUILD A REPUTATION, AND FIVE MINUTES TO DESTROY IT. -- Warren Buffett “ ”
  • 31. Q&A Reggie Dejean Specialty Lines Manager Lawley & Lawley Andolina Verdi Mary Beth DiBacco Specialty Insurance Manager Chubb Insurance Carl Cadregari Executive Vice President and Practice Lead Bonadio IT/IS Risk Management