SlideShare a Scribd company logo
1 of 25
Download to read offline
Preparing For A Data Breach




© 2011 Co3 Systems, Inc.
The information contained herein is proprietary and confidential.
                                                                    Page 1
Agenda

  §  Introductions
  §  Today’s reality with breaches and data loss
  §  Preparing for breach
     –  The process
     –  Tips for getting it right
  §  Q&A




                              Page 2
Introductions: Today’s Speakers


  §  Ted Julian, Chief Marketing Officer, Co3
      Systems
     –  Security / compliance entrepreneur
     –  Security industry analyst
  §  Bob Siegel, Privacy Strategist & Principal,
      Privacy Ref LLC
     –  Previously, Sr. Manger of Worldwide Privacy and
        Compliance for Staples, Inc.
     –  Certified Information Privacy Professional (CIPP/US,
        CIPP/IT)



                            Page 3
Co3 at a Glance

    Co3 Systems’ incident management system helps organizations
         that have customer or employee Personal Information
           reduce the expense, risk, and stress of a breach.

   A web-based/hosted SaaS                     No hardware or software to buy or
                                      
   platform                                    manage; it’s running in minutes

   Concerns all companies that
                                               Retail, Healthcare, Financial Services,
   manage employee or customer        
                                               Higher Education, Services …
   data

   Understands all regulations that            Federal, State, Trade Associations …
                                      
   concern private information                 can customize for contracts

   Can be deployed quickly and is              Intuitive, step-by-step usage model;
                                      
   easy to use                                 no user training needed

                                               Expert, actionable insight in 20
   Delivers immediate, quantifiable
                                              minutes or less – regulatory obligations
   value
                                               and industry best practices

                                      Page 4
Breach Epidemic
  … payment provider’s “fourth-quarter profit fell 90 percent on costs
  related to a security breach…took an $84.4 million pre-tax charge”

      Zappos, Amazon Sued Over Customer Data Breach
  More than half of American consumers would sue
  a company that loses its personal information

              TRICARE Hit with $4.9 Billion Suit Following Breach




                                                      Source: DataLossDB.org
                                     Page 5
Breaches Are Common – Firms Must Act




                                                                                                *

                                                                      **



                                  * “… many of them have suffered a breach – they just don’t know it”

                                      ** if you haven’t been breached, why wouldn’t you disclose that?



    “With an avalanche of… breach notification laws on the horizon, you
    have no choice but to implement an incident management program. If
    you don’t have an incident management program… it’s imperative that
    you do so immediately.”
                                                 Source: “Planning For Failure” – Forrester Research, Nov. 2011



                                 Page 6
Scope of Data Loss

   The exposure of consumer or employee
   Personal Information
                                                                            Internal/
      Malicious             Lost/Stolen               Third-Party
                                                                            Employee
    Cyber-Attacks             Assets                     Leaks
                                                                             Actions
   Global Consumer       Community-Based           Multi-Channel        Government
   Electronics Firm:     Healthcare Plan:          Marketing Service:   Agency:
   Hackers stole         Laptops with              Digital marketing    Employee sent
   customer data,        patient data stolen       agency exposes       CD-ROM with
   including credit      by former                 customer data of     personal data on
   card information      employee                  dozens of clients    registered advisors
   100 million           208,000                   Millions of          139,000
   records               records                   records              records


            In the US there are 46 States, 4 Territories, 14 Federal Authorities
                 and multiple trade associations, each enforcing their own
                 regulations that prescribe the treatment of personal data

                                          Page 7
Ignoring the Problem is Not an Option

  Regulatory Requirements                       Trade Associations & Commissions
  46 States, 3 Commonwealths, and 14            Industry groups, commissions, and
  Federal agencies have established             certification bodies are imposing
  legislation                                   stricter guidelines and penalties
  Fines are growing – aggressive AGs            More fines – and businesses losing
  are filling state coffers                     accreditation


                                        Brand
                                       Damage

  Contractual Obligations                        Class Action Lawsuits
  Company obligations extend to 3rd              Law firms have noticed and are
  party data sources, vendors, and               picking up the pace in class-action
  even corporate customers                       lawsuits
  Extreme sensitivity on vendor and              Even with no “harm”, companies
  partner use (and storage) of data              are losing and settling quickly




