1 of 70

Data Breach Simulation Exercise

How to Minimize Damage & Maximize Outcomes in the Wake of a Data Breach

May 2018

2 of 70

Link to Slides

3 of 70

Exploding Data!

4 of 70

Social Media in Schools: What Now?

4

5 of 70

Bite-Sized Tips & Tricks

5

6 of 70

But Wait! There’s More!

6

7 of 70

NOTHING TO HIDE???

7

8 of 70

8

9 of 70

In 1991 for about $3000 on sale…

9

10 of 70

EVOLVING, SOPHISTICATED SCAMS

10

11 of 70

Kids these days…

11

12 of 70

BLUE: phishing attacks �PURPLE: breaches or hacks resulting in the disclosure of personal data �YELLOW: ransomware attacks �GREEN: denial-of-service attacks (green pins); and�RED: other cyber incidents resulting in school disruptions & unauthorized disclosures

12

The K-12 Cyber Incident Map

13 of 70

13

RIPPED FROM THE HEADLINES!

14 of 70

14

TERRIFYING NEW HACKING TREND!

15 of 70

15

IMPORTANCE OF DIGITAL CITIZENSHIP

16 of 70

CHANGING LANDSCAPE OF DATA PRIVACY

16

17 of 70

LEGISLATIVE CHANGES

17

18 of 70

FUTURE READY!

18

19 of 70

LEGISLATIVE TRENDS

19

20 of 70

GDPR???

20

21 of 70

2018 Ballot Measure?

21

22 of 70

COPPA OVERVIEW

23 of 70

ALL THE COOL KIDS ARE DOING IT…

24 of 70

WHAT IS…EXAMPLE

25 of 70

DO YOU ASK BEFORE YOU APP?

26 of 70

SIMPLE TIPS FOR TEACHERS

27 of 70

SOCIALIZE SAFELY!

28 of 70

28

29 of 70

29

http://www.visualcapitalist.com/happens-internet-minute-2017/

30 of 70

DATA BREACH SIMULATION

  • Table top exercise that simulates a data breach within a complex organization.
  • Intended to put you in the shoes of critical decision makers who have just experienced a data breach.

30

31 of 70

DATA BREACH SIMULATION

  • You will be divided into teams to react and respond to the scenario.
  • Over time, the scenario will be more fully revealed and you will discover more about what happened.

31

32 of 70

Be Prepared for the Unexpected!

32

33 of 70

SUGGESTIONS

  • Think about each of the roles needed in your organization (e.g., public information officer, data system leadership, attorney, auditors, etc.).
  • The full extent or impact of a data breach is rarely known up front. Do your best to anticipate what might happen, but don’t get ahead of yourself.

33

34 of 70

DATA BREACH SIMULATION

Each team will develop two key products:

  1. Public and Internal Communications/ Messaging – Develop the message(s) you will deliver to your staff, stakeholders, the media, and the public.

34

During the event, you will be asked to participate in press conferences about the scenario. Be prepared to respond to members of the media about what is happening and how your organization is responding.

35 of 70

DATA BREACH SIMULATION

  1. Response Plan – Outline how your organization will approach the scenario and what resources you will mobilize. Describe who will compose your response team. Identify goals and a timeline for your response.

35

36 of 70

BACKGROUND

  • Your LEA has 1,500 employees.
  • 250 employees work at the central office, 1,250 work in the field.
  • Your IT department provides centralized services and support for all employees including access to a newly-deployed centrally-managed database that includes student, certificated, and classified staff information.

36

37 of 70

BACKGROUND (cont.)

  • The new database allows users to log in through a browser and upload and modify information.
  • The new system has only been deployed in a few sites throughout the county.

37

38 of 70

SCENARIO

  • Yesterday, an employee that works at one of the school sites reported that some student data has been changed in the system. Several of the students in one program had their grades changed to reflect higher grades than the teacher recalls them having.

38

39 of 70

SCENARIO

  • Initial investigation shows that someone logged on using the field employee’s login information and manually changed the grades.
  • Additionally, the logs indicate that several reports were also downloaded from other systems, including some that contained private information about employees (including SSNs) .

39

40 of 70

DATA BREACH SCENARIO

  1. Gather with your team.
  2. Go over the scenario carefully. What do you know? What don’t you know?
  3. Begin building your response. Elect a team member to take notes.

40

41 of 70

DATA BREACH SCENARIO (cont.)

  1. During the scenario, you will receive additional information about the breach. Read each of these updates as the scenario unfolds.
  2. We will occasionally pause to discuss where we are, and eventually give a press statement.

41

This exercise works best if approached as a “murder mystery” game. The more you synthesize the information and role play, the more useful the exercise becomes.

42 of 70

Questions?

42

43 of 70

DATA BREACH SCENARIO

43

10 Minutes

  • Your LEA has 1,500 employees.
  • 250 staff work at the central office , 1,250 work in the field.
  • Your IT department provides centralized services and support for all employees including access to a newly-deployed centrally-managed database.
  • The new database allows users to log in through a browser and upload/modify information.
  • The new system has only been deployed in a few offices throughout the county.
  • Yesterday, an employee in the field reported that some student data has been changed.
  • Someone logged on using the field employee’s login.
  • Logs indicate that several reports were downloaded from other systems, including some that contained private information about employees (including SSNs).

44 of 70

WHERE ARE WE?

  • Have you begun to build a response plan?
  • Can you make any concrete conclusions?
  • Does the fact that the breach includes SSNs change the way you respond?

44

45 of 70

SCENARIO UPDATE

    • Logs indicate that the login occurred from the Wi-Fi network of your organization’s Central Office after school hours.
    • Reports have surfaced about a student intern offering to change additional accounts for money. No names have yet been revealed.

45

46 of 70

DATA BREACH SCENARIO

46

10 Minutes

    • Logs indicate that the login occurred from the Wi-Fi network inside your central office after hours of operation.
    • Reports have surfaced about unpaid student interns offering to change additional accounts for money. No names have yet been revealed.

47 of 70

WHERE ARE WE?

  • Has the updated information changed your approach to the scenario?
  • Think about what controls you could put in place to avoid a scenario like this.

47

48 of 70

SCENARIO UPDATE

    • Two under age student interns are rumored to be the culprits.
    • When questioned, they admit that they located a sticky note with the employee’s username and password, which they used to log in to change the accounts.

48

49 of 70

SCENARIO UPDATE

    • The interns said that they also accessed the employee payroll systems, including a database of employees that listed names, addresses, SSNs, employee ID numbers, etc.
    • Investigation reveals that the students changes grades of student athletes who had been placed on academic probation and made ineligible to play in upcoming games because of low grades.

49

50 of 70

DATA BREACH SCENARIO

50

10 Minutes

    • Two student interns are rumored to be the culprits.
    • When questioned, they admit that they located a sticky note with the employee’s username and password, which they used to log in to change the accounts.
    • The interns said that they also accessed the employee payroll systems, including a database of employees that listed names, addresses, SSNs, employee ID numbers, etc.
    • Investigation reveals that the grades of students athletes on academic probation had been changed.

51 of 70

WHERE ARE WE?

  • How has the updated information changed your approach to the scenario?
  • What other information would be useful?

51

52 of 70

SCENARIO UPDATE

    • The data the student interns accessed contain academic information for 10 students and 175 employees.
    • Some of the account information has been published to the interns’ Facebook pages.
    • News of the breach has leaked out. You are receiving calls from parents and employees asking if their data/their student’s data were accessed or altered.

52

53 of 70

DATA BREACH SCENARIO

  • The news of the breach is out and you must brief the press, the community, and stakeholders.
  • Your spokesperson will give a brief press conference to address the issue and take questions.
  • In the audience are reporters from local and national media, as well as parents, employees, privacy advocates, and activists.

53

10 Minutes

54 of 70

DEVELOP A COMMUNICATION PLAN

  • Determine types of communications that need to be developed (both internally and externally).
  • Determine methods for disseminating information.
  • Assign roles for communication.
  • Anticipate questions that are likely to arise and draft/vet responses.

54

55 of 70

DISCUSS UPDATES & DEVELOP A PR PLAN

  • Determine types of communications that need to be developed (both internally and externally).
  • Determine methods for disseminating information.
  • Assign roles for communication.
  • Anticipate questions that are likely to arise and draft/vet responses.

55

15 Minutes

    • The data the interns accessed contain financial information for 10 students and 175 employees.
    • Some of the account information has been published to the interns’ Facebook pages.
    • News of the breach has leaked out. You are receiving calls from clients and parents employees wanting to know what data were accessed/altered.

56 of 70

PRESS CONFERENCE

  • The news of the breach is out and you must brief the press, the community, and shareholders.
  • Your spokesperson will give a brief press conference to address the issue and take questions.
  • In the audience are reporters from local and national media, as well as employees, parents, clients, privacy advocates, and activists.

56

57 of 70

Where Are We?

  • How did it go?
  • Was your message received well?

57

58 of 70

DEVELOP AN INCIDENT RESPONSE PLAN

  • Use your notes from the scenario discussion.
  • Identify an incident response team (e.g., CIO, Data Coordinator, IT Manager, legal counsel).
  • Outline the steps to identify the source of the breach, catalog the data affected, and identify how it occurred.
  • Should you involve law enforcement? When? What legal requirements exist?
  • What preventative corrective actions should you implement?

58

59 of 70

DEVELOP AN INCIDENT RESPONSE PLAN

  • Use your notes from the scenario discussion.
  • Identify an incident response team (e.g., CIO, Data Coordinator, IT Manager, legal counsel).
  • Outline the steps to identify the source of the breach, catalog the data affected, and identify how it occurred.
  • Should you involve law enforcement? When? What legal requirements exist?
  • What preventative corrective actions should you implement?

59

10 Minutes

60 of 70

UNVEIL YOUR RESPONSE PLAN

  • Take us through your response plan. Include the who, what, when, and how of your activities.
  • What were the driving factors in your decision-making process?
  • Did your plan evolve as the scenario became more clear? How?
  • How should you prepare to enable a prompt reaction to a potential breach?

60

61 of 70

WRAP-UP

  • Lessons learned from press conference.
  • Incident Response Plans – what might work for us?
  • What have you learned? Will it affect your behavior?
  • How could this exercise be more useful to you?

61

62 of 70

RESOURCE EXAMPLES

63 of 70

MORE RESOURCE EXAMPLES

64 of 70

HELPFUL ORGANIZATIONS

65 of 70

SIMPLE TIPS TO PROTECT PRIVACY

65

66 of 70

Student Data Privacy Law References

66

Law/Guidance Source

Web Site/Page

Family Educational Rights and Privacy Act (FERPA)

Privacy Technical Assistance Center (PTAC)

California Education Code (EC)

Children’s Online Privacy Protection Act (COPPA)

Protection of Pupil Rights Amendment (PPRA)

AB 1442 (Social Media)

AB 1584 (Third Party Contracts)

SB 1177 (Student Online Personal Information Protection Act)

SB 178 (Electronic Devices)

67 of 70

ED TECH DATA PRIVACY RESOURCES

Resource Title

URL

California Student Privacy Alliance

Common Sense Education Privacy Evaluations

Common Sense Media’s “What Is…” Videos

Privacy Expert Video

US Department of Ed Student Privacy Page

FERPA Sherpa for Educators

IKeepSafe Vetted Products

TAPD (Technical Assistance & Professional Development Cybersecurity Ed Program

Ask Before You App Video

Data Privacy Guidebook

Common Sense Ed Student Privacy Tips Video

Common Sense Ed Social Media Privacy Video

68 of 70

Student Data Privacy Resources

Tool/Resource

Web Site/Page

US Department of Education’s Student Privacy Web Page

Data Privacy Guidebook

National Center for Education Statistics (NCES) Forum Guide to Education Data Privacy

Common Sense Media’s Privacy & Internet Safety Page

On Guard Online for Parents

On Guard Online for Educators

Future of Privacy Forum for K-12 Education

NCES’s Data Stewardship: Managing PII in Student Education Records Report

FERPA Sherpa Student Privacy Resource Center

The CDE’s Data Privacy Web Page

K12 Cybersecurity Resource Center

Threatwire video podcast

69 of 70

General Data Privacy Resources

Tool/Resource

Web Site/Page

On Guard Online

National Cyber Security Alliance’s Stay Safe Online Web Page

Common Sense Media’s Digital Citizenship Page

Future of Privacy Forum

Privacy Paradox (Podcast)

Bloomberg Digital Defense

(Jordan Robertson, Columnist)

Wall Street Journal Personal Tech News (Geoffrey A. Fowler, Columnist)

Wired Magazine Editor-in-Chief Nicholas Thompson

70 of 70

Geoff Belleau, Consultant

@EdTech_Cal

California Dept of Education

gbelleau@cde.ca.gov

70

Elizabeth Wisnia, Consultant

@cdeprivacy

California Dept of Education�ewisnia@cde.ca.gov