SlideShare a Scribd company logo
Privileged and Confidential Information Twitter:@RevInnovator
CyberSecurity
Five Ways for Boards to Prepare
October 2015
Privileged and Confidential Information Twitter:@RevInnovator
The Last Year of High Profile Breaches
1
11,000,000	
  
Bank	
  Accounts	
  
Social	
  Security	
  Numbers	
  
80,000,000	
  
Social	
  Security	
  Numbers	
  
eMail	
  Addresses	
  
Physical	
  Addresses	
  
47,000	
  
Proprietary	
  Info	
  
Employee	
  info	
  
	
  
109,000,000	
  
Credit	
  Cards	
  
eMail	
  Addresses	
  
83,000,000	
  
eMail	
  Addresses	
  
Physical	
  Addresses	
  
145,000,000	
  
eMail	
  Addresses	
  
Physical	
  Addresses	
  
Login	
  CredenIals	
  
110,000,000	
  
Credit	
  Card	
  Numbers	
  
Source:	
  Bloomberg.com	
  -­‐	
  A	
  Quick	
  Guide	
  to	
  the	
  Worst	
  Corporate	
  Hack	
  AQacks	
  
Privileged and Confidential Information Twitter:@RevInnovator
High Profile Firings: Not Just IT
2
Mailroom Employee
Highmark
MDF Transcription
Boston Medical Group
Two hospital workers
Georgia Hospital
“Terrific Employee”
Goold Health System
Target	
  CIO	
  –	
  Beth	
  Jacobs	
  
Maricopa	
  County	
  Community	
  
College	
  District	
  –	
  Miguel	
  Corozo	
  
The	
  Texas	
  State	
  Comptroller's	
  
office	
  –	
  Susan	
  Combs	
  
Target	
  CEO	
  Gregg	
  Steinhafel	
  
The	
  Utah	
  state	
  Department	
  of	
  
Technology	
  Service	
  
Privileged and Confidential Information Twitter:@RevInnovator 3
A primary responsibility of every board is
to secure the future of the organization.
- Tom Horton – Boards & Directors
Privileged and Confidential Information Twitter:@RevInnovator
The New Normal
•  Every company is an IT Company
•  Every company is a Big Data Company
•  BYOX will continue to grow
•  Most security is perimeter security
•  ~25% of HIPAA breaches involve a trusted
partner
– That number is poised to increase as business
associates are now liable under the new HIPAA
rule
4
Privileged and Confidential Information Twitter:@RevInnovator
Top Three Industry Breaches
5
Number	
  of	
  Incidents Confirmed	
  Data	
  Loss
Total Small Large Unknown Total Small Large Unknown
Public 50,315	
   19 49,596 700 303 6 241 56
InformaIon 1,496 36 34 1,426 95 13 17 65
Financial 642 44 177 421 277 33 136 108
Dollar loss is difficult to calculate
Boards and Executives care about business
impact
Privileged and Confidential Information Twitter:@RevInnovator 6
Privileged and Confidential Information Twitter:@RevInnovator
30 years later: Why do Companies still #Fail?
•  Security and Compliance treated as “IT
problems” and not as core Business Operations
•  Security spend is perceived as a burden
expense
–  Consider it in the same as your Accounting function
•  Most compliance and security needs primarily
addresses the complex internal IT requirements
–  Governance, human and wider partner network
vulnerabilities are lightly considered
7
Privileged and Confidential Information Twitter:@RevInnovator
According to a 2014 Verizon Report,
only 10% of Merchants/Service
Providers were fully compliant with
DSS 2.0 standards*
8
*Verizon 2014 Pci Compliance Report - http://www.verizonenterprise.com/pcireport/2014/
Compliance ≠ Security!
Privileged and Confidential Information Twitter:@RevInnovator
Five Mandates for the Board
Understanding
People
Process
Technology
Preparedness
9
•  Understanding
–  What are the risks?
–  Chain of trust?
–  Do they understand Cyber?
•  People
–  Are the right people in place?
–  Do they have the resources they need?
–  Do they understand the companies
strategic risks?
•  Process
–  Is there are breach response plan?
–  Do you have partners ready to support?
–  How often is it tested?
•  Technology
–  Cyber-risk is not an IT problem.
–  IT is one of the enablers
•  Preparedness
–  Is business continuity ready?
–  Is it tested?
–  Are out-of-band methods in place?
Privileged and Confidential Information Twitter:@RevInnovator
Cyber Insurance is a Reality
10
Privileged and Confidential Information Twitter:@RevInnovator
Example of a Prepared Team
11
April 2014: A Dutch teenage girl
sends a “prank” tweet
threatening American Airlines.
American Airlines’ response was
direct and got media airplay.
@AmericanAir tweeted
“@QueenDemetriax_ Sarah, we take
these threats very seriously. Your IP
address and details will be forwarded to
security and the FBI.”
@QueenDemetriax_ tweeted
"@AmericanAir hello my name's Ibrahim
and I'm from Afghanistan. I'm part of Al
Qaida and on June 1st I'm gonna do
something really big bye.”
Privileged and Confidential Information Twitter:@RevInnovator
Five Questions for Executives and Boards
•  Is an up to date security framework in
place?
•  Does a breach response plan exist?
•  How much does (cyber) insurance cover?
•  Are both internal and external (partner)
resources considered?
•  Do employee’s understand their role in
relation to company security?
12
excellence.perspective.innovation.
Privileged and Confidential Information Twitter:@RevInnovator
NACD Five Principles
1.  Cyber security is an enterprise-wide risk management
issues, not just an IT problem.
2.  Address the serious legal consequences of cyber risks.
3.  Cyber security must be addressed with professionals
and given board-level priority.
4.  Directors must advise management to take all steps
necessary to comprehensively address cyber risk with
personnel and resources.
5.  Determine how your organization would deal with a
breach and whether liability can be addressed via
insurance.
14

More Related Content

What's hot

Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Kevin Duffey
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
IronCore Labs
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breaches
WhoisXML API
 
Easy security presentation 1
Easy security presentation 1Easy security presentation 1
Easy security presentation 1Michael Buschmann
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Accellis Technology Group
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...
Kevin Duffey
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
Alexandru Turcu
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
CMR WORLD TECH
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
4iQ
 
Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015
Brian Levine
 
Productivity 3.0
Productivity 3.0Productivity 3.0
Productivity 3.0
The Lorenzi Group
 
Social Engineering Team Talk 1 PhishMe Leader Guide Final
Social Engineering Team Talk 1 PhishMe  Leader Guide FinalSocial Engineering Team Talk 1 PhishMe  Leader Guide Final
Social Engineering Team Talk 1 PhishMe Leader Guide FinalSteve Gavora
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
EMC
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
Cyberhunter Cyber Security
 
Phishing
PhishingPhishing
Phishing
guicelacatalina
 
State of Security
State of SecurityState of Security
State of Security
- Mark - Fullbright
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cybera Inc.
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And Security
Jamie Hutt
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
Jamie Hutt
 
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
Black Duck by Synopsys
 

What's hot (20)

Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breaches
 
Easy security presentation 1
Easy security presentation 1Easy security presentation 1
Easy security presentation 1
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology Group
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
 
Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015
 
Productivity 3.0
Productivity 3.0Productivity 3.0
Productivity 3.0
 
Social Engineering Team Talk 1 PhishMe Leader Guide Final
Social Engineering Team Talk 1 PhishMe  Leader Guide FinalSocial Engineering Team Talk 1 PhishMe  Leader Guide Final
Social Engineering Team Talk 1 PhishMe Leader Guide Final
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Phishing
PhishingPhishing
Phishing
 
State of Security
State of SecurityState of Security
State of Security
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And Security
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
 

Viewers also liked

Webサービスのための 10/40Gigabit Ethernetの可能性
Webサービスのための10/40Gigabit Ethernetの可能性Webサービスのための10/40Gigabit Ethernetの可能性
Webサービスのための 10/40Gigabit Ethernetの可能性
Naoto MATSUMOTO
 
How To Train Your Calxeda EnergyCore
How To Train Your  Calxeda EnergyCoreHow To Train Your  Calxeda EnergyCore
How To Train Your Calxeda EnergyCore
Naoto MATSUMOTO
 
Computational Research day 2015
Computational Research day 2015Computational Research day 2015
Computational Research day 2015
cunera
 
Fcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industryFcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industry
Alberto Garcia Romera
 
Small Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work item
Small Cell Forum
 
