Minimizing the Risk of a
Data Breach in the Workplace
December 8, 2015
Bradford Bach
BradfordBach| bbach@titan-ca.com | 213.784.3070
High profilesecuritybreaches make news
BradfordBach | bbach@titan-ca.com | 213.784.3070
Cyber thieves target smaller companies!
• They are not prepared
• They don’t understand their legal obligations
• They have financial liability
• They are the nexus for larger company breaches
BradfordBach | bbach@titan-ca.com | 213.784.3070
Cyber attacksare on the rise
• Nations, groups & individuals are targeting
– Institutions
– Financial services agencies
– Utilities
– Consumers
• 43 percent of US firms have experienced a data breach in the past year (survey of
735 businesses)
Source: Pew Research Centerand Ponemon Institute
BradfordBach | bbach@titan-ca.com | 213.784.3070
What are the hackers looking for?
• Credit card details
• Bank account numbers and PIN’s
• Social security numbers
• Passport numbers
• Drivers licenses
• Usernames and passwords
• Birthdays and anniversaries
BradfordBach | bbach@titan-ca.com | 213.784.3070
Management’sconcern about data breach
Percentage concern level on 10-point scale
Source: Ponemon Institute
BradfordBach| bbach@titan-ca.com | 213.784.3070
Key steps companieshave taken
• Recognizedtheneedfor a strongercyberdefenseposture
• Allocatedresourcesto preventing,detectingandresolvingdata breaches
• Developedoperationsandcomplianceprocedures
• EstablishedComputerSecurityIncidentResponseTeams(SIRT)
BradfordBach| bbach@titan-ca.com | 213.784.3070
Investments in response to databreaches
Source: Ponemon Institute
BradfordBach | bbach@titan-ca.com | 213.784.3070
What constitutesan incident?
• Report of a physical or criminal act (e.g.:theft of a computer, laptop, tablet or PDA)
• Suspicion that a device has been compromised to allow access to sensitive data
• Security issue with a person using equipment
• Other circumstances that warrant investigation include disruptive viruses, denial
of service attacks, malware, phishing scams, spam etc.
BradfordBach| bbach@titan-ca.com | 213.784.3070
Are youprepared?
• Are you working with your IT team to ensure that you have appropriate security
controls in place?
• Do you have a SIRT team in place including general counsel, executives, key
personnel & IT?
• Have you implemented best practices policies and procedures to secure your
network?
• How are you funded to cover the legal compliance and costs associated with a
breach?
• Do you know what laws impact your industry?
BradfordBach| bbach@titan-ca.com | 213.784.3070
Cybercrime example
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
1. Planning: Have shared goals and describe them in detail
2. TheTeam: Identify, inform and train those you expectto take
action
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
3. Incident identification methods and triggers
Define events and mechanisms that mighttrigger a security incident investigation. Provide examples
to help othersunderstand what to look for and how to respond.
• Theft or loss ofan unencrypted device
• Hacking ofa system containing protected data
• Employee snooping
• Malwarecapable ofdata exfiltration
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
4. Breach determination methodology
How will youdetermine if protected data was likelyto havebeen compromised based on the
attack, data classification, jurisdiction andparticular regulations?
Usethe four factor risk assessment methodology required for healthcaredata. If thereis a
probability of compromise, then you have suffered a breach. Thefour factors are:
• Thenatureandextentoftheprotectedinformationinvolved,includingthetypesofidentifiersandthelikelihoodofre-
identification;
• Theunauthorizedpersonwhousedtheprotectedinformationortowhomthedisclosurewasmade;
• Whethertheprotectedinformationwasactuallyacquiredorviewed;
• Theextenttowhichtherisktotheprotectedinformationhasbeenmitigated.
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
5. Breach response team activation
This will includemembers of the CIRTbut those that are normallynot included in incidents that do
