NetDiligence Cyber & Privacy Liability Conference, June 2-3, 2015 Contact: Claire Reiss, NLC-RISC Program Director creiss@nlcmutual.com or 202-626-3165 NetDiligence, an NLC-RISC partner and developer of the eRisk Hub used by many NLCRISC member pools as well as commercial insurers, held its annual East Coast Cyber and Privacy Liability Conference in Philadelphia on June 2-3, 2015. Panels comprised of experienced professionals presented a packed agenda that included sessions on cyber claims and litigation, cyber insurance coverage, hacker approaches, breach response, the status of efforts to enact a federal notification law, evolving PCI requirements, and vulnerabilities associated with third party vendors. @NLC-RISC tweeted salient points throughout the conference, but in case you missed them, here are some of the key points made by the presenters. • • • • • • Increasingly clients are concerned about the security of their information in the hands of third parties, so organizations (including pools and insurers) that can demonstrate that they are providing good security may have a competitive advantage. Although cloud users can contract for security services from their providers, they remain ultimately responsible for the security of their data. They need to ensure that they are using a cloud provide that has state of the art security, with a contact that ensures the provide will be cooperative in the event of a breach. In October 2015, organizations that take credit cards, including small and medium sized local governments, will be faced with a shift in the responsibility for fraudulent card present transactions from the issuers to merchants that have not implemented chip enabled terminal technology. It’s a good reason for all organizations that accept credit cards to implement the new technology. There is new federal data breach notification legislation being considered by Congress: H.R. 1770, the Data Security and Breach Notification Act of 2015. Although passage is never certain, this one has a better chance than many of its predecessors. According to state attorney general office representatives, it is very important to have a breach response plan before a breach occurs. The attorney general’s office will ask for it if it becomes involved. Pools may be able to help their members by providing information about how to create such a plan. Using unsecured public wireless internet in hotels, airports, etc. can be very dangerous. It is easy to get onto the wrong site because it can sometimes be difficult to determine which is the genuine wireless site offered by the venue. Wifi pineapples can enable a hacker to insert themselves between the user and a legitimate wifi connection. Public charging stations, especially those that operate • • • • • • • by providing usb connections rather than electrical plugs, can result in lost data and loading of malware onto the device. BYOD is a major risk to employers if employee devices connect to the network, because employees’ devices may not be as well protected and may have picked up malware during personal use. Employers should have strong BYOD policies in place if they allow those devices to connect to their network. Data breach litigation is not expected to slow. More plaintiffs’ attorneys are entering the field. The plaintiff’s bar is pursuing a uniform damage model for class action legislation brought by victims of a data breach. If adopted, this will make litigation more lucrative by eliminating the need to prove actual damages to individual plaintiffs. Some state regulators are coming back and inquiring about data breaches several years later. From an insurer’s perspective, when can the file be closed? Attorneys’ computer networks house a great deal of sensitive and confidential information. Be sure that attorneys used by your pool have good security and cyber coverage so they can respond appropriately if there is a breach. A best practice in cyber breach planning is to have a pre-vetted roster of experts, generally more than one in any given discipline, so an expert will be available quickly if needed. Emerging issues in cyber coverage include network business interruption, cyber extortion, crossover coverage, and the effect of war, terrorism and crime exclusions. The west coast version of this conference will be October 6-7 at the Loews Santa Monica Beach Hotel. Here is the registration link.