Block Chain Record Management
Block Chain Record ManagementBlock Chain Record Management
Block Chain Record Management
Charles Moore
 
Data and Donuts: How to write a data management plan
Data and Donuts: How to write a data management planData and Donuts: How to write a data management plan
Data and Donuts: How to write a data management plan
C. Tobin Magle
 
Brainstorming of Hospitality design
Brainstorming of Hospitality designBrainstorming of Hospitality design
Brainstorming of Hospitality design
Neenu Sara Abraham
 
Evolutionary Psychology
Evolutionary PsychologyEvolutionary Psychology
Evolutionary Psychology
Simon Bignell
 
Solving the Language Barrier
Solving the Language BarrierSolving the Language Barrier
Solving the Language BarrierLuis Medina
 
大規模なスイッチレス・サーバクラスタリング構築運用の考察
大規模なスイッチレス・サーバクラスタリング構築運用の考察大規模なスイッチレス・サーバクラスタリング構築運用の考察
大規模なスイッチレス・サーバクラスタリング構築運用の考察
Naoto MATSUMOTO
 
Yeast experiment
Yeast experimentYeast experiment
Yeast experiments08051
 
Data mining slides
Data mining slidesData mining slides
Data mining slidessmj
 

Viewers also liked (17)

Webサービスのための 10/40Gigabit Ethernetの可能性
Webサービスのための10/40Gigabit Ethernetの可能性Webサービスのための10/40Gigabit Ethernetの可能性
Webサービスのための 10/40Gigabit Ethernetの可能性
 
How To Train Your Calxeda EnergyCore
How To Train Your  Calxeda EnergyCoreHow To Train Your  Calxeda EnergyCore
How To Train Your Calxeda EnergyCore
 
assuncao pdf ok
assuncao pdf okassuncao pdf ok
assuncao pdf ok
 
Muhammad Al1
Muhammad Al1Muhammad Al1
Muhammad Al1
 
ERM Symposium Agenda FINAL
ERM Symposium Agenda FINALERM Symposium Agenda FINAL
ERM Symposium Agenda FINAL
 
Computational Research day 2015
Computational Research day 2015Computational Research day 2015
Computational Research day 2015
 
Fcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industryFcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industry
 
A lovely lunch recipe
A lovely lunch recipeA lovely lunch recipe
A lovely lunch recipe
 
Small Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work item
 
Block Chain Record Management
Block Chain Record ManagementBlock Chain Record Management
Block Chain Record Management
 
Data and Donuts: How to write a data management plan
Data and Donuts: How to write a data management planData and Donuts: How to write a data management plan
Data and Donuts: How to write a data management plan
 
Brainstorming of Hospitality design
Brainstorming of Hospitality designBrainstorming of Hospitality design
Brainstorming of Hospitality design
 
Evolutionary Psychology
Evolutionary PsychologyEvolutionary Psychology
Evolutionary Psychology
 
Solving the Language Barrier
Solving the Language BarrierSolving the Language Barrier
Solving the Language Barrier
 
大規模なスイッチレス・サーバクラスタリング構築運用の考察
大規模なスイッチレス・サーバクラスタリング構築運用の考察大規模なスイッチレス・サーバクラスタリング構築運用の考察
大規模なスイッチレス・サーバクラスタリング構築運用の考察
 
Yeast experiment
Yeast experimentYeast experiment
Yeast experiment
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 

Similar to Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board

5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
ClearDATACloud
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
IT Governance Ltd
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
Grant Barker
 
Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511
Stan Stahl, PhD
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
mihinpr
 
Privacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesPrivacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service Representatives
Art Hall
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
ISSA LA
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
Marty Miller
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
Matthew Rosenquist
 
Ten Steps to Help Avoid a Major Privacy or Security Headache
Ten Steps to Help Avoid a Major  Privacy or Security Headache Ten Steps to Help Avoid a Major  Privacy or Security Headache
Ten Steps to Help Avoid a Major Privacy or Security Headache
Ryan Boyles
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
Shariyaz Abdeen
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Carolyn Slade, MS-HIM
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Carolyn Slade, MS-HIM
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Health IT Conference – iHT2
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
Sandra Fathi
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
Priyanka Aash
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Joe Bartolo
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
SecureAuth
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
CA Technologies
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
christalgrieg
 

