About ofonseca

Website: http://www.experian.com/databreach

Profile: Ozzie Fonseca is a Certified Information Privacy Professional (CIPP) who serves as Director of Experian’s Data Breach Resolution Group. Ozzie has been involved in the identity protection arena for nearly a decade, and in his current role has managed thousands of data breach response plans for clients of every size, and for events involving from hundreds to millions of victims.During his tenure, Ozzie has worked with countless privacy and compliance professionals in virtually every industry, and consistently brings to the table his extensive practical experience in handling large scale breach notifications, setting up incident response call centers and in providing best-in-class identity protection and fraud resolution services.Before his involvement in the privacy arena, Ozzie spent most of his career as an educator in the auto insurance, telecom and credit industries responsible for developing training programs across the corporate spectrum.Ozzie holds a Bachelor’s and Master’s degree in Business Administration.He can be contacted at 949.567.3851 or Ozzie.Fonseca@experian.com.


Posts by ofonseca

Spreading the word: What can you do to support Cybersecurity Awareness Month?

Posted on Oct 14 2014 by

Cybersecurity risks and protection methods have changed greatly, for both businesses and individuals, since the Department of Homeland Security initiated the first Cybersecurity Awareness Month 11 years ago. New cyber threats emerge constantly, and it’s never been more vital for businesses and their employees to be on guard against cyber intruders. Hopefully, your organization already […]

Share

The role of the right partners in data breach recovery: the IAPP talk you won’t want to miss

Posted on Sep 16 2014 by

While many American companies have done a noteworthy job of improving their data breach preparedness in the past few years, it seems new breaches occur every month to remind us there’s still plenty of room for improvement. And many state governments are responding by upgrading their post-breach recovery requirements to mandate faster notification timing, and […]

Share

Do Elevated Data Breach Risks Trump ‘BYOD’ Savings?

Posted on Aug 27 2014 by

Two schools of thought have emerged around the practice of “BYOD” – allowing employees to use personal mobile devices for business purposes. BYOD advocates say the practice allows companies to avoid the expense of buying, providing service for, and maintaining a fleet of company-owned devices. Detractors argue that BYOD amps up a company’s already-high risks […]

Share

The 5 Best Things a Company can do After a Data Breach

Posted on Aug 13 2014 by

There are a lot of opinions about what companies should never do in terms of data breach prevention and response. Equally important, however, are the things you should do in the wake of a breach. Here are our top five tips to help you with your breach response. Some may seem obvious, yet a shocking […]

Share

Stress, Apathy and Winning by Default: How Consumers Respond to Data Breach Notification Letters

Posted on Jun 26 2014 by

Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the breach and their involvement in it, they can warn customers of potential identity theft risks and educate them on how to cope with those risks. The one thing no company wants […]

Share

3 Steps To Ease Your Cyber Security Spring Cleaning Efforts

Posted on May 28 2014 by

No matter how diligent your organization is about cyber security, it never hurts to take a second – or even third and fourth – look at what you’re doing to secure vital data and systems. With so many of us in a spring cleaning mindset at this time of year, now is a good time […]

Share

The Worst Things You can Say or Do in a Breach Notification Letter

Posted on May 06 2014 by

When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised. However, many consumers would also probably argue that you’re morally obligated, to notify them of data loss; they want you to tell them of the breach and to do so in […]

Share

Medical Data Breaches: Game-changing for Health Information Professionals

Posted on Mar 26 2014 by

While cyber crime continues to grow across industries, medical identity theft and medical data breaches are rising at a disproportionate rate. And though all identity theft can result in catastrophic damage to consumers’ financial wellbeing, medical identity theft may affect their physical health as well. Consumers are aware of the risks, too. In a recent […]

Share

Must-do Resolutions to Improve Your Small Business’ Cyber Security

Posted on Mar 12 2014 by

As we approach the end of the 1st quarter of 2014 , small-business owners juggle a host of operational and financial objectives. Resolving to improve cyber security should be paramount among them. Cyber security risks continue to grow across all industries, regardless of an organization’s size. Data shows that being small won’t protect your company […]

Share

Auditing Your Data Breach Response Plan: The Never-ending Story

Posted on Feb 13 2014 by

Business is not static; business plans and operating processes evolve to meet market changes and demand fluctuations. Data breach response plans shouldn’t be static either. Threats emerge and risks change constantly in today’s digital world, and a response plan needs to keep pace. It’s essential to regularly audit your data breach response plan to ensure […]

Share