                                       Page 8
Co3 Automates Breach Management

PREPARE                                                                                 ASSESS
Improve Organizational                                                                  Quantify Potential Impact,
Readiness                                                                               Support Privacy Impact
•  Assign response team                                                                 Assessments
                                                 R         E                  AS
                                              PA
•  Describe environment                                                                 •  Track events
•  Simulate events and incidents                                                        •  Scope regulatory requirements
                                                                M U LATI O




                                                                                 SE
                                        E
•  Focus on organizational gaps
                                                           SI
                                                                                        •  See $ exposure

                                       PR




                                                                                   SS
                                                                                        •  Send notice to team




                                                                          N
                                                                             S
                                                                                        •  Generate PIAs
                                            I N CI D E N




                                                                               S
                                                                              NT
                                       RE



                                                     TS



                                                                          E
REPORT                                                                    EV            MANAGE




                                                                                   E
                                       PO




                                            RT


                                                                                 G
                                                                                NA
Document Results and                                                                    Easily Generate Detailed
Track Performance
                                                                          M   A         Incident Response Plans
•  Document incident results                                                            •  Escalate to complete IR plan
•  Track historical performance                                                         •  Oversee the complete plan
•  Demonstrate organizational                                                           •  Assign tasks: who/what/when
   preparedness                                                                         •  Notify regulators and clients
•  Generate audit/compliance reports                                                    •  Monitor progress to completion




                                                                 Page 9
PREPARING FOR A BREACH


          Page 10
Some Questions

  1.    How do your employees notify you of a
        potential data breach event?
  2.    How does and incident become an event?
  3.    How are external communications
        coordinated?


   “Organizing is what you do before you do something, so that when
                   you do it, it is not all mixed up.”
                              -- A. A. Milne




                               Page 11
Sample Event Process



     Incident                          • Decides if this may be a data
                      Escalate to
      Occurs                             breach event based on currently
                     CPO and CSO
                                         known information


                                       • Determines scope of the event
  Follow Incident                      • Identifies risks and responsibilities
   Management        Engage Event
                                       • Reports back to CPO and CSO
      Process       Management Team
                                       • Coordinates remediation




                      Engage Event     • Defines how all communication to
                     Communication       stakeholders is coordinated
                          Plan



                             Page 12
Incident Management Processes

  §  Generally owned by IT
     •  Provides logging and tracking services
     •  May be focused on data processing incidents
     •  May not be sensitive to paper-based issues
  §  Metrics-centric process
     •  Response time
     •  Resolution time
     •  Close / Completion time
  §  Check to see how non-IT events are addressed
     •  Are non-IT events routinely handled?
     •  Are they tracked in the Incident Management system?
     •  Has a test scenario been run recently?



                                  Page 13
Sample Event Process



     Incident                          • Decides if this may be a data
                      Escalate to
      Occurs                             breach event based on currently
                     CPO and CSO
                                         known information


                                       • Determines scope of the event
  Follow Incident                      • Identifies risks and responsibilities
   Management        Engage Event
                                       • Reports back to CPO and CSO
      Process       Management Team
                                       • Coordinates remediation




                      Engage Event     • Defines how all communication to
                     Communication       stakeholders is coordinated
                          Plan



                             Page 14
Event Management Team

  §  Cross-functional team
     •  Initially determines scope and impact of the event
     •  Coordinates remediation efforts
  §  Led by the Chief Privacy Officer
  §  Core members should represent…
     •    Legal
     •    Privacy
     •    Compliance
     •    Incident Management
     •    IT
  §  Other members added based on the event




                                Page 15
Facts To Gather During An Event

  1.    Information lost            8.   Residence of affected
  2.    Was data encrypted          9.  Can data be
  3.    Amount of data lost              recovered?
  4.    Has the data loss           10.  Applicable laws
        been stopped?               11.  Notification
  5.    When loss occurred               requirements
  6.    Where it was lost           12.  Potential impact to

  7.    Who was affected                 other applications
                                    13.  Potential impact on
                                         other organizations

                          Page 16
Sample Event Process



     Incident                          • Decides if this may be a data
                      Escalate to
      Occurs                             breach event based on currently
                     CPO and CSO
                                         known information


                                       • Determines scope of the event
  Follow Incident                      • Identifies risks and responsibilities
   Management        Engage Event
                                       • Reports back to CPO and CSO
      Process       Management Team
                                       • Coordinates remediation




                      Engage Event     • Defines how all communication to
                     Communication       stakeholders is coordinated
                          Plan



                             Page 17
Event Communication Plan



   §  Identifies members of the Event Communication
       Team
      –  Contains contact information for the members
   §  Defines communication parameters
      •  Who talks to whom and when
   §  Contains frameworks for communications




