SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Privileged and Confidential Information Twitter:@RevInnovator
CyberSecurity
Five Ways for Boards to Prepare
October 2015
Privileged and Confidential Information Twitter:@RevInnovator
The Last Year of High Profile Breaches
1
11,000,000	
  
Bank	
  Accounts	
  
Social	
  Security	
  Numbers	
  
80,000,000	
  
Social	
  Security	
  Numbers	
  
eMail	
  Addresses	
  
Physical	
  Addresses	
  
47,000	
  
Proprietary	
  Info	
  
Employee	
  info	
  
	
  
109,000,000	
  
Credit	
  Cards	
  
eMail	
  Addresses	
  
83,000,000	
  
eMail	
  Addresses	
  
Physical	
  Addresses	
  
145,000,000	
  
eMail	
  Addresses	
  
Physical	
  Addresses	
  
Login	
  CredenIals	
  
110,000,000	
  
Credit	
  Card	
  Numbers	
  
Source:	
  Bloomberg.com	
  -­‐	
  A	
  Quick	
  Guide	
  to	
  the	
  Worst	
  Corporate	
  Hack	
  AQacks	
  
Privileged and Confidential Information Twitter:@RevInnovator
High Profile Firings: Not Just IT
2
Mailroom Employee
Highmark
MDF Transcription
Boston Medical Group
Two hospital workers
Georgia Hospital
“Terrific Employee”
Goold Health System
Target	
  CIO	
  –	
  Beth	
  Jacobs	
  
Maricopa	
  County	
  Community	
  
College	
  District	
  –	
  Miguel	
  Corozo	
  
The	
  Texas	
  State	
  Comptroller's	
  
office	
  –	
  Susan	
  Combs	
  
Target	
  CEO	
  Gregg	
  Steinhafel	
  
The	
  Utah	
  state	
  Department	
  of	
  
Technology	
  Service	
  
Privileged and Confidential Information Twitter:@RevInnovator 3
A primary responsibility of every board is
to secure the future of the organization.
- Tom Horton – Boards & Directors
Privileged and Confidential Information Twitter:@RevInnovator
The New Normal
•  Every company is an IT Company
•  Every company is a Big Data Company
•  BYOX will continue to grow
•  Most security is perimeter security
•  ~25% of HIPAA breaches involve a trusted
partner
– That number is poised to increase as business
associates are now liable under the new HIPAA
rule
4
Privileged and Confidential Information Twitter:@RevInnovator
Top Three Industry Breaches
5
Number	
  of	
  Incidents Confirmed	
  Data	
  Loss
Total Small Large Unknown Total Small Large Unknown
Public 50,315	
   19 49,596 700 303 6 241 56
InformaIon 1,496 36 34 1,426 95 13 17 65
Financial 642 44 177 421 277 33 136 108
Dollar loss is difficult to calculate
Boards and Executives care about business
impact
Privileged and Confidential Information Twitter:@RevInnovator 6
Privileged and Confidential Information Twitter:@RevInnovator
30 years later: Why do Companies still #Fail?
•  Security and Compliance treated as “IT
problems” and not as core Business Operations
•  Security spend is perceived as a burden
expense
–  Consider it in the same as your Accounting function
•  Most compliance and security needs primarily
addresses the complex internal IT requirements
–  Governance, human and wider partner network
vulnerabilities are lightly considered
7
Privileged and Confidential Information Twitter:@RevInnovator
According to a 2014 Verizon Report,
only 10% of Merchants/Service
Providers were fully compliant with
DSS 2.0 standards*
8
*Verizon 2014 Pci Compliance Report - http://www.verizonenterprise.com/pcireport/2014/
Compliance ≠ Security!
Privileged and Confidential Information Twitter:@RevInnovator
Five Mandates for the Board
Understanding
People
Process
Technology
Preparedness
9
•  Understanding
–  What are the risks?
–  Chain of trust?
–  Do they understand Cyber?
•  People
–  Are the right people in place?
–  Do they have the resources they need?
–  Do they understand the companies
strategic risks?
•  Process
–  Is there are breach response plan?
–  Do you have partners ready to support?
–  How often is it tested?
•  Technology
–  Cyber-risk is not an IT problem.
–  IT is one of the enablers
•  Preparedness
–  Is business continuity ready?
–  Is it tested?
–  Are out-of-band methods in place?
Privileged and Confidential Information Twitter:@RevInnovator
Cyber Insurance is a Reality
10
Privileged and Confidential Information Twitter:@RevInnovator
Example of a Prepared Team
11
April 2014: A Dutch teenage girl
sends a “prank” tweet
threatening American Airlines.
American Airlines’ response was
direct and got media airplay.
@AmericanAir tweeted
“@QueenDemetriax_ Sarah, we take
these threats very seriously. Your IP
address and details will be forwarded to
security and the FBI.”
@QueenDemetriax_ tweeted
"@AmericanAir hello my name's Ibrahim
and I'm from Afghanistan. I'm part of Al
Qaida and on June 1st I'm gonna do
something really big bye.”
Privileged and Confidential Information Twitter:@RevInnovator
Five Questions for Executives and Boards
•  Is an up to date security framework in
place?
•  Does a breach response plan exist?
•  How much does (cyber) insurance cover?
•  Are both internal and external (partner)
resources considered?
•  Do employee’s understand their role in
relation to company security?
12
excellence.perspective.innovation.
Privileged and Confidential Information Twitter:@RevInnovator
NACD Five Principles
1.  Cyber security is an enterprise-wide risk management
issues, not just an IT problem.
2.  Address the serious legal consequences of cyber risks.
3.  Cyber security must be addressed with professionals
and given board-level priority.
4.  Directors must advise management to take all steps
necessary to comprehensively address cyber risk with
personnel and resources.
5.  Determine how your organization would deal with a
breach and whether liability can be addressed via
insurance.
14

