SlideShare ist ein Scribd-Unternehmen logo
1 von 44
Downloaden Sie, um offline zu lesen
February 10, 2015
Cybersecurity
Workshop
E. Andrew Keeney, Esq.
Kaufman & Canoles, P.C.
2
E. Andrew Keeney, Esq.
Kaufman & Canoles, P.C.
150 West Main Street, Suite 2100
Norfolk, VA 23510
(757) 624-3153
eakeeney@kaufcan.com
http://www.kaufmanandcanoles.com/movies/credit-unions.html
3
Overview and Agenda
• Value
– What electronically stored data has value to
thieves?
– Why is cybersecurity critically important to credit
unions?
• Breaches
− External vs. Internal Threats
− Hackers/Employee error/Rogue Employee
4
Overview and Agenda –
continued
• Responses
• Prevention
• Insurance
• Laws and regulations
• Key takeaways/Best practices
5
Horror Stories
6
Data Security
Data & Cybersecurity: the practice of protecting
data and systems from unwanted use.
Data breach: security incident in which
sensitive, protected or confidential data is
copied, transmitted, viewed, stolen or used by
an individual unauthorized to do so.
7
Why only a general
awareness?
• Complacency seems to still be the norm.
– There is a view that cybersecurity measures do
not add to the bottom line; rather, it is a cost.
– There is a dearth in knowledge among
management-level individuals about actual,
current risks.
– There is a general misunderstanding of specific
risks that are known.
– Belief abounds that “it won’t happen to our
business.”
8
“We’re in a day when a person can commit
about 15,000 bank robberies sitting in their
basement.”
-Robert Anderson
Executive Assistant Director of the FBI’s Criminal Cyber
Response and Services Branch
“You’re going to be hacked.”
-Joseph Demarest
Assistant Director of the FBI’s Criminal Cyber Response and
Services Branch
9
Categories of Business
Organizations
• Those that will suffer a breach.
• Those that have suffered a breach.
• And those that will suffer a breach again.
• No business organization is spared.
10
Source: CUNA Mutual Group and NetDiligence 2013 Cyber Liability & Data Breach
Insurance Claims
11
Busy Year 2013
• 617 documented breaches
– Average costs of these 317 breaches:
• $5 dollars per customer notification multiplied by millions
• $30 per card cancellation/related monitoring of credit
PER customer
• $2000 per hours in forensic examinations and data
security analysis costs
• $500,000 per breach in legal expenses
• 1 million dollars per breach in corporate settlement costs
– 1 million dollars per breach in regulatory fines or related
expenses
https://www.privacyrights.org/data-breach
12
2014
• Identity Theft Resource Center reports that
between 2005 (when record keeping
commenced) and October 14, 2014 there
were 4,854 recorded breaches exposing
669,680,671 records.
• Major data breaches are reported almost
weekly
– JP Morgan Chase; Target; Home Depot; eBay;
Michaels; Neiman Marcus; Citibank; Sony, etc.
13
Data Breach
Basics (cont’d)
• If large-scale breaches are regularly reported,
then the number of smaller-scale breaches
necessarily must be larger.
• Average cost to a company that suffers a
breach now is approximately $200.00 per
compromised record .
14
Data Breach
Basics (cont’d)
• Average cost of lost laptop containing
personally identifiable information now has
approached $50,000, with only 2%
representing the actual cost of the device.
• Forensic experts hired to identify, contain,
and respond to data breaches easily cost 6-
figures within the first two weeks of
engagement.
15
Target Breach Expenses
(does not include legal expenses)
• Severance for CEO amounted to 15.9 million
dollars alone
• Regulatory fines 1 billion dollars – for negligence
to the government
• Fraudulent credit card charges – whopping 2.2
billion dollars
– Was to be refunded by the company for losses from
those 40 million card accounts
– The retail chain suffered 440 million dollars in
revenue losses fueling 2014 so far as a result of
lowered consumer confidence from the hacks
16
Vulnerability of So-Called
“Secure” Systems
• Viruses, spyware, worms, or Trojans
• Malware, including zero-day malware
• Web-based attacks
• Employee actions (both negligent and
intentional)
• phishing
17
Simple Data Loss
• Lost or stolen devices
– Smartphones with weak or no password protection
– Laptops with weak or no password protection
– Flash drives or other portable memory devices
• Improper disposal of documents
• Improper disposal of computers and other
devices
• Improper disposal of system components
• Palm Springs Federal Credit Union
18
Financial Sector Threats
• The number of incidents and level of
sophistication has increased dramatically in
recent years triggering active Cyber Division
of the FBI to take larger active role.
• Account Takeovers
– Exploitation of online financial and market
systems, such as Automated Clearing House
systems, payment card transactions, and market
trades.
19
Threats (cont’d)
– Compromise typically is accomplished by
accessing an authorized user’s weak account
credentials.
• Third-Party Payment Processor Breaches
– Bad actors target these companies’ systems,
because the volume of personally identifiable
information and payment card information is
massive, and because such information has
immediate value on the black market.
20
Threats (cont’d)
• Payment Card Skimming and Point of Sale
Schemes
– Steal card data to sell or create fake payment card
– Obsolete operating systems for ATMs and POS
machines is easily compromised
21
Threats (cont’d)
• Mobile Banking Exploitation
– Increased risks
– Malware starting to show up
• Man-in-the-middle attacks utilizing special malware sent
via texts
• More prevalent in Androids
– Apple’s mobile payment system
22
Threats (cont’d)
• Insider Access
– Direct access to confidential information, data, and
other insider information.
• Supply Chain Infiltration/Vendor Management
– Bad actors can gain physical and technical access
to credit union by compromising trusted suppliers
of technical, computer, and security equipment,
software, and hardware.
23
Consequences of Inaction
• Loss of goodwill
• Reputation risk
• Transactional costs associated with loss
mitigation
• Forensic expert fees
• Civil liability exposure
• Exposure to fines
and other penalties
24
FFIEC Cybersecurity
Assessment
• Inherent risk
– Connection types
– Technologies used
• Preparedness
– Risk management and oversight
– Collaboration and controls
– Incident management
25
FS-ISAC
• Financial Services Information Sharing and
