Handout 1

advertisement
Avoiding Cyber Liability Pitfalls:
Lessons Learned from
Risk Managers, Insurance,
Legal and Forensic Experts
Recording of this session via any media type is strictly prohibited.
Page 1
Introduction of Speakers
Katherine Keefe, Esq. – Beazley
Ted Kobus, Esq. – Baker Hostetler
Steve Visser – Navigant
Jim Morley – John Deere
Recording of this session via any media type is strictly prohibited.
Page 2
Cyber Liability – Introduction
•
Attention grabbing news headlines
•
Breaches increasing in frequency by many accounts
•
Nature of security threats changing
•
Many types of organizations are at risk
•
Evolving response requirements
Recording of this session via any media type is strictly prohibited.
Page 3
Types of Incidents Observed
Recording of this session via any media type is strictly prohibited.
Page 4
Types of Information Security Incidents:
Healthcare
• Phishing - Attempted Payroll Diversions Remote email box access
• Snooping into patient records
• Lost/stolen computing devices
• Inappropriate access to patient or provider
records with fraudulent tax return preparation
• Malware
Recording of this session via any media type is strictly prohibited.
Page 5
Types of Information Security Incidents: Higher
Education
• Malware
• Hacking
• Inadvertent exposure of information to the
internet
Recording of this session via any media type is strictly prohibited.
Page 6
Types of Information Security Incidents:
Financial Services
• Malware with command and control capability
• Lost or stolen computing devices
Recording of this session via any media type is strictly prohibited.
Page 7
Types of Breaches
Statistics from Navigant Research
Adapted from Navigant’s Information Security & Data Breach Report: March 2014 Update
FQA includes Q3 2012 – Q2 2013, July 1, 2012 – June 30, 2013.
Recording of this session via any media type is strictly prohibited.
Page 8
Types of Breaches
Breaches by Type of Entity
Adapted from Navigant’s Information Security & Data Breach Report: March 2014 Update
FQA includes Q3 2012 – Q2 2013, July 1, 2012 – June 30, 2013.
Recording of this session via any media type is strictly prohibited.
Page 9
Types of Breaches
Breakout of Corporate Breaches by Industry Group
Industry Group
Q4 2013
Q3 2013
FQA
Services
41%
35%
36%
Retail & Wholesale 27%
Trade
Insurance & Finance 23%
0%
17%
35%
21%
Transportation,
Utilities, & Public
Services
Manufacturing
5%
10%
9%
4%
20%
17%
Adapted from Navigant’s Information Security & Data Breach Report: March 2014 Update
FQA includes Q3 2012 – Q2 2013, July 1, 2012 – June 30, 2013.
Recording of this session via any media type is strictly prohibited.
Page 10
How Information Security Incidents
are Discovered
• Reported by an internal person
o (e.g.- employee)
• Reported by an external entity
o (e.g.- law enforcement or business partner)
Recording of this session via any media type is strictly prohibited.
Page 11
Where are the threats coming from?
Legal Perspective
• Inside threats
– Employee negligence
• Security failures
• Lost mobile devices
– Employee ignorance
• Improper disposal of
personal information
(dumpsters)
• Lack of education and
awareness
– Malicious employees
• Outside threats
– Hackers
• Malware
• Phishing and Spear
Phishing
– Thieves (including Social
Engineering Tools)
– Vendors
Recording of this session via any media type is strictly prohibited.
Page 12
Breach Causes:
Beazley Breach Response Services– Q1 2014
Payment Card
2%
Unknown
3%
Insider
10%
Stationary Device
1%
Physical Loss
26%
Portable Device
11%
Other
12%
Unintended
Disclosure
22%
Hack or Malware
13%
Recording of this session via any media type is strictly prohibited.
Page 13
Industries Impacted by Data Incidents:
Beazley Breach Response Services– Q1 2014
Education
6%
Retail
6%
Financial
9%
Healthcare
67%
Other
12%
Recording of this session via any media type is strictly prohibited.
Page 14
Developing an Effective Incident
Response Plan (“IRP”)
Recording of this session via any media type is strictly prohibited.
Page 15
Objectives for a Data Breach
Incident Response Plan
• “Living Document”
– Routinely updated to keep current
• Clear and easy to use in the midst of a crisis incident
– Succinct
– Organized by sections
• Not a “phone book” but not a “leaflet”
– Background information on regulations and laws
– Detailed procedures and steps on incident management
– Contact details of the Incident Response Team (IRT)
• Document all discoveries for evidentiary needs
Recording of this session via any media type is strictly prohibited.
16 Page 16
Anatomy of the IRP
• Incident Response Team
– Roles & Responsibilities
– Internal Members of the IRT
– External Members of the IRT
– Contact Information of Members of the IRT
– Define “Threat Levels” to Members of the IRT
Recording of this session via any media type is strictly prohibited.
17 Page 17
Anatomy of the IRP (Continued)
• Incident Triaging
–
–
–
–
Threat level defined to trigger appropriate members of the IRT
Insurance carrier need to be advised?
