SlideShare a Scribd company logo
1 of 34
© benefitexpress 2016
Cyber Security and Data
Breaches
Larry Grudzien
Attorney at Law
© benefitexpress 2016
Recent High-Profile Data Breaches
•Suspected North Korean hackers
•Data included personal information about Sony Pictures
employees and their families, e-mails between employees,
information about executive salaries at the company, copies of
unreleased Sony films, and other information.
•The hackers called themselves the “Guardians of Peace” and
demanded the cancellation of the planned release of the film The
Interview, a comedy about a plot to assassinate North Korean
leader Kim Jong-un.
Sony: November 2014
© benefitexpress 2016
Recent High-Profile Data Breaches
•Suspected Chinese hackers.
•Nation's second largest health insurer.
•Names, addresses, social security numbers, birth dates, and
other information from 80 million customers and employees.
•Thieves used information to rack up $40,000 in credit card
charges for some customers.
Anthem: January, 2015
© benefitexpress 2016
Recent High-Profile Data Breaches
•In June 2015, OPM announced that it had been the target of a
data breach targeting the records of as many as four million
people.
•Later, FBI Director James Comey estimated 18 million
•Breach has been described by federal officials as among the
largest breaches of government data in the history of the U.S.
Office of Personnel Management (U.S. Government): April, 2015
© benefitexpress 2016
Recent High-Profile Data Breaches
• Information targeted included SSNs, names, dates and places of birth, and
addresses
• Also likely involved the theft of detailed security-clearance-related
background information
• And even 5 million fingerprints
• On July 9, 2015, the estimate of the number of stolen records was increased
to 21.5 million
• Soon after, Katherine Archuleta, the director of OPM, and former National
Political Director for Barack Obama's 2012 reelection campaign, resigned
Office of Personnel Management (U.S. Government): April, 2015
© benefitexpress 2016
Recent High-Profile Data Breaches
•Suspected Russian hackers
•70 million customers
•Name, address, phone number and e-mail address.
•After the data breach was discovered, Target offered one year of
free credit monitoring and identity theft protection to all customers
who shopped in U.S. stores
•Access through 3rd party vendor (HVAC)
•Shows importance of 3rd party control as well
Target: December, 2013
© benefitexpress 2016
High Level Technical Overview
•General Overview
•How do you approach advising your employer on
cybersecurity?
•What does the threat landscape look like now?
•What resources are out there to help you?
General Overview
© benefitexpress 2016
High Level Technical Overview
Anywhere there is a device consisting of hardware
and software, typically with an internet connection
What can be hacked?
© benefitexpress 2016
High Level Technical Overview
• Cyber Security: the protection of information systems from theft or damage to the
hardware, the software, and to the information on them, as well as from
disruption or misdirection of the services they provide
• Data Breach: the intentional or unintentional release of secure information to an
untrusted environment
• Cloud: the practice of using a network of remote servers hosted on the Internet to
store, manage, and process data, rather than a local server or a personal computer
• Phishing: the attempt to acquire sensitive information such as usernames,
passwords, and credit card details (and sometimes, indirectly, money), often for
malicious reasons, by masquerading as a trustworthy entity in an electronic
communication
Define Applicable Terms
© benefitexpress 2016
High Level Technical Overview
• Encryption: the process of encoding messages or information in such a way that
only authorized parties can read it
• Botnet: (also known as a zombie army) a number of Internet computers that,
although their owners are unaware of it, have been set up to forward transmissions
(including spam or viruses) to other computers on the Internet
• Patch: a piece of software designed to update a computer program or its supporting
data, to fix or improve it. This includes fixing security vulnerabilities
• Two-Factor Authentication: a security process in which the user provides two
means of identification from separate categories of credentials; one is typically a
physical token, such as a card, and the other is typically something memorized,
such as a security code
Define Applicable Terms
© benefitexpress 2016
High Level Technical Overview
• Federal Trade Commission, “Start with Security” guidance to businesses
(https://www.ftc.gov/system/files/documents/plain-language/pdf0205-startwithsecurity.pdf).
This is generic guidance drawn from the FTC’s recent enforcement cases. It’s fairly simple
and written in non-technical language, but it provides some insight into what one group of
federal regulators are thinking is (or should be) the standard of care for a business.
• NIST Cybersecurity Framework (http://www.nist.gov/cyberframework/). This document
was developed through a lengthy consultation process with industry; it is meant to provide a
general approach to cybersecurity, and to point businesses toward the relevant existing
standards. In many industry contexts, it is becoming the de facto “standard of care.”
• NIST Recommendations (http://csrc.nist.gov/publications/PubsSPs.html). These
documents are more detailed and technical recommendations developed through the NIST
collaborative process with industry. The “800” series are particularly important in
cybersecurity. The documents are designed for use by IT professionals responsible for
implementing a company’s cybersecurity program.
Additional Resources on Cyber Security and Data Breach Topics
© benefitexpress 2016
High Level Technical Overview
• Verizon Data Breach Report (DBIR) (http://www.verizonenterprise.com/DBIR/) is
annual analysis of cyber threats as reflected in actual data breaches and security
incidents. The report looks at anonymized data submitted by a broad range of law
enforcement agencies, private companies, and cybersecurity providers.
• Steptoe & Johnson Cyberlaw Podcast (http://www.dhs.gov/topic/cybersecurity-
information-sharing). Weekly podcast put out by a group of lawyers at Steptoe.
They provide a good summary of case law, policy developments, and legislation
relating to cyber, data breach, privacy, national security, etc.
• DHS Information Sharing resources: DHS supports a number of information
sharing initiatives. You can find summary information here:
http://www.dhs.gov/topic/cybersecurity-information-sharing.
Additional Resources on Cyber Security and Data Breach Topics
© benefitexpress 2016