Analysis Center
• Launched in 1999 as the global go-to
resource for cyber threat
• www.fsisac.com
26
Consumers
• “Breach fatigue”
• Complacency
• Not likely to impact shopping habits
• Credit unions should educate members and
encourage monitoring of account
27
Laws and regulations
28
Risk Assessment/Prevention
• Preventive measures
• Including
– Identifying foreseeable threats
– Assess likelihood and danger of potential threats
– Assess sufficiency of policies, procedures
– Proper disposal of information
29
Loss Prevention
• Employee Awareness Training
• Patch Management
• Encryption
• Periodic Testing of Computer Security
30
Loss Prevention (cont’d)
• Strengthen Account Credentials
– Pass-phrases, rather than passwords
– Combine various character types
• Limit and restrict administrative access
• Cybersecurity and Data Protection Policies
and Procedures
31
Breach Response
• Assess incident
• Notify NCUA or state supervisory authority
• Notify law enforcement
– File Suspicious Activity Report (“SAR”), if
applicable
• Preservation of records and evidence
• Member notification
• 12 C.F.R. Parts 748 and 1016
32
Breach Response (cont’d)
• Cybersecurity and Data Breach Response
Plan
• Upon notice of a potential data compromise,
immediately contact a law firm with
cybersecurity expertise.
• Permit law firm to coordinate retention of
forensic experts.
33
State Regulation
• Only 3 states do not currently have a law
requiring notification of security breaches
• Minnesota and Washington have statutes that
require a merchant to reimburse a financial
institution for reissuance of cards under
certain circumstances
• NJ bill introduced this year requires
reimbursement for costs incurred by financial
institutions
34
Connecticut Consumer
Security Breach Notification
Any person who conducts business in this state, and who, in the ordinary course of
such person’s business, owns, licenses or maintains computerized data that
includes personal information, shall provide notice of any breach of security
following the discovery of the breach to any resident of this state whose personal
information was, or is reasonably believed to have been, accessed by an
unauthorized person through such breach of security. Such notice shall be made
without unreasonable delay, subject to the provisions of subsection (d) of this
section and the completion of an investigation by such person to determine the
nature and scope of the incident, to identify the individuals affected, or to restore
the reasonable integrity of the data system. Such notification shall not be required
if, after an appropriate investigation and consultation with relevant federal, state
and local agencies responsible for law enforcement, the person reasonably
determines that the breach will not likely result in harm to the individuals whose
personal information has been acquired and accessed.
35
Connecticut Consumer
Security Breach Notification
Any person that maintains such person’s own security breach procedures as part of an
information security policy for the treatment of personal information and otherwise
complies with the timing requirements of this section, shall be deemed to be in compliance
with the security breach notification requirements of this section, provided such person
notifies, as applicable, residents of this state, owners and licensees in accordance with
such person’s policies in the event of a breach of security and in the case of notice to a
resident, such person also notifies the Attorney General not later than the time when
notice is provided to the resident. Any person that maintains such a security breach
procedure pursuant to the rules, regulations, procedures or guidelines established by the
primary or functional regulator, as defined in 15 USC 6809(2), shall be deemed to be in
compliance with the security breach notification requirements of this section, provided (1)
such person notifies, as applicable, such residents of this state, owners, and licensees
required to be notified under and in accordance with the policies or the rules, regulations,
procedures or guidelines established by the primary or functional regulator in the event of
a breach of security, and (2) if notice is given to a resident of this state in accordance with
subdivision (1) of this subsection regarding a breach of security, such person also notifies
the Attorney General not later than the time when notice is provided to the resident.
36
Federal Regulation
• Tax Identity Theft Awareness Week:
www.mycreditunion.gov/protect/Pages/taxidtheft.aspx
• Prevent Identity Theft:
www.mycreditunion.gov/protect/Pages/Prevent-Identity-
Theft.aspx
• Frauds and Scams:
www.mycreditunion.gov/protect/fraud/Pages/default.aspx
• Cybersecurity Awareness: www.ffiec.gov/cybersecurity.htm
• NCUA Consumer Report: Frauds, Scams and Cyberthreats -
Part I: http://youtu.be/3Zlfy7_97Vc
• NCUA Consumer Report: Frauds, Scams and Cyberthreats -
Part II: http://youtu.be/5XfyfRgxsLE
37
What Constitutes Cyber
Liability
38
Insurance
“The vast majority of credit unions in the U.S.
don’t have adequate insurance coverage in the
event of another online data breach.”
-Credit Union Journal, November 10, 2014
39
What Can You Do?
• Is your data security adequate?
• What does your insurance cover?
• What insurance is available for credit unions
that may experience data breach exposure?
40
Cyber Insurance
• Approximately 50 companies in the U.S. offer
cybersecurity insurance
• $2 billion is expected to be spent in the
United States in 2014 on cyber insurance
– 67% increase from 2013
– In 2010 cyber insurance premiums totaled
$600,000
• Notifying affected customers of a credit card
breach can cost up to $500,000
41
Cyber Insurance – continued
• $166,000
– average cost of a breach to credit unions
– according to CUNA Mutual
• CUNA Mutual’s cybersecurity policy includes
access to:
– Resources to help credit unions manage risks
– Insurance protection
– Breach recovery services
42
• Employee Awareness Training
• Patch Management
• Encryption
• Periodic Testing of Computer Security
• Policies and Procedures
• Proactive and quick response
• Review current insurance coverage
43
E. Andrew Keeney, Esq.
Kaufman & Canoles, P.C.
150 West Main Street, Suite 2100
Norfolk, VA 23510
(757) 624-3153
eakeeney@kaufcan.com
http://www.kaufmanandcanoles.com/movies/credit-unions.html
February 10, 2015
Cybersecurity
Workshop
E. Andrew Keeney, Esq.
Kaufman & Canoles, P.C.

