SlideShare a Scribd company logo
License No. 045127
Thank you for joining us. We have a great many participants in today’s call. Your
phone is currently muted so that the noise level can be kept to a minimum. If
you have not yet joined the audio portion of this webinar, please click on
Communicate at the top of your screen, and then Join Teleconference. The dial-
in information will appear.
If you have any questions, you can send them to the host using the Chat
feature in the bottom right corner during the webinar.
The webinar will start momentarily.
© 2014 Keenan & Associates
Don’t Be a Victim to Data Breach Risks
Protecting Your Organization From Data Breach and Privacy Risks
License No. 045127License No. 045127
Protecting Your Organization From
Data Breach and Privacy Risks
2
Brad Keenan
Cyber Specialist
Keenan
Kyle McKibbin
Cyber Specialist
Keenan
Presented by:
License No. 045127
Cyber Summary
• Cyber Risk and Data Breaches
– Overview
– Where are the exposures?
– How much of a financial impact do they have?
• Data breach examples
• Cyber Risk Management
– Risk retention
– Risk control
– Risk transfer
3
License No. 045127
Myths about Cyber Security
• ALL Cyber Breaches are Preventable
• “The IT Team is on top of it”
• Cyber Theft/Data Breach is about credit cards
• Big Corporate Companies are most at-risk
• External hackers are the biggest security risk
4
License No. 045127 5
License No. 045127
40 Million Individuals;
$148 Million Loss 24 States; 51 Stores
$4.8 Million HIPAA
Fine
350,000 credit
cards;
$4.1 Million
Loss
National Headlines
6
56 million credit cards;
Unknown Loss
License No. 045127 7
License No. 045127
School Districts
8
License No. 045127
Healthcare Organizations
9
License No. 045127
Municipalities
10
License No. 045127 11
License No. 045127
Data Breach
A data breach is an incident in which sensitive,
protected or confidential data has potentially been
viewed, stolen or used by an individual unauthorized
to do so
12
License No. 045127
Important Records
• Student records
• Employee records
• Credit card information
• Financial aid records
• Job applicant records
• Tax ID information
• Utility payment records
• Citation payment records
• Patient records
• Health plan records and
ID numbers
13
License No. 045127
Exposures
INTERNAL
• Lost or stolen laptops,
computers, flash drives or other
storage devices
• Backup tapes misplaced or lost
in transit
• Rogue employees
• Inadequate computer-use
policies
• Weak IT Infrastructure
• Employee Negligence
EXTERNAL
• IT consultants/vendors
• Internet and network access
points
• Sale, donation or disposal of
old office equipment (desks, file
cabinets, copiers) that contain
employee records
• Viruses or Malware
• “Dumpster diving”
14
License No. 045127
Why are Organizations at Risk
• Resource Size
– Less sophisticated safeguards
– Less dedicated manpower may lead to delayed or no detection
– Less resources to use to recover vs. big business
• Ability to React
– Detect/report a breach
– Notify/assist affected individuals
– Reimburse individuals for actual losses
15
License No. 045127
Regulation & Notification Laws
• Federal guidelines
– HIPAA
– Payment Card Industry Data Security Standard (PCI-DSS)
– Drivers Privacy Protection Act (DPPA)
• Notification and consumer protection laws vary from state as
to who must be notified and the manner of notification
• 47 states (including California) and D.C. have separate breach
laws in place as of 2/6/12
– AB 1149 (effective January 1, 2014)
– SB 46 (effective January 1, 2014)
16
License No. 045127
Media Management
17
Response to a Breach
License No. 045127
Per Person Cost of a Breach
18
$316
$286
$259
$237
$236
$223
$219
$209
$204
$196
$183
$181
$172
$125
$93
$73
$0 $50 $100 $150 $200 $250 $300 $350
Healthcare
Transportation
Education
Energy
Financial
Services
Communications
Pharmaceutical
Industrial
Consumer
Media
Technology
Public
Retail
Hospitality
Research
According to 2014 Ponemon Institute Study
License No. 045127
Real Life Example #1
• Healthcare industry
• Children’s health system