100% Prevention is Not Possible
•Lose credibility if you state (or think) otherwise
•Critical to recognize the reality
•Three kinds of entities:
Have been hacked
Will be hacked
Have been or will be, but just don’t know it (or don’t admit it)
© benefitexpress 2016
Standard of Care
A standard of care is developing:
NIST
DOJ Guidelines
Homeland Security
Critical to be – and stay – ahead of the curve
© benefitexpress 2016
Government Involvement
•FBI: FBI InfraGard
•U.S. Secret Service: Electronic Crimes Task Force
(ECTF)
•Entities organized by state or local authorities
Federal Law Enforcement
© benefitexpress 2016
Government Involvement
•SEC
•DOJ
•FTC
•Homeland Security
Federal Agencies
© benefitexpress 2016
Government Involvement
• US Congress passed the Cybersecurity Act of 2015, and President Barack
Obama signed the measure into law on December 18, 2015
• The Act of 2015 aims to defend against cyberattacks by creating a
framework for the voluntary sharing of cyber threat information between
private entities and the federal government, as well as within agencies of the
federal government
• The legislation also aims to protect individuals’ privacy rights by ensuring that
personal information is not unnecessarily divulged
• Companies are permitted to monitor and operate defensive measures on
both their own information systems as well as those of others with written
authorization
Federal Legislation
© benefitexpress 2016
Government Involvement
• Entities are encouraged to implement and utilize security controls to protect against
unauthorized access to or acquisition of cyber threat indicators or defensive
measures
• Companies may share threat indicators and defensive measures with the federal
government, but they must institute appropriate security controls and remove
personal information not directly related to the reported cybersecurity threat
• Liability protections are available for companies choosing to share information
provided they implement the proper controls
• Private entities may also share threat indicators and defensive measures with other
private entities; again, personal information must be removed and security controls
should be in place
Federal Legislation
© benefitexpress 2016
Government Involvement
•49 states
•Different definitions of “breach”
•Different requirements re notification of government officials, law
enforcement, etc.
•Different requirements re notification of customers
•Different requirements as to what data elements must be
disclosed in notifications
State Regulations
© benefitexpress 2016
Government Involvement
Federal: NIST Framework, Exec. Order effect on
regulatory agencies.
Specific agency interest
SEC
FTC
FCC
Sector agencies
Report on Status of Regulatory Rulemaking
© benefitexpress 2016
Information Sharing Among Stakeholders, Government Agencies, Etc.
Report on general status
Government contractors and subcontractors have different
obligations than other entities
© benefitexpress 2016
3rd Party Vulnerability and Efforts to Control
•Target Breach Was Through an HVAC Vendor
•Questionnaires/Interviews re Data Security Practices
•Audits re Same
© benefitexpress 2016
Who are the Hackers?
•Nation States (North Korea, China, Russia, other?)
•Criminal Groups
•“Patriotic hackers”
•Terrorists/ISIL
•Even Teenagers
© benefitexpress 2016
What are Their Motivations?
Money is the usual driver
But not always
See Ashley Madison (morality was the driver?)
Ransom scams are common
© benefitexpress 2016
Data Breach Litigation
•Recent General Counsel article predicting “Wave of data
breach litigation”
•Recent 7th Circuit case re Standing in Data Breach
cases. (Remijas v. Neiman Marcus Group, 794 F.3d 688
(2015))
•Class Action Cases Against Target, Anthem, Sony, etc.
© benefitexpress 2016
Commercially Available Products and Services
High level, publically available discussion of prior work for DOD and
Intelligence Community:
 Booz Allen Hamilton
 Verizon Communications
Cyber products and services available from Booz Allen Hamilton:
 Threat analyses (pre-breach): vulnerability testing and recommendations for mediation.
 Cyber4Sight® Services: Predictive intelligence service help clients prepare for future
attacks – information/reports on threat-actor activities and trends.
 Post-cyber incident threat mitigation
 Workforce skills assessment and cyber training.
 Analytics of risks, threats, and opportunities for companies, government, and executive
clients.
© benefitexpress 2016
Commercially Available Products and Services
Products and services available from Verizon:
Managed Security Services
Forensic Response
Rapid Response Retainers
Government partnerships (ECS)
© benefitexpress 2016
Suggested Best Practices
Critical for:
 Post-breach litigation
 Government inquiries/investigations (SEC, DOJ, FTC, state regulators, etc.)
 Response to media inquiries/public opinion/ investors/corporate executives
Plan should include:
 Identify and protect critical assets (not necessarily “everything”)
 Experienced external counsel and forensic experts retained in advance:
 No delay for conflict checks
 Expert advice to help develop the plan (make sure have backup of critical data
and ability to log event traffic)
 Expert advice available as soon as breach is detected
 After hours/weekend response already negotiated
Must have a carefully constructed response plan in place BEFORE the crisis hits
© benefitexpress 2016
Suggested Best Practices
Law enforcement contacts developed in advance:
FBI InfraGard
USSS ECTF
Others
Media Response Plan:
Single point of contact
Recognize investigation and recovery takes time – OPM, etc.
© benefitexpress 2016
Suggested Best Practices
• Dissemination of Information to Board of Directors:
 Critical – Boards are beginning to be held accountable
 Boards need to understand that this is no longer just a low level IT issue
 Boards need to understand the extent and importance of efforts to prevent, monitor,
detect and mitigate
• Dissemination of Information to Investors
 Critical that Investor Relations Dept. understands and is prepared for investor inquiries
and notifications post-breach
• Notification of Customers:
 Currently governed by 49 different state laws
 Plus a host of international rules and regulations for global customers
© benefitexpress 2016
Suggested Best Practices
•War Games/Simulations:
 Good practice for the real thing
 Also shows awareness, seriousness and taking responsibility in advance
of a breach
•Engage “White Hat” Hackers:
 Run “Bug Bounty” programs
•Insurance products:
 Liability coverage may not cover these breaches
 May have obtain separate insurance policy
Questions?
© benefitexpress 2016
Contact
Larry Grudzien
Attorney at Law
708-717-9638
larry@larrygrudzien.com
larrygrudzien.com

