Cyber risk - NBA-CLS

advertisement
Understanding Cybersecurity Risks:
Issues & Trends
Association of Corporate Counsel
© 2015
1
Our questions…
"What should my company do to prepare for a
data-related incident?"
"What can I do to help manage risks while
supporting innovation?”
"Why Most Cybersecuirty Happens Outside the CISO's Office" Wall Street
Journal Blog (June 23, 2015)
ACC Docket, “Cybersecurity: Emerging Trends and Regulatory Guidance” (May
2015)
2
Understanding Cyber Risk:
•
Goal of cybersecurity = protect assets that allow business to perform
•
Cyber risk = probability of threat exploiting weak point of assets
•
Attackers, motives, and attacks = varied and constantly evolving
•
Status update:
– Cyber threats increasing in frequency, scale, sophistication, & severity
– Unpreparedness remains high
– Prediction: “ongoing series of low-to-moderate level cyber attacks * * * that
impose cumulative costs on US economic competitiveness and national
security." (Worldwide Threat Assessment of U.S. Intelligence Community)
•
Potential impact: Stakes include reputational harm, shareholder stock
price, continuity of operations, overall confidence and liability
3
Where Threats May Exist
Enterprise
level
“Internet of
Things”
Point-of-sale
registers
Vendor
Employee
Wi-Fi
printers
Hackers
Personal
email
accounts
Social media
Employee
smartphones
4
Managing Risk Collaboratively
Human
Resources
Accounting
Information
Technology
Payroll
Sales/Customer
Service
Legal
Cyber-risk
committees
Board
Company
culture
Cyber
Risk
Public Relations
5
Key Cybersecurity Milestones
•
February 12, 2013:
– Executive Order 13636 calling for voluntary consensus standards and
industry best practices
– Presidential Policy Directive 21 calling for greater research and
development work, including focus on better protections and partnerships
•
February 12, 2014:
– National Institute of Standards and Technology (NIST) Cybersecurity
Framework is released
•
Throughout 2013 and 2014:
– Target, Home Depot, Community Health Systems, JPMorgan and Sony
Pictures all publicly disclose massive cybersecurity attacks.
– Federal Financial Institutions Examination Council (FFIEC) recommends
Financial Services Information Sharing and Analysis Center (FS-ISAC).
6
Key Cybersecurity Milestones (cont’d)
•
Thus far in 2015:
– More Breaches: Anthem (records of 80 million exposed); OPM
(records of millions exposed – number disputed)
– White House continues activity:
•
•
•
•
Proposes Personal Data Notification & Protection Act (January 2015)
Proposes Student Digital Privacy Act (January 2015)
Reintroduces draft of Consumer Privacy Bill of Rights (February 2015)
Issues EO 13691 (February 2015) – calling for development of
information sharing organizations, voluntary standards for information
organizations, and liability protections for companies that share.
– House approves Cybersecurity Bill (April 2015) – allows for
information sharing with feds and includes liability protections
– DOJ issues guidance: “Best Practices for Victim Response and
Reporting of Cyber Incidents”
7
Sector-by-sector Regulation in US
Key Agencies
•
•
•
•
•
•
•
Federal Trade Commission
Department of Health and Human Services
Office of the Comptroller of the Currency
Securities and Exchange Commission
Department of Justice
Federal Deposit Insurance Corporation
State AG offices and insurance regulators
Key Laws (and Agency Guidance)
•
•
•
•
•
•
•
•
•
•
•
Gramm-Leach-Bliley Act
HIPAA
SOX
Fair Credit Reporting Act
Children’s Online Privacy Protection Act
Privacy Act
Electronic Signatures in Global and National Commerce Act
Federal Information Security Management Act
Homeland Security Act of 2002
SEC and DOJ Guidelines
FTC Act?
8
Highlight: Federal Trade Commission
(FTC) Role in Cybersecurity
•
50+ enforcement actions in past 15 years relating to data security
– Mostly administrative actions
– Mostly resolved through consent orders and long-term supervision
– Other cases filed in federal court pursuant to injunctive authority
•
FTC enforcement authority primarily from Section 5 of FTC Act
– Also from Children Online Privacy Protection Act (COPPA); Gramm-LeachBliley (GLB) and Fair Credit Reporting Act (FCRA)
•
Section 5: “unfair” and “deceptive” trade practices
– Deceptive (historical & most common): challenge allegedly false data
security representations (e.g. Fandango, Credit Karma)
– Unfair (most recent): FTC’s minimum cybersecurity standards for
companies collecting personal information
9
Highlight: Federal Trade Commission
(FTC) Role in Cybersecurity
•
What’s “unfair”:
– Failure to encrypt, establish log-in protocols, protect against
commonly known attacks, and provide cybersecurity training…
•
Remedying violations through consent orders:
– Comprehensive information security program
– Independent risk assessments
– Periodic reporting back to FTC
•
Watch: Whether Third Circuit will curtail FTC authority
– FTC v. Wyndham Worldwide Corporation, et al., 2014 WL 2812049 (D.N.J.)