Weitere ähnliche Inhalte

Was ist angesagt?

Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyDonny Shimamoto
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 
Cyber Threats and Insurance
Cyber Threats and InsuranceCyber Threats and Insurance
Cyber Threats and InsuranceEric Dean
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case studyAbhilash vijayan
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team SportQuarles & Brady
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance Hubbard Insurance Group
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsShawn Tuma
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Joseph White MPA CPM
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
Ch&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - TeaserCh&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - TeaserStephanie Baruk
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...David Cunningham
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 

Was ist angesagt? (20)

Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Cyber Threats and Insurance
Cyber Threats and InsuranceCyber Threats and Insurance
Cyber Threats and Insurance
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity Regulations
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014Target Data Breach Case Study 10242014
Target Data Breach Case Study 10242014
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
Ch&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - TeaserCh&Cie - Cyber Security - CIB - Teaser
Ch&Cie - Cyber Security - CIB - Teaser
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 

Andere mochten auch

Understanding the Fundamentals of Credit Union Third-Party Vendor Due Diligence
Understanding the Fundamentals of Credit Union Third-Party Vendor Due DiligenceUnderstanding the Fundamentals of Credit Union Third-Party Vendor Due Diligence
Understanding the Fundamentals of Credit Union Third-Party Vendor Due DiligenceKaufman & Canoles
 
Risks and Liabilities of Loan Participations, Part II
Risks and Liabilities ofLoan Participations, Part IIRisks and Liabilities ofLoan Participations, Part II
Risks and Liabilities of Loan Participations, Part IIKaufman & Canoles
 
