Compliance and a Culture of Integrity

www.pwc.com
Compliance and a Culture
of Integrity
Data and Privacy
October 29, 2014
Cyber security and Privacy…..
. . . a Board level issue
• Increase in the Security and Privacy regulatory mandates in recent years, as well
as expected changes in upcoming years
• Emerging technologies and reliance on third parties have created a borderless
infrastructure
• Growing demand by business leaders to understand how privacy (“what” data is
sensitive to the business) and security (“how” to protect the data deemed
sensitive) is integrated
• Increase in threats and vulnerabilities to sensitive data and corporate assets
• Even companies that place great emphasis on securing their business processes
can become the victim of cybercrime. Cybercrime can manifest in many ways
• Having a documented, demonstrated and regularly tested program helps in the
event of regulator oversight
PwC
2
Cyber security . . .
. . . a strategic imperative
Global Business Ecosystem
Traditional boundaries have shifted
• The ecosystem is built around a
model of open collaboration
and trust—the very attributes
being exploited by an increasing
number of global adversaries.
• Constant information flow is
the lifeblood of the business
ecosystem. Data is distributed
and disbursed throughout the
ecosystem, expanding the domain
requiring protection.
• Adversaries are actively
targeting critical assets
throughout the ecosystem—
significantly increasing the
exposure and impact to
businesses.
PwC
Pressures and changes which
create opportunity and risk
3
Motivated Adversaries
Adversary
• Loss of competitive
advantage
• Disruption to critical
infrastructure
•
•
•
•
Organized
Crime
• Immediate financial
gain
• Collect information for
future financial gains
• Financial / Payment
Systems
• PII
• PCI
• PHI
• Regulatory inquiries and
penalties
• Lawsuits
• Loss of confidence
Hacktivists
• Influence political and
/or social change
• Pressure business to
change their practices
• Corporate secrets
• Business information
• Information of key
executives, employees,
customers, partners
• Disruption of business
activities
• Brand and reputation
• Loss of consumer
confidence
• Personal advantage,
monetary gain
• Professional revenge
• Patriotism
• Sales, deals, market
strategies
• Corporate secrets, IP,
R&D
• Business operations
• Personnel information
•
•
•
•
Insiders
Trade secrets
Business information
Emerging technologies
Critical infrastructure
Impact
• Economic, political,
and/or military
advantage
Nation
State
PwC
Targets
Motives
Trade secret disclosure
Operational disruption
Brand and reputation
National security impact
4
Current cybersecurity risks and trends
Even companies that place great emphasis on
securing their business processes can become the
victim of cybercrime.
• large organizations (those with gross annual
revenues of $1 billion or more) detected 44%
more incidents compared with last year.
PwC
Source: 2014 PwC Global State of Information Security Survey
5
Current cybersecurity risks and trends
The average number of annual detected incidents has
increased, evidencing today’s elevated threat
environment. As a result, total financial losses due to
incidents has risen given the cost and complexity of
responding to threats.
PwC
2009
2010
Source: 2014 PwC Global State of Information Security Survey
2011
2012
2013
2014
6
Current cybersecurity risks and trends
• Mobile security is an area of continued vulnerability. Mobility has generated
a deluge of data, but deployment of mobile security has not kept pace
• Companies are increasingly sharing data with third parties. While services
can be outsourced, accountability for security and privacy cannot
• Compromises attributed to third parties with trusted access increases while
due diligence weakens:

55% have security baselines for external partners, suppliers, and
vendors (60% in 2013)

50% perform risk assessments on third-party vendors (53% in
2013)
• Very few organizations have true visibility into third party business partners
• Changing relationship between the organization and consumers- multiple
channels/consumer touch points (e.g. website/mobile site/app/store)
without centralized oversight and “control”
PwC
7
Current cybersecurity risks and trends
• Current and former employees are the most-cited culprits of security
incidents, but implementation of key insider-threat safeguards is declining:

56% have privileged user-access tools (65% in 2013)

51% monitor user compliance with security policies (58% in 2013)

51% have an employee security training and awareness program
(60% in 2013)
• While less frequent, incidents attributed to nation-states, organized crime,
and competitors increased sharply in 2014:
PwC