                          Page 18
Event Communication Team

  Stakeholders                    Team Members
  •  Customers                    •    Marketing *
  •  Employees                    •    Internal Communications
  •  Marketing Dept.              •    Public Relations*
  •  Media                        •    Security / Loss Prevention
                                  •    Legal
  •  Law enforcement
                                  •    Investor Relations
  •  Other Government
                                  •    Chief Privacy Officer
     Officials
  •  Shareholders                 * Potential Lead




                        Page 19
Communication Parameters

  §  Spokespeople must be identified
     •  Spokesperson designation by stakeholder
     •  Limit communication to be done to designees
  §  Message content must be reviewed
     •  Consistent messages sent across stakeholders
  §  Keep Executive Leadership informed
     •  Frequent updates from chairs of both teams
  §  Use Executives as spokespeople sparingly




                           Page 20
Communication Frameworks

  §  Most communications can be prewritten
    •  Details of the specific event added at Event
  §  Prepared items may include…
    •    Press releases
    •    Letters / emails to customers
    •    Website updates
    •    Employee notices
    •    Talking points for the media




                             Page 21
Test, Test, and Retest

  §  Make all participants familiar with processes
      before they are implemented
  §  Two common types of testing
    Table Top Exercises                       Scenario exercise
    •  Multiple scenarios defined             •  One scenario is defined
    •  Key participants meet                  •  Participants notified day of
    •  Each scenario is discussed                exercise happening
                                              •  Production processes and
                                                 tools are used to manage the
                                                 event
                                              •  Key participants meet to
                                                 debrief




                                    Page 22
Other Considerations

  §  System of record
  §  Methods of communications
  §  Independent divisions
     •  Multinational divisions
     •  Acquired businesses
     •  Recognized brands




                             Page 23
Questions




© 2011 Co3 Systems, Inc.
The information contained herein is proprietary and confidential.
                                                                    Page 24
Thanks!




     1 Alewife Center, Suite 450             ph: 508-474-5125
     Cambridge, MA 02140                     e: info@privacyref.com
     ph: 617-206-3900                        privacyref.com
     e: info@co3sys.com
     www.co3sys.com

  Gartner:
  “Co3 …define(s) what software
   packages for privacy look like.”




                                   Page 25

More Related Content

What's hot

Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
olambel
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
Resilient Systems
 
The Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and SolutionsThe Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and Solutions
Ledjit
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documents
e.law International
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
DFickett
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
Clear Technologies
 
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Source Conference
 

What's hot (20)

Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information Infrastructure
 
Halvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber WebinarHalvorsen on Risk Cyber Webinar
Halvorsen on Risk Cyber Webinar
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 
Print - Overlooked piece of the security puzzle whitepaper - DRAFT
Print - Overlooked piece of the security puzzle whitepaper - DRAFTPrint - Overlooked piece of the security puzzle whitepaper - DRAFT
Print - Overlooked piece of the security puzzle whitepaper - DRAFT
 
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
Electronic data & record management
Electronic data & record managementElectronic data & record management
Electronic data & record management
 
1 s2.0-s0167404801002097-main
1 s2.0-s0167404801002097-main1 s2.0-s0167404801002097-main
1 s2.0-s0167404801002097-main
 
Improving Your Information Security Program
Improving Your Information Security ProgramImproving Your Information Security Program
Improving Your Information Security Program
 
Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013
 
The Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and SolutionsThe Effective eDocument Retention Program - Policies, Processes and Solutions
The Effective eDocument Retention Program - Policies, Processes and Solutions
 
Secure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documentsSecure dataroom whitepaper_protecting_confidential_documents
Secure dataroom whitepaper_protecting_confidential_documents
 
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
Protecting Utilities through Business Continuity - Scott Roe, Corporate Risk ...
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Proactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van SymonsProactive Log Management in Insurance by Van Symons
Proactive Log Management in Insurance by Van Symons
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident...
 
7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec
 

Viewers also liked

งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1
surasak2222
 
Nlpdap tanitim
Nlpdap tanitimNlpdap tanitim
Miriam Sturdee - Xray vision
Miriam Sturdee - Xray vision Miriam Sturdee - Xray vision
Miriam Sturdee - Xray vision
Sebastian Weise
 

Viewers also liked (17)

Twitter #mk12
Twitter #mk12Twitter #mk12
Twitter #mk12
 
Rca mk tdag
Rca mk tdagRca mk tdag
Rca mk tdag
 
What is Marketing?
What is Marketing?What is Marketing?
What is Marketing?
 