not convert to a breach. Theycan be both internaland external including:
• Technical
• Executive
• Legal andcompliance
• Public relations
• Security vendors, etc.
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
6. Notification actions
Notification requirements vary by statute, state and data class. It is important to know the
requirements for each class of data youpossess.
7. Reporting and documentation
It is critical that youproduce accurateand complete documentation of the events, actions, and results
that occuras the result of a security incident. Besure to spend the time requiredto accuratelyportray
what happened, who did what, to what and with what? Keep copies of all communications,
notifications and any and all activity.
BradfordBach| bbach@titan-ca.com | 213.784.3070
SIRT response teams andplan minimums
8. Policy and procedural ortechnological improvement
After a significant security incident and breach is a great opportunity to improveupon the policies and
procedures to prevent another breach in the futureand how to respond if it happens again. Takethis
opportunity to consider what happened and how youreacted. Thenconsider and documentways to
improveon both.
BradfordBach| bbach@titan-ca.com | 213.784.3070
Trainingand updating staff
Onceyou have createdyour Computer Security Incident Response Plan and when you
use the plan to respond; you should then train your staff effectively and consistently.
BradfordBach| bbach@titan-ca.com | 213.784.3070
Trainingand updating staff
• Having plans for which staff are either unaware of or are not familiar with when it
is time to act is much like having no plans at all.
• A lack of training can lead to inaction, delays and mistakes which are avoidable
and canbe incredibly costly. Empoweryour employees to beconfident and ready
to act when the inevitable occurs.
BradfordBach| bbach@titan-ca.com | 213.784.3070
BradfordBach | bbach@titan-ca.com | 213.784.3070
Breakdown of Events Impacting Security
Source: Pew Research Center and Ponemon Institute
Bradford Bach | bbach@titan-ca.com | 213.784.3070
Socialnetworking scams
Source: Ponemon Institute
BradfordBach | bbach@titan-ca.com | 213.784.3070
Understandyour specificlegal obligations
• Health InformationPortability& AccountabilityAct(HIPAA)
• Health InformationTechnologyforEconomicandClinical Health Act (HITECH)
• Customs-TradePartnershipAgainstTerrorism(C-TPAT)
• FairandAccurateCreditTransactionAct(FACTA) includesRedFlagsRule
• NorthAmerican Electric ReliabilityCorp.(NERC)
• CriticalInfrastructureProtection(CIP)
• InternationalTraffickingin Arm Regulation(ITAR)
• Criminal JusticeInformationServices (CJIS)
• FederalInformationProcessingStandards(FIPS)
• FederalInformationSecurityManagement Act(FISMA)
• TheChildren’sOnlinePrivacyProtectionAct(COPPA)
BradfordBach| bbach@titan-ca.com | 213.784.3070
Be prepared!
• Addressing regulatory issuesshould go beyond meeting minimum requirements. It
should also introduce efficiencies and processes that improve your overall
business.
BradfordBach| bbach@titan-ca.com | 213.784.3070
Areas of focus tobe defensible in2016
1. Do a vulnerability or security assessment
2. Conduct patching for software security updates
3. Implement e-mail spam/malware filtering with link reputation checking
4. Set up a network security policy
5. Antivirus/malware
6. Cultivate a culture of safety with end-usertraining
• Source:: LeadingSecurityExpertsAlvakaNetworks
BradfordBach| bbach@titan-ca.com | 213.784.3070
Areas of focus tobe defensiblein 2016
7. Implement backupand disaster recovery/business continuity
8. Network monitoring is an important function
9. Utilize the full security potential of VLAN and VPN
10. Gofor an up-to-date firewall/UTM technology, IPS/IDS
11. Dual factor authentication provides greater security
12. Makesureyou do your budgeting and ROI on security measures
Source:: Leading Security Experts Alvaka Networks
BradfordBach| bbach@titan-ca.com | 213.784.3070
BradfordBach |
bbach@titan-ca.com
| 213.784.3070