• 1.6 million patients and employees effected
• Lost three unencrypted computer backup tapes
during a building remodeling project
– Patient billing
– Employee payroll
• $316 x 1.6M = Could you absorb this loss?
19
License No. 045127
• Local Community College
• Confidential records for 35,212
students were mistakenly emailed
to an unknown account
• The employee used a personal
email account to send the data to
the researcher’s personal email
address because the data file was
too large to go through the
district’s secure, encrypted email
server
• The incident is costing about
$290,000
20
Real Life Example #2
License No. 045127
Real Life Example #3
• Southern California City
• CalPERS payment document was accidentally
posted to the Water District’s website
• Document contained personal information,
including names and SSNs
• Information of employees and former employees
who were enrolled in CalPERS during July 1986-
October 2011
21
License No. 045127
Risk Management Strategies
Risk Transfer
• Cyber Liability Insurance (Data Breach/Privacy)
– A risk management option that reduces the out-of-pocket cost
related to data breaches
• Vendor Management
– Cloud/Data management provider
– Data is held by a 3rd party vendor
22
License No. 045127
Cyber Liability: First-Party Coverage
Loss of Data
– Costs for repair and restoration of computer programs and electronic data
Cyber Extortion
– Covers extortion threats to commit an intentional computer attack against the
insured
Crisis Management
– Costs for hiring a public relations firm to mitigate negative publicity
– Security experts to come in and assess the scope of the breach and determine a
plan of action
– Costs to comply with multiple state breach notice laws
 Notification requirements
 Credit monitoring for detecting fraud
23
License No. 045127
Cyber Liability: Third-Party Coverage
Network and Information Security Liability
– To defend and indemnify claims for breach of security and access
to protected information
Regulatory Defense Expenses
– Defense costs and claims expenses involved with the regulatory
action taken against you resulting from a data breach.
24
License No. 045127
Policy Benefits
Loss Prevention Services
• In-depth knowledge of the risk and specific
exposures
• Training and compliance solutions
• IT Security Assessment services
• Consultations
• Proactive computer security services
25
License No. 045127
3rd Party Contractual Language
1) Seek defense/indemnity for breach of information
security
2) Seek proof of insurance and adequate limits,
perhaps even contract specific limits
3) Beware of limitation of liability provisions,
limiting to amount of the contract
26
License No. 045127
Risk Management Strategy
• Risk retention
27
License No. 045127
Risk Management Strategy
Risk Control
• Insider misuse
• Physical theft/loss
• Miscellaneous errors
28
License No. 045127 29
License No. 045127
Protect Your Organization
• Privacy/Breach Mitigation Program:
– network authentication
– credit card security
– data back-up
– complex passwords & physical security controls
– encrypted laptops/access
– file purging
• Assess your exposures, including employees, students,
parents/guardians, volunteers, vendors, contractors, residents,
customers, and patients
• Evaluate your potential costs and liabilities in connection with
a breach
– Identify and track the life cycle of information in your organization
30
License No. 045127
31
Questions?
Disclaimer – Keenan & Associates is an insurance brokerage and consulting firm.
It is not a law firm or an accounting firm. We do not give legal advice or tax
advice and neither this presentation, the answers provided during the Question
and Answer period, nor the documents accompanying this presentation
constitutes or should be construed as legal or tax advice. You are advised to
follow up with your own legal counsel and/or tax advisor to discuss how this
information affects you.
31
License No. 045127
Innovative Solutions. Enduring Principles.
32
Thank you for your
participation!

