SlideShare a Scribd company logo
Minimizing the Risk of a
Data Breach in the Workplace
December 8, 2015
Bradford Bach
BradfordBach| bbach@titan-ca.com | 213.784.3070
High profilesecuritybreaches make news
BradfordBach | bbach@titan-ca.com | 213.784.3070
Cyber thieves target smaller companies!
• They are not prepared
• They don’t understand their legal obligations
• They have financial liability
• They are the nexus for larger company breaches
BradfordBach | bbach@titan-ca.com | 213.784.3070
Cyber attacksare on the rise
• Nations, groups & individuals are targeting
– Institutions
– Financial services agencies
– Utilities
– Consumers
• 43 percent of US firms have experienced a data breach in the past year (survey of
735 businesses)
Source: Pew Research Centerand Ponemon Institute
BradfordBach | bbach@titan-ca.com | 213.784.3070
What are the hackers looking for?
• Credit card details
• Bank account numbers and PIN’s
• Social security numbers
• Passport numbers
• Drivers licenses
• Usernames and passwords
• Birthdays and anniversaries
BradfordBach | bbach@titan-ca.com | 213.784.3070
Management’sconcern about data breach
Percentage concern level on 10-point scale
Source: Ponemon Institute
BradfordBach| bbach@titan-ca.com | 213.784.3070
Key steps companieshave taken
• Recognizedtheneedfor a strongercyberdefenseposture
• Allocatedresourcesto preventing,detectingandresolvingdata breaches
• Developedoperationsandcomplianceprocedures
• EstablishedComputerSecurityIncidentResponseTeams(SIRT)
BradfordBach| bbach@titan-ca.com | 213.784.3070
Investments in response to databreaches
Source: Ponemon Institute
BradfordBach | bbach@titan-ca.com | 213.784.3070
What constitutesan incident?
• Report of a physical or criminal act (e.g.:theft of a computer, laptop, tablet or PDA)
• Suspicion that a device has been compromised to allow access to sensitive data
• Security issue with a person using equipment
• Other circumstances that warrant investigation include disruptive viruses, denial
of service attacks, malware, phishing scams, spam etc.
BradfordBach| bbach@titan-ca.com | 213.784.3070
Are youprepared?
• Are you working with your IT team to ensure that you have appropriate security
controls in place?
• Do you have a SIRT team in place including general counsel, executives, key
personnel & IT?
• Have you implemented best practices policies and procedures to secure your
network?
• How are you funded to cover the legal compliance and costs associated with a
breach?
• Do you know what laws impact your industry?
BradfordBach| bbach@titan-ca.com | 213.784.3070
Cybercrime example
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
1. Planning: Have shared goals and describe them in detail
2. TheTeam: Identify, inform and train those you expectto take
action
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
3. Incident identification methods and triggers
Define events and mechanisms that mighttrigger a security incident investigation. Provide examples
to help othersunderstand what to look for and how to respond.
• Theft or loss ofan unencrypted device
• Hacking ofa system containing protected data
• Employee snooping
• Malwarecapable ofdata exfiltration
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
4. Breach determination methodology
How will youdetermine if protected data was likelyto havebeen compromised based on the
attack, data classification, jurisdiction andparticular regulations?
Usethe four factor risk assessment methodology required for healthcaredata. If thereis a
probability of compromise, then you have suffered a breach. Thefour factors are:
• Thenatureandextentoftheprotectedinformationinvolved,includingthetypesofidentifiersandthelikelihoodofre-
identification;
• Theunauthorizedpersonwhousedtheprotectedinformationortowhomthedisclosurewasmade;
• Whethertheprotectedinformationwasactuallyacquiredorviewed;
• Theextenttowhichtherisktotheprotectedinformationhasbeenmitigated.
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
5. Breach response team activation
This will includemembers of the CIRTbut those that are normallynot included in incidents that do
not convert to a breach. Theycan be both internaland external including:
• Technical
• Executive
• Legal andcompliance
• Public relations
• Security vendors, etc.
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
6. Notification actions
Notification requirements vary by statute, state and data class. It is important to know the
requirements for each class of data youpossess.
7. Reporting and documentation
It is critical that youproduce accurateand complete documentation of the events, actions, and results
that occuras the result of a security incident. Besure to spend the time requiredto accuratelyportray
what happened, who did what, to what and with what? Keep copies of all communications,
notifications and any and all activity.
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
8. Policy and procedural ortechnological improvement
After a significant security incident and breach is a great opportunity to improveupon the policies and
procedures to prevent another breach in the futureand how to respond if it happens again. Takethis
opportunity to consider what happened and how youreacted. Thenconsider and documentways to
improveon both.
BradfordBach| bbach@titan-ca.com | 213.784.3070
Trainingand updating staff
Onceyou have createdyour Computer Security Incident Response Plan and when you
use the plan to respond; you should then train your staff effectively and consistently.
BradfordBach| bbach@titan-ca.com | 213.784.3070
Trainingand updating staff
• Having plans for which staff are either unaware of or are not familiar with when it
is time to act is much like having no plans at all.
• A lack of training can lead to inaction, delays and mistakes which are avoidable
and canbe incredibly costly. Empoweryour employees to beconfident and ready
to act when the inevitable occurs.
BradfordBach| bbach@titan-ca.com | 213.784.3070
BradfordBach | bbach@titan-ca.com | 213.784.3070
Breakdown of Events Impacting Security
Source: Pew Research Center and Ponemon Institute
Bradford Bach | bbach@titan-ca.com | 213.784.3070
Socialnetworking scams
Source: Ponemon Institute
BradfordBach | bbach@titan-ca.com | 213.784.3070
Understandyour specificlegal obligations
• Health InformationPortability& AccountabilityAct(HIPAA)
• Health InformationTechnologyforEconomicandClinical Health Act (HITECH)
• Customs-TradePartnershipAgainstTerrorism(C-TPAT)
• FairandAccurateCreditTransactionAct(FACTA) includesRedFlagsRule
• NorthAmerican Electric ReliabilityCorp.(NERC)
• CriticalInfrastructureProtection(CIP)
• InternationalTraffickingin Arm Regulation(ITAR)
• Criminal JusticeInformationServices (CJIS)
• FederalInformationProcessingStandards(FIPS)
• FederalInformationSecurityManagement Act(FISMA)
• TheChildren’sOnlinePrivacyProtectionAct(COPPA)
BradfordBach| bbach@titan-ca.com | 213.784.3070
Be prepared!
• Addressing regulatory issuesshould go beyond meeting minimum requirements. It
should also introduce efficiencies and processes that improve your overall
business.
BradfordBach| bbach@titan-ca.com | 213.784.3070
Areas of focus tobe defensible in2016
1. Do a vulnerability or security assessment
2. Conduct patching for software security updates
3. Implement e-mail spam/malware filtering with link reputation checking
4. Set up a network security policy
5. Antivirus/malware
6. Cultivate a culture of safety with end-usertraining
• Source:: LeadingSecurityExpertsAlvakaNetworks
BradfordBach| bbach@titan-ca.com | 213.784.3070
Areas of focus tobe defensiblein 2016
7. Implement backupand disaster recovery/business continuity
8. Network monitoring is an important function
9. Utilize the full security potential of VLAN and VPN
10. Gofor an up-to-date firewall/UTM technology, IPS/IDS
11. Dual factor authentication provides greater security
12. Makesureyou do your budgeting and ROI on security measures
Source:: Leading Security Experts Alvaka Networks
BradfordBach| bbach@titan-ca.com | 213.784.3070
BradfordBach |
bbach@titan-ca.com
| 213.784.3070

