the information ecosystem: closing the gaps
DESCRIPTION
The Information Ecosystem: Closing the GAPS. About Me. Founder and CEO of IDTLP Personal Background Company Accolades and History . Information is Currency. =. Information Exposure Trends. Information Exposure Statistics As of March 4, 2013. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/1.jpg)
The Information Ecosystem: Closing
the GAPS
![Page 2: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/2.jpg)
About Me
• Founder and CEO of IDTLP• Personal Background • Company Accolades and History
![Page 3: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/3.jpg)
=
Information is Currency
![Page 4: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/4.jpg)
Information Exposure Trends
![Page 5: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/5.jpg)
Over 607,255,063 million records reported lost or stolen from higher education, health
care, government, business, and the financial industry since January 2005. (www.privacyrights.org)
Information Exposure StatisticsAs of March 4, 2013
In 2005, an average of 71% of breaches were technology related.
By 2006, technology related breaches were reduced to 28%, however, operational and
behavior incidents increased from 29% to 72%.
![Page 6: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/6.jpg)
Higher Education Exposure Statistics
Source of the Breaches
![Page 7: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/7.jpg)
Every organization that reported breaches since January 2005, it is assumed that 100%
of them had some degree of compliance, technology controls, and prevention
measures in place.
Many also utilized “Industry Best Standards”
Information Exposure Statistics
![Page 8: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/8.jpg)
From 2005 to 2010 roughly 350,000,000 records were lost or stolen.
From 2010 to current over 607,000,000 records have been lost or stolen.
NEARLY DOUBLED in half the time – Why? ( more laws, industry standards, education, etc.)
Information Exposure Statistics
![Page 9: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/9.jpg)
Issue #1 – The Focus
The Puzzling Truth about Compliance and Prevention
![Page 10: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/10.jpg)
“The closet was secured by biometric and keycard scan security with a magnetic lock and an additional door with a keyed lock. In addition, the property
management company for the leased spaced provided security services . . . In spite of these physical safeguards, HHS determined that the PHI contained on
the hard drives was not protected well enough.”
Issue #1 - Evidence
![Page 11: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/11.jpg)
Issue #1 - Evidence
![Page 12: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/12.jpg)
Issue #2 – Compliance Efforts
The Puzzling Truth about Compliance and Prevention
![Page 13: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/13.jpg)
Issue #2 - Evidence
![Page 14: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/14.jpg)
Issue #2 - Evidence
![Page 15: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/15.jpg)
Issue #3 – Ecosystem
The Puzzling Truth about Compliance and Prevention
![Page 16: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/16.jpg)
What is the Information Ecosystem?
![Page 17: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/17.jpg)
i
Areas of Information
![Page 18: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/18.jpg)
Privacy Security
Response Usage
No iControl
Shared iControl
Shared iControl
No iControl iContr
ol
Areas of Information Control and Information
Practices
![Page 19: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/19.jpg)
Information Processes and Flow
Lock Up
Log Off
Shred
A Practice Management Approach to a Process
![Page 20: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/20.jpg)
Balance is KEY•
Information Systems
(BOT)• Information
Flow• Information Compliance• Industry Standards
• Case Study• MoreDEFENSIBLE POSITION
![Page 21: The Information Ecosystem: Closing the GAPS](https://reader035.vdocuments.site/reader035/viewer/2022062218/56816193550346895dd13415/html5/thumbnails/21.jpg)
Where to Go From Here
Establish an Identity Theft Prevention Team Conduct an Operations-Driven Risk Assessment Design a Written Identity Theft Prevention
Program Employee Behavior Modification (Training) Service Provider Oversight Response Plan for Loss or Breach Evaluate and Update the Identity Theft Prevention
Program
Solid Steps
Possible Pitfalls