Best_Practices_Data_..

advertisement
Best Practices for Data
Security and Data Breach
Protocol
Gabriel M.A. Stern, Fasken Martineau DuMoulin LLP
Jason Green, PricewaterhouseCoopers
PwC
Your presenters
Gabriel M.A. Stern
Jason Green
Senior Associate
Director
Fasken Martineau
DuMoulin LLP
PricewaterhouseCoopers
 Senior Associate with Fasken Martineau
DuMoulin LLP, practicing in the area of
Information Technology Law
 Broad experience with information technology,
privacy, consumer protection, health sector,
and intellectual property-related matters.
 Has drafted/negotiated a wide range of
agreements, including outsourcing
agreements, software agreements, ecommerce and website terms and conditions,
privacy agreements, and procurement
documents (requests for proposals, master
service agreements and related materials).
PwC
 Director with PwC LLP, and National Lead for
Breach and Incident response. Part of the
broader Cyber Resilience practice
 25 background encompassing information
security, investigations and digital forensics.
 Led and driven large multi-functional, end-toend security teams to address tactical and
strategic security and risk needs across
multiple industries
2
Overview
1.
Current risks and challenges – the new reality
2. Current risks and challenges – adapting to the new reality
3. Data breaches – some facts
4. Strategies to reduce vulnerability
5. Crisis management & incident response
6. The role for lawyers –notification requirements
7.
The role for lawyers – vendor/contract management
8. The role for lawyers – helping when breaches occur
The key message for lawyers = we have an important role to play in managing data breaches and
data security, but to effectively advise on such issues, the business and IT elements of these issues
must be understood and engaged.
PwC
Current Risks and Challenges
The new reality
PwC
Putting cyber security into perspective
•
•
Cyber security represents many things to many different people
Key characteristics and attributes of cyber security:
─ Broader than just information technology and not limited to just the enterprise
─ Increasing attack surface due to technology connectivity and convergence
─ An ‘outside-in view’ of the threats and potential impact facing an
organization
─ Shared responsibility across the enterprise which requires cross functional
disciplines in order to plan, protect, defend and respond
─ Need to involve legal, IT, and business groups, all of which have a role to
play in managing these risks
It is no longer just an IT challenge – it is a business imperative with important legal obligations and
consequences
PwC
5
The digital world has got bigger
The evolution:
•
Technology-led innovation is transforming the
business models.
•
Companies operate in a dynamic environment
that is increasingly hyper-connected and
interdependent.
•
The ecosystem is built around a model of open
collaboration and trust.
•
Constant information flow is the lifeblood of the
business ecosystem.
Leading to:
PwC
•
Legal compliance regimes that must be identified
and adhered to
•
Legal risk mitigation strategies that affect all
parts of an enterprise
•
Benefits of same technological advances are
being exploited by an increasing number of global
adversaries.
•
Adversaries are actively targeting critical assets
throughout the ecosystem.
•
Data is distributed and disbursed, increasing
the potential for loss and exposure.
•
Changing business drivers and threats are creating
opportunities and risks.
6
Organizations today face four main types of cyber
adversaries…
Adversary motives and tactics evolve as business strategies change and business activities are executed;
‘crown jewels’ must be identified and their protection prioritized, monitored and adjusted accordingly.
Adversary
Nation state
Organized
crime
Hacktivists
Insiders
PwC
Targets
Motives
Trade secrets
Sensitive business information
Emerging technologies
Critical infrastructure
Impact
• Loss of competitive advantage
• Disruption to critical
infrastructure
• Military, economic or
political advantage
•
•
•
•
• Immediate financial gain
• Collect information for
future financial gains
• Financial / payment systems
• Personally Identifiable
Information
• Payment Card Information
• Protected Health Information
• Costly regulatory inquiries and
penalties
• Consumer and shareholder
lawsuits
• Loss of consumer confidence
• Influence political and /or
social change
• Pressure business to
change their practices
• Corporate secrets
• Sensitive business information
• Information related to key
executives, employees,
customers & business partners
• Disruption of business
activities
• Brand and reputation
• Loss of consumer confidence
• Personal advantage,
monetary gain
• Professional revenge
• Bribery or coercion
• Critical infrastructure
• Operational technologies
• Highly visible venues
• Destabilize, disrupt, and
destroy physical and logical
assets
7
…Including “accidental insiders”
Accidental insiders do not realize the risk they can cause in a business. The damage they can cause can
be as significant as any targeted attack.
Adversary
Insiders
?
