About ofonseca

Website: http://www.experian.com/databreach

Profile: Ozzie Fonseca is a Certified Information Privacy Professional (CIPP) who serves as Director of Experian’s Data Breach Resolution Group. Ozzie has been involved in the identity protection arena for nearly a decade, and in his current role has managed thousands of data breach response plans for clients of every size, and for events involving from hundreds to millions of victims.During his tenure, Ozzie has worked with countless privacy and compliance professionals in virtually every industry, and consistently brings to the table his extensive practical experience in handling large scale breach notifications, setting up incident response call centers and in providing best-in-class identity protection and fraud resolution services.Before his involvement in the privacy arena, Ozzie spent most of his career as an educator in the auto insurance, telecom and credit industries responsible for developing training programs across the corporate spectrum.Ozzie holds a Bachelor’s and Master’s degree in Business Administration.He can be contacted at 949.567.3851 or Ozzie.Fonseca@experian.com.


Posts by ofonseca

ITRC report identifies top three data breach triggers

Posted on May 07 2012 by

For a company, a data breach can seem like it comes out of the blue. Yet, according to analysis by the Identity Theft Resource Center (ITRC), the three primary causes of data breaches have remained the same since 2009: Hacking Data on the move Insider theft ITRC has been releasing an annual Breach Report since 2007. […]

Share

Big data can mean big breaches

Posted on Mar 27 2012 by

As companies accumulate vast amount of data to improve their business intelligence, the risks of data breaches accumulate accordingly.  While organizations are rapidly increasing their ability to store, process and analyze huge amount of information collected from social networks, sensors, IT systems and other sources, they’re often failing to consider that much of this data […]

Share

Infographic: Unlock data breach facts

Posted on Mar 12 2012 by

Share

When data recovery becomes a data disaster

Posted on Feb 21 2012 by

Your server crashed. You dropped your storage device. Your computer drive failed. And there’s no back-up in sight. Who ya gonna call? A data recovery vendor, of course. Not so fast. Before you madly dial for help, beware of unscrupulous providers who turn data recovery services into data breach scams. According to a recent report […]

Share

Are you in hiding after a data breach? Watch our new video.

Posted on Jan 31 2012 by

httpv://youtu.be/KTHWhscxGeU

Share

Five top trends in security threats

Posted on Jan 31 2012 by

Just as technology is continuously evolving, so are the wily ways in which fraudsters circumvent the safeguards for changing technologies. Symantec’s study Internet Security Threat Report offers a review of where cyber thieves are finding new opportunities and, accordingly, where experts believe the thorniest security trouble spots lie.

Share

How data breaches harm reputations

Posted on Jan 17 2012 by

The Ponemon study clearly shows that when data breaches occur, the collateral damage of a company’s brand and reputation become significant hard costs that must be factored into the total financial loss.

Share

Data breaches don’t take a holiday at the arcade

Posted on Dec 27 2011 by

A recent data breach discovery serves as a reminder that even when you’re on vacation, cyber criminals never sleep.

Share

Avoiding holiday scams

Posted on Dec 06 2011 by

With the flood of online shoppers comes the accompanying tidal wave of fraudsters washing over the cheerful holiday landscape. Hidden behind the online mistletoe, cyber-thieves lurk with seasonal scams, virtual Scrooges with plans to spoil holiday shopping for consumers and retailers.

Share

Honoring veterans by protecting their identities

Posted on Nov 10 2011 by

It is a cruel irony that service members who defend our country by fighting abroad are often most at risk from the threat of identity theft at home. Frequent deployments, relocation and the unique demands of military life create vulnerabilities for fraudsters to exploit, and military personnel can remain unaware that they have been targeted long after a crime has been perpetrated.

Share