Weitere ähnliche Inhalte

Was ist angesagt?

Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Kevin Duffey
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearIronCore Labs
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesWhoisXML API
 
Easy security presentation 1
Easy security presentation 1Easy security presentation 1
Easy security presentation 1Michael Buschmann
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupAccellis Technology Group
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Kevin Duffey
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Alexandru Turcu
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 4iQ
 
Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015Brian Levine
 
Social Engineering Team Talk 1 PhishMe Leader Guide Final
Social Engineering Team Talk 1 PhishMe  Leader Guide FinalSocial Engineering Team Talk 1 PhishMe  Leader Guide Final
Social Engineering Team Talk 1 PhishMe Leader Guide FinalSteve Gavora
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutionsCyberhunter Cyber Security
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCybera Inc.
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityJamie Hutt
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityJamie Hutt
 
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...Black Duck by Synopsys
 

Was ist angesagt? (20)

Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
 
Can domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breachesCan domain intelligence help healthcare service providers combat data breaches
Can domain intelligence help healthcare service providers combat data breaches
 
Easy security presentation 1
Easy security presentation 1Easy security presentation 1
Easy security presentation 1
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology Group
 
Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...Equifax breach - how to lose friends and customers...
Equifax breach - how to lose friends and customers...
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey 2019 Identity Protection and Data Breaches Survey
2019 Identity Protection and Data Breaches Survey
 
Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015
 
Productivity 3.0
Productivity 3.0Productivity 3.0
Productivity 3.0
 
Social Engineering Team Talk 1 PhishMe Leader Guide Final
Social Engineering Team Talk 1 PhishMe  Leader Guide FinalSocial Engineering Team Talk 1 PhishMe  Leader Guide Final
Social Engineering Team Talk 1 PhishMe Leader Guide Final
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Phishing
PhishingPhishing
Phishing
 
State of Security
State of SecurityState of Security
State of Security
 
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human BehaviourCyber Summit 2016: Insider Threat Indicators: Human Behaviour
Cyber Summit 2016: Insider Threat Indicators: Human Behaviour
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And Security
 
E commerce - Data Integrity and Security
E commerce - Data Integrity and SecurityE commerce - Data Integrity and Security
E commerce - Data Integrity and Security
 
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...Open Source Insight:  Securing Software Stacks, Election Security, FDA Pacema...
Open Source Insight: Securing Software Stacks, Election Security, FDA Pacema...
 

Andere mochten auch

Webサービスのための 10/40Gigabit Ethernetの可能性
Webサービスのための10/40Gigabit Ethernetの可能性Webサービスのための10/40Gigabit Ethernetの可能性
Webサービスのための 10/40Gigabit Ethernetの可能性Naoto MATSUMOTO
 
How To Train Your Calxeda EnergyCore
How To Train Your  Calxeda EnergyCoreHow To Train Your  Calxeda EnergyCore
How To Train Your Calxeda EnergyCoreNaoto MATSUMOTO
 
Computational Research day 2015
Computational Research day 2015Computational Research day 2015
Computational Research day 2015cunera
 
Fcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industryFcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industryAlberto Garcia Romera
 
Small Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cell Forum
 
Block Chain Record Management
Block Chain Record ManagementBlock Chain Record Management
Block Chain Record ManagementCharles Moore
 
