Audio File: Download/Play Recording
Date: October 24, 2017
Guest Speaker: M. Lisa Shasteen, Esq., Shasteen & Percy, P.A.
Host: John A. Warnick, Esq., Founder, Purposeful Planning Institute
The news is awash with reports of identity theft. Equifax, Sony, Office of Personnel Management (OPM), Anthem and other hacks increasingly dominate the news and even bring our national election into question. We hear of ransomware hitting Merck Pharmaceuticals and our local hospitals. Insiders at Wells Fargo are using our identities to churn accounts for bonuses. Power grids and water supply systems are at risk, and the FBI reports that business email compromise (BEC) is a primary threat to all businesses within the United States.
Why is this happening, and what can we do to protect ourselves? Should we even try? What are our legal obligations to our clients and employees? We have become completely reliant upon cutting-edge technologies. We love their convenience but often do not grasp the behavioral and organizational changes these new capabilities require, nor the vulnerabilities they create. Criminals rely on our inertia and procrastination. The good news is that there are some relatively simple and inexpensive steps that everyone can take to greatly enhance security. The first step is to change our mental models.
This session will investigate the invisible rise of a cultural meme every bit as relentless and destructive as a hurricane and some relatively simple steps we can all take to better secure ourselves and others we have a duty to protect.
- Cybersecurity and data privacy are not IT issues. These are issues that everyone needs to be mindful of and take steps to address.
- Threats come from very large and well-funded organized groups, insiders, every-day criminals, and from neglect. A well-planned and thorough response is needed to adequately protect yourself and your clients.
- A data breach is inevitable and can be extremely costly in terms of financial loss and the time it takes to address a breach and repair the damage that has been done. The cost to proactively prepare for a breach is significantly less and will help minimize the impact.
Purposeful Quote: “You don’t have to see the whole staircase, just take the first step.” – Martin Luther King, Jr.