SlideShare a Scribd company logo
Don’t Let Them 
Take a Byte: 
Defend Your Data 
Bit by Bit 
Kevin Ricci, CISA, MCSE
Former FBI 
Director Mueller: 
“There are two types 
of companies, those 
that have been 
hacked and those 
that don’t know it”
Why is this important?
Key Statistics 
• 94% of organizations have had at least one data breach in the 
past two years. 
• Averages: 
• Number of breach incidents in the past two years: 4 
• Number of records compromised per breach – 28,765. 
• Cost per record lost - $188 
• Industry with highest average cost per breach is Healthcare - 
$233 per record compromised. 
• Cause of Breaches: 
• 37% - Malicious or criminal attack 
• 35% - Negligent employee 
• 29% - System glitch 
Source: Ponemon Institute’s 2013 Cost of Data 
Breach Study: Global Analysis
Full service Professional Services Firm: 
Attest 
Services 
Tax 
Preparation 
and 
Compliance 
IT Audit and 
Security 
Internal 
Control 
Internal 
Audit 
Outsourcing 
SSAE 16 
Services
CPA 
CIA 
Highly qualified 
in a variety of 
specializations 
CFE 
CISA 
MCSE 
ABV 
CVA 
MST
Affiliations: 
– AICPA 
– PCAOB 
– ACFEI 
– ISACA 
– PCAOB 
– TANGO 
– CICPAC 
– Practicewise 
– VACO Risk 
Solutions
HIPAA Overview 
• The Health Insurance Portability and 
Accountability Act (HIPAA) was passed 
by Congress in 1996 
• Purpose 
– Ensure the portability of health care 
– Prevent fraud and abuse 
– Reduce paperwork 
– Enforce standards that will improve the 
efficiency of healthcare delivery, simplify 
the exchange of healthcare data, and 
reduce cost 
– Ensure the privacy and security of health 
information
HIPAA HITECH and Final Omnibus Rule 
• In 2009, the American Recovery and Reinvestment Act was 
passed and included the Health Information Technology 
for Economic and Clinical Health (HITECH) Act. In 2013, 
the Final Omnibus Rule was passed. 
• HITECH continues the effort of HIPAA to encourage 
migration to electronic patient records via financial 
incentives 
• Widens the scope and magnitude of privacy and security 
protections available under HIPAA and clarifies their 
provisions 
• Provides stronger enforcement including regular audits 
• Modifies and clarifies the definition of what constitutes a 
reportable privacy breach 
• Business Associates (BA) are now obligated to comply with 
the relevant regulations
HIPAA Overview 
Health Insurance Portability and Accountability Act of 1996 
Title I 
Insurance 
Portability 
Title II 
Preventing 
Fraud and 
Abuse 
Title III 
Tax Related 
Health 
Provisions 
Title IV 
Group Health 
Plan 
Requirements 
Title V 
Revenue Offsets 
Title II 
Medical Liability 
Reform 
Title II 
Administrative 
Simplification 
EDI 
Privacy 
Security
HIPAA Security Rule: 
• Established in 2003 
• The Security Rule is 
comprised of 22 
safeguards broken into 
three sections 
–Administrative 
Safeguards 
–Physical Safeguards 
–Technical Safeguards
HIPAA PHI 
• The formal definition of protected health information (PHI): 
– Past, current, or future mental or physical health information 
or related billing with one of 18 identifiers 
– Electronic, Verbal, Written 
• Electronic PHI is any identifiable patient data that is either 
stored or transmitted in electronic form.
HIPAA 
Who Needs to Comply? 
• Covered Entities 
– Health Plans 
– Healthcare Providers 
– Healthcare 
Clearinghouses 
• Business Associates 
– An entity that creates, 
receives, maintains, or 
transmits protected 
health information on 
behalf of a covered 
entity
Individuals Affected by Breaches
HIPAA Penalties 
Violation Amount Per 
Violation 
(A) Did Not Know $100 - $50,000 
(B) Reasonable Cause $1,000 - $50,000 
(C)(i) Willful Neglect-Corrected $10,000 - $50,000 
(C)(ii) Willful Neglect-Not Corrected $50,000
HIPAA 
HHS Website
HIPAA 
Tips For Compliance 
• Administrative 
– Create a thorough HIPAA policy handbook for all 
employees 
– Require periodic training 
– Have all employees sign a confidentiality statement 
– Have a comprehensive data breach plan 
– Work with your business associates to verify that they are 
compliant
HIPAA 
Tips For Compliance 
• Technical 
– Complete a security assessment review 
– Identify your PHI through data mapping 
– Implement the minimum necessary standard – only 
provide employees access to what they need 
– Properly dispose of hardware when it is no longer needed 
– Encrypt backup media, portable computers, and mobile 
devices containing PHI 