More Related Content

What's hot

Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
Thoughtworks
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
fmi_igf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
Aurora Computer Studies
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
WTF is Digital Risk Protection
WTF is Digital Risk ProtectionWTF is Digital Risk Protection
WTF is Digital Risk Protection
Digital Shadows
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
WPICPE
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
WAJAHAT IQBAL
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
Mostafa Elgamala
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
Jisc Scotland
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 

What's hot (20)

Information security
Information securityInformation security
Information security
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Data & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny LeroyData & Privacy: Striking the Right Balance - Jonny Leroy
Data & Privacy: Striking the Right Balance - Jonny Leroy
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
WTF is Digital Risk Protection
WTF is Digital Risk ProtectionWTF is Digital Risk Protection
WTF is Digital Risk Protection
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Viewers also liked

Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
International Institute for Learning
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
Eversheds Sutherland
 
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
DATAVERSITY
 
Group 3 presentation
Group 3 presentationGroup 3 presentation
Group 3 presentation
Zack T
 
FOSDEM 2016: The State of XMPP and Instant Messaging, The Awakening
FOSDEM 2016: The State of XMPP and Instant Messaging, The AwakeningFOSDEM 2016: The State of XMPP and Instant Messaging, The Awakening
FOSDEM 2016: The State of XMPP and Instant Messaging, The Awakening
Nyco
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
AlienVault
 