More Related Content

What's hot

Terminating Employees in California
Terminating Employees in CaliforniaTerminating Employees in California
Terminating Employees in California
Diana Maier
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and Employees
Cassie McGarvey, JD
 
Fenwick SHP0412
Fenwick SHP0412Fenwick SHP0412
Fenwick SHP0412
Paul Fenwick CMIOSH RMaPS
 
Small Law Office Management for the Legal Professional
Small Law Office Management for the Legal ProfessionalSmall Law Office Management for the Legal Professional
Small Law Office Management for the Legal Professional
Shawn J. Roberts
 
Legal Administration And Technology
Legal Administration And TechnologyLegal Administration And Technology
Legal Administration And Technology
lgladm59
 
Insurance Risk
Insurance RiskInsurance Risk
Insurance Risk
Hafeez Farooq
 
Utah_OSHA_Workplace_Accidents_Investigations_Citations
Utah_OSHA_Workplace_Accidents_Investigations_CitationsUtah_OSHA_Workplace_Accidents_Investigations_Citations
Utah_OSHA_Workplace_Accidents_Investigations_Citations
Parsons Behle & Latimer
 
Employment Presentation
Employment PresentationEmployment Presentation
Employment Presentation
Levenfeld Pearlstein, LLC
 
Conducting an Effective Internal Investigation
Conducting an Effective Internal InvestigationConducting an Effective Internal Investigation
Conducting an Effective Internal Investigation
Parsons Behle & Latimer
 
Top7ReasonsPreventativeMaintenanceCity
Top7ReasonsPreventativeMaintenanceCityTop7ReasonsPreventativeMaintenanceCity
Top7ReasonsPreventativeMaintenanceCity
Alecia Flahiff
 
Top 5 issues employment law breakfast (k0227996 2)
Top 5 issues employment law breakfast (k0227996 2)Top 5 issues employment law breakfast (k0227996 2)
Top 5 issues employment law breakfast (k0227996 2)
Jonathan Hyman
 
Labor Markets Core Course 2013: Severance Payments and Labor Market Performance
Labor Markets Core Course 2013: Severance Payments and Labor Market PerformanceLabor Markets Core Course 2013: Severance Payments and Labor Market Performance
Labor Markets Core Course 2013: Severance Payments and Labor Market Performance
Health, Education, Social Protection and Labor World Bank
 
Ethics - Duty of Competency & Technology
Ethics - Duty of Competency & TechnologyEthics - Duty of Competency & Technology
Ethics - Duty of Competency & Technology
Michael Cole
 
White Paper - HSE Fee For Intervention
White Paper - HSE Fee For InterventionWhite Paper - HSE Fee For Intervention
White Paper - HSE Fee For Intervention
Roger Hart MSc CMIOSH CSHP (OSHCR)
 
Back to the Office, Back to the Basics
Back to the Office, Back to the BasicsBack to the Office, Back to the Basics
Back to the Office, Back to the Basics
Parsons Behle & Latimer
 
Contractor's guide, effective h&s programs
Contractor's guide, effective h&s programsContractor's guide, effective h&s programs
Contractor's guide, effective h&s programs
ajidajang
 
MediRevv_Coding_Denials_7_Strategies_Maximize_Cash
MediRevv_Coding_Denials_7_Strategies_Maximize_CashMediRevv_Coding_Denials_7_Strategies_Maximize_Cash
MediRevv_Coding_Denials_7_Strategies_Maximize_Cash
Robb Rood
 
I 9 Services
I 9 ServicesI 9 Services
I 9 Services
tessamiller1
 
Michigan Alsp 2009(3)
Michigan Alsp 2009(3)Michigan Alsp 2009(3)
Michigan Alsp 2009(3)
Diversified Legal Staffing, LLC
 
Update on the new sentencing guidance on health and safety breaches
Update on the new sentencing guidance on health and safety breachesUpdate on the new sentencing guidance on health and safety breaches
Update on the new sentencing guidance on health and safety breaches
Chartered Institute for the Management of Sport and Physical Activity
 

What's hot (20)

Terminating Employees in California
Terminating Employees in CaliforniaTerminating Employees in California
Terminating Employees in California
 
BYOD: Advice for Employers and Employees
BYOD: Advice for Employers and EmployeesBYOD: Advice for Employers and Employees
BYOD: Advice for Employers and Employees
 