Tila respa, one of the most expensive changes in decades
Tila respa, one of the most expensive changes in decadesTila respa, one of the most expensive changes in decades
Tila respa, one of the most expensive changes in decadesKaufman & Canoles
 
Credit Union Retained Counsel
Credit Union Retained CounselCredit Union Retained Counsel
Credit Union Retained CounselKaufman & Canoles
 
Powers of Attorney & Subpoenas - The Rights, Abuses & Potential Liabilities t...
Powers of Attorney & Subpoenas - The Rights, Abuses & Potential Liabilities t...Powers of Attorney & Subpoenas - The Rights, Abuses & Potential Liabilities t...
Powers of Attorney & Subpoenas - The Rights, Abuses & Potential Liabilities t...Kaufman & Canoles
 
NAFCU Regulatory Compliance Seminar Focus on Fair Lending
NAFCU Regulatory Compliance Seminar Focus on Fair Lending NAFCU Regulatory Compliance Seminar Focus on Fair Lending
NAFCU Regulatory Compliance Seminar Focus on Fair Lending Kaufman & Canoles
 
Powers of Attorney & Subpoenas, the Mistakes, Abuses & Potential Liability to...
Powers of Attorney & Subpoenas, the Mistakes, Abuses & Potential Liability to...Powers of Attorney & Subpoenas, the Mistakes, Abuses & Potential Liability to...
Powers of Attorney & Subpoenas, the Mistakes, Abuses & Potential Liability to...Kaufman & Canoles
 

Andere mochten auch (7)

Understanding the Fundamentals of Credit Union Third-Party Vendor Due Diligence
Understanding the Fundamentals of Credit Union Third-Party Vendor Due DiligenceUnderstanding the Fundamentals of Credit Union Third-Party Vendor Due Diligence
Understanding the Fundamentals of Credit Union Third-Party Vendor Due Diligence
 
Risks and Liabilities of Loan Participations, Part II
Risks and Liabilities ofLoan Participations, Part IIRisks and Liabilities ofLoan Participations, Part II
Risks and Liabilities of Loan Participations, Part II
 
Tila respa, one of the most expensive changes in decades
Tila respa, one of the most expensive changes in decadesTila respa, one of the most expensive changes in decades
Tila respa, one of the most expensive changes in decades
 
Credit Union Retained Counsel
Credit Union Retained CounselCredit Union Retained Counsel
Credit Union Retained Counsel
 
Powers of Attorney & Subpoenas - The Rights, Abuses & Potential Liabilities t...
Powers of Attorney & Subpoenas - The Rights, Abuses & Potential Liabilities t...Powers of Attorney & Subpoenas - The Rights, Abuses & Potential Liabilities t...
Powers of Attorney & Subpoenas - The Rights, Abuses & Potential Liabilities t...
 
NAFCU Regulatory Compliance Seminar Focus on Fair Lending
NAFCU Regulatory Compliance Seminar Focus on Fair Lending NAFCU Regulatory Compliance Seminar Focus on Fair Lending
NAFCU Regulatory Compliance Seminar Focus on Fair Lending
 
Powers of Attorney & Subpoenas, the Mistakes, Abuses & Potential Liability to...
Powers of Attorney & Subpoenas, the Mistakes, Abuses & Potential Liability to...Powers of Attorney & Subpoenas, the Mistakes, Abuses & Potential Liability to...
Powers of Attorney & Subpoenas, the Mistakes, Abuses & Potential Liability to...
 

Ähnlich wie Cybersecurity Workshop

Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Amy Purcell
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionBlackbaud
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBsMary Brophy
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response ManagementDon Caeiro
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdfQuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdfinfomalad
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 

Ähnlich wie Cybersecurity Workshop (20)

Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting Introduction
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdfQuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
QuestionConsider the Citibank incident in 2005 where more than 3.9.pdf
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 

Mehr von Kaufman & Canoles

Mortgage Delinquency & Collections
Mortgage Delinquency & CollectionsMortgage Delinquency & Collections
Mortgage Delinquency & CollectionsKaufman & Canoles
 
Due Diligence: A Necessity in a New Environment
Due Diligence: A Necessity in a New EnvironmentDue Diligence: A Necessity in a New Environment
Due Diligence: A Necessity in a New EnvironmentKaufman & Canoles
 