8 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 20158 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 2015
Identacor
 
Leveraging Cloud Based Technologies for Increased Team Productivity
Leveraging Cloud Based Technologies for Increased Team ProductivityLeveraging Cloud Based Technologies for Increased Team Productivity
Leveraging Cloud Based Technologies for Increased Team Productivity
Justin Denton
 
abc analysis and eoq
abc analysis and eoq abc analysis and eoq
abc analysis and eoq
Annepaga Pawankumar
 
wendy's presentation
wendy's presentationwendy's presentation
wendy's presentation
emily weinstein
 
Slack presentation
Slack presentationSlack presentation
Slack presentation
blevz
 
inventory control & ABC analysis ppt
inventory control & ABC analysis pptinventory control & ABC analysis ppt
inventory control & ABC analysis ppthyderali123
 
Inventory control techniques
Inventory control techniquesInventory control techniques
Inventory control techniques
SRINATH RAMAKRISHNAN
 
Slack's Ali Rayl on Scaling Support for User Growth
Slack's Ali Rayl on Scaling Support for User GrowthSlack's Ali Rayl on Scaling Support for User Growth
Slack's Ali Rayl on Scaling Support for User Growth
Heavybit
 
A SaaS Metric designed to Increase Free Trial Conversions
A SaaS Metric designed to Increase Free Trial ConversionsA SaaS Metric designed to Increase Free Trial Conversions
A SaaS Metric designed to Increase Free Trial Conversions
Lincoln Murphy
 
How (and When) to Hire a Great VP of Customer Success Management CSM
How (and When) to Hire a Great VP of Customer Success Management CSMHow (and When) to Hire a Great VP of Customer Success Management CSM
How (and When) to Hire a Great VP of Customer Success Management CSM
Gainsight
 
How to Drive Growth with Customer Success Metrics
How to Drive Growth with Customer Success MetricsHow to Drive Growth with Customer Success Metrics
How to Drive Growth with Customer Success Metrics
Gainsight
 
SaaS Accounting: The blueprint to understanding and optimizing
SaaS Accounting: The blueprint to understanding and optimizingSaaS Accounting: The blueprint to understanding and optimizing
SaaS Accounting: The blueprint to understanding and optimizing
Price Intelligently
 
9 Worst Practices in SaaS Metrics
9 Worst Practices in SaaS Metrics9 Worst Practices in SaaS Metrics
9 Worst Practices in SaaS Metrics
Christoph Janz
 

Viewers also liked (20)

Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
 
Group 3 presentation
Group 3 presentationGroup 3 presentation
Group 3 presentation
 
FOSDEM 2016: The State of XMPP and Instant Messaging, The Awakening
FOSDEM 2016: The State of XMPP and Instant Messaging, The AwakeningFOSDEM 2016: The State of XMPP and Instant Messaging, The Awakening
FOSDEM 2016: The State of XMPP and Instant Messaging, The Awakening
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 
8 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 20158 Nastiest Data Breaches In 2015
8 Nastiest Data Breaches In 2015
 
Leveraging Cloud Based Technologies for Increased Team Productivity
Leveraging Cloud Based Technologies for Increased Team ProductivityLeveraging Cloud Based Technologies for Increased Team Productivity
Leveraging Cloud Based Technologies for Increased Team Productivity
 
Inventory Control
Inventory ControlInventory Control
Inventory Control
 
abc analysis and eoq
abc analysis and eoq abc analysis and eoq
abc analysis and eoq
 
wendy's presentation
wendy's presentationwendy's presentation
wendy's presentation
 
Slack presentation
Slack presentationSlack presentation
Slack presentation
 
inventory control & ABC analysis ppt
inventory control & ABC analysis pptinventory control & ABC analysis ppt
inventory control & ABC analysis ppt
 
Inventory control techniques
Inventory control techniquesInventory control techniques
Inventory control techniques
 
Slack's Ali Rayl on Scaling Support for User Growth
Slack's Ali Rayl on Scaling Support for User GrowthSlack's Ali Rayl on Scaling Support for User Growth
Slack's Ali Rayl on Scaling Support for User Growth
 
A SaaS Metric designed to Increase Free Trial Conversions
A SaaS Metric designed to Increase Free Trial ConversionsA SaaS Metric designed to Increase Free Trial Conversions
A SaaS Metric designed to Increase Free Trial Conversions
 
