Preventing, Detecting And Responding To

Security Breaches And Identity Theft

Make sure you're not next...

Thursday, March 16, 2006

About

Do you have the operational and strategic tools you need to prevent, detect and respond to the massive threat of security breaches and identity theft?

With ever-more sophisticated hackers and cyber-criminals, identity theft has become the number one issue facing financial institutions, credit bureaus, online businesses, universities and other enterprises that retain personal information. And for good reason - the statistics showing financial and reputational damage from security breaches and resulting identity theft are staggering.
  • The FTC reports 1,000 cases a day of ID theft
  • A recent FBI operation put an end to a scheme in which nearly 150,000 victims lost more than $215 million
  • The number of phishing e-mail messages intercepted by a prominent web security company grew 300% since June 2004
  • Over 80% of the top 100 financial institutions have reported external attacks on their IT systems in the past year
It is not enough to simply have in place an information security plan; the CIO, CTO, Risk Managers, Privacy Officers and Counsel must operate cohesively and quickly to stay ahead of would-be fraudsters. To prevent your institution from becoming the next victim, you must take action to ensure a top-notch system that will protect, enforce and secure your consumer data.

ACI's Detecting and Responding to Security Breaches and ID Theft publication will provide you with up-to-date information and practical strategies on how to:
  • Identify risks from the regulatory, operations and legal perspectives
  • Upgrade your existing information security program based on your institution's specific needs
  • Shore up your defenses against the latest forms of phishing, spoofing, and pharming
  • Implement the most effective industry standards for fraud management and internal audit systems
  • Respond to security breaches to minimize the impact on corporate reputation and potential liability

Contents & Contributors

About

Do you have the operational and strategic tools you need to prevent, detect and respond to the massive threat of security breaches and identity theft?

With ever-more sophisticated hackers and cyber-criminals, identity theft has become the number one issue facing financial institutions, credit bureaus, online businesses, universities and other enterprises that retain personal information. And for good reason - the statistics showing financial and reputational damage from security breaches and resulting identity theft are staggering.
  • The FTC reports 1,000 cases a day of ID theft
  • A recent FBI operation put an end to a scheme in which nearly 150,000 victims lost more than $215 million
  • The number of phishing e-mail messages intercepted by a prominent web security company grew 300% since June 2004
  • Over 80% of the top 100 financial institutions have reported external attacks on their IT systems in the past year
It is not enough to simply have in place an information security plan; the CIO, CTO, Risk Managers, Privacy Officers and Counsel must operate cohesively and quickly to stay ahead of would-be fraudsters. To prevent your institution from becoming the next victim, you must take action to ensure a top-notch system that will protect, enforce and secure your consumer data.

ACI's Detecting and Responding to Security Breaches and ID Theft publication will provide you with up-to-date information and practical strategies on how to:
  • Identify risks from the regulatory, operations and legal perspectives
  • Upgrade your existing information security program based on your institution's specific needs
  • Shore up your defenses against the latest forms of phishing, spoofing, and pharming
  • Implement the most effective industry standards for fraud management and internal audit systems
  • Respond to security breaches to minimize the impact on corporate reputation and potential liability

Contents & Contributors


PROTECTING YOUR GOOD NAME
Betsy Broder, Federal Trade Commission

GUARDING AGAINST IDENTITY THEFT
Jennet W. Leong, Security and Exchange Commission

PRIVATE INDUSTRY AND THE FBI: A PARTNERSHIP TO COMBAT CYBERCRIME
Gloria Zaborowski, Federal Bureau of Investigation

INFORMATION SECURITY: "ASSESSING OPERATIONAL RISKS AND THREAT VECTORS"
James Christiansen, Experian

CASE STUDY: ACXIOM CORPORATION
Timothy Spainhour, Acxiom Corporation

UPGRADING YOUR INFORMATION SECURITY PROGRAM: LESSONS LEARNED
Michael J. Brauneis, Proviti, Inc.

UPGRADING YOUR INFORMATION SECURITY PROGRAM: THE LEGAL STANDARD FOR COMPLIANCE
Thomas J. Smedinghoff, Baker & McKenzie LLP

UPGRADING YOUR INFORMATION SECURITY PROGRAM TO MEET REGULATORY REQUIREMENTS AND OPERATIONAL BEST PRACTICES
Joseph Majka, Visa U.S.A

UPGRADING YOUR INFORMATION SECURITY PROGRAM: COMPLIANCE IN A MULTI-JURISDICTIONAL SETTING
Brian Hegensbaugh, Baker & McKenzie LLP

CREATING AN ENTERPRISE WIDE FRAUD SOLUTION
Tim Keller, TransUnion

MINIMIZING YOUR VULNERABILITY TO THE LATEST PHISING, SPOOFING AND PHARMING
Alecia Kontzen, Wachovia

CONSUMER PROTECTION: BALANCING RISK, PREFERENCE, AND SECURITY
Amir Orad, CYOTA Inc.

INFORMATION SECURITY BREACH NOTIFICATION LAWS
Peter McCorkell, Wells Fargo & Co.

ENSURING YOUR SECURITY PROGRAM COMPLIES WITH STATE LEGISLATION
Reece Hirsch, Sonnenschein Nath & Rosenthal LLP

POST-BREACH CONTROL AND CONTAINMENT MEASURES TO MINIMIZE LIABILITY
Marc Loewenthal, New Century Mortgage Corporation

POST-BREACH CONTROL AND CONTAINMENT MEASURES TO MINIMIZE LIABILITY
Peter McCorkell, Wells Fargo & Co.

PR STRATEGIES FOR MINIMIZING REPUTATIONAL RISKS WHEN A SECURITY BREACH OCCURS
Jacob S. Frenkel, Shulman, Rogers, Gandal, Pordy & Ecker, P.A.

ENSURING SECURE AND COMPLIANT PROCESSES WHEN USING THIRD PARTIES AND CONSULTANTS
John Delaney, Morrison & Foerster LLP

DATA TRANSFER CONTRACTS: ENSURING SECURE AND COMPLIANT PROCESSES WHEN USING THIRD PARTIES AND CONSULTANTS
Lothar Determann, Baker & McKenzie LLP



*American Conference Institute cannot guarantee that every presentation will be included in the publication.


DOCUMENT TYPES: PRESENTATIONS AVAILABLE: 0