More Related Content

What's hot

wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyProf. Neeta Awasthy
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15E Andrew Keeney
 
DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaNSConclave
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015Numaan Huq
 
Ajs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comAjs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comrobertleew4
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
Implications of acts in organizations
Implications of acts in organizations Implications of acts in organizations
Implications of acts in organizations Swarupa Rani Sahu
 
Ajs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.comAjs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.comStokesCope5
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015Robert Craig
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Amy Purcell
 
NIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government ContractorsNIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government ContractorsUnanet
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 

What's hot (20)

wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15CULCT Cybersecurity Workshop 2.10.15
CULCT Cybersecurity Workshop 2.10.15
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali Rangoliya
 
NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015NumaanHuq_Hackfest2015
NumaanHuq_Hackfest2015
 
DG for Fed
DG for FedDG for Fed
DG for Fed
 
Ajs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comAjs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.com
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Implications of acts in organizations
Implications of acts in organizations Implications of acts in organizations
Implications of acts in organizations
 
Ajs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.comAjs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.com
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013
 
NIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government ContractorsNIST Cybersecurity Requirements for Government Contractors
NIST Cybersecurity Requirements for Government Contractors
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 

Viewers also liked

What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?CBT Nuggets
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDPriyanka Aash
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data BreachDavid Hunt
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Dr David Probert
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Livingstone Advisory
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider ThreatLancope, Inc.
 
