SlideShare une entreprise Scribd logo
1  sur  11
GUN SHOTS –
the need for a
comprehensive breach
plan.
Ahmore Burger-Smidt
A LEGAL OBLIGATION
> The Regulator (who has not yet been established) must be
informed of the breach
> The data subject must be informed of the breach
> The notification must be in writing (plain English) and can be
transmitted to the data subject by way of post (to the last known
postal or physical address), email, placed on the responsible party's
website, published in the news media or as may be directed by the
Regulator
> The notification must provide a description of the possible
consequences of the breach, the measures taken or to be taken to
by the company to address the breach; advice on what the data
subject could do to limit mitigate the possible adverse effects of the
security compromise and the identity of the person responsible for
breach, if known to the company
> The Regulator may direct the company to publicise details about
the data security compromise - if it will protect a data subject who
may be effected by the compromise.
2
3
LEARN FROM HISTORY
• Zurich UK, outsourced the processing of its
data to Zurich South Africa
• In 2008, a tape containing customer data
was lost while being transported from the
data storage facility by a third party
• Zurich UK did not know that the data had
been lost until the loss was recorded in the
Zurich Group's annual data privacy report a
year later
• Regulator found that Zurich's management
and reporting lines were unclear and that the
Group's polices for security incidents were
not always consistent
4
WHERE MIGHT IT BE COMING FROM
37%
35%
29%
 Malicious or criminal attack
 System glitch
 Human factor
Source
2013 Cost of Data Breach Study: Global Analysis
DETERMINE THE RISK
NO ONE SIZE FITS ALL!
> Threat modelling -
> Asset-focused approach: In an asset-focused approach, an
organisation focuses on its information assets and how they
might be vulnerable to information security threats. This
approach asks: "How do we protect this resource?"
> Attacker-focused approach: In an attacker-focused approach, an
organisation focuses on how attackers might try to access an
organisation's information technology ("IT") systems and
resources. This approach asks: "How will an attacker try and
harm this resource?"
> Design-focused approach: In a design-focused approach, an
organisation focuses on the design of an organisation's IT
systems and resources. This approach asks: "How can the
system be designed to resist attacks?"
5
PLANNING!
> Look at the risk of disasters and the business impacts of
each
> Design preventative and reactive controls
> When disasters strike, confidential, secret, personally
identifiable, or sensitive data may be exposed, and business
continuity plans must take into account how to protect
> Information
> Reputation
> Assets
6
IT IS IMPORTANT TO UNDERSTAND
7
Time
Goal
Actions driven
by strategy
Where are
we now?
Mission: how do we
mitigate exposure?
Values: What are our
enduring principles
and beliefs?
Vision: Where do we
want to be?
Strategy: How do we
get there?
BREACH REPORTING
There are three main approaches to breach reporting, each requiring a different protocol-
> Breaks from policy or established routine
> Such events are the lowest form of beach and may or may not present a security risk.
Leaders should note them and take appropriate action – empower and report
> Detected breaches
> Any incident involving unauthorised access to information systems containing sensitive
data, or any other breach of security protocols, must be reported and action taken
depending on circumstances – have breach notification obligations been triggered.
> Potential vulnerabilities or undetected breaches of system security
> An undetectable breach is one that, if it had occurred in the past, would not have been
detected. So-called-zero-day vulnerabilities are typical in that while the vulnerability has
existed for some time, it has only recently become known to the organisation
> All such vulnerabilities require immediate investigation regardless of whether any actual
breach has been detected.
8
BREACH PLAN
9
Several key activities must be incorporated into the breach plan
Procedures for declaration of an emergency Predefined roles and responsibilities
Call lists and
escalation criteria
Communications
plan, including with
external emergency
personnel
Scenario creation
for the impact of
each type of failure
and disaster
Priority order for recovering
each information resource
based on scenarios
Design, implementation, and
testing of failover and redundancy
in hardware, software and
networking capabilities
Training of all
involved parties
Reassessing on a
regular basis to
analyse new risk
THE WAY FORWARD
> When a breach has occurred, the company should –
> openly and timeously communicate with the customers
> stating the nature of the breach
> what information has been stolen and what the customer can do to
ensure that they are not victims of identity theft e.g. the 1 free
annual credit check that all customers are entitled to in terms of the
National Credit Act
> Tell the story - what the company is doing to prevent future data
breaches e.g. improving physical security if computers have been
stolen or improving the quality of security software
> Establish a comprehensive breach plan and ensure that all
employees know what to do in the event of a breach!
> Security breaches must be planned for
10
THANK
YOU
Legal notice: Nothing in this presentation should be construed as
formal legal advice from any lawyer or this firm. Readers are
advised to consult professional legal advisors for guidance on
legislation which may affect their businesses.
© 2014 Werksmans Incorporated trading as Werksmans Attorneys.
All rights reserved.

Contenu connexe

Tendances

Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)CSNP
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsShawn Tuma
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkIGF Indonesia
 
New York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsNew York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsBrunswick Group
 
Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Pinzhang Chen 陈品璋
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewSam Bowne
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsJon Bosco
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningKeyaan Williams
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWithum
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0stevemeltzer
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBsMary Brophy
 

Tendances (20)

Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)Brian Sanders - Business Electronic Compromise (BEC)
Brian Sanders - Business Electronic Compromise (BEC)
 
New York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity RegulationsNew York Department of Financial Services Cybersecurity Regulations
New York Department of Financial Services Cybersecurity Regulations
 
IQ4 Final Presentation (1)
IQ4 Final Presentation  (1)IQ4 Final Presentation  (1)
IQ4 Final Presentation (1)
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
 
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber SurveyKristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
 
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security FrameworkID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
ID IGF 2016 - Infrastruktur 3 - Towards National Cyber Security Framework
 
New York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsNew York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulations
 
Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019Ey Asia-Pacific Cyber Case Competition 2019
Ey Asia-Pacific Cyber Case Competition 2019
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
NYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity RegulationsNYS DFS CyberSecurity Regulations
NYS DFS CyberSecurity Regulations
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for NonprofitsWebinar: Understanding the Cyber Threat Landscape for Nonprofits
Webinar: Understanding the Cyber Threat Landscape for Nonprofits
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0Massachusetts data privacy rules v6.0
Massachusetts data privacy rules v6.0
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 

Similaire à Comprehensive breach plan needed for data security

Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdfRiyaSonawane
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitKevin Duffey
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackMekhi Da ‘Quay Daniels
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1stevemeltzer
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Huntsman Security
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 

Similaire à Comprehensive breach plan needed for data security (20)

Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Cissp notes
Cissp notesCissp notes
Cissp notes
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf
 
Cyber Recovery - Legal Toolkit
Cyber Recovery - Legal ToolkitCyber Recovery - Legal Toolkit
Cyber Recovery - Legal Toolkit
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 

Plus de Werksmans Attorneys

Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar Werksmans Attorneys
 
Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector Werksmans Attorneys
 
Recent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris StevensRecent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris StevensWerksmans Attorneys
 
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...Werksmans Attorneys
 
Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)Werksmans Attorneys
 
Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...Werksmans Attorneys
 
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...Werksmans Attorneys
 
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:Werksmans Attorneys
 
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD Werksmans Attorneys
 
The Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-DaviesThe Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-DaviesWerksmans Attorneys
 
The Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia VatalidisThe Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia VatalidisWerksmans Attorneys
 
Controlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SCControlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SCWerksmans Attorneys
 
BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014Werksmans Attorneys
 
VSquXred Business Rescue presentation
VSquXred Business Rescue presentation VSquXred Business Rescue presentation
VSquXred Business Rescue presentation Werksmans Attorneys
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Werksmans Attorneys
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Werksmans Attorneys
 
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-SmidtHealthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-SmidtWerksmans Attorneys
 

Plus de Werksmans Attorneys (20)

Labour employment seminar 2016
Labour  employment seminar 2016Labour  employment seminar 2016
Labour employment seminar 2016
 
Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar Reaching the summit - addressing the land question seminar
Reaching the summit - addressing the land question seminar
 
Collusive tendering
Collusive tenderingCollusive tendering
Collusive tendering
 
Jbcc - out with the old
Jbcc - out with the oldJbcc - out with the old
Jbcc - out with the old
 
Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector Developing sexuality and sexual health policies in the disability sector
Developing sexuality and sexual health policies in the disability sector
 
Recent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris StevensRecent developments in mining legislation and case law: Director Chris Stevens
Recent developments in mining legislation and case law: Director Chris Stevens
 
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
Business rescue: Saving distressed companies (Director Eric Levenstein and Se...
 
Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)Business rescue in mining: Peter van den Steen (VSquared)
Business rescue in mining: Peter van den Steen (VSquared)
 
Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...Environmental regulation of prospecting, exploration, mining and production: ...
Environmental regulation of prospecting, exploration, mining and production: ...
 
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
CONSTRUCTION AND ENGINEERING LAW: THE INTERPRETATION AND APPLICATION OF DEMAN...
 
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
TYPES OF CONSTRUCTION AND ENGINEERING GUARANTEES:
 
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
WHEN GOOD CONSTRUCTION CONTRACTS GO BAD
 
The Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-DaviesThe Future of Section 197 in South Africa: Bradley Workman-Davies
The Future of Section 197 in South Africa: Bradley Workman-Davies
 
The Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia VatalidisThe Employment Equity Amendment Act: Anastasia Vatalidis
The Employment Equity Amendment Act: Anastasia Vatalidis
 
Controlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SCControlling Strike Violence: Advocate Anton Myburgh SC
Controlling Strike Violence: Advocate Anton Myburgh SC
 
BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014BBBEE Presentation Cape Town Seminar 29 August 2014
BBBEE Presentation Cape Town Seminar 29 August 2014
 
VSquXred Business Rescue presentation
VSquXred Business Rescue presentation VSquXred Business Rescue presentation
VSquXred Business Rescue presentation
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...
 
Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...Foreign & local investment opportunities in South Africa offered by the busin...
Foreign & local investment opportunities in South Africa offered by the busin...
 
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-SmidtHealthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
Healthcare and the Consumer Protection Act 68 of 2008 - Ahmore Burger-Smidt
 

Dernier

citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 

Dernier (20)

citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 

Comprehensive breach plan needed for data security

  • 1. GUN SHOTS – the need for a comprehensive breach plan. Ahmore Burger-Smidt
  • 2. A LEGAL OBLIGATION > The Regulator (who has not yet been established) must be informed of the breach > The data subject must be informed of the breach > The notification must be in writing (plain English) and can be transmitted to the data subject by way of post (to the last known postal or physical address), email, placed on the responsible party's website, published in the news media or as may be directed by the Regulator > The notification must provide a description of the possible consequences of the breach, the measures taken or to be taken to by the company to address the breach; advice on what the data subject could do to limit mitigate the possible adverse effects of the security compromise and the identity of the person responsible for breach, if known to the company > The Regulator may direct the company to publicise details about the data security compromise - if it will protect a data subject who may be effected by the compromise. 2
  • 3. 3 LEARN FROM HISTORY • Zurich UK, outsourced the processing of its data to Zurich South Africa • In 2008, a tape containing customer data was lost while being transported from the data storage facility by a third party • Zurich UK did not know that the data had been lost until the loss was recorded in the Zurich Group's annual data privacy report a year later • Regulator found that Zurich's management and reporting lines were unclear and that the Group's polices for security incidents were not always consistent
  • 4. 4 WHERE MIGHT IT BE COMING FROM 37% 35% 29%  Malicious or criminal attack  System glitch  Human factor Source 2013 Cost of Data Breach Study: Global Analysis
  • 5. DETERMINE THE RISK NO ONE SIZE FITS ALL! > Threat modelling - > Asset-focused approach: In an asset-focused approach, an organisation focuses on its information assets and how they might be vulnerable to information security threats. This approach asks: "How do we protect this resource?" > Attacker-focused approach: In an attacker-focused approach, an organisation focuses on how attackers might try to access an organisation's information technology ("IT") systems and resources. This approach asks: "How will an attacker try and harm this resource?" > Design-focused approach: In a design-focused approach, an organisation focuses on the design of an organisation's IT systems and resources. This approach asks: "How can the system be designed to resist attacks?" 5
  • 6. PLANNING! > Look at the risk of disasters and the business impacts of each > Design preventative and reactive controls > When disasters strike, confidential, secret, personally identifiable, or sensitive data may be exposed, and business continuity plans must take into account how to protect > Information > Reputation > Assets 6
  • 7. IT IS IMPORTANT TO UNDERSTAND 7 Time Goal Actions driven by strategy Where are we now? Mission: how do we mitigate exposure? Values: What are our enduring principles and beliefs? Vision: Where do we want to be? Strategy: How do we get there?
  • 8. BREACH REPORTING There are three main approaches to breach reporting, each requiring a different protocol- > Breaks from policy or established routine > Such events are the lowest form of beach and may or may not present a security risk. Leaders should note them and take appropriate action – empower and report > Detected breaches > Any incident involving unauthorised access to information systems containing sensitive data, or any other breach of security protocols, must be reported and action taken depending on circumstances – have breach notification obligations been triggered. > Potential vulnerabilities or undetected breaches of system security > An undetectable breach is one that, if it had occurred in the past, would not have been detected. So-called-zero-day vulnerabilities are typical in that while the vulnerability has existed for some time, it has only recently become known to the organisation > All such vulnerabilities require immediate investigation regardless of whether any actual breach has been detected. 8
  • 9. BREACH PLAN 9 Several key activities must be incorporated into the breach plan Procedures for declaration of an emergency Predefined roles and responsibilities Call lists and escalation criteria Communications plan, including with external emergency personnel Scenario creation for the impact of each type of failure and disaster Priority order for recovering each information resource based on scenarios Design, implementation, and testing of failover and redundancy in hardware, software and networking capabilities Training of all involved parties Reassessing on a regular basis to analyse new risk
  • 10. THE WAY FORWARD > When a breach has occurred, the company should – > openly and timeously communicate with the customers > stating the nature of the breach > what information has been stolen and what the customer can do to ensure that they are not victims of identity theft e.g. the 1 free annual credit check that all customers are entitled to in terms of the National Credit Act > Tell the story - what the company is doing to prevent future data breaches e.g. improving physical security if computers have been stolen or improving the quality of security software > Establish a comprehensive breach plan and ensure that all employees know what to do in the event of a breach! > Security breaches must be planned for 10
  • 11. THANK YOU Legal notice: Nothing in this presentation should be construed as formal legal advice from any lawyer or this firm. Readers are advised to consult professional legal advisors for guidance on legislation which may affect their businesses. © 2014 Werksmans Incorporated trading as Werksmans Attorneys. All rights reserved.