How (and When) to Hire a Great VP of Customer Success Management CSM
How (and When) to Hire a Great VP of Customer Success Management CSMHow (and When) to Hire a Great VP of Customer Success Management CSM
How (and When) to Hire a Great VP of Customer Success Management CSM
 
How to Drive Growth with Customer Success Metrics
How to Drive Growth with Customer Success MetricsHow to Drive Growth with Customer Success Metrics
How to Drive Growth with Customer Success Metrics
 
SaaS Accounting: The blueprint to understanding and optimizing
SaaS Accounting: The blueprint to understanding and optimizingSaaS Accounting: The blueprint to understanding and optimizing
SaaS Accounting: The blueprint to understanding and optimizing
 
9 Worst Practices in SaaS Metrics
9 Worst Practices in SaaS Metrics9 Worst Practices in SaaS Metrics
9 Worst Practices in SaaS Metrics
 

Similar to Data breach presentation

Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
David Doughty
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
Sandra Fathi
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
Joe Nathans
 
Cybersecurity digital marketing plan
Cybersecurity digital marketing planCybersecurity digital marketing plan
Cybersecurity digital marketing plan
Rohit Philips
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
Livingstone Advisory
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
Sarah Fane
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
Skoda Minotti
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
Joel Cardella
 
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Lucien Pierce
 
Item46763
Item46763Item46763
Item46763
madunix
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
IT Governance Ltd
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
Raffa Learning Community
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
Resilient Systems
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
Patrick Florer
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptx
JkYt1
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA Cyber Security
 

Similar to Data breach presentation (20)

Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Cybersecurity digital marketing plan
Cybersecurity digital marketing planCybersecurity digital marketing plan
Cybersecurity digital marketing plan
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
 
INFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics securityINFRAGARD 2014: Back to basics security
INFRAGARD 2014: Back to basics security
 
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
 
Item46763
Item46763Item46763
Item46763
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptx
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Data breach presentation