How To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their TracksHow To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their Tracks
 
Psoriasis & skin cancer
Psoriasis & skin cancerPsoriasis & skin cancer
Psoriasis & skin cancer
 
Golden globes overview -prom dresses 2013 trends
Golden globes overview -prom dresses 2013 trends Golden globes overview -prom dresses 2013 trends
Golden globes overview -prom dresses 2013 trends
 
22
2222
22
 
L'OREILLE EN MARCHE
L'OREILLE EN MARCHE L'OREILLE EN MARCHE
L'OREILLE EN MARCHE
 
Presentatie tamara policy
Presentatie tamara   policyPresentatie tamara   policy
Presentatie tamara policy
 
Bu ghandoeng’s canteen
Bu ghandoeng’s canteenBu ghandoeng’s canteen
Bu ghandoeng’s canteen
 
งานนำเสนอ1
งานนำเสนอ1งานนำเสนอ1
งานนำเสนอ1
 
POINTS D'OUÏE !
POINTS D'OUÏE !POINTS D'OUÏE !
POINTS D'OUÏE !
 
Available for sale
Available for saleAvailable for sale
Available for sale
 
Nlpdap tanitim
Nlpdap tanitimNlpdap tanitim
Nlpdap tanitim
 
Facebook advanced
Facebook advancedFacebook advanced
Facebook advanced
 
Miriam Sturdee - Xray vision
Miriam Sturdee - Xray vision Miriam Sturdee - Xray vision
Miriam Sturdee - Xray vision
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
 

Similar to Prepare For Breaches Like a Pro

Edelman Privacy Risk Index
Edelman Privacy Risk IndexEdelman Privacy Risk Index
Edelman Privacy Risk Index
Edelman Japan
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir Fancy
SaskSummit
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
Erik Ginalick
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
Emily2014
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0
Satyanandan Atyam
 

Similar to Prepare For Breaches Like a Pro (20)

Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?Securing Your "Crown Jewels": Do You Have What it Takes?
Securing Your "Crown Jewels": Do You Have What it Takes?
 
Where Is Your Sensitive Data Wp
Where Is Your Sensitive Data   WpWhere Is Your Sensitive Data   Wp
Where Is Your Sensitive Data Wp
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Edelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by Ponemon
 
Edelman Privacy Risk Index 2012
Edelman Privacy Risk Index 2012Edelman Privacy Risk Index 2012
Edelman Privacy Risk Index 2012
 
Edelman Privacy Risk Index
Edelman Privacy Risk IndexEdelman Privacy Risk Index
Edelman Privacy Risk Index
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Joanna Belbey Presentation - BDI 10/20/11 Insurance Social Communications Lea...
Joanna Belbey Presentation - BDI 10/20/11 Insurance Social Communications Lea...Joanna Belbey Presentation - BDI 10/20/11 Insurance Social Communications Lea...
Joanna Belbey Presentation - BDI 10/20/11 Insurance Social Communications Lea...
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Sask 3.0 Summit Pci dss presentation Bashir Fancy
Sask 3.0 Summit  Pci dss presentation   Bashir FancySask 3.0 Summit  Pci dss presentation   Bashir Fancy
Sask 3.0 Summit Pci dss presentation Bashir Fancy
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance framework
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
You will be breached
You will be breachedYou will be breached
You will be breached
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Protecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the BeefeatersProtecting the Crown Jewels – Enlist the Beefeaters
Protecting the Crown Jewels – Enlist the Beefeaters
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
 
Asset Security
Asset Security Asset Security
Asset Security
 
Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0Cyber Threat Landscape- Security Posture - ver 1.0
Cyber Threat Landscape- Security Posture - ver 1.0
 

More from Resilient Systems

The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
Resilient Systems
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
Resilient Systems
 
You're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat LandscapeYou're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat Landscape
Resilient Systems
 

More from Resilient Systems (20)

You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The Incident
 
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
 
By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features
 
Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents
 
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 
How To Build An Incident Response Function
How To Build An Incident Response FunctionHow To Build An Incident Response Function
How To Build An Incident Response Function
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
EU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response ImperativeEU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response Imperative
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To Prepare
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
 
You're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat LandscapeYou're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat Landscape
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Prepare For Breaches Like a Pro