Fenwick SHP0412
Fenwick SHP0412Fenwick SHP0412
Fenwick SHP0412
 
Small Law Office Management for the Legal Professional
Small Law Office Management for the Legal ProfessionalSmall Law Office Management for the Legal Professional
Small Law Office Management for the Legal Professional
 
Legal Administration And Technology
Legal Administration And TechnologyLegal Administration And Technology
Legal Administration And Technology
 
Insurance Risk
Insurance RiskInsurance Risk
Insurance Risk
 
Utah_OSHA_Workplace_Accidents_Investigations_Citations
Utah_OSHA_Workplace_Accidents_Investigations_CitationsUtah_OSHA_Workplace_Accidents_Investigations_Citations
Utah_OSHA_Workplace_Accidents_Investigations_Citations
 
Employment Presentation
Employment PresentationEmployment Presentation
Employment Presentation
 
Conducting an Effective Internal Investigation
Conducting an Effective Internal InvestigationConducting an Effective Internal Investigation
Conducting an Effective Internal Investigation
 
Top7ReasonsPreventativeMaintenanceCity
Top7ReasonsPreventativeMaintenanceCityTop7ReasonsPreventativeMaintenanceCity
Top7ReasonsPreventativeMaintenanceCity
 
Top 5 issues employment law breakfast (k0227996 2)
Top 5 issues employment law breakfast (k0227996 2)Top 5 issues employment law breakfast (k0227996 2)
Top 5 issues employment law breakfast (k0227996 2)
 
Labor Markets Core Course 2013: Severance Payments and Labor Market Performance
Labor Markets Core Course 2013: Severance Payments and Labor Market PerformanceLabor Markets Core Course 2013: Severance Payments and Labor Market Performance
Labor Markets Core Course 2013: Severance Payments and Labor Market Performance
 
Ethics - Duty of Competency & Technology
Ethics - Duty of Competency & TechnologyEthics - Duty of Competency & Technology
Ethics - Duty of Competency & Technology
 
White Paper - HSE Fee For Intervention
White Paper - HSE Fee For InterventionWhite Paper - HSE Fee For Intervention
White Paper - HSE Fee For Intervention
 
Back to the Office, Back to the Basics
Back to the Office, Back to the BasicsBack to the Office, Back to the Basics
Back to the Office, Back to the Basics
 
Contractor's guide, effective h&s programs
Contractor's guide, effective h&s programsContractor's guide, effective h&s programs
Contractor's guide, effective h&s programs
 
MediRevv_Coding_Denials_7_Strategies_Maximize_Cash
MediRevv_Coding_Denials_7_Strategies_Maximize_CashMediRevv_Coding_Denials_7_Strategies_Maximize_Cash
MediRevv_Coding_Denials_7_Strategies_Maximize_Cash
 
I 9 Services
I 9 ServicesI 9 Services
I 9 Services
 
Michigan Alsp 2009(3)
Michigan Alsp 2009(3)Michigan Alsp 2009(3)
Michigan Alsp 2009(3)
 
Update on the new sentencing guidance on health and safety breaches
Update on the new sentencing guidance on health and safety breachesUpdate on the new sentencing guidance on health and safety breaches
Update on the new sentencing guidance on health and safety breaches
 

Similar to Webinar: Don’t Be a Victim to Cyber Liability Risks

Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
Asad Zaman
 
Cyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsCyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEs
E Radar
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Paul C. Van Slyke
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counsel
Dan Michaluk
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
Logikcull.com
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
Rodonoghue72
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
Edge Pereira
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Edge Pereira
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
Staying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving WorldStaying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving World
brian andrews
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
James Mulhern
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
infoLock Technologies
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
Jessvin Thomas
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
Kaseya
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
lgcdcpas
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
Bianca Mueller, LL.M.
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
Peter Henley
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Citrin Cooperman
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
Peter Henley
 

Similar to Webinar: Don’t Be a Victim to Cyber Liability Risks (20)

Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Cyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEsCyber Liability Insurance And Protecting SMEs
Cyber Liability Insurance And Protecting SMEs
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
An information management update for in house counsel
An information management update for in house counselAn information management update for in house counsel
An information management update for in house counsel
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
DPA seminar presentation
DPA seminar presentationDPA seminar presentation
DPA seminar presentation
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Staying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving WorldStaying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving World
 
Privacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the artPrivacy by Design - taking in account the state of the art
Privacy by Design - taking in account the state of the art
 
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
(Slides) What's Yours Is Mine: How Employess Are Putting Your Sensitive Data ...
 