More Related Content

PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Data breach
PPTX
Data Privacy: What you need to know about privacy, from compliance to ethics
PPTX
Customer_Churn_prediction.pptx
PPT
“Privacy Today” Slide Presentation
PDF
Cybersecurity crisis management a prep guide
PPTX
Ppt sekilas hukum kontrak
PDF
ISMS_of ISO 27001-2022-awareness training
Cybersecurity Attack Vectors: How to Protect Your Organization
Data breach
Data Privacy: What you need to know about privacy, from compliance to ethics
Customer_Churn_prediction.pptx
“Privacy Today” Slide Presentation
Cybersecurity crisis management a prep guide
Ppt sekilas hukum kontrak
ISMS_of ISO 27001-2022-awareness training

What's hot (20)

PPTX
Email phishing and countermeasures
PPTX
Cybersecurity Awareness
PPTX
Phishing ppt
PPTX
Cyber Security Best Practices
PPTX
Security awareness
PDF
Social Engineering Attacks & Principles
PDF
Network Security Presentation
PPTX
Phishing awareness
PPTX
Network security
PDF
14 tips to increase cybersecurity awareness
PPTX
CYBER SECURITY
PPTX
Cyber security
PPT
Phishing
PPTX
Cyber security
PPT
Basics of Information System Security
PPT
Malware
PDF
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
PPTX
Stuxnet worm
PPTX
User security awareness
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
Email phishing and countermeasures
Cybersecurity Awareness
Phishing ppt
Cyber Security Best Practices
Security awareness
Social Engineering Attacks & Principles
Network Security Presentation
Phishing awareness
Network security
14 tips to increase cybersecurity awareness
CYBER SECURITY
Cyber security
Phishing
Cyber security
Basics of Information System Security
Malware
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Stuxnet worm
User security awareness
Phishing attack, with SSL Encryption and HTTPS Working
Ad

Viewers also liked (20)

PPTX
Data Security Breach: The Sony & Staples Story
PPTX
Data Security Breach – knowing the risks and protecting your business
PDF
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
PPTX
Group 3 presentation
PDF
FOSDEM 2016: The State of XMPP and Instant Messaging, The Awakening
PPTX
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
PPTX
8 Nastiest Data Breaches In 2015
PPTX
Leveraging Cloud Based Technologies for Increased Team Productivity
PPT
Inventory Control
PPTX
abc analysis and eoq
PPT
wendy's presentation
PPTX
Slack presentation
PPTX
inventory control & ABC analysis ppt
PPTX
Inventory control techniques
PDF
Slack's Ali Rayl on Scaling Support for User Growth
PDF
A SaaS Metric designed to Increase Free Trial Conversions
PPTX
How (and When) to Hire a Great VP of Customer Success Management CSM
PPTX
How to Drive Growth with Customer Success Metrics
PPTX
SaaS Accounting: The blueprint to understanding and optimizing
PDF
9 Worst Practices in SaaS Metrics
Data Security Breach: The Sony & Staples Story
Data Security Breach – knowing the risks and protecting your business
Big Challenges in Data Modeling Webinar: Data Security, Data Breaches – Data ...
Group 3 presentation
FOSDEM 2016: The State of XMPP and Instant Messaging, The Awakening
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
8 Nastiest Data Breaches In 2015
Leveraging Cloud Based Technologies for Increased Team Productivity
Inventory Control
abc analysis and eoq
wendy's presentation
Slack presentation
inventory control & ABC analysis ppt
Inventory control techniques
Slack's Ali Rayl on Scaling Support for User Growth
A SaaS Metric designed to Increase Free Trial Conversions
How (and When) to Hire a Great VP of Customer Success Management CSM
How to Drive Growth with Customer Success Metrics
SaaS Accounting: The blueprint to understanding and optimizing
9 Worst Practices in SaaS Metrics
Ad

Similar to Data breach presentation (20)

PDF
Responding to a Data Breach, Communications Guidelines for Merchants
PPTX
David doughty presentation 181119
PDF
Cyber Security 101: What Your Agency Needs to Know
PDF
NextLevel Cyber Security Executive Briefing
PPTX
Cybersecurity digital marketing plan
PPTX
Best practices to mitigate data breach risk
PDF
ChatGPT, Generative AI Data Security Considerations
PPTX
A Brave New World of Cyber Security and Data Breach
PDF
Master Data in the Cloud: 5 Security Fundamentals
PPTX
New Ohio Cybersecurity Law Requirements
PPTX
INFRAGARD 2014: Back to basics security
PPTX
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
PDF
Item46763
PDF
Using international standards to improve US cybersecurity
PDF
Is it time for an IT Assessment?
PDF
Co3 rsc r5
PPTX
Deconstructing Data Breach Cost
PPTX
Protecting Client Data 11.09.11
PDF
CSIRT_16_Jun
PPTX
nist_small_business_fundamentals_july_2019.pptx
Responding to a Data Breach, Communications Guidelines for Merchants
David doughty presentation 181119
Cyber Security 101: What Your Agency Needs to Know
NextLevel Cyber Security Executive Briefing
Cybersecurity digital marketing plan
Best practices to mitigate data breach risk
ChatGPT, Generative AI Data Security Considerations
A Brave New World of Cyber Security and Data Breach
Master Data in the Cloud: 5 Security Fundamentals
New Ohio Cybersecurity Law Requirements
INFRAGARD 2014: Back to basics security
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Item46763
Using international standards to improve US cybersecurity
Is it time for an IT Assessment?
Co3 rsc r5
Deconstructing Data Breach Cost
Protecting Client Data 11.09.11
CSIRT_16_Jun
nist_small_business_fundamentals_july_2019.pptx