86% jump in incidents by nation-states

64% rise in compromises by competitors

26% increase in incidents by organized crime
8
Data breaches are costly and on the rise
Estimated annual losses to
business from data and
identity theft: $150B**
Average cost of a
compromised
record: $188*
Average cost of post
breach response
activities (legal fees,
forensics) - $1.5M*
Each card brand can assess fines for PCI
non-compliance. Examples include:
• Visa (pre breach)$5K-$25K per month
• MasterCard (related to breach) $100K for
each PCI violation
Publicized breaches of personal information:
PwC
Average cost of a data
breach: $5.4M *
2011
2012
2013
1,097
1,631
1390
Estimates at $3M in
lost business per
incident*
*Source: Ponemon Institute’s “2013 Annual Study: U.S. Cost of a Data Breach”
**Source: McAfee 2013 Study: “The Economic Impact of Cybercrime and Cyber Espionage”
9
State Breach Notification Laws
Generally, the laws mandate
that if there is:
• unauthorized access to or
disclosure of unencrypted
personally identifiable
information (PII) that
• threatens the security of
such PII and
• creates a risk of identity
theft
The person that "owns" such
PII must notify affected:
• state residents
• state agencies and/or
• consumer protection
agencies
PwC
Forty seven US states plus DC, Guam,
Puerto Rico and the Virgin Islands
• Alabama, New Mexico and South
Dakota have no law
10
State Security Breach Laws – a quick comparison
Scope of
Personal
Information
covered
Key data such as
name plus SSN<
bank account
number, credit
card number
(Illinois)
Passwords, PINS
and other access
codes (Alaska)
Date of birth,
electronic signature
(North Dakota)
Trigger for
notification
obligation
No notice unless
misuse of the data
is likely
(Colorado)
Notice if breach
creates a
substantial risk of
ID theft or fraud
(Maine)
Notice if there is
reason to know that
personal
information was
acquired (Mass)
Recipient of
Notice
Impacted resident
(all states)
Consumer
reporting
agencies if > 500
(Minnesota)
Consumer reporting
agencies if > 1000
(Michigan, Nevada)
Content of
Notice
Describe nature of
the incident (North
Carolina)
Don’t describe
nature of the
incident (Mass)
Timing of
Notice
As soon as
practicable (Mass)
Five days
(California)
PwC
Biometric data
such as
fingerprints, voice
print and retinal
images (Nebraska,
North Carolina)
Consumer
reporting agencies
if > 10000
(Georgia)
After a reasonable
investigation has
been conducted
(Arizona)
11
Typical Data Breach Legal Response
Most incidents are not cyber security or hacking events, for example:
•
Lost or stolen employee laptop (encryption will help)
•
HR employee accidentally sending spreadsheet to the wrong person
•
Vendor accidentally uploading file to the wrong server
Even the small ones take time to address:
 What data was involved?
 Was it encrypted?
 Who accessed it? How trustworthy are they?
 How can it be used by the person who accessed it?
 Is there a likelihood of harm? (some states don’t care)
 Finding the individuals’ names and contact information
 Drafting letters based on state requirements
PwC
12
Typical Data Breach Legal Response
Need to do analysis to determine if notice is required:
•
Look at the various state laws
•
Look at your customer contracts (for B to B)
•
Comply with your privacy notices
Even if notice is not required, it may be appropriate:
•
Is there an ethical responsibility to notify?
•
If notify in one state, should you notify in all?
•
Could it be a bad PR move not to notify, even if not required?
•
But over-notification also has its issues
A robust Incident Response Plan is necessary to enable prompt reaction.
Prompt reaction is key to a successful response.
PwC
13
How to monitor for data loss and potential threats
• While organizations have made significant security improvements, they have
not kept pace with today’s determined adversaries – many rely on
yesterday’s security practices to combat today’s threats
• Even the most advanced blocking techniques are inadequate against
motivated and targeted attacks. Reduce reliance on prevention-only
capabilities
• Spend less on prevention, invest in detection, response and predictive
capabilities
• Assume a state of continuous compromise, necessitating continuous
monitoring, response and remediation
• Architect for monitoring at all levels of IT stack – network, OS, application,
content, transactions and user behaviors – and develop security operations
center responsible for continuous monitoring, detection and response