PwC
Accidental
Insiders
Motives
Targets
Impact
• Personal advantage,
monetary gain
• Professional revenge
• Bribery or coercion
• Critical infrastructure
• Operational technologies
• Highly visible venues
• Destabilize, disrupt, and
destroy physical and logical
assets
• None – these are data
breaches where no malice
is involved
• E.g. uploading confidential
company documents to file
sharing sites due to
Limewire settings.
• All systems
• Costly regulatory inquiries and
penalties
• Consumer and shareholder
lawsuits
• Loss of consumer confidence
• Disruption of business
activities
• Brand and reputation
• Destabilize, disrupt, and
destroy physical and logical
assets
8
Considerations for businesses adapting to the new reality
Scope of the challenge
Governance
Threat actor
characteristics
Threat focus
Security risk equation
Protection strategy
Defense posture
Control model
Threat intelligence &
information sharing
Risk management
approach
PwC
Historical perspectives
Today’s leading insight
Limited to your “four walls” and the extended
enterprise
Spans your interconnected global and hyperconnected business ecosystem and complex supply
chain
IT led and operated
CEO and Board accountable; Business-aligned and
owned; Cross-functional governance; Legal
properly engaged when appropropriate
One-off and opportunistic; motivated by notoriety,
technical challenge, and individual gain
Organized, funded and targeted; motivated by
economic, monetary and political gain
Primarily external
External and internal
Static or less dynamic
Extremely dynamic and broad
One-size-fits-all approach
Prioritize and protect your key assets based on
threat modelling and intelligence
Protect the perimeter; respond if attacked
Layered defense; contextual threat intelligence;
real-time detection; rapidly respond when attacked
Primarily focused on prevention
Predict, Prevent, Detect, Respond, Correct, and
Recover
Keep to yourself
Share internally (fraud, corporate security, ops risk)
and externally (government, industry peers) … and
sometimes you have no choice but to share
Primarily focused on minimizing likelihood
Accepts breaches will occur often; focused on
minimizing business impact; Lawyers can assist
with this by, for example, properly managing
9
vendor relationships
Current Risks and Challenges
Adapting to the new reality
PwC
Keeping pace with the new reality
Operating in the global business ecosystem requires organizations to think differently
about their security investments.
Engage and commit with the business
• Leadership, ownership, awareness and
accountability for addressing the security risks that
threaten the business
• Alignment and enablement of business objectives
• Engage your legal department before a problem
happens (e.g. when contracting) as well as after (e.g.
understanding breach notification obligations)
Board, Audit Committee, and Executive Leadership
Investment Activities
Projects and Initiatives
Functions and Services
Security Strategy and Roadmap
Security Program, Resources and Capabilities
PwC
Resource Prioritization
Risk and Impact Evaluation
Business Alignment and Enablement
Rationalize and prioritize investments
• Critical assets are constantly evaluated given they
are fundamental to the brand, business growth and
competitive advantage
• Threats and impact to the business are considered
as investment activities are contemplated
Transform and execute the security program
• New and enhanced capabilities are needed to
meet the ever changing security challenges
• A comprehensive program must be built on a strong
foundation and include proactive coordination and
collaboration with the business
• The security implications related to the
convergence of Information Technology,
Operational Technology and Company Products and
Services are addressed
11
Cyber security isn’t just about technology
• Vendor management and contract protection
PwC
Confidential & Proprietary
• Not all breaches are intentional
12
Why organizations have not kept pace
Years of underinvestment in certain areas has left many organizations unable to adequately adapt and
respond to dynamic security risks.
Board, Audit Committee, and Executive Leadership Engagement
Product & Service
Security
Threat
Modeling
& Scenario
Planning
Critical Asset
User
Identification and
Administration
Protection
Technology
Adoption and
Enablement
Ecosystem &
Supply Chain
Security
Notification
and
Disclosure
Threat
Intelligence
Public/Private
Information
Sharing
Monitoring
and Detection
Process and
Technology
Fundamentals
Technology
Debt
Management
Privileged Access
Management
Incident
and Crisis
Management
Global
Security
Operations
Patch &
Configuration
Management
Secure Mobile
and Cloud
Computing
Operational
Technology
Security
Physical
Security
Insider
Threat
Breach
Investigation
and Response
Security
Technology
Rationalization
Compliance
Remediation
Resource Prioritization
Risk and Impact Evaluation
Business Alignment and Enablement
consectetur
Security
Culture
adipiscing
elit
and
Mindset
Security Strategy and Roadmap
Security Program, Functions, Resources and Capabilities
PwC
Confidential & Proprietary
13
Data Breaches – Some Facts
PwC
Attacks on the rise
PwC
Confidential & Proprietary
15
Attacks Sources
PwC
16
Attacks Sources
PwC
Confidential & Proprietary
17
Impacts – Cost per Incident
PwC
Confidential & Proprietary
18
Impacts – Downtime
PwC
Confidential & Proprietary
19
Strategies to Reduce Vulnerability
PwC
Key focus points
• Keep the organization ahead of threats likely to target critical assets
• Align and prioritize security initiatives to enable strategic objectives
• Obtain buy-in from key stakeholders on the security program direction
• Compare security capabilities against industry peers
• Understand the maturity of the security program
• Identify strengths, weaknesses, opportunities and threats
• Establish a multi-year plan for enhancing security
• Vendor relationship management
• Contract terms and conditions (governance, audit rights, insurance, etc.)
