SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Overcoming Hidden Risks in a Shared
Security Model
Agenda
• Introduction
• Compliance and Security Landscape
• Evolution to a 3rd Party Ecosystem
• Data Risks and Challenges
• Deep Dive Into Shared Responsibilities
• Best Practices
• Q&A
Speakers
Chad Kissinger
Founder
OnRamp
OnRamp is a leading HITRUST-certified data center
services company that guides businesses through
the complexities of data security and compliance.
Our solutions help organizations in healthcare,
financial services and education services meet
compliance standards.
OnRamp operates multiple enterprise-class
SSAE16/AICPA SOC 2 Type 2 and SOC 3 data
centers, where we deploy hybrid computing
solutions that enable our customers to blend
secure cloud computing, managed hosting, and
colocation service to best meet their unique
requirements. Our team’s consultative approach
helps you develop the right mix of solutions to
free your resources to focus on agility and
differentiation in your industry.
Speakers
Maria Horton
CEO
EmeSec
EmeSec uses cybersecurity and privacy practices to
build competitive advantage in today’s connected
world for clients.
Our intuitive, adaptive and game-changing
solutions are designed to help organizations
protect their reputation and growth engines while
harnessing the power of security and automated
technologies. The company is an accredited Third
Party Assessor (3PAO) under the Federal Risk and
Authorization Management Program (FedRAMP).
EmeSec Incorporated is a Woman-Owned Service
Disabled Veteran Owned Small Business (SDVOSB),
founded in 2003. EmeSec holds certifications in ISO
9001:2015, ISO 20000-1:2011, ISO/IEC 27001:2013,
ISO/IEC 17020:2012.
Speakers
Michael Casey
Managing Director & Chief
Payments Officer
EPMG Advisors
EPMG Advisors was founded in 2008 with
the purpose of providing clients the best
payments management and advisory
services with boutique customer care. Our
firm is driven to provide our clients with the
understanding and ability to build and
maintain a truly transparent payments
environment.
Whether your objective is to identify new
opportunities for growth or to maximize
profits from existing operations, EPMG
Payment Advisors can deliver the
enterprise-wide solutions you require.
Current Landscape
Ponemon Institute, Cost of Data Breach Study: 2017 Global Analysis
https://healthitsecurity.com/news/mobile-security-at-center-of-2.5m-ocr-hipaa-settlement
The average consolidated cost of a data
breach reached $3.62 million in 2017
50%
$4M
2017
The risk of non-compliance is
significant. Ignorance is not
excused.
Pennsylvania-based
CardioNet agreed to a $2.5 million
OCR HIPAA settlement stemming
from improper safeguards of PII
data.
50% of organizations don’t know who has access to their data, how
they’re using it, or what safeguards are in place to mitigate a security
incident.
Multi-Vendor
Management
Agility and
Responsiveness
Retaining Talent
Patient or
Customer
Engagement
Team Skillsets
Cybersecurity
Managing
Budgets
Evolution to 3rd Party Ecosystem
Ability to Innovate &
Differentiate
Leadership offloads
their IT infrastructure
and computing
needs in order to:
• Increase
Operational
Efficiency
• Rely on Subject
Matter Experts
• Gain a
Competitive
Advantage
• Reduce Costs
C-LEVEL RESPONSIBILITIES
Compliance regulations are written as though
one party is responsible for compliance and
security.
Regulators Leadership Talent
Providers/
Suppliers
THE PLAYERS
Where is the Breakdown?
Data Risks and Top Challenges with Shared
Responsibilities
• Confusing Guidance
• Insufficient Policies and Processes
• Unclear Roles and Responsibilities
• No Accountability
• Lack of Due Diligence (Choosing &
Monitoring 3rd Parties)
• Insufficient Technology
THE FUMBLES
Guidance is Not Prescriptive
www.hhs.gov;
https://www.pcicomplianceguide.org/faq/http
s://www2.ed.gov/
NIST publications
(800-145, 800-66,
800-52); FIPS 140-2
Office for Civil Rights
(OCR)
HIPAA
FISMA
Cloud Council
Security Rule
Breach Notification Rule
PCI Data Security
Standards (DSS)
U.S. Department of
Education- FERPA (20
U.S.C. § 1232g; 34 CFR
Part 99)
The Privacy Act
FedRAMP
THE PLAYBOOK: GOVERNING BODIES AND FRAMEWORKS
Guidance is vague and up
for interpretation.
(i.e. "reasonable and
appropriate ” measures
for HIPAA