– Use business class email 
– Enforce strong logical controls 
– Maintain a business class firewall and antivirus solution
PCI DSS Overview 
• American Express, 
Discover, MasterCard, Visa 
and JCB formed the 
Payment Card Industry 
Security Standards Council 
in 2004 
• They are responsible for 
the development, 
management, education, 
and awareness of the 
Payment Card Industry 
Data Security Standard 
(PCI DSS)
PCI DSS 
Where Do I Fit In? 
Level 1 
>2.5m >6m >6m >6m 
Level 2 
50k to 2.5m 1m to 6m 1m to 6m 1m to 6m 
Level 3 
1 to 50k 20k to 1m 20k to 1m 20k to 1m 
Level 4 
N/A 1 to 20k 1 to 20k 1 to 20k 
Required Optional
PCI DSS Compliance 
• Identify 
• Inventory 
• Analyze 
• Fix 
• Scan 
• Compile 
• Submit
PCI DSS 
Why Should You Comply? 
• Inability to accept payment cards 
• Legal costs, settlements, judgments 
• Higher future costs of compliance 
• Fines and penalties 
• Lost confidence/sales 
• Going out of business
PCI DSS 
Tips For Compliance 
• Identify your credit card data through data mapping 
• Don’t store credit card data on your network 
• If possible, utilize dial-up terminals that do not pass 
through your network 
• Consult with a PCI DSS specialist to confirm your level, 
assist with completing the associated requirements, and 
review your backup 
documentation
State Data Security 
Overview 
• Currently, there is no federal standard, so 
many states have implemented data breach 
notification and data security/privacy 
regulations of their own 
• If you have employees or clients that live in 
those states, you may need to comply with 
their requirements
State Data Security 
Data Breach Notification
State Data Security 
Data Security Regulations
General Security Guidelines 
• Social media 
• Data mapping 
• Logical security 
• Physical security 
• Backups and disaster recovery 
• Mobile devices 
• New threats 
• Spear Phishing 
• Non-disclosure agreements 
• Cyber insurance 
• Education
Social Media 
• Implement a social media policy for your 
business 
• Educate your employees 
• Restrict any social media sites that are not 
used for business purposes 
• Consider a post-separation agreement
Data Mapping 
• Do you know what your sensitive 
data is? 
– Intellectual property 
– Medical information (PHI) 
– Personally identifiable information 
(PII) 
– Credit card data 
• Do you know where your sensitive 
data is? 
– Human Resources 
– Bookkeeping 
– Servers, laptops, desktops, backup 
media?
Data Mapping
Logical Security 
• User passwords 
– Minimum of 8 characters 
– Enforce complexity 
– Periodic changes 
– Deny access after so many 
invalid attempts 
• General 
– Password protected 
screensaver 
– Coordinate with HR to 
immediately be notified of 
terminated employees 
– Change any hardware default 
passwords
Logical Security
Physical Security 
• General 
– Educate your receptionist 
– Redundant ISP 
– Locked to-be-shredded containers 
– Guest passes 
• Data center 
– Visitor log 
– Security cameras 
– Alarm 
– Temperature, water, smoke, fire detectors 
– Uninterrupted power supplies (UPS)
Backups and Disaster Recovery 
• General 
– Viability testing 
– Offsite transport 
– Encryption 
• Onsite backups 
– Fireproof safe 
– Security 
• Cloud backups 
– Service agreement 
– SSAE 16 
• Disaster recovery plan
Mobile Devices 
• Policies 
• Use an antivirus app 
• Use a password 
• Encryption 
• Avoid freeWi-Fi 
• Remote wipe
New Threats 
• Ransomware 
• Heartbleed 
• Internet Explorer Vulnerability
Spear Phishing 
• Train employees on 
what to look for 
• Be careful where you 
post personal information 
• Beware of unexpected emails 
• Keep your software up to date
Non-Disclosure Agreements 
Any consultant that can access 
your network should provide you 
with a non-disclosure / 
confidentiality agreement
Cyber Insurance 
Work with your legal and insurance contacts to 
make sure you have the necessary level of cyber 
insurance in the event of an attack or data breach
Education 
• Critically important – end users are 
often your weakest security link! 
• Provide security training during the 
onboarding process 
• Provide your staff with an annual 
security training 
• Provide additional training to anyone 
with direct contact with PHI, PII, or 
other sensitive information 
• Have employees sign a document that 
they acknowledge the security 
policies
Kevin Ricci, Director of IT 
kricci@lgcd.com 
(401) 421-4800 x278

