Co-hosted with: What Your Company Needs To Know About Cybersecurity

advertisement

What Your Company Needs To Know About

Cybersecurity

Co-hosted with:

Managing Attacks on Company Information,

Technology, Data and Infrastructure

David Bateman

K&L Gates klgates.com 5

klgates.com

The Spectrum of Cyber Attacks

 Advanced Persistent Threats (“APT”)

 Data Breach and Malware

 Denial of Service attacks (“DDoS”)

 Domain name hijacking

 Corporate impersonation and Phishing

 Employee mobility and disgruntled employees

 Lost or stolen laptops and mobile devices

 Inadequate security and systems: first party and third-party vendors klgates.com 6

Advanced Persistent Threats

 targeted, persistent, evasive and advanced

 nation state sponsored

P.L.A. Unit 61398

“ Comment Crew ” klgates.com 6

Advanced Persistent Threats

 United States Cyber Command and director of the

National Security Agency, Gen. Keith B. Alexander, has said the attacks have resulted in the “greatest transfer of wealth in history.” klgates.com

Source: New York Times, June 1, 2013.

6

Advanced Persistent Threats

 Penetration: Spear Phishing

 67 percent of organizations admit that their current security activities are insufficient to stop a targeted attack.*

 Duration:

 average = 356 days**

 Discovery: External Alerts

 55 percent are not even aware of intrusions*

**Source: Mandiant, “APT1, Exposing One of

China’s Cyber Espionage Units” klgates.com

*Source: Trend Micro, USA. http://www.trendmicro.com/us/enterprise/challeng es/advance-targeted-attacks/index.html

6

Advanced Persistent Threats

 Target Profiles

 Industry:

 Information Technology

 Aerospace

 Telecom/Satellite

 Energy

 Engineering/Research/Defense

 Chemical/Pharma

 Activities:

 Announcements of China deals

 China presence klgates.com 6

Litigation Risks and Case Developments

 Class Action exposure – new theories of economic harm

In Re LinkedIn User Privacy Litigation (N.D. Cal. 2014)(promises of security overvalued cost of “premium” service)

 Grigsby v. Valve Corp.

(W.D. Wash. 2013)(promises of security overvalued services)

 Class Action exposure – securities litigation

In re Heartland Payment Systems, Inc. (D. N. J. 2009)(80% stock drop leads to derivative suit)

 Agency Enforcement

 FTC v. Wyndham Hotels (D. Ariz. 2012)(2 year Russian hacking)

 FTC v. RockYou, Inc . (N.D.Cal. 2012)(hackers access PII of 32 million users)

 Mass. v. South Shore Hospital (AG enforcement; $750k settlement)

 Indiana v. Wellpoint, Inc. (AG enforcement; $100k settlement) klgates.com 9

What is Risk?

R

isk = (

V

ulnerability +

T

)

C

ontrols

Approximately 60,000 Know Vulnerabilities

It is never the risk that causes damage or creates opportunities; it is how we respond…before, during, and after.

Scott Angelo

2014 Senior Administrators

Meeting 9

Cybersecurity. The numbers.

2,164

Incidents in 2013

Records exposed

822M

Discovered externally

67%

9% from customers

66%

Go unnoticed for over a month

229 Days is the

Median

92% of breaches are external

40% of breaches utilized malware

29% of breaches used social means

10 klgates.com

10

Cybersecurity. The Risk

85%

Increase in our logging capabilities

120m

Per day

1.2m pieces of mail per day

Only 200k are valid!

Reduced system vulnerabilities

66%

72%

More malicious websites blocked

4m

Per month

Threats blocked monthly

5M

11 klgates.com

11

Cybersecurity: How to survive a breach

• Detection, Isolation, and Containment

• Define which assets face the highest risk for an attack

• Identify threats before attacks occur—and respond

• Mine intelligence from internal and external sources

• SIEM (Security Information and Event Management)

• Security researchers and experts

• Law enforcement

• ISAC (Information Sharing and Analysis Centers)

• Focused Cyber Security Ed and Awareness

• In-house Cyber Security Professionals

12

INSURANCE COVERAGE

AGENDA

 Why Consider Insurance Coverage?

 Legacy Insurance Policies (And Their Limitations)

 Technology E&O Coverage

 Cutting Edge “Cyber” Coverage

 How To Enhance “Off-The-Shelf” Cyber Insurance Forms

Through Negotiation

 TIPS For A Successful Placement

 Audience Q&A

WHY CONSIDER INSURANCE COVERAGE?

“[T]here are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.”

Robert S. Mueller, III, Director, Federal Bureau of Investigation, RSA

Cyber Security Conference San Francisco, CA (Mar. 1, 2012) klgates.com 15

WHY CONSIDER INSURANCE COVERAGE?