Ceo, Director and Officer Liabilities and the Risks of Being Sued
Ceo, Director and Officer Liabilities and the Risks of Being SuedCeo, Director and Officer Liabilities and the Risks of Being Sued
Ceo, Director and Officer Liabilities and the Risks of Being SuedKaufman & Canoles
 
Loan Modification – Workout Plans and Modification
Loan Modification – Workout Plans and ModificationLoan Modification – Workout Plans and Modification
Loan Modification – Workout Plans and ModificationKaufman & Canoles
 
Focus on Fair Lending... Tips to Avoid the Traps
Focus on Fair Lending... Tips to Avoid the TrapsFocus on Fair Lending... Tips to Avoid the Traps
Focus on Fair Lending... Tips to Avoid the TrapsKaufman & Canoles
 
NCUA's Examinations and Your Credit Union's Rights
NCUA's Examinations and Your Credit Union's RightsNCUA's Examinations and Your Credit Union's Rights
NCUA's Examinations and Your Credit Union's RightsKaufman & Canoles
 
NEACH - Diving Into Social Media Social Payments
NEACH - Diving Into Social Media Social PaymentsNEACH - Diving Into Social Media Social Payments
NEACH - Diving Into Social Media Social PaymentsKaufman & Canoles
 
AACUC - Real Estate Strategies
AACUC - Real Estate StrategiesAACUC - Real Estate Strategies
AACUC - Real Estate StrategiesKaufman & Canoles
 
Social Media Compliance Risks
Social Media Compliance RisksSocial Media Compliance Risks
Social Media Compliance RisksKaufman & Canoles
 
Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)Kaufman & Canoles
 
NAFCU Regulatory Compliance Seminar - Required Policies and Risk Assessments
NAFCU Regulatory Compliance Seminar - Required Policies and Risk AssessmentsNAFCU Regulatory Compliance Seminar - Required Policies and Risk Assessments
NAFCU Regulatory Compliance Seminar - Required Policies and Risk AssessmentsKaufman & Canoles
 
Nuts and Bolts to the Post-Judgment Process
Nuts and Bolts to the Post-Judgment ProcessNuts and Bolts to the Post-Judgment Process
Nuts and Bolts to the Post-Judgment ProcessKaufman & Canoles
 
Truth-in-Lending - RESPA: The New Rules
Truth-in-Lending - RESPA: The New RulesTruth-in-Lending - RESPA: The New Rules
Truth-in-Lending - RESPA: The New RulesKaufman & Canoles
 
Focus on Fair Lending… Tips to Avoid the Traps!
Focus on Fair Lending… Tips to Avoid the Traps!Focus on Fair Lending… Tips to Avoid the Traps!
Focus on Fair Lending… Tips to Avoid the Traps!Kaufman & Canoles
 
NCUA Board of Directors Policies
NCUA Board of Directors Policies NCUA Board of Directors Policies
NCUA Board of Directors Policies Kaufman & Canoles
 

Mehr von Kaufman & Canoles (20)

Mortgage Delinquency & Collections
Mortgage Delinquency & CollectionsMortgage Delinquency & Collections
Mortgage Delinquency & Collections
 
Due Diligence: A Necessity in a New Environment
Due Diligence: A Necessity in a New EnvironmentDue Diligence: A Necessity in a New Environment
Due Diligence: A Necessity in a New Environment
 
Ceo, Director and Officer Liabilities and the Risks of Being Sued
Ceo, Director and Officer Liabilities and the Risks of Being SuedCeo, Director and Officer Liabilities and the Risks of Being Sued
Ceo, Director and Officer Liabilities and the Risks of Being Sued
 
Loan Modification – Workout Plans and Modification
Loan Modification – Workout Plans and ModificationLoan Modification – Workout Plans and Modification
Loan Modification – Workout Plans and Modification
 
Focus on Fair Lending... Tips to Avoid the Traps
Focus on Fair Lending... Tips to Avoid the TrapsFocus on Fair Lending... Tips to Avoid the Traps
Focus on Fair Lending... Tips to Avoid the Traps
 
NAFCU - Fraud Management
NAFCU - Fraud ManagementNAFCU - Fraud Management
NAFCU - Fraud Management
 
NCUA's Examinations and Your Credit Union's Rights
NCUA's Examinations and Your Credit Union's RightsNCUA's Examinations and Your Credit Union's Rights
NCUA's Examinations and Your Credit Union's Rights
 
NEACH - Diving Into Social Media Social Payments
NEACH - Diving Into Social Media Social PaymentsNEACH - Diving Into Social Media Social Payments
NEACH - Diving Into Social Media Social Payments
 