• Understand the levels of potential liability that may arise for each of your systems
PwC
Confidential & Proprietary
21
Key Activities
Phases
Align cyber security programs to business strategy and
emerging threat landscape
Strategic Driver
Analysis
Target Operating
Model Design
Gap Analysis &
Benchmarking
Roadmap
Development
· Identify Consumers/
Stakeholders (Internal &
External)
· Define Mission, Vision,
Drivers, Guiding Principles
for the Security Program
· Perform Current State
Capability Assessment
· Define Security Projects/
Initiatives
· Understand Existing Business
Strategy
· Define Solutions & Services
· Perform Gap Analysis
· Define Case for Change
· Prioritize Projects/Initiatives
& Map Inter-dependencies
· Conduct Voice of the
Stakeholder (VoS)
· Evaluate External Business
Ecosystem Pressures and
Threats
· Map Consumers (Internal &
External) with Solutions &
Services
· Perform Peer-Comparison/
Benchmarking
· Define Sourcing & Delivery
Models
· Map Solutions & Services to
Capabilities
· Define High Level Cost
Estimates
· Define High Level Resourcing
Requirements
· Define Change Management
& Communications Plan
· Define Solution & Service
Offering Ownership
· Document Solutions &
Services Interdependencies
· Document Security
Organization Structure
· Define Performance Metrics
PwC
Confidential & Proprietary
22
Security functional domains
Align with the business
Prioritize investments, allocate
resources, and align security
capabilities with the strategic
imperatives and initiatives of
the organization.
Strategy,
Governance &
Management
Security
Security
Architecture &
Strategy
Services
Adapt to the future
Assess the opportunities and security
related risks of new technology
adoption and dynamically changing
business models.
Create sustainable security solutions to provide
foundational capabilities and operational discipline.
Threat,
Security&
Intelligence
Governance
and
Vulnerability
Management
Compliance
Emerging
Sustainable
Trends &
Security
Innovation
Behaviours
Strategy
through
Execution
Manage risk and regulations
Efficiently and effectively identify,
evaluate and manage risk to the
business while addressing the
evolving regulatory requirements.
Secure by design
Cyber
Risk &
Crisis
Compliance
Management
Response
Plan, detect, investigate, and react timely and thoroughly to
security incidents, breaches and compromises.
PwC
Anticipate changes in the risk
landscape through situational
awareness of the internal and
external factors impacting the
business ecosystem.
Enable secure access
Identity
&
Cyber
Threat
Access
Assessment
Management
Incident &
Anticipate and respond to security crises
Address threats and weaknesses
Technology
Crisis
Management
Provide integrated and secure
processes, services, and
infrastructure to enable appropriate
controls over access to critical
systems and assets.
Safeguard critical assets
Information
& Privacy
Protection
Confidential & Proprietary
Identify, prioritize, and protect
sensitive or high value
business assets.
23
Crisis Management &
Incident Response
PwC
Cyber Crisis and Business Continuity Integration
Effective Data Breach Response preparation activities augment existing Business Continuity
program activities in each stage of the BCM lifecycle.
Integrated Business Continuity Program
RETURN TO NORMAL OPERATIONS
Restoration
Activities
PwC
Issues
Assessment
Risk
Management
OPERATIONAL
IMPROVEMENT
Continuity Plan &
Resiliency
Improvement
Recovery procedures
Location & resources
Business Continuity
Program (BCP)
People
Data recovery
Applications
Disaster Recovery
Program (DRP)
Technical
infrastructure
Command & control
Communication &
coordination
Crisis Management
(CM)
Emergency response
Business continuity
Disaster recovery
Business Continuity
Management (BCM)
Crisis management
RM optimization
Risk monitoring
Risk response
Risk assessment
Enterprise Risk
Management (ERM)
Incident Response
Companies must comply with existing and emerging regulations, identify and secure sensitive
information that is constantly in motion, investigate breaches and data theft, manage the insider
threat, and reduce the gamut of cyber security risks
As such organizations must be prepared to:
(1) Forensically investigate cyber intrusions, data theft, and insider malfeasance in order to manage legal, regulatory,
reputational, and other risks and comply with requirements;
(2) Assess business and customer impact and mitigate risk; and,
(3) Rebound stronger through long-term remediation planning, strategic information security program development,
and executive support.