More Related Content

What's hot

Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
Joseph Wynn
 
Supply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperSupply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - Whitepaper
NIIT Technologies
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Mafazo: Digital Solutions
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
Kroll
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
Imperva
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
IBM Security
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
InfinIT - Innovationsnetværket for it
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
IBM Security
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
Skoda Minotti
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
Brian Matteson, CISSP CISA
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
Precisely
 
Finding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown JewelsFinding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown Jewels
Doug Landoll
 
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the BeefeatersProtecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the Beefeaters
Jack Nichelson
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
AdilsonSuende
 
Data Sheet For Erg
Data Sheet For ErgData Sheet For Erg
Data Sheet For Erg
mjschreck
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
SecureAuth
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity Regulations
Jon Bosco
 
Data breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundationData breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundation
Bradley Arant Boult Cummings LLP
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
PECB
 

What's hot (20)

Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
Supply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - WhitepaperSupply Chain Risk Management corrected - Whitepaper
Supply Chain Risk Management corrected - Whitepaper
 
Cyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk ManagementCyber Security Vendor Risk Management /Supply Chain Risk Management
Cyber Security Vendor Risk Management /Supply Chain Risk Management
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBMProtecting the "Crown Jewels" by Henrik Bodskov, IBM
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Finding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown JewelsFinding and Protecting Your Organizations Crown Jewels
Finding and Protecting Your Organizations Crown Jewels
 
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the BeefeatersProtecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the Beefeaters
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Data Sheet For Erg
Data Sheet For ErgData Sheet For Erg
Data Sheet For Erg
 
A CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability InsuranceA CISO's Guide to Cyber Liability Insurance
A CISO's Guide to Cyber Liability Insurance
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity Regulations
 
Data breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundationData breach-response-planning-laying-the-right-foundation
Data breach-response-planning-laying-the-right-foundation
 
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...Business impact of new EU General Data Protection Regulation (GDPR) on organi...
Business impact of new EU General Data Protection Regulation (GDPR) on organi...
 

Similar to Don't let them take a byte

Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
Kaseya
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
Evan Francen
 
You and HIPAA - Get the Facts
You and HIPAA - Get the FactsYou and HIPAA - Get the Facts
You and HIPAA - Get the Facts
resourceone
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
Raffa Learning Community
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
Financial Poise
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysislearfield
 
Cybersecurity 101 final
Cybersecurity 101 finalCybersecurity 101 final
Cybersecurity 101 final
Kemper Brown, Jr.
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
IT Governance Ltd
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
Resilient Systems
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
Patrick Florer
 
HIPAA omnibus rule update
HIPAA omnibus rule updateHIPAA omnibus rule update
HIPAA omnibus rule update
O'Connor Davies CPAs
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting Introduction
Blackbaud
 
Cybersecurity for Small Business
Cybersecurity for Small BusinessCybersecurity for Small Business
Cybersecurity for Small Business
Murray Security Services
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
Compliancy Group
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
Information Technology Society Nepal
 

Similar to Don't let them take a byte (20)

Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
You and HIPAA - Get the Facts
You and HIPAA - Get the FactsYou and HIPAA - Get the Facts
You and HIPAA - Get the Facts
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
 
Cybersecurity 101 final
Cybersecurity 101 finalCybersecurity 101 final
Cybersecurity 101 final
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
HIPAA omnibus rule update
HIPAA omnibus rule updateHIPAA omnibus rule update
HIPAA omnibus rule update
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting Introduction
 
Cybersecurity for Small Business
Cybersecurity for Small BusinessCybersecurity for Small Business
Cybersecurity for Small Business
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 

More from lgcdcpas

Risk contracting
Risk contractingRisk contracting
Risk contracting
lgcdcpas
 
Top 10 Tips for Data Security
Top 10 Tips for Data SecurityTop 10 Tips for Data Security
Top 10 Tips for Data Security
lgcdcpas
 
Nursing home industry presentation
Nursing home industry presentationNursing home industry presentation
Nursing home industry presentation
lgcdcpas
 