  • 1. Preparing For A Data Breach © 2011 Co3 Systems, Inc. The information contained herein is proprietary and confidential. Page 1
  • 2. Agenda §  Introductions §  Today’s reality with breaches and data loss §  Preparing for breach –  The process –  Tips for getting it right §  Q&A Page 2
  • 3. Introductions: Today’s Speakers §  Ted Julian, Chief Marketing Officer, Co3 Systems –  Security / compliance entrepreneur –  Security industry analyst §  Bob Siegel, Privacy Strategist & Principal, Privacy Ref LLC –  Previously, Sr. Manger of Worldwide Privacy and Compliance for Staples, Inc. –  Certified Information Privacy Professional (CIPP/US, CIPP/IT) Page 3
  • 4. Co3 at a Glance Co3 Systems’ incident management system helps organizations that have customer or employee Personal Information reduce the expense, risk, and stress of a breach. A web-based/hosted SaaS No hardware or software to buy or  platform manage; it’s running in minutes Concerns all companies that Retail, Healthcare, Financial Services, manage employee or customer  Higher Education, Services … data Understands all regulations that Federal, State, Trade Associations …  concern private information can customize for contracts Can be deployed quickly and is Intuitive, step-by-step usage model;  easy to use no user training needed Expert, actionable insight in 20 Delivers immediate, quantifiable  minutes or less – regulatory obligations value and industry best practices Page 4
  • 5. Breach Epidemic … payment provider’s “fourth-quarter profit fell 90 percent on costs related to a security breach…took an $84.4 million pre-tax charge” Zappos, Amazon Sued Over Customer Data Breach More than half of American consumers would sue a company that loses its personal information TRICARE Hit with $4.9 Billion Suit Following Breach Source: DataLossDB.org Page 5
  • 6. Breaches Are Common – Firms Must Act * ** * “… many of them have suffered a breach – they just don’t know it” ** if you haven’t been breached, why wouldn’t you disclose that? “With an avalanche of… breach notification laws on the horizon, you have no choice but to implement an incident management program. If you don’t have an incident management program… it’s imperative that you do so immediately.” Source: “Planning For Failure” – Forrester Research, Nov. 2011 Page 6
  • 7. Scope of Data Loss The exposure of consumer or employee Personal Information Internal/ Malicious Lost/Stolen Third-Party Employee Cyber-Attacks Assets Leaks Actions Global Consumer Community-Based Multi-Channel Government Electronics Firm: Healthcare Plan: Marketing Service: Agency: Hackers stole Laptops with Digital marketing Employee sent customer data, patient data stolen agency exposes CD-ROM with including credit by former customer data of personal data on card information employee dozens of clients registered advisors 100 million 208,000 Millions of 139,000 records records records records In the US there are 46 States, 4 Territories, 14 Federal Authorities and multiple trade associations, each enforcing their own regulations that prescribe the treatment of personal data Page 7
  • 8. Ignoring the Problem is Not an Option Regulatory Requirements Trade Associations & Commissions 46 States, 3 Commonwealths, and 14 Industry groups, commissions, and Federal agencies have established certification bodies are imposing legislation stricter guidelines and penalties Fines are growing – aggressive AGs More fines – and businesses losing are filling state coffers accreditation Brand Damage Contractual Obligations Class Action Lawsuits Company obligations extend to 3rd Law firms have noticed and are party data sources, vendors, and picking up the pace in class-action even corporate customers lawsuits Extreme sensitivity on vendor and Even with no “harm”, companies partner use (and storage) of data are losing and settling quickly Page 8
  • 9. Co3 Automates Breach Management PREPARE ASSESS Improve Organizational Quantify Potential Impact, Readiness Support Privacy Impact •  Assign response team Assessments R E AS PA •  Describe environment •  Track events •  Simulate events and incidents •  Scope regulatory requirements M U LATI O SE E •  Focus on organizational gaps SI •  See $ exposure PR SS •  Send notice to team N S •  Generate PIAs I N CI D E N S NT RE TS E REPORT EV MANAGE E PO RT G NA Document Results and Easily Generate Detailed Track Performance M A Incident Response Plans •  Document incident results •  Escalate to complete IR plan •  Track historical performance •  Oversee the complete plan •  Demonstrate organizational •  Assign tasks: who/what/when preparedness •  Notify regulators and clients •  Generate audit/compliance reports •  Monitor progress to completion Page 9
  • 10. PREPARING FOR A BREACH Page 10
  • 11. Some Questions 1.  How do your employees notify you of a potential data breach event? 2.  How does and incident become an event? 3.  How are external communications coordinated? “Organizing is what you do before you do something, so that when you do it, it is not all mixed up.” -- A. A. Milne Page 11