AACUC - Real Estate Strategies
AACUC - Real Estate StrategiesAACUC - Real Estate Strategies
AACUC - Real Estate Strategies
 
Social Media Compliance Risks
Social Media Compliance RisksSocial Media Compliance Risks
Social Media Compliance Risks
 
Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)Cyber Security (Emerging Threats)
Cyber Security (Emerging Threats)
 
Focus on Fair Lending
Focus on Fair LendingFocus on Fair Lending
Focus on Fair Lending
 
Cybersecurity Workshop
Cybersecurity WorkshopCybersecurity Workshop
Cybersecurity Workshop
 
NAFCU Regulatory Compliance Seminar - Required Policies and Risk Assessments
NAFCU Regulatory Compliance Seminar - Required Policies and Risk AssessmentsNAFCU Regulatory Compliance Seminar - Required Policies and Risk Assessments
NAFCU Regulatory Compliance Seminar - Required Policies and Risk Assessments
 
Nuts and Bolts to the Post-Judgment Process
Nuts and Bolts to the Post-Judgment ProcessNuts and Bolts to the Post-Judgment Process
Nuts and Bolts to the Post-Judgment Process
 
Truth-in-Lending - RESPA: The New Rules
Truth-in-Lending - RESPA: The New RulesTruth-in-Lending - RESPA: The New Rules
Truth-in-Lending - RESPA: The New Rules
 
Focus on Fair Lending… Tips to Avoid the Traps!
Focus on Fair Lending… Tips to Avoid the Traps!Focus on Fair Lending… Tips to Avoid the Traps!
Focus on Fair Lending… Tips to Avoid the Traps!
 
CFPB
CFPBCFPB
CFPB
 
NCUA Board of Directors Policies
NCUA Board of Directors Policies NCUA Board of Directors Policies
NCUA Board of Directors Policies
 
TILA - RESPA An Overview
TILA - RESPA An Overview TILA - RESPA An Overview
TILA - RESPA An Overview
 

Kürzlich hochgeladen

ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaYash
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理Airst S
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理Fir La
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书F La
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 

Kürzlich hochgeladen (20)

ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
一比一原版(Essex毕业证书)埃塞克斯大学毕业证学位证书
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 

