SlideShare a Scribd company logo
1 of 27
Case Study: New Revenue
Streams for Identity Theft
What we will be talking about today:
• Definition of identity theft
• Privacy issues
• Victims of the breach
• New revenue streams for
identity thieves
• Solutions
What is Identity Theft?
The unauthorized use of personal,
identifying information to obtain credit,
goods, services, or medical information in
the name of another person.
What is the BIGGEST Problem?
WHO ARE WE?
“You already have
zero privacy...get
over it!”
Scott McNealy,
CEO Sun Microsystems
Defining Privacy Issues
Privacy and American Business’
2013 Survey on Privacy
Revealed:
96% of Americans are
concerned about the loss
of their privacy, primarily
through use of the Internet
Defining Privacy Issues
78% believe they have lost the ability to control the use of their
personal data.
47% believe that there still may be an opportunity to stem that
loss through legislation and industry policing.
65% believe this is an alarming trend and take steps to remove
themselves from any database.
Consumer Information Collection Points
•Credit card application and use
•Supermarket/loyalty cards
•Magazine subscriptions
•Charitable Donations
•Prize drawing entry slips
•Public record information: Births,
marriages, real estate transactions
Victims of the breach
• Hospitals
• Banks and financial
institutions
• Commercial enterprises
• Government agencies
• Colleges and universities
• ANY PLACE THAT STORES
PERSONAL INFORMATION
New Revenue Streams for Identity Thieves
Medical Records: John Hopkins
• Patient Records
• Billing Department
• Patient Admission
• Employees
• IT Department
• Resumes
• Credentials
Sources:
•Medical Care
•Money
•Volume of Victims
New Revenue Streams for Identity Thieves
Medical Records: John Hopkins
Benefits of Information
New Revenue Streams for Identity Thieves
Banks and Financial Institutions: Bank of Am, Data Card
• Signature Cards
• Employees
• IT Department
• Marketing
Department
• Resumes
Sources:
New Revenue Streams for Identity Thieves
Banks and Financial Institutions: Bank of Am, Data Card
• Money
• Volume of Victims
Benefits of Information:
New Revenue Streams for Identity Thieves
Commercial Enterprises: Target, Wal-Mart
• HR Department
• Contracted Pre-Employment
Screening Company
• Benefits Department
• Payroll Department
• Employees
• IT Department
• Resumes
Sources:
New Revenue Streams for Identity Thieves
Commercial Enterprises: Target, Wal-Mart
• Money
• Volume of Victims
Benefits of Information:
New Revenue Streams for Identity Thieves
Government Agencies: Department of Defense
• Applications
• IT Department
• Employees
• Tax Returns
Sources:
New Revenue Streams for Identity Thieves
Government Agencies: Department of Defense
• Money
• Volume of Victims
Benefits of Information:
New Revenue Streams for Identity Thieves
Colleges and Universities: George Mason University, UCLA
• Registrar
• Instructors and Professors
• IT Department
• Benefits Department
• Payroll Department
• Resumes
• Credentials
Sources:
New Revenue Streams for Identity Thieves
Colleges and Universities: George Mason University, UCLA
• Money
• Volume of Victims
Benefits of Information:
New Revenue Streams for Identity Thieves
• Death Records
• New Born Records
• E-mail Scams
• Phishing
• Third Party Vendors
• Third Party Storage Vendors
• Social Media (Facebook,
LinkedIn, etc.)
Miscellaneous Sources:
Strategies to Minimize Risk and Prevent Breaches
• Properly safeguard and store
employee/student records.
• Ensure compliance with new laws
governing identity theft and
storage of records
• Address the legal ramifications
you could face if
employee/student data is stolen
Strategies to Minimize Risk and Prevent Breaches
• Properly destroy confidential
records
• Accurately handle resumes
submitted via the internet
• Scrutinize employees by
performing background checks
and restricting access
• Develop a response plan if
records are stolen
Strategies to Minimize Risk and Prevent Breaches
• Implement key policies and
procedures to maintain overall
security of your records
• Avoid potential pitfalls when
dealing with sensitive data
• Work with third parties who may
have access to your employees’
information
QUESTION?
Chris M. Wright, CPP
chris@thewrightgroup.com
www.thewrightgroup.com
(714) 687-1190
New Revenue Streams for Identity Theft

More Related Content

Viewers also liked

Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL Ministerio TIC Colombia
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (10)

Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
HURTO DE CELULARES: PROBLEMA DE SEGURIDAD PUBLICA - ICPO – INTERPOL
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to New Revenue Streams for Identity Theft

CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...Steven Wardell
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime SecureAuth
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraudtomciolkosz
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theftmherr_riskconsult
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftElizabeth Dimit
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 

Similar to New Revenue Streams for Identity Theft (20)

CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
CISummit 2013: Busting Fraud Rings - The Cases of Healthcare & Financial Serv...
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
FHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking FraudFHRBOC Preventing NFP Banking Fraud
FHRBOC Preventing NFP Banking Fraud
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Naccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity TheftNaccu Card Fraud And Identity Theft
Naccu Card Fraud And Identity Theft
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Scam-Alert-Mod.pptx
Scam-Alert-Mod.pptxScam-Alert-Mod.pptx
Scam-Alert-Mod.pptx
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
Anthem Data Breach
Anthem Data BreachAnthem Data Breach
Anthem Data Breach
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
Privacy Needs to be Personal
Privacy Needs to be PersonalPrivacy Needs to be Personal
Privacy Needs to be Personal
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 

Recently uploaded

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 

Recently uploaded (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

New Revenue Streams for Identity Theft

  • 1. Case Study: New Revenue Streams for Identity Theft
  • 2. What we will be talking about today: • Definition of identity theft • Privacy issues • Victims of the breach • New revenue streams for identity thieves • Solutions
  • 3. What is Identity Theft? The unauthorized use of personal, identifying information to obtain credit, goods, services, or medical information in the name of another person.
  • 4. What is the BIGGEST Problem?
  • 6. “You already have zero privacy...get over it!” Scott McNealy, CEO Sun Microsystems
  • 7. Defining Privacy Issues Privacy and American Business’ 2013 Survey on Privacy Revealed: 96% of Americans are concerned about the loss of their privacy, primarily through use of the Internet
  • 8. Defining Privacy Issues 78% believe they have lost the ability to control the use of their personal data. 47% believe that there still may be an opportunity to stem that loss through legislation and industry policing. 65% believe this is an alarming trend and take steps to remove themselves from any database.
  • 9. Consumer Information Collection Points •Credit card application and use •Supermarket/loyalty cards •Magazine subscriptions •Charitable Donations •Prize drawing entry slips •Public record information: Births, marriages, real estate transactions
  • 10. Victims of the breach • Hospitals • Banks and financial institutions • Commercial enterprises • Government agencies • Colleges and universities • ANY PLACE THAT STORES PERSONAL INFORMATION
  • 11. New Revenue Streams for Identity Thieves Medical Records: John Hopkins • Patient Records • Billing Department • Patient Admission • Employees • IT Department • Resumes • Credentials Sources:
  • 12. •Medical Care •Money •Volume of Victims New Revenue Streams for Identity Thieves Medical Records: John Hopkins Benefits of Information
  • 13. New Revenue Streams for Identity Thieves Banks and Financial Institutions: Bank of Am, Data Card • Signature Cards • Employees • IT Department • Marketing Department • Resumes Sources:
  • 14. New Revenue Streams for Identity Thieves Banks and Financial Institutions: Bank of Am, Data Card • Money • Volume of Victims Benefits of Information:
  • 15. New Revenue Streams for Identity Thieves Commercial Enterprises: Target, Wal-Mart • HR Department • Contracted Pre-Employment Screening Company • Benefits Department • Payroll Department • Employees • IT Department • Resumes Sources:
  • 16. New Revenue Streams for Identity Thieves Commercial Enterprises: Target, Wal-Mart • Money • Volume of Victims Benefits of Information:
  • 17. New Revenue Streams for Identity Thieves Government Agencies: Department of Defense • Applications • IT Department • Employees • Tax Returns Sources:
  • 18. New Revenue Streams for Identity Thieves Government Agencies: Department of Defense • Money • Volume of Victims Benefits of Information:
  • 19. New Revenue Streams for Identity Thieves Colleges and Universities: George Mason University, UCLA • Registrar • Instructors and Professors • IT Department • Benefits Department • Payroll Department • Resumes • Credentials Sources:
  • 20. New Revenue Streams for Identity Thieves Colleges and Universities: George Mason University, UCLA • Money • Volume of Victims Benefits of Information:
  • 21. New Revenue Streams for Identity Thieves • Death Records • New Born Records • E-mail Scams • Phishing • Third Party Vendors • Third Party Storage Vendors • Social Media (Facebook, LinkedIn, etc.) Miscellaneous Sources:
  • 22. Strategies to Minimize Risk and Prevent Breaches • Properly safeguard and store employee/student records. • Ensure compliance with new laws governing identity theft and storage of records • Address the legal ramifications you could face if employee/student data is stolen
  • 23. Strategies to Minimize Risk and Prevent Breaches • Properly destroy confidential records • Accurately handle resumes submitted via the internet • Scrutinize employees by performing background checks and restricting access • Develop a response plan if records are stolen
  • 24. Strategies to Minimize Risk and Prevent Breaches • Implement key policies and procedures to maintain overall security of your records • Avoid potential pitfalls when dealing with sensitive data • Work with third parties who may have access to your employees’ information
  • 26. Chris M. Wright, CPP chris@thewrightgroup.com www.thewrightgroup.com (714) 687-1190