• Breach Notification Costs/Identity Monitoring

• Computer forensics/PR Consulting

• Loss of Customers/Revenue

• Damaged Reputation/Brand

• Regulatory Actions/Fines/Penaltiers/Consumer

Redress

• Lawsuits & Defense Costs

• Loss of “Crown Jewels”

• Business interruption and supply chain disruption

• Drop in stock price/loss of market share

• Potential D&O Suits (Target)

WHY CONSIDER INSURANCE COVERAGE?

WHY CONSIDER INSURANCE COVERAGE?

 SEC Guidance -- “[A]ppropriate disclosures may include”:

 “Discussion of aspects of the registrant’s business or operations that give rise to material cybersecurity risks and the potential costs and consequences”;

 “To the extent the registrant outsources functions that have material cybersecurity risks, description of those functions and how the registrant addresses those risks”;

 “Description of cyber incidents experienced by the registrant that are individually, or in the aggregate, material, including a description of the costs and other consequences”;

 “Risks related to cyber incidents that may remain undetected for an extended period”; and

 “Description of relevant insurance coverage.”

“appropriate disclosures may include: . . . [a]

[d]escription of relevant insurance coverage.”

LEGACY INSURANCE POLICIES (AND

THEIR LIMITATIONS)

 Directors’ and Officers’ (D&O)

 Errors and Omissions (E&O)/Professional Liability

 Employment Practices Liability (EPL)

 Fiduciary Liability

 Crime/Employee Theft

Retail Ventures, Inc. v. National Union Fire Ins. of Pittsburgh, Pa.,

691 F.3d 821 (6th Cir. 2012) (DSW covered for expenses for customer communications, public relations, lawsuits, regulatory defense costs, and fines imposed by Visa and Mastercard under the computer fraud rider of its blanket crime policy)

 CGL?

LEGACY INSURANCE POLICIES (AND

THEIR LIMITATIONS) klgates.com

LEGACY INSURANCE POLICIES (AND

THEIR LIMITATIONS) klgates.com

Legacy Insurance Policies (And Their

Limitations) klgates.com

ISO states that “when this endorsement is attached, it will result in a reduction of coverage due to the deletion of an exception with respect to damages because of bodily injury arising out of loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data.”

Legacy Insurance Policies (And Their

Limitations) klgates.com

TECHNOLOGY E&O COVERAGE

 Essential for a provider of e-commerce-related solutions

 Covers:

 Errors & Omissions in the Provision of Technology Services

 Failure of Technology Products to Serve Their Purpose

 But There Are Limitations

 Triggered By a “Claim” That Alleges An Act or Omission

 May Exclude Security Beach or Unauthorized Access to Information

 May Not Include Breach Notification Costs, Which is Viewed As More of a “First-Party” Loss

klgates.com

CUTTING EDGE “CYBER” COVERAGE

 Privacy And Network Security

 Provides coverage for liability (defense and indemnity) arising out of data breaches, transmission of malicious code, denial of third-party access to the insured’s network, and other network security threats

 Regulatory Liability

 Provides coverage for liability arising out of administrative or regulatory proceedings, fines and penalties

 Media Liability

 Provides coverage for liability (defense and indemnity) for claims alleging infringement of copyright and other intellectual property rights and misappropriation of ideas or media content

CUTTING EDGE “CYBER” COVERAGE

 Information Asset Coverage

 Coverage for damage to or theft of the insured’s own systems and hardware, and may cover the cost of restoring or recreating stolen or corrupted data.

 Network Interruption And Extra Expense (and CBI)

 Coverage for business interruption and extra expense caused by malicious code, DDoS attacks, unauthorized access to, or theft of, information, and other security threats to networks.

 Extortion

 Coverage for losses resulting from extortion (payments of an extortionist’s demand to prevent network loss or implementation of a threat)

 Crisis Management

DATA BREACH COVERAGE EXAMPLE 1

DATA BREACH COVERAGE EXAMPLE 1

DATA BREACH COVERAGE EXAMPLE 2

DATA BREACH COVERAGE EXAMPLE 2

DATA BREACH COVERAGE EXAMPLE 3

DATA BREACH COVERAGE EXAMPLE 3

TIPS FOR A SUCCESSFUL PLACEMENT

 Embrace a Team Approach

 Understand the Risk Profile

 Review Existing Coverages

 Purchase Cyber Coverage as Needed

 Remember the “Cyber” Misnomer

 Spotlight the “Cloud”

 Consider the Amount of Coverage

 Pay attention to the Retroactive Date and ERP

 Look at Defense and Settlement Provisions

BEWARE.

THE.

FINE.

PRINT.

Download