SlideShare a Scribd company logo
Crossing the Streams: How security professionals can leverage
New Zealand's new Privacy Act to build a stronger security culture
PRIVACY
SECURITY
DATA
BREACHES
WHOAMI
• Membership Chair at
(ISC)2 Auckland Chapter
• Researching the Security
Quotient risk profiling
model
• Developing LEGO-based
CISO The Board Game
• Creator of the Cyber Self
Defence Framework
using situational crime
prevention strategies
• Starting to dabble in
privacy…
DISCLAIMER 1
IANAL
DISCLAIMER 2
The ‘double intangibility’ of security
Potential consumers are faced with:
1. the intangibility of risk - knowing precisely
how at risk they are and from what sources
2. the intangibility of protection - knowing
whether the good or service on offer can or will
mitigate that risk
WE ARE SELLERS OF THE IDEA
OF BUYING SECURITY…
“Underspending on
security, and letting
society pay the
eventual price, is far
more profitable. I
don’t blame the tech
companies... Fixing
this requires
changes in the law,
not changes in the
hearts of the
company’s leaders”
BRUCE SCHNEIER, CRYPTOGRAPHER
01:12:20
SECURITY AND PRIVACY
ARE CONVERGING
NEW FOR 2020…
WHAT’S CHANGING?
1. Mandatory privacy breach notification regime - ASAP
2. Criminal offences – fail to notify OPC/mislead/destroy
3. Compliance notices – do/stop doing
4. Enforceable access directions – release
5. Disclosing information overseas – new IPP12, not providers
6. Extraterritorial effect – Facebook
7. Potential for class actions:
“The updated Act will allow the Human Rights Review
Tribunal to award up to $350,000 to each member of a
class action”
“One of the key reforms in the Privacy Bill is a
new requirement for agencies to report privacy
breaches. A privacy breach is any unauthorised
access to or disclosure, loss, or destruction of
personal information. It can also include a
ransomware attack. Privacy breaches that pose
a risk of harm to people must be notified to
affected individuals and to the Privacy
Commissioner”
HON ANDREW LITTLE, 2018
“Damages for privacy
and related litigation
cases have been
growing in recent
years – with minor
breaches fetching up
to $20,000, medium tier
cases in the range of
$20,000-$50,000, and
serious breaches over
$50,000… class
actions pose
significant risk to
organisations in
breach of Privacy Act”
RUSSELL MCVEAGH, 2019
“complainants may
view money as the
most appropriate way
to redress perceived
breaches of their
privacy… agencies
trying to see what risks
may arise from breach
of the Privacy Act look
to the quantum of
damages awarded by
the HRRT as a guide to
the level of risk”
HRRT QUANTUM OF
DAMAGES?
Damages Awarded by the Human Rights
Review Tribunal under Privacy Act 1993,
s88(1)(c) – damages for emotional harm:
8 years / 21 cases / $320,400
“We’re also behind
many other
countries in how we
treat data protection.
We have a shiny new
Privacy Act but
there’s no ability for
the Privacy
Commissioner to
take meaningful
enforcement action
against companies
misusing our data”
JON DUFFY, CONSUMER CEO
WHY SHOULD I
CARE?
PRIVACY HARMS
“People and organisations are becoming
more aware of the individual and group harms
caused by misuse of data and data breaches”
“Once described as
‘the right to be let
alone’, privacy is
now best described
as the ability to
control data we
cannot stop
generating, giving
rise to inferences we
can’t predict”
ANDREW BURT, LAWYER
LEARNING
FROM DATA…
MANDATORY BREACH
REPORTING ENABLES
PRIVACY DATA SCIENCE
Mandatory
breach
notifications
will be
“critical in
making
agencies
more
accountable
for their
handling of
personal
information”
CURRENT STATE: OPC
“Over 320,000 adults (7.9%) experienced
420,000 fraud or cybercrime incidents
over last 12 months.”
“Only 10% of fraud or cybercrime
incidents were reported to the Police”
Ministry of Justice’s New Zealand Crime and Victims Survey (NZCVS)
results, Cycle 2 - 2019
CURRENT STATE: NZP
LEARNING FROM OTHERS
FTC enforcements
19 ACTIONS / 10 YEARS /
110 VULNERABILITIES
Motivations to invest:
• Comply with US laws and regulations
• Reduce privacy harms such as identity theft, cybercrime
• Satisfy security requirements when collecting data
• Discharge director obligations
• Demonstrate due diligence
• Prioritise security spending on highest risks
19 ACTIONS / 10 YEARS /
110 VULNERABILITIES
Top Recommendations:
• Focus on information handling – limit access, encrypt
data at rest, dispose promptly (54%)
• Improve processes – monitor systems and data, patch
systems, train staff (33%)
• Manage consumer expectations – ensure privacy notices
are accurate and consent is explict (13%)