Certain regulations do not
require or recognize
audits or certifications.
(i.e. FERPA)
Establishing the Right Policies and Processes
• Aren’t able to determine the number of
3rd parties with access to confidential
information.
• Lack of confidence in third parties’ data
safeguards, security policies and
procedures.
• Rarely conduct reviews of vendor
management policies and procedures to
ensure they address 3rd party data risk.
• Rely on contractual agreements instead
of audits and assessments to evaluate
the security and privacy practices of
their vendors.
Standard Policies
• Information Classification
Policy
• Risk Management Policy
• Information Systems
Security Policy
• Ongoing Management
• Clearly Defined Roles
Symptoms
Why Are Companies Unable to Determine Who Has
Access to Their Data?
• No accountability
for 3rd party risk
management
• No one
department or
function owns this
responsibility
• Not a priority
• Lack of resources
to track third
parties
• Complexity in
vendor
relationships
• Frequent turnover
in partners
Ponemon Institute, Data Risk in the Third Party Ecosystem
Roles, Responsibility, & Accountability
Senior leadership and boards of directors are rarely involved
in third-party risk management.
36%
of CEOs play a key role
in security &
compliance strategy
79%
Of CEOs cited over-
regulation as a top
threat to their
organizations’ growth.
PWC State of Compliance 2016
Only 16% of respondents indicated that they view their CEO as the compliance and
champion at their organizations.
Roles, Responsibility, & Accountability
INTERNAL – SHARED ACROSS DEPARTMENTS
Shared Responsibility Varies by Model
Responsibility Colocation IaaS PaaS SaaS
Data
Classification
End-point
Protection
Identity &
Access
Management
Application
Controls
Network
Controls
Infrastructure
Physical Security
Customer
Customer
Customer
Customer
Provider Provider
Provider
Customer Customer Customer
Customer Customer Customer Both Parties
Both Parties
Both Parties
Both Parties
Customer
Customer
Both Parties
Provider Provider
Both Parties
Provider
Provider
Provider
Both Parties
Provider
Accountability and Ownership
Organizations admit they are sharing sensitive data with third
parties that might have poor security policies.
Ponemon Institute, Data Risk in the Third Party Ecosystem
Figure 2: Perceptions about vendors’ security policies and procedures
Beware of These 3rd Party Risk Indicators
• Turnover of the vendor’s key personnel
• IT glitches, operational failures and
stoppages
• Outdated IT systems and equipment
• History of frequent data breach
incidents
• Legal actions against the vendor
• Poorly written security and privacy
policies and procedures
Case Studies
• Target breach due to HVAC vendor hack. Ultimately, two-
factor authentication and anti-malware would have mitigated
the breach.
• Hackers breach Equifax’s portal, stealing W-2 data. Only a PIN
code was used to protect sensitive data.
• Uber pays hackers $100,000 to hide year-old breach of 57
million users. Hackers accessed Github.com, a third-party
cloud storage website used by Uber software engineers.
Employee training could have prevented passwords from
being published on a public forum.
ZDN
Forbes.com
USA today.com
Best Practices: Risk Management Life Cycle
DUE
DILLIGENCE
CONTRACT
ONGOING
MONITORING
TERMINATION
PLANNING
OVERSIGHT AND ACCOUNTABILITY
Best Practices: Technology, People, Processes
Technology
• Data encryption in transit and at rest
• Firewalls
• Multi-factor authentication
• Cloud encryption
• Audit logs showing access to data
• Vulnerability scanning, intrusion
detection/prevention
• Hardware and OS patching
• Security Audits
• Contingency Planning
People & Processes
• Audit operational and business
processes
• Audit access management
• Enforce privacy policies
• Ensure cloud networks and connections
are secure
• Evaluate security controls: physical
infrastructure and facilities
• Data decommissioning process
• Be prepared for incidents
1 -Risk
Assessment
3-Vendor Security
Alignment
2 –Assign
Owners
Best Practices: Choosing a Vendor
Understands Your
Business Goals
Credentials &
Certifications
Service Level
Agreements (SLAs)
& Business Associate
Agreements (BAAs)
Security
Availability &
Scalability
Expertise in Your
Industry
Questions?
Thank you! Contact Us:
Sales@onr.com 888.667.2660 www.onr.com

