<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.6000.16681" name=GENERATOR>
<STYLE></STYLE>
</HEAD><FONT face=Arial><FONT size=2>
<BODY>
<DIV> <FONT face=Arial size=2>I thought the board might find this
interesting.</FONT> Is anyone attending?
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial><FONT size=2>A huge conference is being held next week in
D.C. on Data Breaches and Identity Theft (<A
href="mhtml:{F52C6969-8321-4BA1-84F8-9A2A41ECC1B7}mid://00000254/!x-usc:http://www.americanconference.com/finance/databreaches.htm">http://www.americanconference.com/finance/databreaches.htm</A>) where
high ranking federal regulators and enforcement officials
educating businesses about taking the necessary steps to
identify, prevent, and mitigate occurrences of identity theft. The senior
regulators will discuss the latest regulatory developments and enforcement
priorities, .i.e., "The Red Flags Rule".</FONT></FONT></DIV>
<DIV> </DIV>
<DIV>I found the Conference Overview to be very interesting in addition to the
speakers. </DIV>
<DIV>
<P><EM>In 2007, statistics show that the average total cost of a data breach for
a company was $6.3 million. Moreover, the average total cost for lost or exposed
data grew to $239 per compromised record, and the costs for public relations and
communications following an incident have gone up 3% in the last year. Experts
warn that the amount of lost revenue a company experiences in the wake of a data
breach will only continue to grow, especially as 60% of surveyed customers
indicate that they would consider leaving a company following a data breach.
</EM></P>
<P><EM>And to add insult to injury, experts predict that the high profile data
breaches like that of TJX and other large scale losses reported last year are
only the tip of the iceberg compared to what will be seen in the future, as
cyber-criminals get more sophisticated and gain more economic incentives for
stealing consumer information. </EM></P></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>Thanks,</FONT></DIV>
<DIV><FONT face=Arial size=2>Mike</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt"><A name=OLE_LINK1><SPAN
style="FONT-SIZE: 10pt; FONT-FAMILY: Arial">Michael Hill <BR>Certified Identity
Theft Risk Management Specialist<BR></SPAN></A><A
href="mhtml:{F52C6969-8321-4BA1-84F8-9A2A41ECC1B7}mid://00000254/!x-usc:http://www.idtheft101.net/"><FONT
color=#0000ff><SPAN style="mso-bookmark: OLE_LINK1"><SPAN
style="FONT-SIZE: 10pt; FONT-FAMILY: Arial">www.idtheft101.net</SPAN></SPAN><SPAN
style="mso-bookmark: OLE_LINK1"></SPAN></FONT></A><SPAN
style="mso-bookmark: OLE_LINK1"><SPAN
style="FONT-SIZE: 10pt; FONT-FAMILY: Arial">
<BR>404-216-3751<BR> </SPAN></SPAN></P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt"><SPAN
style="mso-bookmark: OLE_LINK1"></SPAN> </P>
<P class=MsoNormal style="MARGIN: 0in 0in 0pt"><SPAN
style="mso-bookmark: OLE_LINK1"><EM><B><SPAN
style="COLOR: green; FONT-FAMILY: Arial">"If You Think You're Not At Risk, Think
Again!"</SPAN></B></EM></SPAN><SPAN style="mso-bookmark: OLE_LINK1"><SPAN
style="FONT-SIZE: 10pt; FONT-FAMILY: Arial"><BR> <BR> <BR>NOTICE:<BR></SPAN></SPAN><SPAN
style="mso-bookmark: OLE_LINK1"><EM><SPAN
style="FONT-SIZE: 7.5pt; FONT-FAMILY: Arial">This email and any attachment to it
is confidential and protected by law and intended for the use of the
individual(s) or entity named on the email. This information and all email
information from the sender is not legal advice nor legal representation and
should not be construed as legal advice nor legal representation. Check with
your attorney in your State for legal advice. If the reader of this message is
not the intended recipient, you are hereby notified that any dissemination or
distribution of this communication is prohibited. If you have received
this communication in error, please notify the sender via return email and
delete it completely from your email system. If you have printed a copy of
the email, please destroy it immediately.
</SPAN></EM></SPAN></P></DIV></DIV></BODY></HTML></FONT></FONT>