19 ACTIONS / 10 YEARS /
110 VULNERABILITIES
PHYSEC:
• Protect paper based
files
• Apply least privilege
• Secure offices* and
vehicles
• Validate identity at
entry
• Revalidate access
rights regularly
LEARNING FROM OTHERS
OAIC insights
Australian Privacy Amendment
(Notifiable Data Breaches) Act 2017
“it was anticipated that
the NDB scheme would
raise confidence
amongst consumers
about the entities that
they are dealing with,
and the increased
transparency would
provide consumers
with more information
to make informed
choices about whether
to transact with
particular entities”
OAIC NDB YEAR ONE
• Despite anonymity, “a sustained interest from the media in reporting… entities
that have experienced a data breach have been in the public eye”
• A growing awareness of privacy rights and issues amongst consumers
• Average time between a breach and misuse of credentials is 9.55 days
• Takes 90 days for an organisation to detect the initial data breach and 28.25
days more to notify individuals
TOP TIPS:
1. Understand your data holdings and secure PII
2. Test data breach response plans
3. Review contracts and document accountabilities for investigating breaches,
assessing harm and notifying individuals
4. Draft notifications and plan your comms strategy – don’t notify on a Friday!
5. Support individuals to mitigate the impact of a data breach.
OAIC JULY 2020
“We are now regularly seeing ransomware attacks
that export or exfiltrate data from a network before
encrypting the data on the target network, which is
also of concern,” she said.
“It highlights the need for organisations to have a
clear understanding of how and where personal
information is stored on their network, and to
consider additional measures such as network
segmentation, robust access controls and
encryption.”
LEARNING FROM OTHERS
Our own backyard…
"This should not have
happened," State
Services Commissioner
Peter Hughes said.
"Some things are so
critical that they can
never be allowed to fail.
Security of the Budget
is one of these."
He had laid a
complaint with the
Privacy
Commissioner,
changed his email
address, passwords
for online accounts,
and froze his credit
reports to prevent
identity fraud.
"For the rest of my
life, I have to worry
about what they [the
unknown third party]
are going to do with
that information."
“30,000 files -
including passports
and driver licences -
were discovered
through a security
flaw on Lambton
Property
Management's
website, with experts
estimating the
information to be
worth $500,000 if it
was to be sold on the
dark web”
DO WE ID RISKS / HARM?
“System security measures should respond to the risks as
identified in the privacy impact report… Privacy enhancing
responses will involve security safeguards appropriate to the
sensitivity of the information and the particular data handling
practices.”
“Security levels, costs, measures, practices and procedures
should be appropriate and proportionate to the value of, and
degree of reliance on, the information systems and to the
severity, probability and extent of potential harm, as the
requirements for security vary depending upon the particular
information systems.”
WHAT SHOULD
WE DO?
APPLY INTERNATIONAL
LESSONS LEARNED AND…
• Review personal information assets and collection
• Create/update your privacy policy and raise
awareness of 01.12.20 with staff. Train them!
• Create/update breach response plan and
notification processes to OPC and individuals
• Define RACI for breach detection and response and
exercise against scenarios to build capability
• Inventory supply chain, review contracts and
security capabilities (including offshore)
• Check privacy statement is reflective of real data
flows/sharing arrangements
• Introduce Privacy by Design thinking - more, better,
earlier PIAs for mature orgs.
PbyD/SbyD: ESTABLISH NFRS
Example Non-Functional Requirements developed using the Volere method:
• Only direct managers can see the personnel records of their staff.
• Only holders of a current security clearance can enter the building.
• The product shall prevent incorrect data from being introduced.
• The product shall protect itself from intentional abuse.
• The product shall make its users aware of its information practices before collecting
data from them.
• The product shall notify customers of changes to its information policy.
• The product shall reveal private information only in compliance with the
organization’s information policy.
• The product shall protect private information in accordance with the relevant privacy
laws and the organization’s information policy.
QUESTIONS?