Similar to Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board (20)

5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Privacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesPrivacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service Representatives
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Ten Steps to Help Avoid a Major Privacy or Security Headache
Ten Steps to Help Avoid a Major  Privacy or Security Headache Ten Steps to Help Avoid a Major  Privacy or Security Headache
Ten Steps to Help Avoid a Major Privacy or Security Headache
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
 

More from LERNER Consulting

How to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptxHow to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptx
LERNER Consulting
 
Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019
LERNER Consulting
 
Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...
LERNER Consulting
 
RChain Developer Conference pithia investments 04-2018
RChain Developer Conference   pithia investments 04-2018RChain Developer Conference   pithia investments 04-2018
RChain Developer Conference pithia investments 04-2018
LERNER Consulting
 
Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018
LERNER Consulting
 
Leadership: A Journey Planner
Leadership: A Journey PlannerLeadership: A Journey Planner
Leadership: A Journey Planner
LERNER Consulting
 
CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018
LERNER Consulting
 
SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017
LERNER Consulting
 
Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017
LERNER Consulting
 
Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017
LERNER Consulting
 
Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016
LERNER Consulting
 
Change Management: A Journey Planner
Change Management: A Journey Planner Change Management: A Journey Planner
Change Management: A Journey Planner
LERNER Consulting
 
There's always room for Growth
There's always room for GrowthThere's always room for Growth
There's always room for Growth
LERNER Consulting
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
LERNER Consulting
 
Alternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER ConsultingAlternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER Consulting
LERNER Consulting
 
Block Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingBlock Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER Consulting
LERNER Consulting
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask Yourself
LERNER Consulting
 
Client Case Study/Citations Template
Client Case Study/Citations TemplateClient Case Study/Citations Template
Client Case Study/Citations Template
LERNER Consulting
 
Executive Status Report Template
Executive Status Report TemplateExecutive Status Report Template
Executive Status Report Template
LERNER Consulting
 

More from LERNER Consulting (20)

How to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptxHow to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptx
 
Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019
 
Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...
 
RChain Developer Conference pithia investments 04-2018
RChain Developer Conference   pithia investments 04-2018RChain Developer Conference   pithia investments 04-2018
RChain Developer Conference pithia investments 04-2018
 
Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018
 
Leadership: A Journey Planner
Leadership: A Journey PlannerLeadership: A Journey Planner
Leadership: A Journey Planner
 
CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018
 
SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017
 
Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017
 
Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017
 
Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016
 
Change Management: A Journey Planner
Change Management: A Journey Planner Change Management: A Journey Planner
Change Management: A Journey Planner
 
SR Developer Job Posting
SR Developer Job PostingSR Developer Job Posting
SR Developer Job Posting
 
There's always room for Growth
There's always room for GrowthThere's always room for Growth
There's always room for Growth
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
 
Alternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER ConsultingAlternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER Consulting
 
Block Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingBlock Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER Consulting
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask Yourself
 
Client Case Study/Citations Template
Client Case Study/Citations TemplateClient Case Study/Citations Template
Client Case Study/Citations Template
 
Executive Status Report Template
Executive Status Report TemplateExecutive Status Report Template
Executive Status Report Template
 

Recently uploaded

Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 

Recently uploaded (20)

Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 

Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board

  • 1. Privileged and Confidential Information Twitter:@RevInnovator CyberSecurity Five Ways for Boards to Prepare October 2015
  • 2. Privileged and Confidential Information Twitter:@RevInnovator The Last Year of High Profile Breaches 1 11,000,000   Bank  Accounts   Social  Security  Numbers   80,000,000   Social  Security  Numbers   eMail  Addresses   Physical  Addresses   47,000   Proprietary  Info   Employee  info     109,000,000   Credit  Cards   eMail  Addresses   83,000,000   eMail  Addresses   Physical  Addresses   145,000,000   eMail  Addresses   Physical  Addresses   Login  CredenIals   110,000,000   Credit  Card  Numbers   Source:  Bloomberg.com  -­‐  A  Quick  Guide  to  the  Worst  Corporate  Hack  AQacks  
  • 3. Privileged and Confidential Information Twitter:@RevInnovator High Profile Firings: Not Just IT 2 Mailroom Employee Highmark MDF Transcription Boston Medical Group Two hospital workers Georgia Hospital “Terrific Employee” Goold Health System Target  CIO  –  Beth  Jacobs   Maricopa  County  Community   College  District  –  Miguel  Corozo   The  Texas  State  Comptroller's   office  –  Susan  Combs   Target  CEO  Gregg  Steinhafel   The  Utah  state  Department  of   Technology  Service  
  • 4. Privileged and Confidential Information Twitter:@RevInnovator 3 A primary responsibility of every board is to secure the future of the organization. - Tom Horton – Boards & Directors
  • 5. Privileged and Confidential Information Twitter:@RevInnovator The New Normal •  Every company is an IT Company •  Every company is a Big Data Company •  BYOX will continue to grow •  Most security is perimeter security •  ~25% of HIPAA breaches involve a trusted partner – That number is poised to increase as business associates are now liable under the new HIPAA rule 4
  • 6. Privileged and Confidential Information Twitter:@RevInnovator Top Three Industry Breaches 5 Number  of  Incidents Confirmed  Data  Loss Total Small Large Unknown Total Small Large Unknown Public 50,315   19 49,596 700 303 6 241 56 InformaIon 1,496 36 34 1,426 95 13 17 65 Financial 642 44 177 421 277 33 136 108 Dollar loss is difficult to calculate Boards and Executives care about business impact
  • 7. Privileged and Confidential Information Twitter:@RevInnovator 6
  • 8. Privileged and Confidential Information Twitter:@RevInnovator 30 years later: Why do Companies still #Fail? •  Security and Compliance treated as “IT problems” and not as core Business Operations •  Security spend is perceived as a burden expense –  Consider it in the same as your Accounting function •  Most compliance and security needs primarily addresses the complex internal IT requirements –  Governance, human and wider partner network vulnerabilities are lightly considered 7
  • 9. Privileged and Confidential Information Twitter:@RevInnovator According to a 2014 Verizon Report, only 10% of Merchants/Service Providers were fully compliant with DSS 2.0 standards* 8 *Verizon 2014 Pci Compliance Report - http://www.verizonenterprise.com/pcireport/2014/ Compliance ≠ Security!
  • 10. Privileged and Confidential Information Twitter:@RevInnovator Five Mandates for the Board Understanding People Process Technology Preparedness 9 •  Understanding –  What are the risks? –  Chain of trust? –  Do they understand Cyber? •  People –  Are the right people in place? –  Do they have the resources they need? –  Do they understand the companies strategic risks? •  Process –  Is there are breach response plan? –  Do you have partners ready to support? –  How often is it tested? •  Technology –  Cyber-risk is not an IT problem. –  IT is one of the enablers •  Preparedness –  Is business continuity ready? –  Is it tested? –  Are out-of-band methods in place?
  • 11. Privileged and Confidential Information Twitter:@RevInnovator Cyber Insurance is a Reality 10
  • 12. Privileged and Confidential Information Twitter:@RevInnovator Example of a Prepared Team 11 April 2014: A Dutch teenage girl sends a “prank” tweet threatening American Airlines. American Airlines’ response was direct and got media airplay. @AmericanAir tweeted “@QueenDemetriax_ Sarah, we take these threats very seriously. Your IP address and details will be forwarded to security and the FBI.” @QueenDemetriax_ tweeted "@AmericanAir hello my name's Ibrahim and I'm from Afghanistan. I'm part of Al Qaida and on June 1st I'm gonna do something really big bye.”
  • 13. Privileged and Confidential Information Twitter:@RevInnovator Five Questions for Executives and Boards •  Is an up to date security framework in place? •  Does a breach response plan exist? •  How much does (cyber) insurance cover? •  Are both internal and external (partner) resources considered? •  Do employee’s understand their role in relation to company security? 12
  • 15. Privileged and Confidential Information Twitter:@RevInnovator NACD Five Principles 1.  Cyber security is an enterprise-wide risk management issues, not just an IT problem. 2.  Address the serious legal consequences of cyber risks. 3.  Cyber security must be addressed with professionals and given board-level priority. 4.  Directors must advise management to take all steps necessary to comprehensively address cyber risk with personnel and resources. 5.  Determine how your organization would deal with a breach and whether liability can be addressed via insurance. 14