Creating Your Red Flags Rule Playbook

Presented by

Brandon Dunlap, BrightFly; Jeff Hughes, Lumension

About this talk

Even with organizations tightening up data security measures, cybercriminals have become very sophisticated and continue to find ways to steal personal information and use it to open or access accounts. According to Javelin Strategies, incidences of identity theft grew by 11 percent from 2008 to 2009 altering the lives of 11 million Americans. If that pattern continues, one in every 20 Americans will be a victim of identity theft this year. The Red Flags Rule, which is enforceable as of June 1, 2010, and carries significant financial recourse for non-compliance, requires organizations across multiple industries to implement additional data security measures and be able to identify the danger signs of fraudulent activity. In this 30-minute webcast, you will learn key tips to developing your Red Flags Rule playbook to effectively: 1. Enhance your data security practices 2. Harmonize data security control requirements across other data protection regulations such as PCI DSS 3. Monitor controls that the Federal Trade Commission mandates 4. Respond to red flags as they are identified

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (50)
Subscribers (8004)
This channel provides live and on-demand webcasts on a range of Endpoint Management and Security topics, including: identifying the latest trends and best practices for minimizing insider risks, reducing your threat exposure, managing Web 2.0 threats, reducing your cost of compliance and taking control of your endpoints, from both an operational and security perspective.