Viscose Rayon (Cotton Modification)
Viscose Rayon (Cotton Modification)Viscose Rayon (Cotton Modification)
Viscose Rayon (Cotton Modification)Sazed Salman
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Zoltan Balazs
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 ChallengesLeandro Bennaton
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity PredictionsPaloAltoNetworks
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!Dr David Probert
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Tableau Software
 

Viewers also liked (20)

What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
 
Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...Current enterprise information security measures continue to fail us. Why is ...
Current enterprise information security measures continue to fail us. Why is ...
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
Viscose Rayon (Cotton Modification)
Viscose Rayon (Cotton Modification)Viscose Rayon (Cotton Modification)
Viscose Rayon (Cotton Modification)
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
2017 Cybersecurity Predictions
2017 Cybersecurity Predictions2017 Cybersecurity Predictions
2017 Cybersecurity Predictions
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017Top 10 Cloud Trends for 2017
Top 10 Cloud Trends for 2017
 

Similar to Dealing Data Leaks: Creating Your Data Breach Response Plan

Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia LunaAviva Spectrum™
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesUlf Mattsson
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response ManagementDon Caeiro
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Richik Sarkar
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Viscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) PresentationViscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) PresentationInvestorideas.com
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptxJohn Donahue
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docxstandfordabbot
 

Similar to Dealing Data Leaks: Creating Your Data Breach Response Plan (20)

Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
What is data privacy?
What is data privacy?What is data privacy?
What is data privacy?
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security Enforcement and Litigation Trends and Developments in Privacy and Data Security
Enforcement and Litigation Trends and Developments in Privacy and Data Security
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Viscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) PresentationViscount Systems (OTCQB:VSYS) Presentation
Viscount Systems (OTCQB:VSYS) Presentation
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx
 

More from benefitexpress

Webinar: Mid-Year Election Changes for Cafeteria Plans
Webinar: Mid-Year Election Changes for Cafeteria PlansWebinar: Mid-Year Election Changes for Cafeteria Plans
Webinar: Mid-Year Election Changes for Cafeteria Plansbenefitexpress
 
COVID-19 Health & Welfare: Compliance for Employers
COVID-19 Health & Welfare: Compliance for EmployersCOVID-19 Health & Welfare: Compliance for Employers
COVID-19 Health & Welfare: Compliance for Employersbenefitexpress
 
Plan Sponsor Webinar: Navigating COVID-19 for Employers
Plan Sponsor Webinar: Navigating COVID-19 for EmployersPlan Sponsor Webinar: Navigating COVID-19 for Employers
Plan Sponsor Webinar: Navigating COVID-19 for Employersbenefitexpress
 
COVID-19: Families First Coronavirus Response Act Signed Into Law
COVID-19: Families First Coronavirus Response Act Signed Into LawCOVID-19: Families First Coronavirus Response Act Signed Into Law
COVID-19: Families First Coronavirus Response Act Signed Into Lawbenefitexpress
 
Medicare & Employer Health Coverage - a Coordination Conversation
Medicare & Employer Health Coverage - a Coordination ConversationMedicare & Employer Health Coverage - a Coordination Conversation
Medicare & Employer Health Coverage - a Coordination Conversationbenefitexpress
 
Common Wage & Hour Issues in Benefits
Common Wage & Hour Issues in BenefitsCommon Wage & Hour Issues in Benefits
Common Wage & Hour Issues in Benefitsbenefitexpress
 
#MeToo in the Workplace
#MeToo in the Workplace#MeToo in the Workplace
#MeToo in the Workplacebenefitexpress
 
The Do's and Don'ts of FMLA Compliance
The Do's and Don'ts of FMLA Compliance The Do's and Don'ts of FMLA Compliance
The Do's and Don'ts of FMLA Compliance benefitexpress
 
What Happens if Obamacare is Struck Down?
What Happens if Obamacare is Struck Down?What Happens if Obamacare is Struck Down?
What Happens if Obamacare is Struck Down?benefitexpress
 
HRAs in 2020: Everything You Need to Know
HRAs in 2020: Everything You Need to KnowHRAs in 2020: Everything You Need to Know
HRAs in 2020: Everything You Need to Knowbenefitexpress
 
Benefitexpress webinar-common-compliance-questions
Benefitexpress webinar-common-compliance-questionsBenefitexpress webinar-common-compliance-questions
Benefitexpress webinar-common-compliance-questionsbenefitexpress
 
How to Administer Wellness Programs in Today's Regulatory Environment
How to Administer Wellness Programs in Today's Regulatory EnvironmentHow to Administer Wellness Programs in Today's Regulatory Environment
How to Administer Wellness Programs in Today's Regulatory Environmentbenefitexpress
 
HIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival GuideHIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival Guidebenefitexpress
 
Webinar | Texas vs. United States - The Repeal of ACA?
Webinar | Texas vs. United States - The Repeal of ACA?Webinar | Texas vs. United States - The Repeal of ACA?
Webinar | Texas vs. United States - The Repeal of ACA?benefitexpress
 
