recent breaches
play

Recent Breaches: California Dept. Newman Marcus Of Child Support - PowerPoint PPT Presentation

Recent Breaches: California Dept. Newman Marcus Of Child Support Services Target Michaels Federal Reserve University of Nebraska Living Social Evernote Facebook Global Payments Company Citi of Texas Adobe IRS JP Morgan Chase in NY


  1. Recent Breaches: California Dept. Newman Marcus Of Child Support Services Target Michael’s Federal Reserve University of Nebraska Living Social Evernote Facebook Global Payments Company Citi of Texas Adobe IRS JP Morgan Chase in NY Schnucks Horizon Blue Cross Dept. Of Energy Blue Shield of NJ

  2. The Problem: Skilled & Protected Perpetrators

  3. The Problem: Antivirus Software isn’t enough Antivirus Software products are “doomed to failure” Brian Dye Senior VP of Information Security at Symantec. • AV is reactionary in nature • Requires constant management • Isn’t making them money • Cyber criminals are focusing on cyber attacks, DOS, Spearphishing & network intrusion

  4. The Problem: Lost Devices Right here in Springfield: Stolen laptops lead to important HIPAA settlements. Two entities have paid the U.S. Department of Health and Human Services Office for Civil Rights (OCR) $1,975,220 collectively to resolve potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules.

  5. Top 10 Security Risks 1. Threat from inside (ignored or from providers) 2. Botnets 3. Mobile Device/BYOD Security 4. Hactivism (Hacking by large hacking organizations) 5. Inadequate Security Policies 6. Un-Patch Software 7. Gen Y Factor 8. Security Backlash 9. Cloud Computing 10. Compliance

  6. Preventative Steps: People • Develop a Culture of Security • Train, Train, Train • Local Area Network Usage • Remote Work • Social Networking • Gen Y (not to be click happy) • Implement Real Security Policies • Explain the Policies & Enforce them • Audit Active User Accounts & Disable former employee accounts

  7. Preventative Steps: Technology • Updates - Always • Next Generation Firewalls • Content Management Systems (Inside the network and while remote) • Protect the innocent user • Manage the Wireless Infrastructure • Mobile Device Management • Encrypt Laptops and Mobile Devices • Spam Management

  8. Preventative Steps: Technology • Dedicate computers to online banking & accounting functions which cannot be used for email or general Web browsing • Utilize Anti-Virus / Anti-Malware Software on every system • White Listing Applications • Ensure every upgrade focuses on security FIRST • Implement Monitoring • Business Associate Agreements • Network Assessment

  9. Protect: Insurance Crime & Cyber Liability Insurance Coverage A decade ago most businesses were concerned about protecting physical assets (building, equipment, stock), today protecting data (computer records) has become the top priority. Cyber Liability and Data Breach Claims are one of the fastest growing areas of risk in the world. • Sophisticated attackers break through traditional safeguards every day • Cloud, mobile, social and big data drive unpredictable change • Yesterday’s security practices are unsustainable • 61% of organizations say that data theft and cyber crime are the greatest threats to their organization • 83% of enterprises have difficulty finding the security skills they need

  10. Protect: Cyber Liabilities & Data Breaches Type of Data Exposed • Personal Information • Financial Information • Health Information Causes of Loss • Hackers • Rogue Employees • Loss/Theft of Equipment – Laptops, Phones, Thumb Drives • Paper Files

  11. Protect: Cyber Liabilities & Data Breaches Top Industries • Financial Services • Healthcare • Retail Top Costs Per Breach • Business Disruption • Information Loss • Notification Expenses & Credit Monitoring • Loss of Revenue • Regulatory Fines • Crisis Management

  12. Protect: Cyber Insurance Coverage Cyber Liability Insurance – Secures a company’s liability and losses in the event of a data breach, typically has two different components • Third Party Liability – Party suffering loss due to the breach comes back on the company for damages • First Party Coverage o Business Interruption o Notification Expenses and Credit Monitoring o Regulatory Fines o Damage to Reputation Obtain an indication (Travelers information in your packet)

  13. Protect: Crime Insurance Coverage Computer Fraud – The theft of money/securities using a business’s computers or network • Typically accessed either by physically using the business’s computer workstations or by hacking into the network and using/accessing logins and passwords. • Normally insured through a computer fraud policy. • Firewalls and login/password management are critical. • Review bank agreements and establish protocols for bank transactions.

  14. Protect: Crime Insurance Coverage Funds Transfer Fraud – A Fraudulently initiated transfer of Funds from an account: • Normally insured through a Funds Transfer policy. • Proper internal policies and procedures are key. • Again, review your bank agreement and establish protocols.

  15. Boards & CEOs Demand Strategy CEO CFO/COO CIO HR CMO Loss of market Audit failure Loss of data Violation of Loss of share & confidentiality, employee customer reputation Fines & integrity and/or privacy trust criminal availability Legal Exposure charges Loss of brand Financial loss reputation

  16. Develop a Crisis Management Plan • Reputation protection is critical! • Target didn’t break the news, a security blogger did. • Customers were confused by Target’s public response – emails were from an unfamiliar domain. • Target’s CEO resigned due to the recent breach and resulting damage. DESIGN, IMPLEMENT, MONITOR • Be prepared to communicate a clear, concise, effective message. • Determine how you will communicate (letters, email, etc.) • Determine how you will handle incoming questions. • Map out a resolution plan.

  17. Wrap Up & Questions • Cyber and computer risks are increasing exponentially. • No single preventative control or procedure can ever be 100% effective. What works today, may not work tomorrow. • As presented in the federal guidance, use a “layered approach” to reduce risk incorporating multiple, overlapping protective measures. • Develop clear strategies on: o Training your staff o Establish a culture of security first o Establish effective network security updates o Next Generation Firewalls o Encrypt sensitive data, emails, and mobile devices o Obtain options on insurance coverage o Establish a crisis management plan o We will send you a plan sample if requested JMARK and Ollis & Company are available to help!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend