SlideShare a Scribd company logo
 
Understanding Risk Management “  The Process of identifying, categorizing, measuring, monitoring and mitigating risk in your Company”
Questions to determine how exposed the company is to Risk ,[object Object],[object Object],[object Object],[object Object],[object Object]
Question for the Senior IT Executive Are your Data Sources Secure? What is the source of the information provided to Senior Management in your reports ? How reliable are these sources, how are they validated?  When was the last time someone audited the information? Have you met with your people and are you sure that they clearly understands the potential risks associated with not protecting the confidentiality of information within the company systems? According to Deloitte Financial Advisory Services, 24.3 percent of survey respondents in 2009 indicated that they view the risk of a government investigation as being higher today than a year ago, yet only 20.8 percent of these executives say their organizations are  “ very ready ”  to handle a government or regulatory investigation. Worse: A 2008 study conducted by Aon Risk Services found that among 320 corporations in 29 countries, a shocking 42 percent of respondents identified risk only through intuition.
What we have Identified from working with our Customers: Many Business don’t understand how technology can be used. They don ’ t have a technology view of their business.  IT is often accuse of not being business-focused , technology gets blamed for things that business people are not actually doing themselves. The  management of strategic risk and regulatory compliance can not be delegated it must reside at the board level. The strategic importance of information and the nature of current business technologies have raised the stakes regarding the privacy, security and confidentiality of information.  In particular, there is heightened sensitivity to safeguarding not just sensitive corporate transaction data, but also data about customers, employees and business partners. The pervasiveness of business technologies has made it far easier for unauthorized pilferage of such information and data. In addition, with heightened concerns about terror, regulations increasingly compel organizations to furnish more data than before.
The Management of Compliance Requires Attention to the following: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is the Financial Implications of A Breach? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: 2007 Annual Study: U.S. Cost of a Data Breach, Understanding Financial Impact, Customer Turnover, and Preventative Solutions, by The Ponemon Institute, PGP Corporation, and Vontu, Inc. Source: Forrester Research
Worldwide Laws and Regulations Increases Need for Protecting Data New, more prescriptive laws and regulations affording greater protection to personal information are based on the very real threats posed by identity thieves, scam artists and crooks who are stealing credit- and debit-card numbers, health plan data and bank account information and the like that reside in disparate databases and are transmitted over the Internet.
Two Main Watch Dog Organizations  The two federal agencies with privacy and security laws that impact most U.S. organizations are the Department of Health and Human Services (HHS) and the Federal Trade Commission (FTC).  The HHS is pushing the health care industry to use electronic medical records (EMRs), health information exchanges (HIEs) and health information technology (HIT) to improve health care and reduce costs. Organizations that have health plans are affected by the privacy and security requirements of the Health Insurance Portability and Accountability Act (HIPAA), and they could potentially benefit from the use of EMRs, HIEs and HIT if health care costs are reduced.  The FTC is the consumer watchdog agency that oversees a number of federal laws and regulations that protect personal information from inappropriate use or disclosure, enforce implicit and explicit privacy and security promises of organizations to consumers, and restrict how credit information may be used and disclosed. Both the HHS and the FTC have been busy on a number of fronts in 2008, including the following:
Recent Regulations •  The FTC introduced the “Red Flags Rule” (meant to address red flags that are indicators of identity theft), which will go into effect on May 1, 2009. It requires creditors (and financial institutions through applicable regulatory agencies with a Nov. 1, 2008, date) to have identity-theft-prevention programs in place. The Red Flags Rule also requires boards of directors and senior management oversight of programs, as well as company oversight of third-party service providers.  •  The HHS stepped up enforcement of HIPAA security regulations that require security controls to protect electronic-protected health information. Additionally, it is moving from a solely complaints-driven process to one that is also proactive.  •  Different HHS entities are providing guidance and proposals that advance the use of EMRs, HIEs and HIT by the health care industry, and address related functionality, interoperability, and privacy and security issues.  In 2008, certain states expanded the scope of information security breach notification laws (in effect in 44 states, the District of Columbia, Puerto Rico and the Virgin Islands) to include not only financial and other identifying information, but also medical information, as well as requiring notification in case of a breach when such information is unencrypted. Other states are now or will be requiring that certain personal