Healthcare Check-in: The Latest Developments in Health and Welfare Plans
Healthcare Check-in: The Latest Developments in Health and Welfare PlansHealthcare Check-in: The Latest Developments in Health and Welfare Plans
Healthcare Check-in: The Latest Developments in Health and Welfare Plansbenefitexpress
 
Webinar | From Analysis to Action: How Personalization Can Lower Employer Cos...
Webinar | From Analysis to Action: How Personalization Can Lower Employer Cos...Webinar | From Analysis to Action: How Personalization Can Lower Employer Cos...
Webinar | From Analysis to Action: How Personalization Can Lower Employer Cos...benefitexpress
 
Webinar | Understanding Flex Spending Compliance
Webinar | Understanding Flex Spending ComplianceWebinar | Understanding Flex Spending Compliance
Webinar | Understanding Flex Spending Compliancebenefitexpress
 
Webinar | COBRA Pitfalls: Common Mistakes and How to Avoid Them
Webinar | COBRA Pitfalls: Common Mistakes and How to Avoid ThemWebinar | COBRA Pitfalls: Common Mistakes and How to Avoid Them
Webinar | COBRA Pitfalls: Common Mistakes and How to Avoid Thembenefitexpress
 
Webinar | Clients Calling “Mayday”? Design a Benefits Technology Strategy to ...
Webinar | Clients Calling “Mayday”? Design a Benefits Technology Strategy to ...Webinar | Clients Calling “Mayday”? Design a Benefits Technology Strategy to ...
Webinar | Clients Calling “Mayday”? Design a Benefits Technology Strategy to ...benefitexpress
 
Webinar | Training the Technique: Advanced ERISA Compliance
Webinar | Training the Technique: Advanced ERISA ComplianceWebinar | Training the Technique: Advanced ERISA Compliance
Webinar | Training the Technique: Advanced ERISA Compliancebenefitexpress
 

More from benefitexpress (20)

Webinar: Mid-Year Election Changes for Cafeteria Plans
Webinar: Mid-Year Election Changes for Cafeteria PlansWebinar: Mid-Year Election Changes for Cafeteria Plans
Webinar: Mid-Year Election Changes for Cafeteria Plans
 
COVID-19 Health & Welfare: Compliance for Employers
COVID-19 Health & Welfare: Compliance for EmployersCOVID-19 Health & Welfare: Compliance for Employers
COVID-19 Health & Welfare: Compliance for Employers
 
Plan Sponsor Webinar: Navigating COVID-19 for Employers
Plan Sponsor Webinar: Navigating COVID-19 for EmployersPlan Sponsor Webinar: Navigating COVID-19 for Employers
Plan Sponsor Webinar: Navigating COVID-19 for Employers
 
COVID-19: Families First Coronavirus Response Act Signed Into Law
COVID-19: Families First Coronavirus Response Act Signed Into LawCOVID-19: Families First Coronavirus Response Act Signed Into Law
COVID-19: Families First Coronavirus Response Act Signed Into Law
 
Medicare & Employer Health Coverage - a Coordination Conversation
Medicare & Employer Health Coverage - a Coordination ConversationMedicare & Employer Health Coverage - a Coordination Conversation
Medicare & Employer Health Coverage - a Coordination Conversation
 
Common Wage & Hour Issues in Benefits
Common Wage & Hour Issues in BenefitsCommon Wage & Hour Issues in Benefits
Common Wage & Hour Issues in Benefits
 
#MeToo in the Workplace
#MeToo in the Workplace#MeToo in the Workplace
#MeToo in the Workplace
 
The Do's and Don'ts of FMLA Compliance
The Do's and Don'ts of FMLA Compliance The Do's and Don'ts of FMLA Compliance
The Do's and Don'ts of FMLA Compliance
 
What Happens if Obamacare is Struck Down?
What Happens if Obamacare is Struck Down?What Happens if Obamacare is Struck Down?
What Happens if Obamacare is Struck Down?
 