Recently uploaded (20)

PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPT
Module 1.ppt Iot fundamentals and Architecture
PPT
What is a Computer? Input Devices /output devices
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
STKI Israel Market Study 2025 version august
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Configure Apache Mutual Authentication
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
Benefits of Physical activity for teenagers.pptx
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Microsoft Excel 365/2024 Beginner's training
Flame analysis and combustion estimation using large language and vision assi...
Module 1.ppt Iot fundamentals and Architecture
What is a Computer? Input Devices /output devices
Consumable AI The What, Why & How for Small Teams.pdf
Training Program for knowledge in solar cell and solar industry
Enhancing plagiarism detection using data pre-processing and machine learning...
STKI Israel Market Study 2025 version august
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
OpenACC and Open Hackathons Monthly Highlights July 2025
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
The influence of sentiment analysis in enhancing early warning system model f...
Zenith AI: Advanced Artificial Intelligence
Configure Apache Mutual Authentication
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Final SEM Unit 1 for mit wpu at pune .pptx
Build Your First AI Agent with UiPath.pptx
Benefits of Physical activity for teenagers.pptx

Data breach presentation

  • 1. Minimizing the Risk of a Data Breach in the Workplace December 8, 2015 Bradford Bach BradfordBach| [email protected] | 213.784.3070
  • 2. High profilesecuritybreaches make news BradfordBach | [email protected] | 213.784.3070
  • 3. Cyber thieves target smaller companies! • They are not prepared • They don’t understand their legal obligations • They have financial liability • They are the nexus for larger company breaches BradfordBach | [email protected] | 213.784.3070
  • 4. Cyber attacksare on the rise • Nations, groups & individuals are targeting – Institutions – Financial services agencies – Utilities – Consumers • 43 percent of US firms have experienced a data breach in the past year (survey of 735 businesses) Source: Pew Research Centerand Ponemon Institute BradfordBach | [email protected] | 213.784.3070
  • 5. What are the hackers looking for? • Credit card details • Bank account numbers and PIN’s • Social security numbers • Passport numbers • Drivers licenses • Usernames and passwords • Birthdays and anniversaries BradfordBach | [email protected] | 213.784.3070
  • 6. Management’sconcern about data breach Percentage concern level on 10-point scale Source: Ponemon Institute BradfordBach| [email protected] | 213.784.3070
  • 7. Key steps companieshave taken • Recognizedtheneedfor a strongercyberdefenseposture • Allocatedresourcesto preventing,detectingandresolvingdata breaches • Developedoperationsandcomplianceprocedures • EstablishedComputerSecurityIncidentResponseTeams(SIRT) BradfordBach| [email protected] | 213.784.3070
  • 8. Investments in response to databreaches Source: Ponemon Institute BradfordBach | [email protected] | 213.784.3070
  • 9. What constitutesan incident? • Report of a physical or criminal act (e.g.:theft of a computer, laptop, tablet or PDA) • Suspicion that a device has been compromised to allow access to sensitive data • Security issue with a person using equipment • Other circumstances that warrant investigation include disruptive viruses, denial of service attacks, malware, phishing scams, spam etc. BradfordBach| [email protected] | 213.784.3070
  • 10. Are youprepared? • Are you working with your IT team to ensure that you have appropriate security controls in place? • Do you have a SIRT team in place including general counsel, executives, key personnel & IT? • Have you implemented best practices policies and procedures to secure your network? • How are you funded to cover the legal compliance and costs associated with a breach? • Do you know what laws impact your industry? BradfordBach| [email protected] | 213.784.3070
  • 12. SIRT response teams andplan minimums 1. Planning: Have shared goals and describe them in detail 2. TheTeam: Identify, inform and train those you expectto take action BradfordBach| [email protected] | 213.784.3070
  • 13. SIRT response teams andplan minimums 3. Incident identification methods and triggers Define events and mechanisms that mighttrigger a security incident investigation. Provide examples to help othersunderstand what to look for and how to respond. • Theft or loss ofan unencrypted device • Hacking ofa system containing protected data • Employee snooping • Malwarecapable ofdata exfiltration BradfordBach| [email protected] | 213.784.3070