Phishing Targets: In 2008, financial institutions were unquestionably the dominant target of phishing e-mails. In the first half of 2009, financial institutions are still the number one target. Along with the decline in phishing and the change in phishing origins, the actual targets of phishing have changed significantly. Financial institutions now only represent 66.3 percent of the targets, allowing Online Payment institutions to consume 31.4 percent of the share. This change in percentage is not necessarily indicative of more phishing directed towards Online Payment organizations, but more accurately represents the decline in North American and European financial targets when it comes to phishing. The other 2.3 percent of phishing targets is comprised of other industries such as online auction Websites, communication services, and online stores : Phishing Targets by Industry, 2009 H1
Why Outsourcing all or part of Risk management can help their company remain compliant in today's world In addition to the complexities of an ever changing economy, the requirements to provide quicker, accurate information has come at a time when penalties for not protecting consumer data are sky rocketing as seen in the TJ Max court decisions. As a result companies are not properly organized within both business and IT to keep up with the almost daily mandates on data protection.  When factoring the increased cost of new systems technologies, data integration requirements, and the growing costs of maintaining  and educating an in-house staff, outsourcing risk analysis and management has become the logical choice. In the 2009 Accenture Global risk Management study, 63% of the 250 companies executives surveyed believed that some aspects of risk management can be outsourced to deliver better efficiencies .
Our Focus  1 Business Risk:  This consists of actual threats to the organization, including its products, services, intellectual property and records. Business leaders must communicate to IT leaders what issues exist and where data might reside.  2 Technology Risk:  It’s important to understand what pieces of information need to be protected in what way, so that an organization can build the right IT infrastructure 3 Legal/Regulatory Risk:  An organization must establish processes and systems that match legal requirements, whether that involves an e-discovery system that must comply with an e-mail retention  rule or storage and encryption standards for managing credit card data.  4 External Risk:  IT must address all external threats related to data storage and retention, life-cycle management. IT needs to play a central role in protecting and  disposing of data properly.  Understanding Risk Enterprise risk management can touch all corners of an enterprise. However, governance, risk and compliance (GRC) typically addresses four primary challenges:
Our Strategy for Security Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Security Strategy requires implementing a combination of technical and organizational controls:
Strategema Has Selected Only The Best As Their Partner:
"Stratagema’s Channel Solutions Partner; IBM Internet Security Solutions Group  ISS
Best Security Award SAN FRANCISCO, - 04 Mar 2010:  IBM (NYSE:  IBM ) today announced it has been named Best Security Company by SC Magazine.  The award, recognizing IBM's leadership in IT and its outstanding security solutions, was presented yesterday at the SC Awards Gala, held in conjunction with the annual RSA Conference in San Francisco. For nearly 50 years, IBM has helped businesses and governments secure their critical infrastructures with solutions that go beyond just collections of niche products.  IBM's customers rely on the most comprehensive security solutions and services addressing compliance mandates, applications, data, identity and access management, networks, threat prevention, systems security, email, encryption, virtualization and cloud security.   "With the Best Security Company Award, our judges have recognized IBM as a leader in the constant battle to protect businesses, customers and data
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Last Word on Reduced Risk, and Compliance There is no Guarantee that a company will remain compliant, with each new regulatory compliance adds another layer of IT risk. Businesses today must contend with an increasing number of government and non-government regulations. The risks of non-compliance are serious and can include fines often in the hundreds of millions of dollars, prosecution of key corporate officers, or loss of business when forced to shut down. But maintaining an effective data protection strategy is not just for the yearly audit, it must be incorporated into the highest levels of the business and it’s strategy, viewed by the company as an living ongoing project. The recent Data Breach of “ Heartland Payment Systems”   echoed this throughout the payment card industry  demonstrating even the most staunch supporter of PCI compliance can never let their guard down.
What Does This Mean to the Resnick Druckman Group LLC: Strategema Consulting will partner to make your data secure, so you in return will be able to assure your accounts that the same security measures you are recommending are part of normal operation procedures for your group:  We will educate your people on the current security climate, new developments, white papers and webinars: Strategema Consulting will continue to grow and be your one stop source to present real world solutions to your clients: Strategema Consulting becomes an integrated  resource to develop a risk management  practice included as part of your accounting practice: Working with Strategema consulting provides both you and your accounts the premier Security solution supported  by the largest provider IBM ISS:

More Related Content

What's hot

CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White PaperDmcenter
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
Herring Consulting & Financial Group
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
Echoworx
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentAkshay Ajgaonkar
 
Security Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. FrameworkSecurity Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. FrameworkDivya Kothari
 
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015Andy Kim
 
RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB CybersecurityAndy Kim
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
EMC
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
danc752
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
xband
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
EY
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record Theft
OPSWAT
 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
The Capital Network
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...
David J Rosenthal
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
- Mark - Fullbright
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
EamonnORagh
 
Chief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementChief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk management
Grant Thornton LLP
 

What's hot (19)

CSR PII White Paper
CSR PII White PaperCSR PII White Paper
CSR PII White Paper
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
 
Security Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. FrameworkSecurity Compliance Models- Checklist v. Framework
Security Compliance Models- Checklist v. Framework
 
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
FIS article - FFIEC Cybersecurity Assessment - by Andy Kim - Summer 2015
 
RIB Cybersecurity
RIB CybersecurityRIB Cybersecurity
RIB Cybersecurity
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4Adrs Flip Chart With Red Flags Rev4
Adrs Flip Chart With Red Flags Rev4
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
 
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
Findings from India Fraud Survey 2012: Fraud and Corporate Governance - Chang...
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record Theft
 
Privacy and Information Security: What Every New Business Needs to Know
Privacy and Information Security:  What Every New Business Needs to KnowPrivacy and Information Security:  What Every New Business Needs to Know
Privacy and Information Security: What Every New Business Needs to Know
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...
Cost of Data Breach Study in 2015 - United States - Presented by IBM and Pono...
 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
databreach whitepaper
databreach whitepaperdatabreach whitepaper
databreach whitepaper
 
Chief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk managementChief Audit Execs speak out: Cybersecurity & risk management
Chief Audit Execs speak out: Cybersecurity & risk management
 

Viewers also liked

AdWords Konferenz_2012: Siegfried Stepke - Landingpage Optimierung
AdWords Konferenz_2012: Siegfried Stepke - Landingpage OptimierungAdWords Konferenz_2012: Siegfried Stepke - Landingpage Optimierung
AdWords Konferenz_2012: Siegfried Stepke - Landingpage Optimierung
e-dialog GmbH
 
"Push Publishing Power
"Push Publishing Power"Push Publishing Power
"Push Publishing Power
Jason Smith
 
Sales Acceleration programme called GoGetter
Sales Acceleration programme called GoGetterSales Acceleration programme called GoGetter
Sales Acceleration programme called GoGetter
SalesRehab Pty Ltd
 
Inner Classes & Multi Threading in JAVA
Inner Classes & Multi Threading in JAVAInner Classes & Multi Threading in JAVA
Inner Classes & Multi Threading in JAVATech_MX
 
The Creative Brief: An Introduction
The Creative Brief: An IntroductionThe Creative Brief: An Introduction
The Creative Brief: An Introduction
edward boches
 
PMP Training - 07 project cost management
PMP Training - 07 project cost managementPMP Training - 07 project cost management
PMP Training - 07 project cost managementejlp12
 