HRAs in 2020: Everything You Need to Know
HRAs in 2020: Everything You Need to KnowHRAs in 2020: Everything You Need to Know
HRAs in 2020: Everything You Need to Know
 
Benefitexpress webinar-common-compliance-questions
Benefitexpress webinar-common-compliance-questionsBenefitexpress webinar-common-compliance-questions
Benefitexpress webinar-common-compliance-questions
 
How to Administer Wellness Programs in Today's Regulatory Environment
How to Administer Wellness Programs in Today's Regulatory EnvironmentHow to Administer Wellness Programs in Today's Regulatory Environment
How to Administer Wellness Programs in Today's Regulatory Environment
 
HIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival GuideHIPAA Training: Privacy Review and Audit Survival Guide
HIPAA Training: Privacy Review and Audit Survival Guide
 
Webinar | Texas vs. United States - The Repeal of ACA?
Webinar | Texas vs. United States - The Repeal of ACA?Webinar | Texas vs. United States - The Repeal of ACA?
Webinar | Texas vs. United States - The Repeal of ACA?
 
Healthcare Check-in: The Latest Developments in Health and Welfare Plans
Healthcare Check-in: The Latest Developments in Health and Welfare PlansHealthcare Check-in: The Latest Developments in Health and Welfare Plans
Healthcare Check-in: The Latest Developments in Health and Welfare Plans
 
Webinar | From Analysis to Action: How Personalization Can Lower Employer Cos...
Webinar | From Analysis to Action: How Personalization Can Lower Employer Cos...Webinar | From Analysis to Action: How Personalization Can Lower Employer Cos...
Webinar | From Analysis to Action: How Personalization Can Lower Employer Cos...
 
Webinar | Understanding Flex Spending Compliance
Webinar | Understanding Flex Spending ComplianceWebinar | Understanding Flex Spending Compliance
Webinar | Understanding Flex Spending Compliance
 
Webinar | COBRA Pitfalls: Common Mistakes and How to Avoid Them
Webinar | COBRA Pitfalls: Common Mistakes and How to Avoid ThemWebinar | COBRA Pitfalls: Common Mistakes and How to Avoid Them
Webinar | COBRA Pitfalls: Common Mistakes and How to Avoid Them
 
Webinar | Clients Calling “Mayday”? Design a Benefits Technology Strategy to ...
Webinar | Clients Calling “Mayday”? Design a Benefits Technology Strategy to ...Webinar | Clients Calling “Mayday”? Design a Benefits Technology Strategy to ...
Webinar | Clients Calling “Mayday”? Design a Benefits Technology Strategy to ...
 
Webinar | Training the Technique: Advanced ERISA Compliance
Webinar | Training the Technique: Advanced ERISA ComplianceWebinar | Training the Technique: Advanced ERISA Compliance
Webinar | Training the Technique: Advanced ERISA Compliance
 

Recently uploaded

Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 

Recently uploaded (20)

Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 

Dealing Data Leaks: Creating Your Data Breach Response Plan

  • 1.
  • 2. © benefitexpress 2016 Cyber Security and Data Breaches Larry Grudzien Attorney at Law
  • 3. © benefitexpress 2016 Recent High-Profile Data Breaches •Suspected North Korean hackers •Data included personal information about Sony Pictures employees and their families, e-mails between employees, information about executive salaries at the company, copies of unreleased Sony films, and other information. •The hackers called themselves the “Guardians of Peace” and demanded the cancellation of the planned release of the film The Interview, a comedy about a plot to assassinate North Korean leader Kim Jong-un. Sony: November 2014
  • 4. © benefitexpress 2016 Recent High-Profile Data Breaches •Suspected Chinese hackers. •Nation's second largest health insurer. •Names, addresses, social security numbers, birth dates, and other information from 80 million customers and employees. •Thieves used information to rack up $40,000 in credit card charges for some customers. Anthem: January, 2015
  • 5. © benefitexpress 2016 Recent High-Profile Data Breaches •In June 2015, OPM announced that it had been the target of a data breach targeting the records of as many as four million people. •Later, FBI Director James Comey estimated 18 million •Breach has been described by federal officials as among the largest breaches of government data in the history of the U.S. Office of Personnel Management (U.S. Government): April, 2015
  • 6. © benefitexpress 2016 Recent High-Profile Data Breaches • Information targeted included SSNs, names, dates and places of birth, and addresses • Also likely involved the theft of detailed security-clearance-related background information • And even 5 million fingerprints • On July 9, 2015, the estimate of the number of stolen records was increased to 21.5 million • Soon after, Katherine Archuleta, the director of OPM, and former National Political Director for Barack Obama's 2012 reelection campaign, resigned Office of Personnel Management (U.S. Government): April, 2015
  • 7. © benefitexpress 2016 Recent High-Profile Data Breaches •Suspected Russian hackers •70 million customers •Name, address, phone number and e-mail address. •After the data breach was discovered, Target offered one year of free credit monitoring and identity theft protection to all customers who shopped in U.S. stores •Access through 3rd party vendor (HVAC) •Shows importance of 3rd party control as well Target: December, 2013
  • 8. © benefitexpress 2016 High Level Technical Overview •General Overview •How do you approach advising your employer on cybersecurity? •What does the threat landscape look like now? •What resources are out there to help you? General Overview
  • 9. © benefitexpress 2016 High Level Technical Overview Anywhere there is a device consisting of hardware and software, typically with an internet connection What can be hacked?
  • 10. © benefitexpress 2016 High Level Technical Overview • Cyber Security: the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide • Data Breach: the intentional or unintentional release of secure information to an untrusted environment • Cloud: the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer • Phishing: the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication Define Applicable Terms
  • 11. © benefitexpress 2016 High Level Technical Overview • Encryption: the process of encoding messages or information in such a way that only authorized parties can read it • Botnet: (also known as a zombie army) a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet • Patch: a piece of software designed to update a computer program or its supporting data, to fix or improve it. This includes fixing security vulnerabilities • Two-Factor Authentication: a security process in which the user provides two means of identification from separate categories of credentials; one is typically a physical token, such as a card, and the other is typically something memorized, such as a security code Define Applicable Terms
  • 12. © benefitexpress 2016 High Level Technical Overview • Federal Trade Commission, “Start with Security” guidance to businesses (https://www.ftc.gov/system/files/documents/plain-language/pdf0205-startwithsecurity.pdf). This is generic guidance drawn from the FTC’s recent enforcement cases. It’s fairly simple and written in non-technical language, but it provides some insight into what one group of federal regulators are thinking is (or should be) the standard of care for a business. • NIST Cybersecurity Framework (http://www.nist.gov/cyberframework/). This document was developed through a lengthy consultation process with industry; it is meant to provide a general approach to cybersecurity, and to point businesses toward the relevant existing standards. In many industry contexts, it is becoming the de facto “standard of care.” • NIST Recommendations (http://csrc.nist.gov/publications/PubsSPs.html). These documents are more detailed and technical recommendations developed through the NIST collaborative process with industry. The “800” series are particularly important in cybersecurity. The documents are designed for use by IT professionals responsible for implementing a company’s cybersecurity program. Additional Resources on Cyber Security and Data Breach Topics
  • 13. © benefitexpress 2016 High Level Technical Overview • Verizon Data Breach Report (DBIR) (http://www.verizonenterprise.com/DBIR/) is annual analysis of cyber threats as reflected in actual data breaches and security incidents. The report looks at anonymized data submitted by a broad range of law enforcement agencies, private companies, and cybersecurity providers. • Steptoe & Johnson Cyberlaw Podcast (http://www.dhs.gov/topic/cybersecurity- information-sharing). Weekly podcast put out by a group of lawyers at Steptoe. They provide a good summary of case law, policy developments, and legislation relating to cyber, data breach, privacy, national security, etc. • DHS Information Sharing resources: DHS supports a number of information sharing initiatives. You can find summary information here: http://www.dhs.gov/topic/cybersecurity-information-sharing. Additional Resources on Cyber Security and Data Breach Topics
  • 14. © benefitexpress 2016 100% Prevention is Not Possible •Lose credibility if you state (or think) otherwise •Critical to recognize the reality •Three kinds of entities: Have been hacked Will be hacked Have been or will be, but just don’t know it (or don’t admit it)