Inside The Audit
Inside The AuditInside The Audit
Inside The Audit
lgcdcpas
 
Basics of construction accouting
Basics of construction accoutingBasics of construction accouting
Basics of construction accouting
lgcdcpas
 
Results Reimagined
Results ReimaginedResults Reimagined
Results Reimagined
lgcdcpas
 

More from lgcdcpas (6)

Risk contracting
Risk contractingRisk contracting
Risk contracting
 
Top 10 Tips for Data Security
Top 10 Tips for Data SecurityTop 10 Tips for Data Security
Top 10 Tips for Data Security
 
Nursing home industry presentation
Nursing home industry presentationNursing home industry presentation
Nursing home industry presentation
 
Inside The Audit
Inside The AuditInside The Audit
Inside The Audit
 
Basics of construction accouting
Basics of construction accoutingBasics of construction accouting
Basics of construction accouting
 
Results Reimagined
Results ReimaginedResults Reimagined
Results Reimagined
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Don't let them take a byte

  • 1. Don’t Let Them Take a Byte: Defend Your Data Bit by Bit Kevin Ricci, CISA, MCSE
  • 2.
  • 3. Former FBI Director Mueller: “There are two types of companies, those that have been hacked and those that don’t know it”
  • 4. Why is this important?
  • 5. Key Statistics • 94% of organizations have had at least one data breach in the past two years. • Averages: • Number of breach incidents in the past two years: 4 • Number of records compromised per breach – 28,765. • Cost per record lost - $188 • Industry with highest average cost per breach is Healthcare - $233 per record compromised. • Cause of Breaches: • 37% - Malicious or criminal attack • 35% - Negligent employee • 29% - System glitch Source: Ponemon Institute’s 2013 Cost of Data Breach Study: Global Analysis
  • 6.
  • 7. Full service Professional Services Firm: Attest Services Tax Preparation and Compliance IT Audit and Security Internal Control Internal Audit Outsourcing SSAE 16 Services
  • 8. CPA CIA Highly qualified in a variety of specializations CFE CISA MCSE ABV CVA MST
  • 9. Affiliations: – AICPA – PCAOB – ACFEI – ISACA – PCAOB – TANGO – CICPAC – Practicewise – VACO Risk Solutions
  • 10. HIPAA Overview • The Health Insurance Portability and Accountability Act (HIPAA) was passed by Congress in 1996 • Purpose – Ensure the portability of health care – Prevent fraud and abuse – Reduce paperwork – Enforce standards that will improve the efficiency of healthcare delivery, simplify the exchange of healthcare data, and reduce cost – Ensure the privacy and security of health information
  • 11. HIPAA HITECH and Final Omnibus Rule • In 2009, the American Recovery and Reinvestment Act was passed and included the Health Information Technology for Economic and Clinical Health (HITECH) Act. In 2013, the Final Omnibus Rule was passed. • HITECH continues the effort of HIPAA to encourage migration to electronic patient records via financial incentives • Widens the scope and magnitude of privacy and security protections available under HIPAA and clarifies their provisions • Provides stronger enforcement including regular audits • Modifies and clarifies the definition of what constitutes a reportable privacy breach • Business Associates (BA) are now obligated to comply with the relevant regulations
  • 12. HIPAA Overview Health Insurance Portability and Accountability Act of 1996 Title I Insurance Portability Title II Preventing Fraud and Abuse Title III Tax Related Health Provisions Title IV Group Health Plan Requirements Title V Revenue Offsets Title II Medical Liability Reform Title II Administrative Simplification EDI Privacy Security
  • 13. HIPAA Security Rule: • Established in 2003 • The Security Rule is comprised of 22 safeguards broken into three sections –Administrative Safeguards –Physical Safeguards –Technical Safeguards
  • 14. HIPAA PHI • The formal definition of protected health information (PHI): – Past, current, or future mental or physical health information or related billing with one of 18 identifiers – Electronic, Verbal, Written • Electronic PHI is any identifiable patient data that is either stored or transmitted in electronic form.
  • 15. HIPAA Who Needs to Comply? • Covered Entities – Health Plans – Healthcare Providers – Healthcare Clearinghouses • Business Associates – An entity that creates, receives, maintains, or transmits protected health information on behalf of a covered entity
  • 17. HIPAA Penalties Violation Amount Per Violation (A) Did Not Know $100 - $50,000 (B) Reasonable Cause $1,000 - $50,000 (C)(i) Willful Neglect-Corrected $10,000 - $50,000 (C)(ii) Willful Neglect-Not Corrected $50,000
  • 19. HIPAA Tips For Compliance • Administrative – Create a thorough HIPAA policy handbook for all employees – Require periodic training – Have all employees sign a confidentiality statement – Have a comprehensive data breach plan – Work with your business associates to verify that they are compliant