More Related Content

What's hot

Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
Shawn Tuma
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
Chinatu Uzuegbu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
Chinatu Uzuegbu
 
Building Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe HarborBuilding Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe Harbor
Advanced Technology Consulting (ATC)
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
PECB
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
Abdul-Hakeem Ajijola
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Withum
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
William McBorrough
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Dan Michaluk
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
CCIAOR
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
Rohan Sehgal
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
This account is closed
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
Eric Reehl
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Government Technology and Services Coalition
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
ITSM Academy, Inc.
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 

What's hot (20)

Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Building Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe HarborBuilding Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe Harbor
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 

Similar to Crossing the streams: How security professionals can leverage the NZ Privacy Act 2020 to build a stronger security culture

Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
Michael C. Keeling, Esq.
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Financial Poise
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity Requirements
Kyle Brown
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
seadeloitte
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
cliff_rudolph
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Jay Kesan
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
ssusera5ade5
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
CBIZ, Inc.
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
American Chamber of Commerce in Bahrain
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
Marc S. Sokol
 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
TraintechTde
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
VikashSinghBaghel1
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
Adrian Dumitrescu
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
Mary Brophy
 

Similar to Crossing the streams: How security professionals can leverage the NZ Privacy Act 2020 to build a stronger security culture (20)

Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity Requirements
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdfCYBER SECURITY  FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
CYBER SECURITY FOR PRIVATE AND DOMESTIC USE -VIKASH SINGH BAGHEL.pdf
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Crossing the streams: How security professionals can leverage the NZ Privacy Act 2020 to build a stronger security culture