  • 15. © benefitexpress 2016 Standard of Care A standard of care is developing: NIST DOJ Guidelines Homeland Security Critical to be – and stay – ahead of the curve
  • 16. © benefitexpress 2016 Government Involvement •FBI: FBI InfraGard •U.S. Secret Service: Electronic Crimes Task Force (ECTF) •Entities organized by state or local authorities Federal Law Enforcement
  • 17. © benefitexpress 2016 Government Involvement •SEC •DOJ •FTC •Homeland Security Federal Agencies
  • 18. © benefitexpress 2016 Government Involvement • US Congress passed the Cybersecurity Act of 2015, and President Barack Obama signed the measure into law on December 18, 2015 • The Act of 2015 aims to defend against cyberattacks by creating a framework for the voluntary sharing of cyber threat information between private entities and the federal government, as well as within agencies of the federal government • The legislation also aims to protect individuals’ privacy rights by ensuring that personal information is not unnecessarily divulged • Companies are permitted to monitor and operate defensive measures on both their own information systems as well as those of others with written authorization Federal Legislation
  • 19. © benefitexpress 2016 Government Involvement • Entities are encouraged to implement and utilize security controls to protect against unauthorized access to or acquisition of cyber threat indicators or defensive measures • Companies may share threat indicators and defensive measures with the federal government, but they must institute appropriate security controls and remove personal information not directly related to the reported cybersecurity threat • Liability protections are available for companies choosing to share information provided they implement the proper controls • Private entities may also share threat indicators and defensive measures with other private entities; again, personal information must be removed and security controls should be in place Federal Legislation
  • 20. © benefitexpress 2016 Government Involvement •49 states •Different definitions of “breach” •Different requirements re notification of government officials, law enforcement, etc. •Different requirements re notification of customers •Different requirements as to what data elements must be disclosed in notifications State Regulations
  • 21. © benefitexpress 2016 Government Involvement Federal: NIST Framework, Exec. Order effect on regulatory agencies. Specific agency interest SEC FTC FCC Sector agencies Report on Status of Regulatory Rulemaking
  • 22. © benefitexpress 2016 Information Sharing Among Stakeholders, Government Agencies, Etc. Report on general status Government contractors and subcontractors have different obligations than other entities
  • 23. © benefitexpress 2016 3rd Party Vulnerability and Efforts to Control •Target Breach Was Through an HVAC Vendor •Questionnaires/Interviews re Data Security Practices •Audits re Same
  • 24. © benefitexpress 2016 Who are the Hackers? •Nation States (North Korea, China, Russia, other?) •Criminal Groups •“Patriotic hackers” •Terrorists/ISIL •Even Teenagers
  • 25. © benefitexpress 2016 What are Their Motivations? Money is the usual driver But not always See Ashley Madison (morality was the driver?) Ransom scams are common
  • 26. © benefitexpress 2016 Data Breach Litigation •Recent General Counsel article predicting “Wave of data breach litigation” •Recent 7th Circuit case re Standing in Data Breach cases. (Remijas v. Neiman Marcus Group, 794 F.3d 688 (2015)) •Class Action Cases Against Target, Anthem, Sony, etc.
  • 27. © benefitexpress 2016 Commercially Available Products and Services High level, publically available discussion of prior work for DOD and Intelligence Community:  Booz Allen Hamilton  Verizon Communications Cyber products and services available from Booz Allen Hamilton:  Threat analyses (pre-breach): vulnerability testing and recommendations for mediation.  Cyber4Sight® Services: Predictive intelligence service help clients prepare for future attacks – information/reports on threat-actor activities and trends.  Post-cyber incident threat mitigation  Workforce skills assessment and cyber training.  Analytics of risks, threats, and opportunities for companies, government, and executive clients.
  • 28. © benefitexpress 2016 Commercially Available Products and Services Products and services available from Verizon: Managed Security Services Forensic Response Rapid Response Retainers Government partnerships (ECS)
  • 29. © benefitexpress 2016 Suggested Best Practices Critical for:  Post-breach litigation  Government inquiries/investigations (SEC, DOJ, FTC, state regulators, etc.)  Response to media inquiries/public opinion/ investors/corporate executives Plan should include:  Identify and protect critical assets (not necessarily “everything”)  Experienced external counsel and forensic experts retained in advance:  No delay for conflict checks  Expert advice to help develop the plan (make sure have backup of critical data and ability to log event traffic)  Expert advice available as soon as breach is detected  After hours/weekend response already negotiated Must have a carefully constructed response plan in place BEFORE the crisis hits
  • 30. © benefitexpress 2016 Suggested Best Practices Law enforcement contacts developed in advance: FBI InfraGard USSS ECTF Others Media Response Plan: Single point of contact Recognize investigation and recovery takes time – OPM, etc.
  • 31. © benefitexpress 2016 Suggested Best Practices • Dissemination of Information to Board of Directors:  Critical – Boards are beginning to be held accountable  Boards need to understand that this is no longer just a low level IT issue  Boards need to understand the extent and importance of efforts to prevent, monitor, detect and mitigate • Dissemination of Information to Investors  Critical that Investor Relations Dept. understands and is prepared for investor inquiries and notifications post-breach • Notification of Customers:  Currently governed by 49 different state laws  Plus a host of international rules and regulations for global customers
  • 32. © benefitexpress 2016 Suggested Best Practices •War Games/Simulations:  Good practice for the real thing  Also shows awareness, seriousness and taking responsibility in advance of a breach •Engage “White Hat” Hackers:  Run “Bug Bounty” programs •Insurance products:  Liability coverage may not cover these breaches  May have obtain separate insurance policy
  • 34. © benefitexpress 2016 Contact Larry Grudzien Attorney at Law 708-717-9638 larry@larrygrudzien.com larrygrudzien.com