  • 12. Sample Event Process Incident • Decides if this may be a data Escalate to Occurs breach event based on currently CPO and CSO known information • Determines scope of the event Follow Incident • Identifies risks and responsibilities Management Engage Event • Reports back to CPO and CSO Process Management Team • Coordinates remediation Engage Event • Defines how all communication to Communication stakeholders is coordinated Plan Page 12
  • 13. Incident Management Processes §  Generally owned by IT •  Provides logging and tracking services •  May be focused on data processing incidents •  May not be sensitive to paper-based issues §  Metrics-centric process •  Response time •  Resolution time •  Close / Completion time §  Check to see how non-IT events are addressed •  Are non-IT events routinely handled? •  Are they tracked in the Incident Management system? •  Has a test scenario been run recently? Page 13
  • 14. Sample Event Process Incident • Decides if this may be a data Escalate to Occurs breach event based on currently CPO and CSO known information • Determines scope of the event Follow Incident • Identifies risks and responsibilities Management Engage Event • Reports back to CPO and CSO Process Management Team • Coordinates remediation Engage Event • Defines how all communication to Communication stakeholders is coordinated Plan Page 14
  • 15. Event Management Team §  Cross-functional team •  Initially determines scope and impact of the event •  Coordinates remediation efforts §  Led by the Chief Privacy Officer §  Core members should represent… •  Legal •  Privacy •  Compliance •  Incident Management •  IT §  Other members added based on the event Page 15
  • 16. Facts To Gather During An Event 1.  Information lost 8.  Residence of affected 2.  Was data encrypted 9.  Can data be 3.  Amount of data lost recovered? 4.  Has the data loss 10.  Applicable laws been stopped? 11.  Notification 5.  When loss occurred requirements 6.  Where it was lost 12.  Potential impact to 7.  Who was affected other applications 13.  Potential impact on other organizations Page 16
  • 17. Sample Event Process Incident • Decides if this may be a data Escalate to Occurs breach event based on currently CPO and CSO known information • Determines scope of the event Follow Incident • Identifies risks and responsibilities Management Engage Event • Reports back to CPO and CSO Process Management Team • Coordinates remediation Engage Event • Defines how all communication to Communication stakeholders is coordinated Plan Page 17
  • 18. Event Communication Plan §  Identifies members of the Event Communication Team –  Contains contact information for the members §  Defines communication parameters •  Who talks to whom and when §  Contains frameworks for communications Page 18
  • 19. Event Communication Team Stakeholders Team Members •  Customers •  Marketing * •  Employees •  Internal Communications •  Marketing Dept. •  Public Relations* •  Media •  Security / Loss Prevention •  Legal •  Law enforcement •  Investor Relations •  Other Government •  Chief Privacy Officer Officials •  Shareholders * Potential Lead Page 19
  • 20. Communication Parameters §  Spokespeople must be identified •  Spokesperson designation by stakeholder •  Limit communication to be done to designees §  Message content must be reviewed •  Consistent messages sent across stakeholders §  Keep Executive Leadership informed •  Frequent updates from chairs of both teams §  Use Executives as spokespeople sparingly Page 20
  • 21. Communication Frameworks §  Most communications can be prewritten •  Details of the specific event added at Event §  Prepared items may include… •  Press releases •  Letters / emails to customers •  Website updates •  Employee notices •  Talking points for the media Page 21
  • 22. Test, Test, and Retest §  Make all participants familiar with processes before they are implemented §  Two common types of testing Table Top Exercises Scenario exercise •  Multiple scenarios defined •  One scenario is defined •  Key participants meet •  Participants notified day of •  Each scenario is discussed exercise happening •  Production processes and tools are used to manage the event •  Key participants meet to debrief Page 22
  • 23. Other Considerations §  System of record §  Methods of communications §  Independent divisions •  Multinational divisions •  Acquired businesses •  Recognized brands Page 23
  • 24. Questions © 2011 Co3 Systems, Inc. The information contained herein is proprietary and confidential. Page 24
  • 25. Thanks! 1 Alewife Center, Suite 450 ph: 508-474-5125 Cambridge, MA 02140 e: info@privacyref.com ph: 617-206-3900 privacyref.com e: info@co3sys.com www.co3sys.com Gartner: “Co3 …define(s) what software packages for privacy look like.” Page 25