SlideShare a Scribd company logo
1 of 6
A Crisis Analysis
of Global
Payments Inc.
Background
   Provides electronic payment process solutions

   Global Headquarters is located in Atlanta, GA

   Employs nearly 3,800 people

   Established in 1967

   Became known as Global Payments Inc. in 2000

   Processes over 1 billion transactions

   Serves over 1 million clients
The Crisis
   In March 2012, Global Payments reported its
    processing system had been illegally accessed

   Hackers obtained Track 2 information from 1.5
    million accounts in North America

   Visa and MasterCard removed Global Payments
    from its list of approved processors

   Shareholders launched a lawsuit against the
    Company

   The breach cost the company nearly $85 million
Organization’s Response
   Informed Visa and MasterCard

   Issued press releases

   Halted trading

   Hosted a conference call to inform stakeholders
    about the breach

   Created an investigation taskforce

   Created a Website
The Media and Stakeholder
Response
   Media coverage of the crisis was negative

   Media criticized Global Payments for its actions and lack
    of information

   Customers lost faith in the organization

   Politicians suggested legislation to improve industry
    standards

   Bloggers demanded better security practices

   Lawsuits were filed
Recommendations
   Prepare a crisis response plan

   Hire a security consultant to examine the state of
    the company’s data security system, policies, and
    practices

   Evaluate legal agreements with all institutions
    involved in processing transactions between
    merchants and consumers

   Implement strategies to engage the media and
    its stakeholders

More Related Content

Viewers also liked

Viewers also liked (8)

Remy na
Remy naRemy na
Remy na
 
Paige na project
Paige na projectPaige na project
Paige na project
 
Maddy na project
Maddy na projectMaddy na project
Maddy na project
 
Blunderboek Outsourcing
Blunderboek OutsourcingBlunderboek Outsourcing
Blunderboek Outsourcing
 
Induction of baseball with Coca-Cola
Induction of baseball with Coca-ColaInduction of baseball with Coca-Cola
Induction of baseball with Coca-Cola
 
Coca cola pp
Coca cola ppCoca cola pp
Coca cola pp
 
Emma na project
Emma na projectEmma na project
Emma na project
 
Obuka preduzetnika
Obuka preduzetnikaObuka preduzetnika
Obuka preduzetnika
 

Similar to Crisis analysis presentation 2012

Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
BackLifeUp - Adapting to change
BackLifeUp - Adapting to changeBackLifeUp - Adapting to change
BackLifeUp - Adapting to changeGuillaume Lauzier
 
Identity Checkpoint
Identity CheckpointIdentity Checkpoint
Identity Checkpointalaskanrogue
 
The global payments crisis analysis
The global payments crisis analysisThe global payments crisis analysis
The global payments crisis analysissunflower2014
 
The global payments crisis analysis
The global payments crisis analysisThe global payments crisis analysis
The global payments crisis analysissunflower2014
 
The global payments crisis analysis
The global payments crisis analysisThe global payments crisis analysis
The global payments crisis analysissunflower2014
 
Big data analytics for life insurers
Big data analytics for life insurersBig data analytics for life insurers
Big data analytics for life insurersdipak sahoo
 
Big_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedBig_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedShradha Verma
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastLogikcull.com
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issuesJagdeepSingh394
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteDave Steer
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industryitio Innovex Pvt Ltv
 
Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014nationalconsumersleague
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentationSreejith Nair
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
Polycab scam elaborated ppt expalined pro
Polycab scam elaborated ppt expalined proPolycab scam elaborated ppt expalined pro
Polycab scam elaborated ppt expalined proRakshitAchra1
 

Similar to Crisis analysis presentation 2012 (20)

Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
BackLifeUp - Adapting to change
BackLifeUp - Adapting to changeBackLifeUp - Adapting to change
BackLifeUp - Adapting to change
 
Identity Checkpoint
Identity CheckpointIdentity Checkpoint
Identity Checkpoint
 
The global payments crisis analysis
The global payments crisis analysisThe global payments crisis analysis
The global payments crisis analysis
 
The global payments crisis analysis
The global payments crisis analysisThe global payments crisis analysis
The global payments crisis analysis
 
The global payments crisis analysis
The global payments crisis analysisThe global payments crisis analysis
The global payments crisis analysis
 
Big data analytics for life insurers
Big data analytics for life insurersBig data analytics for life insurers
Big data analytics for life insurers
 
Big_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedBig_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_published
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
 
2. internal control
2. internal control2. internal control
2. internal control
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Internet security and privacy issues
Internet security and privacy issuesInternet security and privacy issues
Internet security and privacy issues
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 
09Feb2012ISOAgent[1]
09Feb2012ISOAgent[1]09Feb2012ISOAgent[1]
09Feb2012ISOAgent[1]
 
Top Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment IndustryTop Fraud Events & Scandals in The Payment Industry
Top Fraud Events & Scandals in The Payment Industry
 
Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Polycab scam elaborated ppt expalined pro
Polycab scam elaborated ppt expalined proPolycab scam elaborated ppt expalined pro
Polycab scam elaborated ppt expalined pro
 

Crisis analysis presentation 2012

  • 1. A Crisis Analysis of Global Payments Inc.
  • 2. Background  Provides electronic payment process solutions  Global Headquarters is located in Atlanta, GA  Employs nearly 3,800 people  Established in 1967  Became known as Global Payments Inc. in 2000  Processes over 1 billion transactions  Serves over 1 million clients
  • 3. The Crisis  In March 2012, Global Payments reported its processing system had been illegally accessed  Hackers obtained Track 2 information from 1.5 million accounts in North America  Visa and MasterCard removed Global Payments from its list of approved processors  Shareholders launched a lawsuit against the Company  The breach cost the company nearly $85 million
  • 4. Organization’s Response  Informed Visa and MasterCard  Issued press releases  Halted trading  Hosted a conference call to inform stakeholders about the breach  Created an investigation taskforce  Created a Website
  • 5. The Media and Stakeholder Response  Media coverage of the crisis was negative  Media criticized Global Payments for its actions and lack of information  Customers lost faith in the organization  Politicians suggested legislation to improve industry standards  Bloggers demanded better security practices  Lawsuits were filed
  • 6. Recommendations  Prepare a crisis response plan  Hire a security consultant to examine the state of the company’s data security system, policies, and practices  Evaluate legal agreements with all institutions involved in processing transactions between merchants and consumers  Implement strategies to engage the media and its stakeholders