Data and Donuts: How to write a data management plan
Data and Donuts: How to write a data management planData and Donuts: How to write a data management plan
Data and Donuts: How to write a data management planC. Tobin Magle
 
Brainstorming of Hospitality design
Brainstorming of Hospitality designBrainstorming of Hospitality design
Brainstorming of Hospitality designNeenu Sara Abraham
 
Evolutionary Psychology
Evolutionary PsychologyEvolutionary Psychology
Evolutionary PsychologySimon Bignell
 
Solving the Language Barrier
Solving the Language BarrierSolving the Language Barrier
Solving the Language BarrierLuis Medina
 
大規模なスイッチレス・サーバクラスタリング構築運用の考察
大規模なスイッチレス・サーバクラスタリング構築運用の考察大規模なスイッチレス・サーバクラスタリング構築運用の考察
大規模なスイッチレス・サーバクラスタリング構築運用の考察Naoto MATSUMOTO
 
Yeast experiment
Yeast experimentYeast experiment
Yeast experiments08051
 
Data mining slides
Data mining slidesData mining slides
Data mining slidessmj
 

Andere mochten auch (17)

Webサービスのための 10/40Gigabit Ethernetの可能性
Webサービスのための10/40Gigabit Ethernetの可能性Webサービスのための10/40Gigabit Ethernetの可能性
Webサービスのための 10/40Gigabit Ethernetの可能性
 
How To Train Your Calxeda EnergyCore
How To Train Your  Calxeda EnergyCoreHow To Train Your  Calxeda EnergyCore
How To Train Your Calxeda EnergyCore
 
assuncao pdf ok
assuncao pdf okassuncao pdf ok
assuncao pdf ok
 
Muhammad Al1
Muhammad Al1Muhammad Al1
Muhammad Al1
 
ERM Symposium Agenda FINAL
ERM Symposium Agenda FINALERM Symposium Agenda FINAL
ERM Symposium Agenda FINAL
 
Computational Research day 2015
Computational Research day 2015Computational Research day 2015
Computational Research day 2015
 
Fcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industryFcpa enforcement-aerospace-defense-industry
Fcpa enforcement-aerospace-defense-industry
 
A lovely lunch recipe
A lovely lunch recipeA lovely lunch recipe
A lovely lunch recipe
 
Small Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work itemSmall Cells & 5G IoT champions work item
Small Cells & 5G IoT champions work item
 
Block Chain Record Management
Block Chain Record ManagementBlock Chain Record Management
Block Chain Record Management
 
Data and Donuts: How to write a data management plan
Data and Donuts: How to write a data management planData and Donuts: How to write a data management plan
Data and Donuts: How to write a data management plan
 
Brainstorming of Hospitality design
Brainstorming of Hospitality designBrainstorming of Hospitality design
Brainstorming of Hospitality design
 
Evolutionary Psychology
Evolutionary PsychologyEvolutionary Psychology
Evolutionary Psychology
 
Solving the Language Barrier
Solving the Language BarrierSolving the Language Barrier
Solving the Language Barrier
 
大規模なスイッチレス・サーバクラスタリング構築運用の考察
大規模なスイッチレス・サーバクラスタリング構築運用の考察大規模なスイッチレス・サーバクラスタリング構築運用の考察
大規模なスイッチレス・サーバクラスタリング構築運用の考察
 
Yeast experiment
Yeast experimentYeast experiment
Yeast experiment
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 

Ähnlich wie Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board

5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at RiskClearDATACloud
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Grant Barker
 
Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511Stan Stahl, PhD
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Privacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesPrivacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesArt Hall
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604ISSA LA
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarMarty Miller
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 
Ten Steps to Help Avoid a Major Privacy or Security Headache
Ten Steps to Help Avoid a Major  Privacy or Security Headache Ten Steps to Help Avoid a Major  Privacy or Security Headache
Ten Steps to Help Avoid a Major Privacy or Security Headache Ryan Boyles
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime SecureAuth
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxchristalgrieg
 

Ähnlich wie Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board (20)

5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Cyber security for ia and risk 150601
Cyber security for ia and risk 150601Cyber security for ia and risk 150601
Cyber security for ia and risk 150601
 
Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Privacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesPrivacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service Representatives
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
 
SoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security WebinarSoCal HIMSS Privacy Security Webinar
SoCal HIMSS Privacy Security Webinar
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Ten Steps to Help Avoid a Major Privacy or Security Headache
Ten Steps to Help Avoid a Major  Privacy or Security Headache Ten Steps to Help Avoid a Major  Privacy or Security Headache
Ten Steps to Help Avoid a Major Privacy or Security Headache
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docxThis assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
This assignment covers chapter 8 and is due by 1000 p.m on Monday.docx
 