Extended the approach beyond immediate technical remediation to business impact analysis, regulatory and customer
notification support, strategic remediation planning, security program roadmaps, and litigation defense.
PwC
26
The Role for Lawyers
Notification requirements
PwC
Breach Notification Generally
• Privacy law primer:
• For private sector organizations generally, the federal Personal
Information Protection and Electronic Documents Act
(PIPEDA) governs the collection, use and disclosure of personal
information.
• Certain provinces have privacy legislation that has been deemed
substantially similar to PIPEDA.
• One of those provinces, Alberta, has in force rules regarding the
notification that is required in the event of privacy breaches.
• Breach notification requirements have also been proposed for
PIPEDA - different versions have been proposed over time.
PwC
• If such PIPEDA requirements were to ever be adopted, breach
notification obligations would apply across the majority of the
country.
28
Alberta’s PIPA Breach Notification Requirement
• Alberta’s Personal Information Protection Act (PIPA) includes
both a reporting and a notification regime in respect of security
breaches.
• Under this regime, certain privacy breaches must be reported to
the Alberta Information and Privacy Commissioner, and under very
similar circumstances, affected individuals must be notified of such
breaches.
PwC
29
Alberta’s PIPA Breach Notification Requirement
con’t
• Threshold for reporting a breach: whether, objectively, “a
reasonable person would consider that there is a real risk of significant
harm to an individual.”
• Threshold for notifying affected individuals: where “there is a
real risk of significant harm.”
• What is “significant harm?”:
• (i) A “significant harm” is a “material harm” having “non-trivial
consequences or effects” (examples may include “possible”
“financial loss, identity theft, physical harm, humiliation to one’s
professional or personal reputation”); and
• (ii) “real risk” is one where there is a “reasonable degree of
likelihood that the harm could result.”
PwC
30
Other Breach Notification Issues
• Even absent any statutory breach notification obligations, might the
business nonetheless what to report/notify?
• E.g. for goodwill purposes.
• Practical challenges can exist in determining whether breaches have
even occurred.
• E.g. unsecured beta version of e-commerce site. But unclear if any
actual privacy breach. Difficult to tell even through forensics.
PwC
31
The Role for Lawyers
Vendor/contract management
PwC
Vendor/contract management – overview
• In contracting with vendors, lawyers have the opportunity to build a
toolset to help their clients manage data breach/security issues.
• The scope of relevant vendors can be quite wide – not just IT
vendors.
• HVAC vendors may be given overly broad system access rights,
which could pose a threat.
• Encourage clients to ask the right questions:
• What systems will the service impact?
• Where will my data be?
PwC
33
Vendor/contract management – overview con’t
• Educating vendors is often one of the key roles customers play.
• E.g. US vendors not being familiar with Canadian privacy law
obligations.
• Let the data/system guide your drafting: the nature, sensitivity, etc.
of the data/system should influence the type of agreement you draft.
• Doing so will provide your client with an appropriate toolset.
PwC
34
Vendor/contract management – some key terms
• Unlimited liability for when breaches occur.
• E.g. exclusion from liability caps/disclaimer of indirect damages.
• Parental guarantee?
• Such breaches can be costly – will you be able to collect damages
from the actual contracting counterparty?
• Insurance.
• Restricting location of data.
• Alternatively, disclosure regarding location of data.
PwC
35
Vendor/contract management – some key terms
• Express privacy compliance (where applicable to the data).
• Audit rights.
• Specific security requirements.
• Often involves a back and forth between customer’s standard
policies and vendor’s standard service offering.
• Expect standard DR/business continuity planning (outside of
any DR service being provided).
• E.g. vendor cannot rely on force majeure unless they have
DR/business continuity plans in place.
PwC
36
The Role for Lawyers
Helping when breaches occur
PwC
Help! There’s been a breach! What do I do?
• What do lawyers need to think about when they get that call from
their IT department?
• Understand what data was lost – e.g. if personal information was
breached, the aforementioned breach notification issues must be
considered.
• Retention issues – e.g. when to freeze all data.
• Discuss with litigators as appropriate.
• Is there an “adversary” against whom action should/can be
taken?
PwC
38
Help! There’s been a breach! What do I do? con‘t
• Figure out what contractual tools with vendors may be helpful.
• Exercise audit rights?
• Consider whether damages should be sought.
PwC
39
Thank you
Download