About ofonseca

Website: http://www.experian.com/databreach

Profile: Ozzie Fonseca is a Certified Information Privacy Professional (CIPP) who serves as Director of Experian’s Data Breach Resolution Group. Ozzie has been involved in the identity protection arena for nearly a decade, and in his current role has managed thousands of data breach response plans for clients of every size, and for events involving from hundreds to millions of victims.During his tenure, Ozzie has worked with countless privacy and compliance professionals in virtually every industry, and consistently brings to the table his extensive practical experience in handling large scale breach notifications, setting up incident response call centers and in providing best-in-class identity protection and fraud resolution services.Before his involvement in the privacy arena, Ozzie spent most of his career as an educator in the auto insurance, telecom and credit industries responsible for developing training programs across the corporate spectrum.Ozzie holds a Bachelor’s and Master’s degree in Business Administration.He can be contacted at 949.567.3851 or Ozzie.Fonseca@experian.com.


Posts by ofonseca

The role of the right partners in data breach recovery: the IAPP talk you won’t want to miss

Posted on Sep 16 2014 by

While many American companies have done a noteworthy job of improving their data breach preparedness in the past few years, it seems new breaches occur every month to remind us there’s still plenty of room for improvement. And many state governments are responding by upgrading their post-breach recovery requirements to mandate faster notification timing, and […]

Share

The 5 Best Things a Company can do After a Data Breach

Posted on Aug 13 2014 by

There are a lot of opinions about what companies should never do in terms of data breach prevention and response. Equally important, however, are the things you should do in the wake of a breach. Here are our top five tips to help you with your breach response. Some may seem obvious, yet a shocking […]

Share

Stress, Apathy and Winning by Default: How Consumers Respond to Data Breach Notification Letters

Posted on Jun 26 2014 by

Data breach notification letters serve multiple purposes. They ensure a breached company is compliant with data breach notification laws, they alert consumers to the breach and their involvement in it, they can warn customers of potential identity theft risks and educate them on how to cope with those risks. The one thing no company wants […]

Share

3 Steps To Ease Your Cyber Security Spring Cleaning Efforts

Posted on May 28 2014 by

No matter how diligent your organization is about cyber security, it never hurts to take a second – or even third and fourth – look at what you’re doing to secure vital data and systems. With so many of us in a spring cleaning mindset at this time of year, now is a good time […]

Share

The Worst Things You can Say or Do in a Breach Notification Letter

Posted on May 06 2014 by

When a data breach occurs, laws and industry regulations, dictate when and if you need to notify consumers whose data might have been compromised. However, many consumers would also probably argue that you’re morally obligated, to notify them of data loss; they want you to tell them of the breach and to do so in […]

Share

Medical Data Breaches: Game-changing for Health Information Professionals

Posted on Mar 26 2014 by

While cyber crime continues to grow across industries, medical identity theft and medical data breaches are rising at a disproportionate rate. And though all identity theft can result in catastrophic damage to consumers’ financial wellbeing, medical identity theft may affect their physical health as well. Consumers are aware of the risks, too. In a recent […]

Share

Must-do Resolutions to Improve Your Small Business’ Cyber Security

Posted on Mar 12 2014 by

As we approach the end of the 1st quarter of 2014 , small-business owners juggle a host of operational and financial objectives. Resolving to improve cyber security should be paramount among them. Cyber security risks continue to grow across all industries, regardless of an organization’s size. Data shows that being small won’t protect your company […]

Share

Auditing Your Data Breach Response Plan: The Never-ending Story

Posted on Feb 13 2014 by

Business is not static; business plans and operating processes evolve to meet market changes and demand fluctuations. Data breach response plans shouldn’t be static either. Threats emerge and risks change constantly in today’s digital world, and a response plan needs to keep pace. It’s essential to regularly audit your data breach response plan to ensure […]

Share

Must-Dos to Improve Your Business’ Cyber Security

Posted on Jan 14 2014 by

As the year begins to ramp up, small business owners juggle a host of operational and financial objectives. Resolving to improve cyber security should be paramount among them. Cyber security risks continue to grow across all industries, regardless of an organization’s size. Data shows that being small won’t protect your company from attacks such as […]

Share

National Protect Your Identity Week Arrives: Are You Helping Your Employees?

Posted on Oct 23 2013 by

National Protect Your Identity Week, Oct. 20 to 26, provides a prime opportunity to talk to your staff about identity protection. We know from multiple studies that workplace identity theft is a growing concern. Are you doing enough to help your employees protect themselves? While businesses routinely train employees in protocols intended to protect business […]

Share