Cybersecurity Workshop

  • 1. February 10, 2015 Cybersecurity Workshop E. Andrew Keeney, Esq. Kaufman & Canoles, P.C.
  • 2. 2 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153 eakeeney@kaufcan.com http://www.kaufmanandcanoles.com/movies/credit-unions.html
  • 3. 3 Overview and Agenda • Value – What electronically stored data has value to thieves? – Why is cybersecurity critically important to credit unions? • Breaches − External vs. Internal Threats − Hackers/Employee error/Rogue Employee
  • 4. 4 Overview and Agenda – continued • Responses • Prevention • Insurance • Laws and regulations • Key takeaways/Best practices
  • 6. 6 Data Security Data & Cybersecurity: the practice of protecting data and systems from unwanted use. Data breach: security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.
  • 7. 7 Why only a general awareness? • Complacency seems to still be the norm. – There is a view that cybersecurity measures do not add to the bottom line; rather, it is a cost. – There is a dearth in knowledge among management-level individuals about actual, current risks. – There is a general misunderstanding of specific risks that are known. – Belief abounds that “it won’t happen to our business.”
  • 8. 8 “We’re in a day when a person can commit about 15,000 bank robberies sitting in their basement.” -Robert Anderson Executive Assistant Director of the FBI’s Criminal Cyber Response and Services Branch “You’re going to be hacked.” -Joseph Demarest Assistant Director of the FBI’s Criminal Cyber Response and Services Branch
  • 9. 9 Categories of Business Organizations • Those that will suffer a breach. • Those that have suffered a breach. • And those that will suffer a breach again. • No business organization is spared.
  • 10. 10 Source: CUNA Mutual Group and NetDiligence 2013 Cyber Liability & Data Breach Insurance Claims
  • 11. 11 Busy Year 2013 • 617 documented breaches – Average costs of these 317 breaches: • $5 dollars per customer notification multiplied by millions • $30 per card cancellation/related monitoring of credit PER customer • $2000 per hours in forensic examinations and data security analysis costs • $500,000 per breach in legal expenses • 1 million dollars per breach in corporate settlement costs – 1 million dollars per breach in regulatory fines or related expenses https://www.privacyrights.org/data-breach
  • 12. 12 2014 • Identity Theft Resource Center reports that between 2005 (when record keeping commenced) and October 14, 2014 there were 4,854 recorded breaches exposing 669,680,671 records. • Major data breaches are reported almost weekly – JP Morgan Chase; Target; Home Depot; eBay; Michaels; Neiman Marcus; Citibank; Sony, etc.
  • 13. 13 Data Breach Basics (cont’d) • If large-scale breaches are regularly reported, then the number of smaller-scale breaches necessarily must be larger. • Average cost to a company that suffers a breach now is approximately $200.00 per compromised record .
  • 14. 14 Data Breach Basics (cont’d) • Average cost of lost laptop containing personally identifiable information now has approached $50,000, with only 2% representing the actual cost of the device. • Forensic experts hired to identify, contain, and respond to data breaches easily cost 6- figures within the first two weeks of engagement.
  • 15. 15 Target Breach Expenses (does not include legal expenses) • Severance for CEO amounted to 15.9 million dollars alone • Regulatory fines 1 billion dollars – for negligence to the government • Fraudulent credit card charges – whopping 2.2 billion dollars – Was to be refunded by the company for losses from those 40 million card accounts – The retail chain suffered 440 million dollars in revenue losses fueling 2014 so far as a result of lowered consumer confidence from the hacks
  • 16. 16 Vulnerability of So-Called “Secure” Systems • Viruses, spyware, worms, or Trojans • Malware, including zero-day malware • Web-based attacks • Employee actions (both negligent and intentional) • phishing
  • 17. 17 Simple Data Loss • Lost or stolen devices – Smartphones with weak or no password protection – Laptops with weak or no password protection – Flash drives or other portable memory devices • Improper disposal of documents • Improper disposal of computers and other devices • Improper disposal of system components • Palm Springs Federal Credit Union
  • 18. 18 Financial Sector Threats • The number of incidents and level of sophistication has increased dramatically in recent years triggering active Cyber Division of the FBI to take larger active role. • Account Takeovers – Exploitation of online financial and market systems, such as Automated Clearing House systems, payment card transactions, and market trades.
  • 19. 19 Threats (cont’d) – Compromise typically is accomplished by accessing an authorized user’s weak account credentials. • Third-Party Payment Processor Breaches – Bad actors target these companies’ systems, because the volume of personally identifiable information and payment card information is massive, and because such information has immediate value on the black market.
  • 20. 20 Threats (cont’d) • Payment Card Skimming and Point of Sale Schemes – Steal card data to sell or create fake payment card – Obsolete operating systems for ATMs and POS machines is easily compromised
  • 21. 21 Threats (cont’d) • Mobile Banking Exploitation – Increased risks – Malware starting to show up • Man-in-the-middle attacks utilizing special malware sent via texts • More prevalent in Androids – Apple’s mobile payment system
  • 22. 22 Threats (cont’d) • Insider Access – Direct access to confidential information, data, and other insider information. • Supply Chain Infiltration/Vendor Management – Bad actors can gain physical and technical access to credit union by compromising trusted suppliers of technical, computer, and security equipment, software, and hardware.
  • 23. 23 Consequences of Inaction • Loss of goodwill • Reputation risk • Transactional costs associated with loss mitigation • Forensic expert fees • Civil liability exposure • Exposure to fines and other penalties
  • 24. 24 FFIEC Cybersecurity Assessment • Inherent risk – Connection types – Technologies used • Preparedness – Risk management and oversight – Collaboration and controls – Incident management
  • 25. 25 FS-ISAC • Financial Services Information Sharing and Analysis Center • Launched in 1999 as the global go-to resource for cyber threat • www.fsisac.com
  • 26. 26 Consumers • “Breach fatigue” • Complacency • Not likely to impact shopping habits • Credit unions should educate members and encourage monitoring of account
  • 28. 28 Risk Assessment/Prevention • Preventive measures • Including – Identifying foreseeable threats – Assess likelihood and danger of potential threats – Assess sufficiency of policies, procedures – Proper disposal of information
  • 29. 29 Loss Prevention • Employee Awareness Training • Patch Management • Encryption • Periodic Testing of Computer Security
  • 30. 30 Loss Prevention (cont’d) • Strengthen Account Credentials – Pass-phrases, rather than passwords – Combine various character types • Limit and restrict administrative access • Cybersecurity and Data Protection Policies and Procedures
  • 31. 31 Breach Response • Assess incident • Notify NCUA or state supervisory authority • Notify law enforcement – File Suspicious Activity Report (“SAR”), if applicable • Preservation of records and evidence • Member notification • 12 C.F.R. Parts 748 and 1016
  • 32. 32 Breach Response (cont’d) • Cybersecurity and Data Breach Response Plan • Upon notice of a potential data compromise, immediately contact a law firm with cybersecurity expertise. • Permit law firm to coordinate retention of forensic experts.
  • 33. 33 State Regulation • Only 3 states do not currently have a law requiring notification of security breaches • Minnesota and Washington have statutes that require a merchant to reimburse a financial institution for reissuance of cards under certain circumstances • NJ bill introduced this year requires reimbursement for costs incurred by financial institutions
  • 34. 34 Connecticut Consumer Security Breach Notification Any person who conducts business in this state, and who, in the ordinary course of such person’s business, owns, licenses or maintains computerized data that includes personal information, shall provide notice of any breach of security following the discovery of the breach to any resident of this state whose personal information was, or is reasonably believed to have been, accessed by an unauthorized person through such breach of security. Such notice shall be made without unreasonable delay, subject to the provisions of subsection (d) of this section and the completion of an investigation by such person to determine the nature and scope of the incident, to identify the individuals affected, or to restore the reasonable integrity of the data system. Such notification shall not be required if, after an appropriate investigation and consultation with relevant federal, state and local agencies responsible for law enforcement, the person reasonably determines that the breach will not likely result in harm to the individuals whose personal information has been acquired and accessed.
  • 35. 35 Connecticut Consumer Security Breach Notification Any person that maintains such person’s own security breach procedures as part of an information security policy for the treatment of personal information and otherwise complies with the timing requirements of this section, shall be deemed to be in compliance with the security breach notification requirements of this section, provided such person notifies, as applicable, residents of this state, owners and licensees in accordance with such person’s policies in the event of a breach of security and in the case of notice to a resident, such person also notifies the Attorney General not later than the time when notice is provided to the resident. Any person that maintains such a security breach procedure pursuant to the rules, regulations, procedures or guidelines established by the primary or functional regulator, as defined in 15 USC 6809(2), shall be deemed to be in compliance with the security breach notification requirements of this section, provided (1) such person notifies, as applicable, such residents of this state, owners, and licensees required to be notified under and in accordance with the policies or the rules, regulations, procedures or guidelines established by the primary or functional regulator in the event of a breach of security, and (2) if notice is given to a resident of this state in accordance with subdivision (1) of this subsection regarding a breach of security, such person also notifies the Attorney General not later than the time when notice is provided to the resident.
  • 36. 36 Federal Regulation • Tax Identity Theft Awareness Week: www.mycreditunion.gov/protect/Pages/taxidtheft.aspx • Prevent Identity Theft: www.mycreditunion.gov/protect/Pages/Prevent-Identity- Theft.aspx • Frauds and Scams: www.mycreditunion.gov/protect/fraud/Pages/default.aspx • Cybersecurity Awareness: www.ffiec.gov/cybersecurity.htm • NCUA Consumer Report: Frauds, Scams and Cyberthreats - Part I: http://youtu.be/3Zlfy7_97Vc • NCUA Consumer Report: Frauds, Scams and Cyberthreats - Part II: http://youtu.be/5XfyfRgxsLE
  • 38. 38 Insurance “The vast majority of credit unions in the U.S. don’t have adequate insurance coverage in the event of another online data breach.” -Credit Union Journal, November 10, 2014
  • 39. 39 What Can You Do? • Is your data security adequate? • What does your insurance cover? • What insurance is available for credit unions that may experience data breach exposure?
  • 40. 40 Cyber Insurance • Approximately 50 companies in the U.S. offer cybersecurity insurance • $2 billion is expected to be spent in the United States in 2014 on cyber insurance – 67% increase from 2013 – In 2010 cyber insurance premiums totaled $600,000 • Notifying affected customers of a credit card breach can cost up to $500,000
  • 41. 41 Cyber Insurance – continued • $166,000 – average cost of a breach to credit unions – according to CUNA Mutual • CUNA Mutual’s cybersecurity policy includes access to: – Resources to help credit unions manage risks – Insurance protection – Breach recovery services
  • 42. 42 • Employee Awareness Training • Patch Management • Encryption • Periodic Testing of Computer Security • Policies and Procedures • Proactive and quick response • Review current insurance coverage
  • 43. 43 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153 eakeeney@kaufcan.com http://www.kaufmanandcanoles.com/movies/credit-unions.html
  • 44. February 10, 2015 Cybersecurity Workshop E. Andrew Keeney, Esq. Kaufman & Canoles, P.C.