Chromotography
ChromotographyChromotography
Chromotography
Omer Bayazeid, PhD
 
Top 50 B2B Marketing Case Studies of 2012
Top 50 B2B Marketing Case Studies of 2012Top 50 B2B Marketing Case Studies of 2012
Top 50 B2B Marketing Case Studies of 2012
BtoB Online
 
Principles and application of chromatography
Principles and application of chromatographyPrinciples and application of chromatography
Principles and application of chromatographysuniu
 

Viewers also liked (9)

AdWords Konferenz_2012: Siegfried Stepke - Landingpage Optimierung
AdWords Konferenz_2012: Siegfried Stepke - Landingpage OptimierungAdWords Konferenz_2012: Siegfried Stepke - Landingpage Optimierung
AdWords Konferenz_2012: Siegfried Stepke - Landingpage Optimierung
 
"Push Publishing Power
"Push Publishing Power"Push Publishing Power
"Push Publishing Power
 
Sales Acceleration programme called GoGetter
Sales Acceleration programme called GoGetterSales Acceleration programme called GoGetter
Sales Acceleration programme called GoGetter
 
Inner Classes & Multi Threading in JAVA
Inner Classes & Multi Threading in JAVAInner Classes & Multi Threading in JAVA
Inner Classes & Multi Threading in JAVA
 
The Creative Brief: An Introduction
The Creative Brief: An IntroductionThe Creative Brief: An Introduction
The Creative Brief: An Introduction
 
PMP Training - 07 project cost management
PMP Training - 07 project cost managementPMP Training - 07 project cost management
PMP Training - 07 project cost management
 
Chromotography
ChromotographyChromotography
Chromotography
 
Top 50 B2B Marketing Case Studies of 2012
Top 50 B2B Marketing Case Studies of 2012Top 50 B2B Marketing Case Studies of 2012
Top 50 B2B Marketing Case Studies of 2012
 
Principles and application of chromatography
Principles and application of chromatographyPrinciples and application of chromatography
Principles and application of chromatography
 

Similar to Accounting

Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
CBIZ, Inc.
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Financial Poise
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Financial Poise
 
2015 cost of data breach study
2015 cost of data breach study2015 cost of data breach study
2015 cost of data breach study
The Internet of Things
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Servicegorsline
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
FERMA
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
Financial Poise
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Perficient, Inc.
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
Protected Harbor
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
BDO_Consulting
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
- Mark - Fullbright
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
Druva
 
2016 cost of data breach study brasil
2016 cost of data breach study   brasil2016 cost of data breach study   brasil
2016 cost of data breach study brasil
João Rufino de Sales
 
Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Carolyn Kopf
 
Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012
EY
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALSteve Knapp
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
IJNSA Journal
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
Brian Bauer
 

Similar to Accounting (20)

Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
2015 cost of data breach study
2015 cost of data breach study2015 cost of data breach study
2015 cost of data breach study
 
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance ServiceTBG Security Mgl93 H 201 CMR17.00 Compliance Service
TBG Security Mgl93 H 201 CMR17.00 Compliance Service
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
2016 cost of data breach study brasil
2016 cost of data breach study   brasil2016 cost of data breach study   brasil
2016 cost of data breach study brasil
 
Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706
 
Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012Fraud and corporate governance changing paradigm in India 2012
Fraud and corporate governance changing paradigm in India 2012
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 