  • 1. Crossing the Streams: How security professionals can leverage New Zealand's new Privacy Act to build a stronger security culture PRIVACY SECURITY DATA BREACHES
  • 2.
  • 3. WHOAMI • Membership Chair at (ISC)2 Auckland Chapter • Researching the Security Quotient risk profiling model • Developing LEGO-based CISO The Board Game • Creator of the Cyber Self Defence Framework using situational crime prevention strategies • Starting to dabble in privacy…
  • 6.
  • 7. The ‘double intangibility’ of security Potential consumers are faced with: 1. the intangibility of risk - knowing precisely how at risk they are and from what sources 2. the intangibility of protection - knowing whether the good or service on offer can or will mitigate that risk WE ARE SELLERS OF THE IDEA OF BUYING SECURITY…
  • 8. “Underspending on security, and letting society pay the eventual price, is far more profitable. I don’t blame the tech companies... Fixing this requires changes in the law, not changes in the hearts of the company’s leaders” BRUCE SCHNEIER, CRYPTOGRAPHER
  • 11.
  • 12.
  • 14.
  • 15. WHAT’S CHANGING? 1. Mandatory privacy breach notification regime - ASAP 2. Criminal offences – fail to notify OPC/mislead/destroy 3. Compliance notices – do/stop doing 4. Enforceable access directions – release 5. Disclosing information overseas – new IPP12, not providers 6. Extraterritorial effect – Facebook 7. Potential for class actions: “The updated Act will allow the Human Rights Review Tribunal to award up to $350,000 to each member of a class action”
  • 16.
  • 17.
  • 18. “One of the key reforms in the Privacy Bill is a new requirement for agencies to report privacy breaches. A privacy breach is any unauthorised access to or disclosure, loss, or destruction of personal information. It can also include a ransomware attack. Privacy breaches that pose a risk of harm to people must be notified to affected individuals and to the Privacy Commissioner” HON ANDREW LITTLE, 2018
  • 19.
  • 20. “Damages for privacy and related litigation cases have been growing in recent years – with minor breaches fetching up to $20,000, medium tier cases in the range of $20,000-$50,000, and serious breaches over $50,000… class actions pose significant risk to organisations in breach of Privacy Act” RUSSELL MCVEAGH, 2019
  • 21. “complainants may view money as the most appropriate way to redress perceived breaches of their privacy… agencies trying to see what risks may arise from breach of the Privacy Act look to the quantum of damages awarded by the HRRT as a guide to the level of risk” HRRT QUANTUM OF DAMAGES? Damages Awarded by the Human Rights Review Tribunal under Privacy Act 1993, s88(1)(c) – damages for emotional harm: 8 years / 21 cases / $320,400
  • 22. “We’re also behind many other countries in how we treat data protection. We have a shiny new Privacy Act but there’s no ability for the Privacy Commissioner to take meaningful enforcement action against companies misusing our data” JON DUFFY, CONSUMER CEO
  • 24.
  • 25.
  • 26.
  • 27. PRIVACY HARMS “People and organisations are becoming more aware of the individual and group harms caused by misuse of data and data breaches”
  • 28.
  • 29. “Once described as ‘the right to be let alone’, privacy is now best described as the ability to control data we cannot stop generating, giving rise to inferences we can’t predict” ANDREW BURT, LAWYER
  • 32. Mandatory breach notifications will be “critical in making agencies more accountable for their handling of personal information” CURRENT STATE: OPC
  • 33. “Over 320,000 adults (7.9%) experienced 420,000 fraud or cybercrime incidents over last 12 months.” “Only 10% of fraud or cybercrime incidents were reported to the Police” Ministry of Justice’s New Zealand Crime and Victims Survey (NZCVS) results, Cycle 2 - 2019 CURRENT STATE: NZP
  • 34. LEARNING FROM OTHERS FTC enforcements
  • 35.
  • 36. 19 ACTIONS / 10 YEARS / 110 VULNERABILITIES Motivations to invest: • Comply with US laws and regulations • Reduce privacy harms such as identity theft, cybercrime • Satisfy security requirements when collecting data • Discharge director obligations • Demonstrate due diligence • Prioritise security spending on highest risks
  • 37. 19 ACTIONS / 10 YEARS / 110 VULNERABILITIES Top Recommendations: • Focus on information handling – limit access, encrypt data at rest, dispose promptly (54%) • Improve processes – monitor systems and data, patch systems, train staff (33%) • Manage consumer expectations – ensure privacy notices are accurate and consent is explict (13%)
  • 38. 19 ACTIONS / 10 YEARS / 110 VULNERABILITIES PHYSEC: • Protect paper based files • Apply least privilege • Secure offices* and vehicles • Validate identity at entry • Revalidate access rights regularly
  • 39. LEARNING FROM OTHERS OAIC insights Australian Privacy Amendment (Notifiable Data Breaches) Act 2017
  • 40.
  • 41. “it was anticipated that the NDB scheme would raise confidence amongst consumers about the entities that they are dealing with, and the increased transparency would provide consumers with more information to make informed choices about whether to transact with particular entities”
  • 42. OAIC NDB YEAR ONE • Despite anonymity, “a sustained interest from the media in reporting… entities that have experienced a data breach have been in the public eye” • A growing awareness of privacy rights and issues amongst consumers • Average time between a breach and misuse of credentials is 9.55 days • Takes 90 days for an organisation to detect the initial data breach and 28.25 days more to notify individuals TOP TIPS: 1. Understand your data holdings and secure PII 2. Test data breach response plans 3. Review contracts and document accountabilities for investigating breaches, assessing harm and notifying individuals 4. Draft notifications and plan your comms strategy – don’t notify on a Friday! 5. Support individuals to mitigate the impact of a data breach.
  • 43.
  • 44. OAIC JULY 2020 “We are now regularly seeing ransomware attacks that export or exfiltrate data from a network before encrypting the data on the target network, which is also of concern,” she said. “It highlights the need for organisations to have a clear understanding of how and where personal information is stored on their network, and to consider additional measures such as network segmentation, robust access controls and encryption.”
  • 45. LEARNING FROM OTHERS Our own backyard…
  • 46. "This should not have happened," State Services Commissioner Peter Hughes said. "Some things are so critical that they can never be allowed to fail. Security of the Budget is one of these."
  • 47.
  • 48.
  • 49. He had laid a complaint with the Privacy Commissioner, changed his email address, passwords for online accounts, and froze his credit reports to prevent identity fraud. "For the rest of my life, I have to worry about what they [the unknown third party] are going to do with that information."
  • 50. “30,000 files - including passports and driver licences - were discovered through a security flaw on Lambton Property Management's website, with experts estimating the information to be worth $500,000 if it was to be sold on the dark web”
  • 51. DO WE ID RISKS / HARM? “System security measures should respond to the risks as identified in the privacy impact report… Privacy enhancing responses will involve security safeguards appropriate to the sensitivity of the information and the particular data handling practices.” “Security levels, costs, measures, practices and procedures should be appropriate and proportionate to the value of, and degree of reliance on, the information systems and to the severity, probability and extent of potential harm, as the requirements for security vary depending upon the particular information systems.”
  • 53. APPLY INTERNATIONAL LESSONS LEARNED AND… • Review personal information assets and collection • Create/update your privacy policy and raise awareness of 01.12.20 with staff. Train them! • Create/update breach response plan and notification processes to OPC and individuals • Define RACI for breach detection and response and exercise against scenarios to build capability • Inventory supply chain, review contracts and security capabilities (including offshore) • Check privacy statement is reflective of real data flows/sharing arrangements • Introduce Privacy by Design thinking - more, better, earlier PIAs for mature orgs.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66. PbyD/SbyD: ESTABLISH NFRS Example Non-Functional Requirements developed using the Volere method: • Only direct managers can see the personnel records of their staff. • Only holders of a current security clearance can enter the building. • The product shall prevent incorrect data from being introduced. • The product shall protect itself from intentional abuse. • The product shall make its users aware of its information practices before collecting data from them. • The product shall notify customers of changes to its information policy. • The product shall reveal private information only in compliance with the organization’s information policy. • The product shall protect private information in accordance with the relevant privacy laws and the organization’s information policy.
  • 67.