Weitere ähnliche Inhalte

Was ist angesagt?

Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security ManagementEC-Council
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threatzhihaochen
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overviewelvinchan
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardSecurityScorecard
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data SecurityImperva
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk ManagementDeepak Bansal, CPA CISSP
 
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...Proofpoint
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy QuizDruva
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesTony Moroney
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes ObserveIT
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017EQS Group
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 

Was ist angesagt? (20)

Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
Forrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the StandardForrester Webinar: Security Ratings Set the Standard
Forrester Webinar: Security Ratings Set the Standard
 
The Business Case for Data Security
The Business Case for Data SecurityThe Business Case for Data Security
The Business Case for Data Security
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
 
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 
Task 3
Task 3Task 3
Task 3
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Cybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best PracticesCybersecurity Preparedness Trends and Best Practices
Cybersecurity Preparedness Trends and Best Practices
 
Symantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global ResultsSymantec 2011 Encryption Flash Poll Global Results
Symantec 2011 Encryption Flash Poll Global Results
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017M&A security - E-crime Congress 2017
M&A security - E-crime Congress 2017
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 

Ähnlich wie Overcoming Hidden Risks in a Shared Security Model

Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Digital Ethical Risk Assessment
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk AssessmentMarc St-Pierre
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientAccenture Operations
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015CBIZ, Inc.
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersBroadridge
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Item46763
Item46763Item46763
Item46763madunix
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businessesbasilmph
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 

Ähnlich wie Overcoming Hidden Risks in a Shared Security Model (20)

Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Digital Ethical Risk Assessment
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk Assessment
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
 
Internal Audit
Internal AuditInternal Audit
Internal Audit
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Item46763
Item46763Item46763
Item46763
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Asset Security
Asset Security Asset Security
Asset Security
 
Choosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for BusinessesChoosing the Right Cybersecurity Services: A Guide for Businesses
Choosing the Right Cybersecurity Services: A Guide for Businesses
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 

Mehr von OnRamp

Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)OnRamp
 
Transform Your Business with Supply Chain AI and a Modern Infrastructure
Transform Your Business with Supply Chain AI and a Modern InfrastructureTransform Your Business with Supply Chain AI and a Modern Infrastructure
Transform Your Business with Supply Chain AI and a Modern InfrastructureOnRamp
 
Insider Secrets to Oracle License Management
Insider Secrets to Oracle License ManagementInsider Secrets to Oracle License Management
Insider Secrets to Oracle License ManagementOnRamp
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations OnRamp
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 

Mehr von OnRamp (6)

Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Transform Your Business with Supply Chain AI and a Modern Infrastructure
Transform Your Business with Supply Chain AI and a Modern InfrastructureTransform Your Business with Supply Chain AI and a Modern Infrastructure
Transform Your Business with Supply Chain AI and a Modern Infrastructure
 
Insider Secrets to Oracle License Management
Insider Secrets to Oracle License ManagementInsider Secrets to Oracle License Management
Insider Secrets to Oracle License Management
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations HIPAA eBOOK: Avoid Common HIPAA Violations
HIPAA eBOOK: Avoid Common HIPAA Violations
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 

Kürzlich hochgeladen

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Kürzlich hochgeladen (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Overcoming Hidden Risks in a Shared Security Model