Getting Ready for GDPR
Getting Ready for GDPRGetting Ready for GDPR
Getting Ready for GDPR
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Cyber Security - ASGFOA
Cyber Security - ASGFOACyber Security - ASGFOA
Cyber Security - ASGFOA
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
 
Identity theft and data responsibilities
Identity theft and data responsibilitiesIdentity theft and data responsibilities
Identity theft and data responsibilities
 

Recently uploaded

SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 

Webinar: Don’t Be a Victim to Cyber Liability Risks

  • 1. License No. 045127 Thank you for joining us. We have a great many participants in today’s call. Your phone is currently muted so that the noise level can be kept to a minimum. If you have not yet joined the audio portion of this webinar, please click on Communicate at the top of your screen, and then Join Teleconference. The dial- in information will appear. If you have any questions, you can send them to the host using the Chat feature in the bottom right corner during the webinar. The webinar will start momentarily. © 2014 Keenan & Associates Don’t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks
  • 2. License No. 045127License No. 045127 Protecting Your Organization From Data Breach and Privacy Risks 2 Brad Keenan Cyber Specialist Keenan Kyle McKibbin Cyber Specialist Keenan Presented by:
  • 3. License No. 045127 Cyber Summary • Cyber Risk and Data Breaches – Overview – Where are the exposures? – How much of a financial impact do they have? • Data breach examples • Cyber Risk Management – Risk retention – Risk control – Risk transfer 3
  • 4. License No. 045127 Myths about Cyber Security • ALL Cyber Breaches are Preventable • “The IT Team is on top of it” • Cyber Theft/Data Breach is about credit cards • Big Corporate Companies are most at-risk • External hackers are the biggest security risk 4
  • 6. License No. 045127 40 Million Individuals; $148 Million Loss 24 States; 51 Stores $4.8 Million HIPAA Fine 350,000 credit cards; $4.1 Million Loss National Headlines 6 56 million credit cards; Unknown Loss
  • 12. License No. 045127 Data Breach A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so 12
  • 13. License No. 045127 Important Records • Student records • Employee records • Credit card information • Financial aid records • Job applicant records • Tax ID information • Utility payment records • Citation payment records • Patient records • Health plan records and ID numbers 13
  • 14. License No. 045127 Exposures INTERNAL • Lost or stolen laptops, computers, flash drives or other storage devices • Backup tapes misplaced or lost in transit • Rogue employees • Inadequate computer-use policies • Weak IT Infrastructure • Employee Negligence EXTERNAL • IT consultants/vendors • Internet and network access points • Sale, donation or disposal of old office equipment (desks, file cabinets, copiers) that contain employee records • Viruses or Malware • “Dumpster diving” 14
  • 15. License No. 045127 Why are Organizations at Risk • Resource Size – Less sophisticated safeguards – Less dedicated manpower may lead to delayed or no detection – Less resources to use to recover vs. big business • Ability to React – Detect/report a breach – Notify/assist affected individuals – Reimburse individuals for actual losses 15
  • 16. License No. 045127 Regulation & Notification Laws • Federal guidelines – HIPAA – Payment Card Industry Data Security Standard (PCI-DSS) – Drivers Privacy Protection Act (DPPA) • Notification and consumer protection laws vary from state as to who must be notified and the manner of notification • 47 states (including California) and D.C. have separate breach laws in place as of 2/6/12 – AB 1149 (effective January 1, 2014) – SB 46 (effective January 1, 2014) 16
  • 17. License No. 045127 Media Management 17 Response to a Breach
  • 18. License No. 045127 Per Person Cost of a Breach 18 $316 $286 $259 $237 $236 $223 $219 $209 $204 $196 $183 $181 $172 $125 $93 $73 $0 $50 $100 $150 $200 $250 $300 $350 Healthcare Transportation Education Energy Financial Services Communications Pharmaceutical Industrial Consumer Media Technology Public Retail Hospitality Research According to 2014 Ponemon Institute Study