Recently uploaded

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Accounting

  • 1.  
  • 2. Understanding Risk Management “ The Process of identifying, categorizing, measuring, monitoring and mitigating risk in your Company”
  • 3.
  • 4. Question for the Senior IT Executive Are your Data Sources Secure? What is the source of the information provided to Senior Management in your reports ? How reliable are these sources, how are they validated? When was the last time someone audited the information? Have you met with your people and are you sure that they clearly understands the potential risks associated with not protecting the confidentiality of information within the company systems? According to Deloitte Financial Advisory Services, 24.3 percent of survey respondents in 2009 indicated that they view the risk of a government investigation as being higher today than a year ago, yet only 20.8 percent of these executives say their organizations are “ very ready ” to handle a government or regulatory investigation. Worse: A 2008 study conducted by Aon Risk Services found that among 320 corporations in 29 countries, a shocking 42 percent of respondents identified risk only through intuition.
  • 5. What we have Identified from working with our Customers: Many Business don’t understand how technology can be used. They don ’ t have a technology view of their business. IT is often accuse of not being business-focused , technology gets blamed for things that business people are not actually doing themselves. The management of strategic risk and regulatory compliance can not be delegated it must reside at the board level. The strategic importance of information and the nature of current business technologies have raised the stakes regarding the privacy, security and confidentiality of information. In particular, there is heightened sensitivity to safeguarding not just sensitive corporate transaction data, but also data about customers, employees and business partners. The pervasiveness of business technologies has made it far easier for unauthorized pilferage of such information and data. In addition, with heightened concerns about terror, regulations increasingly compel organizations to furnish more data than before.
  • 6.
  • 7.
  • 8. Worldwide Laws and Regulations Increases Need for Protecting Data New, more prescriptive laws and regulations affording greater protection to personal information are based on the very real threats posed by identity thieves, scam artists and crooks who are stealing credit- and debit-card numbers, health plan data and bank account information and the like that reside in disparate databases and are transmitted over the Internet.
  • 9. Two Main Watch Dog Organizations The two federal agencies with privacy and security laws that impact most U.S. organizations are the Department of Health and Human Services (HHS) and the Federal Trade Commission (FTC). The HHS is pushing the health care industry to use electronic medical records (EMRs), health information exchanges (HIEs) and health information technology (HIT) to improve health care and reduce costs. Organizations that have health plans are affected by the privacy and security requirements of the Health Insurance Portability and Accountability Act (HIPAA), and they could potentially benefit from the use of EMRs, HIEs and HIT if health care costs are reduced. The FTC is the consumer watchdog agency that oversees a number of federal laws and regulations that protect personal information from inappropriate use or disclosure, enforce implicit and explicit privacy and security promises of organizations to consumers, and restrict how credit information may be used and disclosed. Both the HHS and the FTC have been busy on a number of fronts in 2008, including the following:
  • 10. Recent Regulations • The FTC introduced the “Red Flags Rule” (meant to address red flags that are indicators of identity theft), which will go into effect on May 1, 2009. It requires creditors (and financial institutions through applicable regulatory agencies with a Nov. 1, 2008, date) to have identity-theft-prevention programs in place. The Red Flags Rule also requires boards of directors and senior management oversight of programs, as well as company oversight of third-party service providers. • The HHS stepped up enforcement of HIPAA security regulations that require security controls to protect electronic-protected health information. Additionally, it is moving from a solely complaints-driven process to one that is also proactive. • Different HHS entities are providing guidance and proposals that advance the use of EMRs, HIEs and HIT by the health care industry, and address related functionality, interoperability, and privacy and security issues. In 2008, certain states expanded the scope of information security breach notification laws (in effect in 44 states, the District of Columbia, Puerto Rico and the Virgin Islands) to include not only financial and other identifying information, but also medical information, as well as requiring notification in case of a breach when such information is unencrypted. Other states are now or will be requiring that certain personal