Mehr von LERNER Consulting

How to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptxHow to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptxLERNER Consulting
 
Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019LERNER Consulting
 
Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...LERNER Consulting
 
RChain Developer Conference pithia investments 04-2018
RChain Developer Conference   pithia investments 04-2018RChain Developer Conference   pithia investments 04-2018
RChain Developer Conference pithia investments 04-2018LERNER Consulting
 
Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018LERNER Consulting
 
Leadership: A Journey Planner
Leadership: A Journey PlannerLeadership: A Journey Planner
Leadership: A Journey PlannerLERNER Consulting
 
CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018LERNER Consulting
 
SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017LERNER Consulting
 
Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017LERNER Consulting
 
Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017LERNER Consulting
 
Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016LERNER Consulting
 
Change Management: A Journey Planner
Change Management: A Journey Planner Change Management: A Journey Planner
Change Management: A Journey Planner LERNER Consulting
 
There's always room for Growth
There's always room for GrowthThere's always room for Growth
There's always room for GrowthLERNER Consulting
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardLERNER Consulting
 
Alternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER ConsultingAlternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER ConsultingLERNER Consulting
 
Block Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingBlock Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingLERNER Consulting
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfLERNER Consulting
 
Client Case Study/Citations Template
Client Case Study/Citations TemplateClient Case Study/Citations Template
Client Case Study/Citations TemplateLERNER Consulting
 
Executive Status Report Template
Executive Status Report TemplateExecutive Status Report Template
Executive Status Report TemplateLERNER Consulting
 

Mehr von LERNER Consulting (20)

How to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptxHow to talk to your generative AI r2.pptx
How to talk to your generative AI r2.pptx
 
Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019Blochchain's Impact on Finance 01-2019
Blochchain's Impact on Finance 01-2019
 
Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...Presentation to Legislative Committee on Economic Development & International...
Presentation to Legislative Committee on Economic Development & International...
 
RChain Developer Conference pithia investments 04-2018
RChain Developer Conference   pithia investments 04-2018RChain Developer Conference   pithia investments 04-2018
RChain Developer Conference pithia investments 04-2018
 
Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018Crypto Traders event at Atlas Workspace 04-2018
Crypto Traders event at Atlas Workspace 04-2018
 
Leadership: A Journey Planner
Leadership: A Journey PlannerLeadership: A Journey Planner
Leadership: A Journey Planner
 
CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018CFOs and Cryptocurrency 01-2018
CFOs and Cryptocurrency 01-2018
 
SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017SVIA InsurTech Summit Dec 5 - 6th 2017
SVIA InsurTech Summit Dec 5 - 6th 2017
 
Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017Bitcoin + blockchain transaction 07 2017
Bitcoin + blockchain transaction 07 2017
 
Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017Business of Blockchain LERNER Consulting 05 2017
Business of Blockchain LERNER Consulting 05 2017
 
Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016Lawrence I Lerner Executive Bio 11 2016
Lawrence I Lerner Executive Bio 11 2016
 
Change Management: A Journey Planner
Change Management: A Journey Planner Change Management: A Journey Planner
Change Management: A Journey Planner
 
SR Developer Job Posting
SR Developer Job PostingSR Developer Job Posting
SR Developer Job Posting
 
There's always room for Growth
There's always room for GrowthThere's always room for Growth
There's always room for Growth
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
 
Alternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER ConsultingAlternative payment methods 03 2015 LERNER Consulting
Alternative payment methods 03 2015 LERNER Consulting
 
Block Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER ConsultingBlock Chain as a Platform February 2015 - LERNER Consulting
Block Chain as a Platform February 2015 - LERNER Consulting
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask Yourself
 
Client Case Study/Citations Template
Client Case Study/Citations TemplateClient Case Study/Citations Template
Client Case Study/Citations Template
 
Executive Status Report Template
Executive Status Report TemplateExecutive Status Report Template
Executive Status Report Template
 

Kürzlich hochgeladen

digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 

Kürzlich hochgeladen (20)

digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 

Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board

  • 1. Privileged and Confidential Information Twitter:@RevInnovator CyberSecurity Five Ways for Boards to Prepare October 2015
  • 2. Privileged and Confidential Information Twitter:@RevInnovator The Last Year of High Profile Breaches 1 11,000,000   Bank  Accounts   Social  Security  Numbers   80,000,000   Social  Security  Numbers   eMail  Addresses   Physical  Addresses   47,000   Proprietary  Info   Employee  info     109,000,000   Credit  Cards   eMail  Addresses   83,000,000   eMail  Addresses   Physical  Addresses   145,000,000   eMail  Addresses   Physical  Addresses   Login  CredenIals   110,000,000   Credit  Card  Numbers   Source:  Bloomberg.com  -­‐  A  Quick  Guide  to  the  Worst  Corporate  Hack  AQacks  
  • 3. Privileged and Confidential Information Twitter:@RevInnovator High Profile Firings: Not Just IT 2 Mailroom Employee Highmark MDF Transcription Boston Medical Group Two hospital workers Georgia Hospital “Terrific Employee” Goold Health System Target  CIO  –  Beth  Jacobs   Maricopa  County  Community   College  District  –  Miguel  Corozo   The  Texas  State  Comptroller's   office  –  Susan  Combs   Target  CEO  Gregg  Steinhafel   The  Utah  state  Department  of   Technology  Service  
  • 4. Privileged and Confidential Information Twitter:@RevInnovator 3 A primary responsibility of every board is to secure the future of the organization. - Tom Horton – Boards & Directors
  • 5. Privileged and Confidential Information Twitter:@RevInnovator The New Normal •  Every company is an IT Company •  Every company is a Big Data Company •  BYOX will continue to grow •  Most security is perimeter security •  ~25% of HIPAA breaches involve a trusted partner – That number is poised to increase as business associates are now liable under the new HIPAA rule 4
  • 6. Privileged and Confidential Information Twitter:@RevInnovator Top Three Industry Breaches 5 Number  of  Incidents Confirmed  Data  Loss Total Small Large Unknown Total Small Large Unknown Public 50,315   19 49,596 700 303 6 241 56 InformaIon 1,496 36 34 1,426 95 13 17 65 Financial 642 44 177 421 277 33 136 108 Dollar loss is difficult to calculate Boards and Executives care about business impact
  • 7. Privileged and Confidential Information Twitter:@RevInnovator 6
  • 8. Privileged and Confidential Information Twitter:@RevInnovator 30 years later: Why do Companies still #Fail? •  Security and Compliance treated as “IT problems” and not as core Business Operations •  Security spend is perceived as a burden expense –  Consider it in the same as your Accounting function •  Most compliance and security needs primarily addresses the complex internal IT requirements –  Governance, human and wider partner network vulnerabilities are lightly considered 7
  • 9. Privileged and Confidential Information Twitter:@RevInnovator According to a 2014 Verizon Report, only 10% of Merchants/Service Providers were fully compliant with DSS 2.0 standards* 8 *Verizon 2014 Pci Compliance Report - http://www.verizonenterprise.com/pcireport/2014/ Compliance ≠ Security!
  • 10. Privileged and Confidential Information Twitter:@RevInnovator Five Mandates for the Board Understanding People Process Technology Preparedness 9 •  Understanding –  What are the risks? –  Chain of trust? –  Do they understand Cyber? •  People –  Are the right people in place? –  Do they have the resources they need? –  Do they understand the companies strategic risks? •  Process –  Is there are breach response plan? –  Do you have partners ready to support? –  How often is it tested? •  Technology –  Cyber-risk is not an IT problem. –  IT is one of the enablers •  Preparedness –  Is business continuity ready? –  Is it tested? –  Are out-of-band methods in place?
  • 11. Privileged and Confidential Information Twitter:@RevInnovator Cyber Insurance is a Reality 10
  • 12. Privileged and Confidential Information Twitter:@RevInnovator Example of a Prepared Team 11 April 2014: A Dutch teenage girl sends a “prank” tweet threatening American Airlines. American Airlines’ response was direct and got media airplay. @AmericanAir tweeted “@QueenDemetriax_ Sarah, we take these threats very seriously. Your IP address and details will be forwarded to security and the FBI.” @QueenDemetriax_ tweeted "@AmericanAir hello my name's Ibrahim and I'm from Afghanistan. I'm part of Al Qaida and on June 1st I'm gonna do something really big bye.”
  • 13. Privileged and Confidential Information Twitter:@RevInnovator Five Questions for Executives and Boards •  Is an up to date security framework in place? •  Does a breach response plan exist? •  How much does (cyber) insurance cover? •  Are both internal and external (partner) resources considered? •  Do employee’s understand their role in relation to company security? 12
  • 15. Privileged and Confidential Information Twitter:@RevInnovator NACD Five Principles 1.  Cyber security is an enterprise-wide risk management issues, not just an IT problem. 2.  Address the serious legal consequences of cyber risks. 3.  Cyber security must be addressed with professionals and given board-level priority. 4.  Directors must advise management to take all steps necessary to comprehensively address cyber risk with personnel and resources. 5.  Determine how your organization would deal with a breach and whether liability can be addressed via insurance. 14