  • 14. SIRT response teams andplan minimums 4. Breach determination methodology How will youdetermine if protected data was likelyto havebeen compromised based on the attack, data classification, jurisdiction andparticular regulations? Usethe four factor risk assessment methodology required for healthcaredata. If thereis a probability of compromise, then you have suffered a breach. Thefour factors are: • Thenatureandextentoftheprotectedinformationinvolved,includingthetypesofidentifiersandthelikelihoodofre- identification; • Theunauthorizedpersonwhousedtheprotectedinformationortowhomthedisclosurewasmade; • Whethertheprotectedinformationwasactuallyacquiredorviewed; • Theextenttowhichtherisktotheprotectedinformationhasbeenmitigated. BradfordBach| [email protected] | 213.784.3070
  • 15. SIRT response teams andplan minimums 5. Breach response team activation This will includemembers of the CIRTbut those that are normallynot included in incidents that do not convert to a breach. Theycan be both internaland external including: • Technical • Executive • Legal andcompliance • Public relations • Security vendors, etc. BradfordBach| [email protected] | 213.784.3070
  • 16. SIRT response teams andplan minimums 6. Notification actions Notification requirements vary by statute, state and data class. It is important to know the requirements for each class of data youpossess. 7. Reporting and documentation It is critical that youproduce accurateand complete documentation of the events, actions, and results that occuras the result of a security incident. Besure to spend the time requiredto accuratelyportray what happened, who did what, to what and with what? Keep copies of all communications, notifications and any and all activity. BradfordBach| [email protected] | 213.784.3070
  • 17. SIRT response teams andplan minimums 8. Policy and procedural ortechnological improvement After a significant security incident and breach is a great opportunity to improveupon the policies and procedures to prevent another breach in the futureand how to respond if it happens again. Takethis opportunity to consider what happened and how youreacted. Thenconsider and documentways to improveon both. BradfordBach| [email protected] | 213.784.3070
  • 18. Trainingand updating staff Onceyou have createdyour Computer Security Incident Response Plan and when you use the plan to respond; you should then train your staff effectively and consistently. BradfordBach| [email protected] | 213.784.3070
  • 19. Trainingand updating staff • Having plans for which staff are either unaware of or are not familiar with when it is time to act is much like having no plans at all. • A lack of training can lead to inaction, delays and mistakes which are avoidable and canbe incredibly costly. Empoweryour employees to beconfident and ready to act when the inevitable occurs. BradfordBach| [email protected] | 213.784.3070
  • 21. Breakdown of Events Impacting Security Source: Pew Research Center and Ponemon Institute Bradford Bach | [email protected] | 213.784.3070
  • 22. Socialnetworking scams Source: Ponemon Institute BradfordBach | [email protected] | 213.784.3070
  • 23. Understandyour specificlegal obligations • Health InformationPortability& AccountabilityAct(HIPAA) • Health InformationTechnologyforEconomicandClinical Health Act (HITECH) • Customs-TradePartnershipAgainstTerrorism(C-TPAT) • FairandAccurateCreditTransactionAct(FACTA) includesRedFlagsRule • NorthAmerican Electric ReliabilityCorp.(NERC) • CriticalInfrastructureProtection(CIP) • InternationalTraffickingin Arm Regulation(ITAR) • Criminal JusticeInformationServices (CJIS) • FederalInformationProcessingStandards(FIPS) • FederalInformationSecurityManagement Act(FISMA) • TheChildren’sOnlinePrivacyProtectionAct(COPPA) BradfordBach| [email protected] | 213.784.3070
  • 24. Be prepared! • Addressing regulatory issuesshould go beyond meeting minimum requirements. It should also introduce efficiencies and processes that improve your overall business. BradfordBach| [email protected] | 213.784.3070
  • 25. Areas of focus tobe defensible in2016 1. Do a vulnerability or security assessment 2. Conduct patching for software security updates 3. Implement e-mail spam/malware filtering with link reputation checking 4. Set up a network security policy 5. Antivirus/malware 6. Cultivate a culture of safety with end-usertraining • Source:: LeadingSecurityExpertsAlvakaNetworks BradfordBach| [email protected] | 213.784.3070
  • 26. Areas of focus tobe defensiblein 2016 7. Implement backupand disaster recovery/business continuity 8. Network monitoring is an important function 9. Utilize the full security potential of VLAN and VPN 10. Gofor an up-to-date firewall/UTM technology, IPS/IDS 11. Dual factor authentication provides greater security 12. Makesureyou do your budgeting and ROI on security measures Source:: Leading Security Experts Alvaka Networks BradfordBach| [email protected] | 213.784.3070