  • 1. Overcoming Hidden Risks in a Shared Security Model
  • 2. Agenda • Introduction • Compliance and Security Landscape • Evolution to a 3rd Party Ecosystem • Data Risks and Challenges • Deep Dive Into Shared Responsibilities • Best Practices • Q&A
  • 3. Speakers Chad Kissinger Founder OnRamp OnRamp is a leading HITRUST-certified data center services company that guides businesses through the complexities of data security and compliance. Our solutions help organizations in healthcare, financial services and education services meet compliance standards. OnRamp operates multiple enterprise-class SSAE16/AICPA SOC 2 Type 2 and SOC 3 data centers, where we deploy hybrid computing solutions that enable our customers to blend secure cloud computing, managed hosting, and colocation service to best meet their unique requirements. Our team’s consultative approach helps you develop the right mix of solutions to free your resources to focus on agility and differentiation in your industry.
  • 4. Speakers Maria Horton CEO EmeSec EmeSec uses cybersecurity and privacy practices to build competitive advantage in today’s connected world for clients. Our intuitive, adaptive and game-changing solutions are designed to help organizations protect their reputation and growth engines while harnessing the power of security and automated technologies. The company is an accredited Third Party Assessor (3PAO) under the Federal Risk and Authorization Management Program (FedRAMP). EmeSec Incorporated is a Woman-Owned Service Disabled Veteran Owned Small Business (SDVOSB), founded in 2003. EmeSec holds certifications in ISO 9001:2015, ISO 20000-1:2011, ISO/IEC 27001:2013, ISO/IEC 17020:2012.
  • 5. Speakers Michael Casey Managing Director & Chief Payments Officer EPMG Advisors EPMG Advisors was founded in 2008 with the purpose of providing clients the best payments management and advisory services with boutique customer care. Our firm is driven to provide our clients with the understanding and ability to build and maintain a truly transparent payments environment. Whether your objective is to identify new opportunities for growth or to maximize profits from existing operations, EPMG Payment Advisors can deliver the enterprise-wide solutions you require.
  • 6. Current Landscape Ponemon Institute, Cost of Data Breach Study: 2017 Global Analysis https://healthitsecurity.com/news/mobile-security-at-center-of-2.5m-ocr-hipaa-settlement The average consolidated cost of a data breach reached $3.62 million in 2017 50% $4M 2017 The risk of non-compliance is significant. Ignorance is not excused. Pennsylvania-based CardioNet agreed to a $2.5 million OCR HIPAA settlement stemming from improper safeguards of PII data. 50% of organizations don’t know who has access to their data, how they’re using it, or what safeguards are in place to mitigate a security incident.
  • 7. Multi-Vendor Management Agility and Responsiveness Retaining Talent Patient or Customer Engagement Team Skillsets Cybersecurity Managing Budgets Evolution to 3rd Party Ecosystem Ability to Innovate & Differentiate Leadership offloads their IT infrastructure and computing needs in order to: • Increase Operational Efficiency • Rely on Subject Matter Experts • Gain a Competitive Advantage • Reduce Costs C-LEVEL RESPONSIBILITIES
  • 8. Compliance regulations are written as though one party is responsible for compliance and security. Regulators Leadership Talent Providers/ Suppliers THE PLAYERS Where is the Breakdown?
  • 9. Data Risks and Top Challenges with Shared Responsibilities • Confusing Guidance • Insufficient Policies and Processes • Unclear Roles and Responsibilities • No Accountability • Lack of Due Diligence (Choosing & Monitoring 3rd Parties) • Insufficient Technology THE FUMBLES
  • 10. Guidance is Not Prescriptive www.hhs.gov; https://www.pcicomplianceguide.org/faq/http s://www2.ed.gov/ NIST publications (800-145, 800-66, 800-52); FIPS 140-2 Office for Civil Rights (OCR) HIPAA FISMA Cloud Council Security Rule Breach Notification Rule PCI Data Security Standards (DSS) U.S. Department of Education- FERPA (20 U.S.C. § 1232g; 34 CFR Part 99) The Privacy Act FedRAMP THE PLAYBOOK: GOVERNING BODIES AND FRAMEWORKS Guidance is vague and up for interpretation. (i.e. "reasonable and appropriate ” measures for HIPAA Certain regulations do not require or recognize audits or certifications. (i.e. FERPA)
  • 11. Establishing the Right Policies and Processes • Aren’t able to determine the number of 3rd parties with access to confidential information. • Lack of confidence in third parties’ data safeguards, security policies and procedures. • Rarely conduct reviews of vendor management policies and procedures to ensure they address 3rd party data risk. • Rely on contractual agreements instead of audits and assessments to evaluate the security and privacy practices of their vendors. Standard Policies • Information Classification Policy • Risk Management Policy • Information Systems Security Policy • Ongoing Management • Clearly Defined Roles Symptoms
  • 12. Why Are Companies Unable to Determine Who Has Access to Their Data? • No accountability for 3rd party risk management • No one department or function owns this responsibility • Not a priority • Lack of resources to track third parties • Complexity in vendor relationships • Frequent turnover in partners Ponemon Institute, Data Risk in the Third Party Ecosystem
  • 13. Roles, Responsibility, & Accountability Senior leadership and boards of directors are rarely involved in third-party risk management. 36% of CEOs play a key role in security & compliance strategy 79% Of CEOs cited over- regulation as a top threat to their organizations’ growth. PWC State of Compliance 2016 Only 16% of respondents indicated that they view their CEO as the compliance and champion at their organizations.
  • 14. Roles, Responsibility, & Accountability INTERNAL – SHARED ACROSS DEPARTMENTS
  • 15. Shared Responsibility Varies by Model Responsibility Colocation IaaS PaaS SaaS Data Classification End-point Protection Identity & Access Management Application Controls Network Controls Infrastructure Physical Security Customer Customer Customer Customer Provider Provider Provider Customer Customer Customer Customer Customer Customer Both Parties Both Parties Both Parties Both Parties Customer Customer Both Parties Provider Provider Both Parties Provider Provider Provider Both Parties Provider
  • 16. Accountability and Ownership Organizations admit they are sharing sensitive data with third parties that might have poor security policies. Ponemon Institute, Data Risk in the Third Party Ecosystem Figure 2: Perceptions about vendors’ security policies and procedures
  • 17. Beware of These 3rd Party Risk Indicators • Turnover of the vendor’s key personnel • IT glitches, operational failures and stoppages • Outdated IT systems and equipment • History of frequent data breach incidents • Legal actions against the vendor • Poorly written security and privacy policies and procedures
  • 18. Case Studies • Target breach due to HVAC vendor hack. Ultimately, two- factor authentication and anti-malware would have mitigated the breach. • Hackers breach Equifax’s portal, stealing W-2 data. Only a PIN code was used to protect sensitive data. • Uber pays hackers $100,000 to hide year-old breach of 57 million users. Hackers accessed Github.com, a third-party cloud storage website used by Uber software engineers. Employee training could have prevented passwords from being published on a public forum. ZDN Forbes.com USA today.com
  • 19. Best Practices: Risk Management Life Cycle DUE DILLIGENCE CONTRACT ONGOING MONITORING TERMINATION PLANNING OVERSIGHT AND ACCOUNTABILITY
  • 20. Best Practices: Technology, People, Processes Technology • Data encryption in transit and at rest • Firewalls • Multi-factor authentication • Cloud encryption • Audit logs showing access to data • Vulnerability scanning, intrusion detection/prevention • Hardware and OS patching • Security Audits • Contingency Planning People & Processes • Audit operational and business processes • Audit access management • Enforce privacy policies • Ensure cloud networks and connections are secure • Evaluate security controls: physical infrastructure and facilities • Data decommissioning process • Be prepared for incidents 1 -Risk Assessment 3-Vendor Security Alignment 2 –Assign Owners
  • 21. Best Practices: Choosing a Vendor Understands Your Business Goals Credentials & Certifications Service Level Agreements (SLAs) & Business Associate Agreements (BAAs) Security Availability & Scalability Expertise in Your Industry
  • 23. Thank you! Contact Us: Sales@onr.com 888.667.2660 www.onr.com

Hinweis der Redaktion

  1. Chad Provide insights into risk management governance. What are the obstacles? Budget, resources, knowledge, etc.   Maria Discuss differences and similarities in the landscape among the industries you serve. Discuss top threat sources.     Michael Discuss the cost of compliance versus non-compliance. Remaining non-compliant is not an option. Organizations are on the hook for ongoing penalties until they become compliant. Penalties are not openly discussed nor widely publicized, but they can be catastrophic to a small business.  
  2. Chad Discuss the evolution to a third party ecosystem and how it’s only one of the many challenges executives face. Compliance and security is not their core business.   Third parties are not limited to outsourcing alone, though. Third parties can also be your suppliers. Think about a large global organization with a massive supply chain could have thousands of supplier relationships with digital entities.
  3. Chad Compliance regulations are written as though there’s one party responsible, even though there are a number of participants.   Football analogy: it’s like creating a play for one player when there are multiple players, and multiple teams.
  4. Maria  Discuss challenges at a high level.   Continuing the football analogy: It’s as if your coach isn’t tell you what position you’re playing during the game or evaluating post-game recaps to continue to improve your performance. You weren’t given a helmet and have no clue what plays you’re running.  
  5. Maria Discuss the limitations of compliance frameworks. Highlight the fact that they are not prescriptive, but instead are up for interpretation. Discuss regulations that offer certification by a third-party auditor, versus others do not have a formalized way to prove compliance.   Michael Discuss PCI DSS requirements and which ones require shared responsibilities with vendors and partners. Discuss Common misconceptions of the requirements.  
  6. Michael   Internal policies and processes are PREREQUISTES to bringing in a 3rd party – you must have those in order prior to adding complexity of external parties. When your organization doesn’t have a baseline of standards, you open your organization up to vulnerabilities. If you suspect you don’t have the right policies and procedures in place, chances are you are right – and you won’t have control or confidence over your security internally or exchanging data with providers. You must not only develop policies and processes, but also enforce them. (1st and last symptom) who has access to their information and that they rely on contractual agreements for peace of mind. Highlight the fact that organizations are unable to determine
  7. Michael
  8. Maria Discuss the stats from the State of Compliance 2016 report.   Most boards and executives perceive compliance and security to be important to their organization’s growth and well-being, but the majority of them are not involved. They do not play a key role in the strategy or execution of the plans that maintain risk management. This disconnect impacts employee perception of senior leadership’s role in their organizations’ compliance programs, as only 16% of respondents indicated their employees view the CEO as the compliance and ethics champion at their organizations.    
  9. Maria Discuss who is responsible for what across departments. Operations, Security, Compliance, and IT take the lead on strategy, information custodians (i.e. Database Administrator) control access to the data, and information owners can be in any department. Everyone plays a part in reducing vulnerabilities, reporting possible security incidents, etc.    
  10. Chad Discuss how security is different across different types of infrastructures. Some responsibilities are shared, while others are clearly one or the other party. Include examples of differences in physical vs virtualized environment security.
  11. Chad   Organizations admin they are sharing sensitive data with vendors and supplies that have poor security, but they also aren’t doing anything about it. In Ponemon’s 2017 Data Risk Survey, 58% of organizations stated that it’s not possible to determine if their 3rd parties have sufficient safeguards.   Only 1/3 of organizations perform frequent review of vendor management policies to make sure they address the changing landscape. And about 38% of organizations have no tracking methods regarding their risk management program internally or externally.
  12. Michael   Discuss the warning signs of a 3rd party that is struggling with their own security measures, and will likely put you at risk, too. It’s not impossible to determine like some organizations indicate across studies.
  13. Michael   Target breach due to HVAC vendor hack: HVAC vendor did not use appropriate anti-malware software or two-factor authentication for contractors, leaving a backdoor open to Target’s network. Hackers breach Equifax’s portal, stealing W-2 data: The trouble stemmed from TALX, an Equifax subsidiary that provides online payroll, HR and tax services. Hackers were able to reset the 4-digit PIN given to customer employees as a password and then steal W-2 tax data after successfully answering personal questions about those employees. The PIN was the only security measure put in place. Uber pays hackers $100,000 to hide year-old breach of 57 million users. Hackers accessed Github.com, a third-party cloud storage website used by Uber software engineers. Employee training could have prevented passwords from being on a public forum.   Sources: http://www.zdnet.com/article/anatomy-of-the-target-data-breach-missed-opportunities-and-lessons-learned/ https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/thomasbrewster/2017/09/08/equifax-data-breach- history/&refURL=https://www.google.com/&referrer=https://www.google.com/ https://www.usatoday.com/story/tech/2017/11/21/uber-kept-mum-year-hack-info-57-million-riders-and-drivers/887002001/
  14. Maria Discuss the risk management lifecycle. Review the lifecycle and draw particular attention to documentation and audit-prep, as it’s not enough to be compliant and secure—you must have proof of your efforts: Documentation To address the risk, companies should have an inventory of all third-party vendors. In your contracts with 3rd party vendors, make sure you address how our information is being access and processed, including with whom you have no direct relationship – aka a 4th party. Audits ‘Weakest Link’ Attack Methodology’: An attacker does not want to spend a great deal of time looking for a way into a target network. The objective is to obtain entry, gather valuables, and abscond in a minimal timeframe To address the risk, companies should have an inventory of all third-party vendors. In your contracts with 3rd party vendors, make sure you address how our information is being access and processed, including with whom you have no direct relationship – aka 4th party  
  15. Chad Develop a strong compliance and security posture within your organization (policies, processes, technology). Discuss the ideal strategy and highlight a few of the most important aspects.
  16. Chad