  • 20. HIPAA Tips For Compliance • Technical – Complete a security assessment review – Identify your PHI through data mapping – Implement the minimum necessary standard – only provide employees access to what they need – Properly dispose of hardware when it is no longer needed – Encrypt backup media, portable computers, and mobile devices containing PHI – Use business class email – Enforce strong logical controls – Maintain a business class firewall and antivirus solution
  • 21. PCI DSS Overview • American Express, Discover, MasterCard, Visa and JCB formed the Payment Card Industry Security Standards Council in 2004 • They are responsible for the development, management, education, and awareness of the Payment Card Industry Data Security Standard (PCI DSS)
  • 22. PCI DSS Where Do I Fit In? Level 1 >2.5m >6m >6m >6m Level 2 50k to 2.5m 1m to 6m 1m to 6m 1m to 6m Level 3 1 to 50k 20k to 1m 20k to 1m 20k to 1m Level 4 N/A 1 to 20k 1 to 20k 1 to 20k Required Optional
  • 23. PCI DSS Compliance • Identify • Inventory • Analyze • Fix • Scan • Compile • Submit
  • 24. PCI DSS Why Should You Comply? • Inability to accept payment cards • Legal costs, settlements, judgments • Higher future costs of compliance • Fines and penalties • Lost confidence/sales • Going out of business
  • 25. PCI DSS Tips For Compliance • Identify your credit card data through data mapping • Don’t store credit card data on your network • If possible, utilize dial-up terminals that do not pass through your network • Consult with a PCI DSS specialist to confirm your level, assist with completing the associated requirements, and review your backup documentation
  • 26. State Data Security Overview • Currently, there is no federal standard, so many states have implemented data breach notification and data security/privacy regulations of their own • If you have employees or clients that live in those states, you may need to comply with their requirements
  • 27. State Data Security Data Breach Notification
  • 28. State Data Security Data Security Regulations
  • 29. General Security Guidelines • Social media • Data mapping • Logical security • Physical security • Backups and disaster recovery • Mobile devices • New threats • Spear Phishing • Non-disclosure agreements • Cyber insurance • Education
  • 30. Social Media • Implement a social media policy for your business • Educate your employees • Restrict any social media sites that are not used for business purposes • Consider a post-separation agreement
  • 31. Data Mapping • Do you know what your sensitive data is? – Intellectual property – Medical information (PHI) – Personally identifiable information (PII) – Credit card data • Do you know where your sensitive data is? – Human Resources – Bookkeeping – Servers, laptops, desktops, backup media?
  • 33. Logical Security • User passwords – Minimum of 8 characters – Enforce complexity – Periodic changes – Deny access after so many invalid attempts • General – Password protected screensaver – Coordinate with HR to immediately be notified of terminated employees – Change any hardware default passwords
  • 35. Physical Security • General – Educate your receptionist – Redundant ISP – Locked to-be-shredded containers – Guest passes • Data center – Visitor log – Security cameras – Alarm – Temperature, water, smoke, fire detectors – Uninterrupted power supplies (UPS)
  • 36. Backups and Disaster Recovery • General – Viability testing – Offsite transport – Encryption • Onsite backups – Fireproof safe – Security • Cloud backups – Service agreement – SSAE 16 • Disaster recovery plan
  • 37. Mobile Devices • Policies • Use an antivirus app • Use a password • Encryption • Avoid freeWi-Fi • Remote wipe
  • 38. New Threats • Ransomware • Heartbleed • Internet Explorer Vulnerability
  • 39. Spear Phishing • Train employees on what to look for • Be careful where you post personal information • Beware of unexpected emails • Keep your software up to date
  • 40. Non-Disclosure Agreements Any consultant that can access your network should provide you with a non-disclosure / confidentiality agreement
  • 41. Cyber Insurance Work with your legal and insurance contacts to make sure you have the necessary level of cyber insurance in the event of an attack or data breach
  • 42. Education • Critically important – end users are often your weakest security link! • Provide security training during the onboarding process • Provide your staff with an annual security training • Provide additional training to anyone with direct contact with PHI, PII, or other sensitive information • Have employees sign a document that they acknowledge the security policies
  • 43. Kevin Ricci, Director of IT kricci@lgcd.com (401) 421-4800 x278