  • 19. License No. 045127 Real Life Example #1 • Healthcare industry • Children’s health system • 1.6 million patients and employees effected • Lost three unencrypted computer backup tapes during a building remodeling project – Patient billing – Employee payroll • $316 x 1.6M = Could you absorb this loss? 19
  • 20. License No. 045127 • Local Community College • Confidential records for 35,212 students were mistakenly emailed to an unknown account • The employee used a personal email account to send the data to the researcher’s personal email address because the data file was too large to go through the district’s secure, encrypted email server • The incident is costing about $290,000 20 Real Life Example #2
  • 21. License No. 045127 Real Life Example #3 • Southern California City • CalPERS payment document was accidentally posted to the Water District’s website • Document contained personal information, including names and SSNs • Information of employees and former employees who were enrolled in CalPERS during July 1986- October 2011 21
  • 22. License No. 045127 Risk Management Strategies Risk Transfer • Cyber Liability Insurance (Data Breach/Privacy) – A risk management option that reduces the out-of-pocket cost related to data breaches • Vendor Management – Cloud/Data management provider – Data is held by a 3rd party vendor 22
  • 23. License No. 045127 Cyber Liability: First-Party Coverage Loss of Data – Costs for repair and restoration of computer programs and electronic data Cyber Extortion – Covers extortion threats to commit an intentional computer attack against the insured Crisis Management – Costs for hiring a public relations firm to mitigate negative publicity – Security experts to come in and assess the scope of the breach and determine a plan of action – Costs to comply with multiple state breach notice laws  Notification requirements  Credit monitoring for detecting fraud 23
  • 24. License No. 045127 Cyber Liability: Third-Party Coverage Network and Information Security Liability – To defend and indemnify claims for breach of security and access to protected information Regulatory Defense Expenses – Defense costs and claims expenses involved with the regulatory action taken against you resulting from a data breach. 24
  • 25. License No. 045127 Policy Benefits Loss Prevention Services • In-depth knowledge of the risk and specific exposures • Training and compliance solutions • IT Security Assessment services • Consultations • Proactive computer security services 25
  • 26. License No. 045127 3rd Party Contractual Language 1) Seek defense/indemnity for breach of information security 2) Seek proof of insurance and adequate limits, perhaps even contract specific limits 3) Beware of limitation of liability provisions, limiting to amount of the contract 26
  • 27. License No. 045127 Risk Management Strategy • Risk retention 27
  • 28. License No. 045127 Risk Management Strategy Risk Control • Insider misuse • Physical theft/loss • Miscellaneous errors 28
  • 30. License No. 045127 Protect Your Organization • Privacy/Breach Mitigation Program: – network authentication – credit card security – data back-up – complex passwords & physical security controls – encrypted laptops/access – file purging • Assess your exposures, including employees, students, parents/guardians, volunteers, vendors, contractors, residents, customers, and patients • Evaluate your potential costs and liabilities in connection with a breach – Identify and track the life cycle of information in your organization 30
  • 31. License No. 045127 31 Questions? Disclaimer – Keenan & Associates is an insurance brokerage and consulting firm. It is not a law firm or an accounting firm. We do not give legal advice or tax advice and neither this presentation, the answers provided during the Question and Answer period, nor the documents accompanying this presentation constitutes or should be construed as legal or tax advice. You are advised to follow up with your own legal counsel and/or tax advisor to discuss how this information affects you. 31
  • 32. License No. 045127 Innovative Solutions. Enduring Principles. 32 Thank you for your participation!