– Interlocutory appeal before the Third Circuit
10
Highlight: Federal Trade Commission
(FTC) Role in Cybersecurity (Cont’d)
•
FTC Recommendations -- 2012 Privacy Report
-
•
Privacy by design
Simplified choice: Offer choices at a time and in the context in which
consumer is making the decision
Transparency: Shorter, clearer privacy notices
Other recommendations –
-
Use commonly used and readily available data security measures
Have a privacy policy in place
Review consumer assurances for alignment with actual security
Scrutinize data management often
Follow FTC complaints and consent decrees
11
NIST Cybersecurity Framework
•
What it is: set of voluntary standards and best practices to help
organizations with critical infrastructure manage cyber risk
•
Key attributes: Any sector; any industry; common vocabulary;
common concepts; envisioned for international compatibility
•
Three parts:
– Core: common activities & desired outcomes
– Tiers: context for understanding organizational view of cyber risk
and processes to manage risk
– Profile: actual outcomes against business needs
•
Basis of future regulation? Still a concern…
12
NIST Cybersecurity Framework (cont’d)
• How in-house counsel can use it
–
–
–
–
Understand company’s alignment with best practices
Raise awareness and communicate with stakeholders
Understand and share information across functions and BUs
Use as basis for due diligence or evaluation criteria with service
providers
– Provide high-level education to senior execs and board members
– Foresee how the “standard of care” may evolve
– And many other ways…
13
Briefly on Breach Notification
•
Patchwork everywhere:
– United States:
• States & territories have laws except AL, SD, & NM
• Federal: depends on industry and regulatory guidance
– International:
•
•
•
•
•
•
Some nation-states comprehensive approach
Others nation-states have sectoral approach for specific industries
Data protection authority guidance
Implied by notice/consent requirements of privacy laws
Still awaiting: Harmonized Data Privacy Regulations from EU Commission
Timing is everything:
– timely internal notice to incident response team and external response
team; retaining third party forensic firm; and managing notice components
14
Hypothetical Scenario
• FBI discovers personal identifiable information (PII) of
your company’s employees (including those in the UK) as
well as 300,000 customers posted on Pastebin
• FBI formally notifies your company and requests an onsite visit to further discuss the apparent breach
• On the same day the corporate anonymous hotline
receives allegations of an insider possibly facilitating a
data breach that may be linked to the FBI notification
What should your company have done prior to this incident?
15
Practical Considerations: Pre-incident
Establish a Working Group
Use guidelines (e.g.,
NIST Framework)
Preincident
• Identify
• Protect
• Detect
• Respond
Incident
Postincident
• Recover
16
Practical Considerations: Pre-incident
Identify:
• Assets:
- Data, devices, systems and facilities
• Governance
- Risk manager: CISO/CIO
- Planning team: Legal, data privacy and security experts, HR, IT,
CFO, Marketing and Product Development
- Plan, train and conduct table-top exercises
- Decision making structure - Information security policies
- Data breach regulations and notification obligations
- Establish ongoing relationships with relevant entities (regulators,
industry peers, FBI, Department of Homeland Security)
17
Practical Considerations: Pre-incident
Identify (Cont’d):
• Perform risk assessment?
- Threats and vulnerabilities
- Potential business impacts
- Determine risk based on threats, vulnerabilities, likelihoods, and
impacts
• Establish risk management strategy
- Determine priorities
- Determine risk tolerance
• Establish response plan
18
Practical Considerations: Pre-incident
Key “Protect” considerations:
•
•
•
•
•
•
Who has access? Employees and vendors
Access controls?
Training program/Exercise group
Insurance
Measures to protect data-at-rest and data-in-transit?
Vendor security policy? Due diligence, contractual obligations
supply chain
• Key policies? Internal investigation, computer use, computer
monitoring, bring your own device (BYOD), Cloud Computing,
other emerging technologies
19
Practical Considerations: Pre-incident
Key “Detect” Considerations:
•
•
•
•
Is anomalous activity being detected? How?
How is the network and physical environment being monitored?
“Privacy by design”
Detection team?
- Clear roles and back ups
- Clear criteria on reporting detection
20
Practical Considerations: Incident
Key “Respond” Considerations:
• Incident response team
 Clear roles, back ups and order of operations
 E.g., IT, Legal, customer service dept., Corporate Relations and
Government Relations
• External providers
– IT forensics, mailing houses and call center providers,
external counsel, credit monitoring services providers
• Forensics report and assessment
• Contain breach
21
Practical Considerations: Incident (Cont’d)
Key “Respond” Considerations (Cont’d)
• Notification
- To whom





Consider law enforcement/Department of Homeland Security
C-Suite
Customers/employees
Regulators (e.g., Insurance Departments, attorney generals, etc.)
Media
- When
• Cooperation with regulators
22
Practical Considerations: Post-Incident
• Prepare for claims against the company
-
•
•
•
•
•
FTC, state insurance departments, attorney generals and
class actions
Consider bringing civil claims against attackers or
cooperating with criminal prosecution
Consider
Pursue insurance coverage
Document lessons learned and review securityrelated policies and processes
Document diligence
23
“What should my company do to prepare for a data
breach and how can I help?”
– Understand the company’s exposure to cyber threats
– Understand where the company’s vulnerabilities may exist
– Ensure Legal is represented on the Security Policy Planning
Committee
– Prepare and coordinate with stakeholders
• Lead by identifying legal requirements and proposing ways to limit risk
• Consider insurance options
• Consider data sharing proposals
– Develop a strong plan
• Include focus on preserving evidence
• Include possibilities for media response
24
Contact Information/Follow-Up
[Speaker’s name]
[Title]
Association of Corporate Counsel
1025 Connecticut Ave NW Suite
200
Washington, DC 20036 202-2934103
25
THANK YOU!
Association of Corporate Counsel
26
Download