• Chose context-aware network, endpoint and application security solutions
that provide prevention, detection, prediction and response capabilities
PwC
14
Evolving perspectives - adapting to the new reality
Historical
IT Security
Perspectives
Today’s Leading
Cybersecurity
Insights
Scope of the challenge
• Limited to your “four walls”
and the extended enterprise
• Spans your interconnected
global business ecosystem
Ownership and
accountability
• IT led and operated
• Business-aligned and owned;
CEO and board accountable
Adversaries’
characteristics
• One-off and opportunistic;
motivated by notoriety,
technical challenge, and
individual gain
• Organized, funded and
targeted; motivated by
economic, monetary and
political gain
Information asset
protection
• One-size-fits-all approach
• Prioritize and protect your
“crown jewels”
Defense posture
• Protect the perimeter;
respond if attacked
• Plan, monitor, and rapidly
respond when attacked
Security intelligence and
information sharing
• Keep to yourself
• Public/private partnerships;
collaboration with industry
working groups
PwC
15
Building a Cyber Security & Privacy
Program
PwC
16
Common challenges and keys to an effective program
• Creating a robust strategy that accounts for a
complex, multi-regulatory & changing
environment
1. An effective governance structure
• Managing individual concerns and perceptions
across differing cultures
3. An effective risk assessment process
• Understanding the information the
organization collects & processes
2. A strong culture and attitude at all levels
4. A complete, dynamic, current lifecycle data
inventory that includes third parties
5. Controls aligned with a selected framework
• Managing information across the data lifecycle,
within and outside your organization
6. An effective training and awareness program
• Building secure networks and systems
7. An effective team that ensures compliance
with laws and regulations
• Standardizing practices across all entities and
regions, including all channels
• Coordinating incident response
• Driving policy and controls into business
practices and technology
• Adopting privacy values throughout the
enterprise
• Ensuring Business Continuity & Disaster
Recovery
strategies are in place
PwC
8. An effective auditing and monitoring
function
9. Policies and procedures that are current,
communicated, and followed
10. An effective, documented, and tested
incident response plan
11. An effective, documented, and tested
Business Continuity and Disaster Recovery
plan
17
Cyber Security program components
C – Suite Focus Areas
Secure information is power
Strategy,
Governance &
Management
Security
Architecture &
Services
• Align with the
business
Emerging
Technologies &
Market Trends
• Adapt to the future
• Security by design
Risk &
Compliance
Management
• Manage risk and
regulations
Threat,
Intelligence &
Vulnerability
Management
• Address threats &
weaknesses
Incident &
Crisis
Management
• Anticipate &
respond to security
crises
Identity &
Access
Management
• Enable Secure
Access
PwC
Data Protection
& Privacy
• Safeguard critical
assets
18
Taking action: 5 steps toward a strategic cyber program
1
Ensure that your cybersecurity strategy is aligned with business
objectives and is strategically funded
2
Identify your most valuable information assets, and prioritize protection
of this high-value data
3
Understand your adversaries, including their motives, resources, and
methods of attack to help reduce the time from detect to respond
4
Assess cybersecurity of third parties and supply chain partners, and
ensure they adhere to your security policies and practices
5
Collaborate with others to increase awareness of cybersecurity threats
and response tactics
PwC
19
Contacts
Bonnie L. Yeomans
VP, Assistant General Counsel
and Privacy Officer
CA Technologies
(631) 342-2678
bonnie.yeomans@ca.com
Jacqueline T Wagner
Managing Director – New York Privacy
Leader
PwC
(646) 471-5644
jacqueline.t.wagner@us.pwc.com
Ariel Litvin
Director - IT Risk & Security Assurance
PwC
(646) 471-0999
ariel.litvin@us.pwc.com
© 2014 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved. PwC refers to the United States member firm, and may sometimes refer
to the PwC network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details. This content is for general information purposes
only, and should not be used as a substitute for consultation with professional advisors.
PwC
20