  • 11. Phishing Targets: In 2008, financial institutions were unquestionably the dominant target of phishing e-mails. In the first half of 2009, financial institutions are still the number one target. Along with the decline in phishing and the change in phishing origins, the actual targets of phishing have changed significantly. Financial institutions now only represent 66.3 percent of the targets, allowing Online Payment institutions to consume 31.4 percent of the share. This change in percentage is not necessarily indicative of more phishing directed towards Online Payment organizations, but more accurately represents the decline in North American and European financial targets when it comes to phishing. The other 2.3 percent of phishing targets is comprised of other industries such as online auction Websites, communication services, and online stores : Phishing Targets by Industry, 2009 H1
  • 12. Why Outsourcing all or part of Risk management can help their company remain compliant in today's world In addition to the complexities of an ever changing economy, the requirements to provide quicker, accurate information has come at a time when penalties for not protecting consumer data are sky rocketing as seen in the TJ Max court decisions. As a result companies are not properly organized within both business and IT to keep up with the almost daily mandates on data protection. When factoring the increased cost of new systems technologies, data integration requirements, and the growing costs of maintaining and educating an in-house staff, outsourcing risk analysis and management has become the logical choice. In the 2009 Accenture Global risk Management study, 63% of the 250 companies executives surveyed believed that some aspects of risk management can be outsourced to deliver better efficiencies .
  • 13. Our Focus 1 Business Risk: This consists of actual threats to the organization, including its products, services, intellectual property and records. Business leaders must communicate to IT leaders what issues exist and where data might reside. 2 Technology Risk: It’s important to understand what pieces of information need to be protected in what way, so that an organization can build the right IT infrastructure 3 Legal/Regulatory Risk: An organization must establish processes and systems that match legal requirements, whether that involves an e-discovery system that must comply with an e-mail retention rule or storage and encryption standards for managing credit card data. 4 External Risk: IT must address all external threats related to data storage and retention, life-cycle management. IT needs to play a central role in protecting and disposing of data properly. Understanding Risk Enterprise risk management can touch all corners of an enterprise. However, governance, risk and compliance (GRC) typically addresses four primary challenges:
  • 14.
  • 15. Strategema Has Selected Only The Best As Their Partner:
  • 16. "Stratagema’s Channel Solutions Partner; IBM Internet Security Solutions Group ISS
  • 17. Best Security Award SAN FRANCISCO, - 04 Mar 2010: IBM (NYSE: IBM ) today announced it has been named Best Security Company by SC Magazine.  The award, recognizing IBM's leadership in IT and its outstanding security solutions, was presented yesterday at the SC Awards Gala, held in conjunction with the annual RSA Conference in San Francisco. For nearly 50 years, IBM has helped businesses and governments secure their critical infrastructures with solutions that go beyond just collections of niche products.  IBM's customers rely on the most comprehensive security solutions and services addressing compliance mandates, applications, data, identity and access management, networks, threat prevention, systems security, email, encryption, virtualization and cloud security.   "With the Best Security Company Award, our judges have recognized IBM as a leader in the constant battle to protect businesses, customers and data
  • 18.
  • 19.
  • 20. Last Word on Reduced Risk, and Compliance There is no Guarantee that a company will remain compliant, with each new regulatory compliance adds another layer of IT risk. Businesses today must contend with an increasing number of government and non-government regulations. The risks of non-compliance are serious and can include fines often in the hundreds of millions of dollars, prosecution of key corporate officers, or loss of business when forced to shut down. But maintaining an effective data protection strategy is not just for the yearly audit, it must be incorporated into the highest levels of the business and it’s strategy, viewed by the company as an living ongoing project. The recent Data Breach of “ Heartland Payment Systems” echoed this throughout the payment card industry demonstrating even the most staunch supporter of PCI compliance can never let their guard down.
  • 21. What Does This Mean to the Resnick Druckman Group LLC: Strategema Consulting will partner to make your data secure, so you in return will be able to assure your accounts that the same security measures you are recommending are part of normal operation procedures for your group: We will educate your people on the current security climate, new developments, white papers and webinars: Strategema Consulting will continue to grow and be your one stop source to present real world solutions to your clients: Strategema Consulting becomes an integrated resource to develop a risk management  practice included as part of your accounting practice: Working with Strategema consulting provides both you and your accounts the premier Security solution supported  by the largest provider IBM ISS: