SlideShare a Scribd company logo
1 of 28
1
Protecting the Digital Frontier
Interactive Data Breach
2
Agenda
Breach Scenario
Cyber Security
Cyber Coverages
CCB INSURANCE BROKERS
4
So what do we know?
• Threat Actors have exploited a vulnerability in our corporate website,
giving them access to client records.
• Hackers have then immediately notified press of what has happened, and
are threatening to release the records they have access to.
• Unsure of scale – but it could potentially be our entire client database,
which contains 3,000 records.
5
What information could have
been accessed?
• Names
• Addresses
• Bank Details
• Credit Card details (PCI)
• Health Information (PHI)
• Driving License Numbers
• Criminal Convictions
6
WHAT IS A DATA BREACH?
A personal data breach means a breach of security leading to the accidental or
unlawful destruction, loss, alteration, unauthorised disclosure of, or access to,
personal data transmitted, stored or otherwise processed.
Article 4 (12) - GDPR
OR TO THINK ABOUT IT ANOTHER WAY…
Confidentiality
Integrity
Availability
DO WE HAVE TO TELL ANYONE?
And who are they?
• Article 33 (reporting to the ICO)
• If breach is likely to result in a risk to the rights and freedoms of data
subjects notification is mandatory …not later than 72 hours.
• Article 34 (reporting to data subjects)
• If breach is likely to result in a high risk to the rights and freedoms of
data subjects notification must occur without undue delay
WHO DO WE GO TO FOR HELP?
10
Legal
What will our legal team do?
• Investigate – What? How?
• Notify ICO
• Notify Police
• Notify data subjects
• Pull together other vendors (retaining privilege)
• Provide advise on any regulatory issues – are we in breach of GDPR /
other regulations?
• Can handle any third party claims for damages if they arise in future
• Any overseas clients? Multi jurisdictional issues
11
IT Forensics
What will our forensic team do?
• Identify threat vector
• Close down vulnerability, removing hackers from network
• Analyse the scope of the breach (how far into the network did they get?)
• Support Legal on database review (what has been accessed?)
• Offer assistance with regulatory notification
• Mitigation
• Future improvement
12
CCB CEO:
THE INSURANCE TIMES WANTS
AN INTERVIEW!!!!
WHAT IS GOING ON….??!!
PR Consultants
What will the PR team do?
• Determine key messaging
• Review impact on all stakeholders (employees / suppliers?)
• Manage / handle media
• Draft notifications
• Issue press releases
• Handle social media
• Advise on future reputational enhancement
14
SOME “GO TO” TIPS FOR INTERVIEWS:
• Refer to “criminal act”
• “Working together” with our customers
• Full investigation underway
• Confirm the data loss, but size not yet known
• Co-operating with the ICO
• Sorry for concern our customers are feeling
• Ongoing police investigation – cannot comment further
3 DAYS LATER….
20 BITCOIN OR WE DATA DUMP. YOU HAVE 24 HOURS
What can our IT team tell us?
• All 3,000 records have been accessed by hackers which contains:
• Addresses
• Health information
• Credit card data
• Ransomware has encrypted all of our servers
• All back ups also encrypted
18
CCB CEO:
WHAT HAVE WE SPENT SO FAR?
(IGNORINGANY RANSOMWARE PAYMENT)
Some extra costs we haven’t considered yet…
• First Party Costs:
• Cost of sending email notifications (can’t simply do this via Outlook – specialist
solutions exist)
• Customer helpline to be set up
• Outsourced staff (telephone / social media responders)
• Call logging / note taking system
• Business Interruption – during incident and reputational loss going forward
• Potential Third Party costs:
• Dark web / credit monitoring to be offered to customers
• 3rd party claims for damages
• Regulatory Fines
20
CCB CEO:
WHAT ARE WE LOOKING AT ALL
IN?
How did we arrive at this figure?
Article 82 of GDPR allows claims from impacted data subjects
• TLT v SOS Home Department & Google v Vidal – Damages between £2.5k - £12.5k
• Breach involving 3,000 data subjects
• 10% seek damages (300 people)
• Reserve each at £5.5k per claim (taking a low -mid point of the damages and
including costs)
• Total 3rd party claim cost - £1.65m
• Plus costs already discussed = £1.8m
22
23
Cyber Security Stats
94%
of organisations worldwide have suffered a data breach
as a result of a cyberattack in the past 12 months
$133k
Average cost of ransomware attacks in
2019
6 MONTHS
Average time to
detect a breach
92%
Attacks launched by
phishing emails
EVERY 14
SECONDS
Time businesses
fall victim to
ransomware attacks
86%
Of UK businesses will
suffer a phishing attack
in 2020
Between 1st Jan 2005 to 18th April 2018
there were 8,854 recorded breaches, in
the first half of 2019 there were 3,800
recorded breaches
In March 2020, ransomware attacks
increased 148% over baseline levels from
February 2020 amid the COVID-19
outbreak.
43%
Of cyber attacks aimed
at small businesses
45 MINUTES
Length of time cyber
criminals can go from
initial entry to ransoming
the entire network
94%
24
Cyber Security Tips
1
Educate employees
and implement
staff training
2
Secure your networks and
limit access to authorised
personnel only
3
Regularly update your
computer software, systems
and create weekly backups
4
Purchase a cyber-insurance
policy to help transfer the
financial risk away from
your business
5
Prepare a data breach
response plan including
step-by-step actions and
test frequently
6
Keep privacy policies and
security controls up to date
committing to readiness
and resilience
Passwords
• Set different passwords for each account
• Use long passwords
• Mix letters, numbers and symbols
• Change on a regular basis
Emails
• Report any suspicious emails. Do not click
links or respond to anything you are not
expecting. Even if it looks like it is from a
recognised sender.
• Take extra care when sending
personal/sensitive data. Double check
recipients and make use of delay
functions.
25
Our Key Responsibilities
A CYBER INSURANCE POLICY WOULD HAVE BEEN MONEY
WELL SPENT:
TO SUMMARISE
• Cyber attacks are fast moving and multi faceted events
• Involves a huge amount of time and effort by C-suite and several
operational areas to work through
• External assistance is almost always necessary
• Costs quickly ramp up
• Cyber Insurance policies can and do step up to the plate to help
businesses respond to these matters – service lead offering
QUESTIONS?
Please use the chat function in Teams (not Slido!)

More Related Content

Similar to nerfslides.pptx

GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018Human Capital Department
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data BreachBrian Heidelberger
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 

Similar to nerfslides.pptx (20)

GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data Breach
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 

Recently uploaded

computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 

Recently uploaded (20)

computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 

nerfslides.pptx

  • 1. 1 Protecting the Digital Frontier Interactive Data Breach
  • 4. 4
  • 5. So what do we know? • Threat Actors have exploited a vulnerability in our corporate website, giving them access to client records. • Hackers have then immediately notified press of what has happened, and are threatening to release the records they have access to. • Unsure of scale – but it could potentially be our entire client database, which contains 3,000 records. 5
  • 6. What information could have been accessed? • Names • Addresses • Bank Details • Credit Card details (PCI) • Health Information (PHI) • Driving License Numbers • Criminal Convictions 6
  • 7. WHAT IS A DATA BREACH? A personal data breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed. Article 4 (12) - GDPR
  • 8. OR TO THINK ABOUT IT ANOTHER WAY… Confidentiality Integrity Availability
  • 9. DO WE HAVE TO TELL ANYONE? And who are they? • Article 33 (reporting to the ICO) • If breach is likely to result in a risk to the rights and freedoms of data subjects notification is mandatory …not later than 72 hours. • Article 34 (reporting to data subjects) • If breach is likely to result in a high risk to the rights and freedoms of data subjects notification must occur without undue delay
  • 10. WHO DO WE GO TO FOR HELP? 10
  • 11. Legal What will our legal team do? • Investigate – What? How? • Notify ICO • Notify Police • Notify data subjects • Pull together other vendors (retaining privilege) • Provide advise on any regulatory issues – are we in breach of GDPR / other regulations? • Can handle any third party claims for damages if they arise in future • Any overseas clients? Multi jurisdictional issues 11
  • 12. IT Forensics What will our forensic team do? • Identify threat vector • Close down vulnerability, removing hackers from network • Analyse the scope of the breach (how far into the network did they get?) • Support Legal on database review (what has been accessed?) • Offer assistance with regulatory notification • Mitigation • Future improvement 12
  • 13. CCB CEO: THE INSURANCE TIMES WANTS AN INTERVIEW!!!! WHAT IS GOING ON….??!!
  • 14. PR Consultants What will the PR team do? • Determine key messaging • Review impact on all stakeholders (employees / suppliers?) • Manage / handle media • Draft notifications • Issue press releases • Handle social media • Advise on future reputational enhancement 14
  • 15. SOME “GO TO” TIPS FOR INTERVIEWS: • Refer to “criminal act” • “Working together” with our customers • Full investigation underway • Confirm the data loss, but size not yet known • Co-operating with the ICO • Sorry for concern our customers are feeling • Ongoing police investigation – cannot comment further
  • 17. 20 BITCOIN OR WE DATA DUMP. YOU HAVE 24 HOURS
  • 18. What can our IT team tell us? • All 3,000 records have been accessed by hackers which contains: • Addresses • Health information • Credit card data • Ransomware has encrypted all of our servers • All back ups also encrypted 18
  • 19. CCB CEO: WHAT HAVE WE SPENT SO FAR? (IGNORINGANY RANSOMWARE PAYMENT)
  • 20. Some extra costs we haven’t considered yet… • First Party Costs: • Cost of sending email notifications (can’t simply do this via Outlook – specialist solutions exist) • Customer helpline to be set up • Outsourced staff (telephone / social media responders) • Call logging / note taking system • Business Interruption – during incident and reputational loss going forward • Potential Third Party costs: • Dark web / credit monitoring to be offered to customers • 3rd party claims for damages • Regulatory Fines 20
  • 21. CCB CEO: WHAT ARE WE LOOKING AT ALL IN?
  • 22. How did we arrive at this figure? Article 82 of GDPR allows claims from impacted data subjects • TLT v SOS Home Department & Google v Vidal – Damages between £2.5k - £12.5k • Breach involving 3,000 data subjects • 10% seek damages (300 people) • Reserve each at £5.5k per claim (taking a low -mid point of the damages and including costs) • Total 3rd party claim cost - £1.65m • Plus costs already discussed = £1.8m 22
  • 23. 23 Cyber Security Stats 94% of organisations worldwide have suffered a data breach as a result of a cyberattack in the past 12 months $133k Average cost of ransomware attacks in 2019 6 MONTHS Average time to detect a breach 92% Attacks launched by phishing emails EVERY 14 SECONDS Time businesses fall victim to ransomware attacks 86% Of UK businesses will suffer a phishing attack in 2020 Between 1st Jan 2005 to 18th April 2018 there were 8,854 recorded breaches, in the first half of 2019 there were 3,800 recorded breaches In March 2020, ransomware attacks increased 148% over baseline levels from February 2020 amid the COVID-19 outbreak. 43% Of cyber attacks aimed at small businesses 45 MINUTES Length of time cyber criminals can go from initial entry to ransoming the entire network 94%
  • 24. 24 Cyber Security Tips 1 Educate employees and implement staff training 2 Secure your networks and limit access to authorised personnel only 3 Regularly update your computer software, systems and create weekly backups 4 Purchase a cyber-insurance policy to help transfer the financial risk away from your business 5 Prepare a data breach response plan including step-by-step actions and test frequently 6 Keep privacy policies and security controls up to date committing to readiness and resilience
  • 25. Passwords • Set different passwords for each account • Use long passwords • Mix letters, numbers and symbols • Change on a regular basis Emails • Report any suspicious emails. Do not click links or respond to anything you are not expecting. Even if it looks like it is from a recognised sender. • Take extra care when sending personal/sensitive data. Double check recipients and make use of delay functions. 25 Our Key Responsibilities
  • 26. A CYBER INSURANCE POLICY WOULD HAVE BEEN MONEY WELL SPENT:
  • 27. TO SUMMARISE • Cyber attacks are fast moving and multi faceted events • Involves a huge amount of time and effort by C-suite and several operational areas to work through • External assistance is almost always necessary • Costs quickly ramp up • Cyber Insurance policies can and do step up to the plate to help businesses respond to these matters – service lead offering
  • 28. QUESTIONS? Please use the chat function in Teams (not Slido!)