About mbruemmer

Website:

Profile: Michael Bruemmer is vice president of Experian Data Breach Resolution. With more than 25 years' industry experience, he brings a wealth of knowledge related to sales and operations. Most recently, Bruemmer served as business development director of Consumer Products at ID Analytics, where he was responsible for the development and execution of all selling strategies.Prior to his work in the identity theft and fraud resolution space, Bruemmer was vice president and general manager of Small and Medium Business for the Americas with Lenovo. During his tenure, he ran channel network and call center operations in the US, Latin America and Canada.Currently, he is a development board member for the Girl Scouts of America, and formerly served on the board of trustees for the Trinity Episcopal School in Austin, Texas.Bruemmer holds a Bachelor of Arts in Labor Economics from the University of Wisconsin-Madison.He can be contacted at 949.567.6504 or michael.bruemmer@experian.com.


Posts by mbruemmer

Employee-Related Security Risks Are Addressed in our Latest Ponemon Institute Study

Posted on Jun 01 2016 by

What keeps your cyber security team up at night, and does it weigh equally on the minds of managers? Do they lose sleep worrying about malicious attacks from outside your organization? Or do they fear a careless employee will leave a laptop in an unlocked car or use an unsecured personal mobile device to access […]

Share

Best Practices for ID Theft Services and Programs

Posted on May 18 2016 by

While there are some critics of identity theft protection and credit monitoring services, consumers need a tool to fight against identity theft and fraud in today’s data breach climate. As a result of this demand, there has recently been a flurry of new services to the market.

Share

Experian Acquires CSID

Posted on May 11 2016 by

I am pleased to share the news on this blog that Experian has signed a definitive agreement to acquire CSIdentity Corporation (CSID), a leading provider of consumer identity management and fraud detection services.

Share

Video: 2016 Predictions – Mauricio Paez

Posted on Mar 31 2016 by

Mauricio Paez, a partner with the international law firm Jones Day, recently joined me to share predictions about eight emerging and evolving trends in global cyberwarfare. Watch to learn his insights.

Share

Video: 2016 Predictions – Jon-Michael Brook

Posted on Mar 30 2016 by

With 2016 an election year that’s already seen some evidence of campaign breaches, how much more will we see the frequency and intensity potential increase before the polls close? Jon-Michael Brooke of Guide Holdings LLC joins me for a preview of the most significant potentials for the campaign whose data is snatched.

Share

Video: 2016 Predictions – Lynn Sessions

Posted on Mar 24 2016 by

How do healthcare breaches continue to differ in their response to discovery and notification? Lynn Sessions of BakerHostetler shares how an increase in true security violations by external forces has triggered an increase in notifications on a serious scale in the healthcare space.

Share

Why Are Employees the Weakest Link in Breach Prevention? Hear Answers at IAPP Global Privacy Summit

Posted on Mar 22 2016 by

Employees are a company’s biggest asset, but when it comes to cyber security, they are often the weakest link. Unfortunately, a large number of security incidents are caused by employee negligence or the compromise of their computers or phones, leaving even companies with strong technical security programs at risk.

Share

Video: 2016 Predictions – Bill Hardin

Posted on Mar 18 2016 by

With the first quarter of 2016 wrapping up, it’s a good time to take a look at the cyber security trends that emerged at the end of 2015 and the beginning of 2016. What are the cyber risks companies will need to be most vigilant against for the rest of the year?

Share

Infographic: Timeline of a Data Breach Response

Posted on Feb 23 2016 by

      Preparing a breach response plan is sometimes a painful topic, planning the response that should happen after your business becomes the unfortunate victim of a cyber attack. How exactly should things work? Explore the timing of the planning and execution of a response – before and after the breach – as a […]

Share

Involving Head Honchos in Data Breach Response

Posted on Feb 09 2016 by

Shouldn’t it be easy to convince your senior executives of the importance of cyber security? High-profile data breaches make the news, and your top decision-makers surely read the same headlines you do. Those reports — and numerous studies — make it clear that cyber security incidents continue to grow in volume, frequency and impact. Yet […]

Share