  • 1. Minimizing the Risk of a Data Breach in the Workplace December 8, 2015 Bradford Bach BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 2. High profilesecuritybreaches make news BradfordBach | bbach@titan-ca.com | 213.784.3070
  • 3. Cyber thieves target smaller companies! • They are not prepared • They don’t understand their legal obligations • They have financial liability • They are the nexus for larger company breaches BradfordBach | bbach@titan-ca.com | 213.784.3070
  • 4. Cyber attacksare on the rise • Nations, groups & individuals are targeting – Institutions – Financial services agencies – Utilities – Consumers • 43 percent of US firms have experienced a data breach in the past year (survey of 735 businesses) Source: Pew Research Centerand Ponemon Institute BradfordBach | bbach@titan-ca.com | 213.784.3070
  • 5. What are the hackers looking for? • Credit card details • Bank account numbers and PIN’s • Social security numbers • Passport numbers • Drivers licenses • Usernames and passwords • Birthdays and anniversaries BradfordBach | bbach@titan-ca.com | 213.784.3070
  • 6. Management’sconcern about data breach Percentage concern level on 10-point scale Source: Ponemon Institute BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 7. Key steps companieshave taken • Recognizedtheneedfor a strongercyberdefenseposture • Allocatedresourcesto preventing,detectingandresolvingdata breaches • Developedoperationsandcomplianceprocedures • EstablishedComputerSecurityIncidentResponseTeams(SIRT) BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 8. Investments in response to databreaches Source: Ponemon Institute BradfordBach | bbach@titan-ca.com | 213.784.3070
  • 9. What constitutesan incident? • Report of a physical or criminal act (e.g.:theft of a computer, laptop, tablet or PDA) • Suspicion that a device has been compromised to allow access to sensitive data • Security issue with a person using equipment • Other circumstances that warrant investigation include disruptive viruses, denial of service attacks, malware, phishing scams, spam etc. BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 10. Are youprepared? • Are you working with your IT team to ensure that you have appropriate security controls in place? • Do you have a SIRT team in place including general counsel, executives, key personnel & IT? • Have you implemented best practices policies and procedures to secure your network? • How are you funded to cover the legal compliance and costs associated with a breach? • Do you know what laws impact your industry? BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 12. SIRT response teams andplan minimums 1. Planning: Have shared goals and describe them in detail 2. TheTeam: Identify, inform and train those you expectto take action BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 13. SIRT response teams andplan minimums 3. Incident identification methods and triggers Define events and mechanisms that mighttrigger a security incident investigation. Provide examples to help othersunderstand what to look for and how to respond. • Theft or loss ofan unencrypted device • Hacking ofa system containing protected data • Employee snooping • Malwarecapable ofdata exfiltration BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 14. SIRT response teams andplan minimums 4. Breach determination methodology How will youdetermine if protected data was likelyto havebeen compromised based on the attack, data classification, jurisdiction andparticular regulations? Usethe four factor risk assessment methodology required for healthcaredata. If thereis a probability of compromise, then you have suffered a breach. Thefour factors are: • Thenatureandextentoftheprotectedinformationinvolved,includingthetypesofidentifiersandthelikelihoodofre- identification; • Theunauthorizedpersonwhousedtheprotectedinformationortowhomthedisclosurewasmade; • Whethertheprotectedinformationwasactuallyacquiredorviewed; • Theextenttowhichtherisktotheprotectedinformationhasbeenmitigated. BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 15. SIRT response teams andplan minimums 5. Breach response team activation This will includemembers of the CIRTbut those that are normallynot included in incidents that do not convert to a breach. Theycan be both internaland external including: • Technical • Executive • Legal andcompliance • Public relations • Security vendors, etc. BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 16. SIRT response teams andplan minimums 6. Notification actions Notification requirements vary by statute, state and data class. It is important to know the requirements for each class of data youpossess. 7. Reporting and documentation It is critical that youproduce accurateand complete documentation of the events, actions, and results that occuras the result of a security incident. Besure to spend the time requiredto accuratelyportray what happened, who did what, to what and with what? Keep copies of all communications, notifications and any and all activity. BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 17. SIRT response teams andplan minimums 8. Policy and procedural ortechnological improvement After a significant security incident and breach is a great opportunity to improveupon the policies and procedures to prevent another breach in the futureand how to respond if it happens again. Takethis opportunity to consider what happened and how youreacted. Thenconsider and documentways to improveon both. BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 18. Trainingand updating staff Onceyou have createdyour Computer Security Incident Response Plan and when you use the plan to respond; you should then train your staff effectively and consistently. BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 19. Trainingand updating staff • Having plans for which staff are either unaware of or are not familiar with when it is time to act is much like having no plans at all. • A lack of training can lead to inaction, delays and mistakes which are avoidable and canbe incredibly costly. Empoweryour employees to beconfident and ready to act when the inevitable occurs. BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 21. Breakdown of Events Impacting Security Source: Pew Research Center and Ponemon Institute Bradford Bach | bbach@titan-ca.com | 213.784.3070
  • 22. Socialnetworking scams Source: Ponemon Institute BradfordBach | bbach@titan-ca.com | 213.784.3070
  • 23. Understandyour specificlegal obligations • Health InformationPortability& AccountabilityAct(HIPAA) • Health InformationTechnologyforEconomicandClinical Health Act (HITECH) • Customs-TradePartnershipAgainstTerrorism(C-TPAT) • FairandAccurateCreditTransactionAct(FACTA) includesRedFlagsRule • NorthAmerican Electric ReliabilityCorp.(NERC) • CriticalInfrastructureProtection(CIP) • InternationalTraffickingin Arm Regulation(ITAR) • Criminal JusticeInformationServices (CJIS) • FederalInformationProcessingStandards(FIPS) • FederalInformationSecurityManagement Act(FISMA) • TheChildren’sOnlinePrivacyProtectionAct(COPPA) BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 24. Be prepared! • Addressing regulatory issuesshould go beyond meeting minimum requirements. It should also introduce efficiencies and processes that improve your overall business. BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 25. Areas of focus tobe defensible in2016 1. Do a vulnerability or security assessment 2. Conduct patching for software security updates 3. Implement e-mail spam/malware filtering with link reputation checking 4. Set up a network security policy 5. Antivirus/malware 6. Cultivate a culture of safety with end-usertraining • Source:: LeadingSecurityExpertsAlvakaNetworks BradfordBach| bbach@titan-ca.com | 213.784.3070
  • 26. Areas of focus tobe defensiblein 2016 7. Implement backupand disaster recovery/business continuity 8. Network monitoring is an important function 9. Utilize the full security potential of VLAN and VPN 10. Gofor an up-to-date firewall/UTM technology, IPS/IDS 11. Dual factor authentication provides greater security 12. Makesureyou do your budgeting and ROI on security measures Source:: Leading Security Experts Alvaka Networks BradfordBach| bbach@titan-ca.com | 213.784.3070