About mbruemmer

Website:

Profile: Michael Bruemmer is vice president of Experian Data Breach Resolution. With more than 25 years' industry experience, he brings a wealth of knowledge related to sales and operations. Most recently, Bruemmer served as business development director of Consumer Products at ID Analytics, where he was responsible for the development and execution of all selling strategies.Prior to his work in the identity theft and fraud resolution space, Bruemmer was vice president and general manager of Small and Medium Business for the Americas with Lenovo. During his tenure, he ran channel network and call center operations in the US, Latin America and Canada.Currently, he is a development board member for the Girl Scouts of America, and formerly served on the board of trustees for the Trinity Episcopal School in Austin, Texas.Bruemmer holds a Bachelor of Arts in Labor Economics from the University of Wisconsin-Madison.He can be contacted at 949.567.6504 or michael.bruemmer@experian.com.


Posts by mbruemmer

Top 6 Mistakes Companies Make in Data Breach Handling

Posted on Aug 23 2016 by

Top 6 Mistakes Companies Make in Data Breach Handling A data breach can be a character-defining moment for any company. Whether you’re an international conglomerate or a small business, how you handle a data breach speaks volumes about the kind of company you are, how well you treat customers, and your long-term prognosis for business […]

Share

How Can you Trim Costs in Breach Response and Service?

Posted on Aug 09 2016 by

Data breach costs should no longer come as a surprise to any company; in fact, you should be budgeting for data breach expenses just as you would any other expected expense. That’s one of the key messages to come out of the now-indispensable annual “Cost of a Data Breach” report.

Share

Pay, Resist or Punt? How Will Your Organization Handle a Ransomware Attack?

Posted on Jul 27 2016 by

Ransomware is on the rise. If it becomes as ubiquitous as identity theft and data breaches — and signs point in that direction – how will your organization deal with it when a hacker uses malicious code to lock you out of your own computer systems?

Share

6 Best Practices to Ensure Success When Purchasing Cyber Insurance

Posted on Jul 13 2016 by

          Hopefully, by now you’re convinced of the value of cyber insurance. In case you’re not, here’s a brief recap of the advantages of having a cyber insurance policy in place prior to a data breach: Reduce the per-record cost of a data breach by $4.40, according to Ponemon Institute’s 2015 […]

Share

Employee-Related Security Risks Are Addressed in our Latest Ponemon Institute Study

Posted on Jun 01 2016 by

What keeps your cyber security team up at night, and does it weigh equally on the minds of managers? Do they lose sleep worrying about malicious attacks from outside your organization? Or do they fear a careless employee will leave a laptop in an unlocked car or use an unsecured personal mobile device to access […]

Share

Best Practices for ID Theft Services and Programs

Posted on May 18 2016 by

While there are some critics of identity theft protection and credit monitoring services, consumers need a tool to fight against identity theft and fraud in today’s data breach climate. As a result of this demand, there has recently been a flurry of new services to the market.

Share

Experian Acquires CSID

Posted on May 11 2016 by

I am pleased to share the news on this blog that Experian has signed a definitive agreement to acquire CSIdentity Corporation (CSID), a leading provider of consumer identity management and fraud detection services.

Share

Video: 2016 Predictions – Mauricio Paez

Posted on Mar 31 2016 by

Mauricio Paez, a partner with the international law firm Jones Day, recently joined me to share predictions about eight emerging and evolving trends in global cyberwarfare. Watch to learn his insights.

Share

Video: 2016 Predictions – Jon-Michael Brook

Posted on Mar 30 2016 by

With 2016 an election year that’s already seen some evidence of campaign breaches, how much more will we see the frequency and intensity potential increase before the polls close? Jon-Michael Brooke of Guide Holdings LLC joins me for a preview of the most significant potentials for the campaign whose data is snatched.

Share

Video: 2016 Predictions – Lynn Sessions

Posted on Mar 24 2016 by

How do healthcare breaches continue to differ in their response to discovery and notification? Lynn Sessions of BakerHostetler shares how an increase in true security violations by external forces has triggered an increase in notifications on a serious scale in the healthcare space.

Share