Privacy counsel needed?
Investigation needed?
• Forensics
• Traditional
• Both
– Electronic data? Paper-based data? Both?
– Is a 3rd party involved? Or the cause?
– Law enforcement needed?
• FBI? Secret Service? State/Local?
• Police Report needed? (Theft involved?)
– PR/Crisis management needed? Media involved (yet)?
Recording of this session via any media type is strictly prohibited.
18 Page 18
Anatomy of the IRP (Continued)
• Breach Response Methodology
– Notification Procedures
• Define timing strategy of all communications
• Police report needed? (if theft involved)
• Affected individuals’ notification fulfillment needed?
– Draft notification letters
» Description of what happened and when (if permitted)
» Description of data types involved
» Steps to protect oneself
» What entity is going to investigate and mitigate harm. Remedy? (credit monitoring)
» Contact details for questions
» Apology
– Obtain corporate logo and signature image
• Affected individuals’ call center needed?
– Establish escalation contacts
– Draft FAQs
– Draft scripts
Recording of this session via any media type is strictly prohibited.
19 Page 19
Anatomy of the IRP (Continued)
• Breach Response Methodology
– Notification Procedures
• Government agencies / attorneys general
– Draft notification letters - federal, state, local (where applicable)
• Press releases
– Draft press releases and scripts for media
• Internal communications
– Draft internal memos
– General workforce, management, board of directors
• Website
– HITECH substitute notice (if applicable)
– Public posting
– Require separate phone # from notification #
• Assess need for localization (multiple languages)
• Accompanying remedy with notice
– Credit monitoring / credit reports
– Identity theft resolution
» Credit-related fraud restoration
» Healthcare record fraud restoration
Recording of this session via any media type is strictly prohibited.
20 Page 20
Anatomy of the IRP (Continued)
• Mitigation and Remediation
– Recovery
• Eradicate vulnerabilities
• Reinstate repaired/hardened systems
– Review – Lessons Learned
• Log/Record incident in an incident database for trending/historical
analytics
• Review with incident response team
– Review information security systems, policies and procedures, workflows
– Review physical security systems, policies and procedures, workflows
– Update training program accordingly
• Update incident response plan
Recording of this session via any media type is strictly prohibited.
21 Page 21
From a Forensic Investigation Perspective,
What are We Preparing to Do?
•
•
•
•
•
•
•
•
•
•
Varies from incident to incident, but there are common activities to prepare
for
Evaluation of whether data egress occurred
Identification and evaluation of contents of missing computing devices
Analysis of system access records to evaluate what individuals did in systems
Analysis of data traffic to assess whether ex-filtration occurred
Evaluation of what happened as a result of malware
Evaluation of what is in e-mail boxes
Evaluation of whether there are artifacts of information access
Support a risk of harm assessment
Examples; not a comprehensive list above
Recording of this session via any media type is strictly prohibited.
Page 22
Preparation for Forensic Incident Investigations
Recommendations to help make future investigations effective
1. Prepare a data map, including:
 List of all data systems
 System characteristics, data format, system architecture
 System subject matter experts
 Assess how data can be extracted from each system
 Review and update quarterly
2. Assess and improve (if needed) log retention and
accessibility
Recording of this session via any media type is strictly prohibited.
Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005
Page 23
Preparation for Forensic Incident Investigations
Recommendations to help make a future investigation effective
2. Assess and improve log retention and accessibility
(if needed)
3. Identify service providers and agree to contract terms in
advance
Recording of this session via any media type is strictly prohibited.
Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005
Page 24
Preparation for Forensic Incident Investigations
Recommendations to help make a future investigation effective
4. Engage in response planning
 Division of roles and responsibilities for each common type
of information security incident
 Response steps planning (e.g.- data enrichment for names
and addresses required for notification)
5. Identify formats/patterns/ranges of key identification
numbers
 Identification numbers for individuals your business interacts
with
Recording of this session via any media type is strictly prohibited.
Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005
Page 25
Risk Management and Prevention
Recording of this session via any media type is strictly prohibited.
Page 26
How Do We Protect Ourselves?
• Vendor Management
• Security Awareness/Education
• Basic Data Security Good Practices
• Risk Assessment
• Policies and Procedures
• Consistent Enforcement of Policies & Procedures
• Practice breach response initiative
• Delete data when no longer needed
Recording of this session via any media type is strictly prohibited.
Page 27
Document Retention / Destruction
• How do you control document retention?
– By policy? Oversight & enforcement?
• How long do you need to store data? Why?
• Where do you store old data?
– Backup tapes stored offsite? How secured?
• Do vendors return data or do they keep it?
Recording of this session via any media type is strictly prohibited.
Page 28
Security Awareness & Education
• Initial training at time of hiring
– How do employees spot security problems?
– What is the reporting procedure?
– Are supervisors trained to handle reports from staff (e.g. is a gag order
appropriate)?
• Regular and continued training and awareness
– What does your training program include for security issues and
procedures? Annual?
– Formal online training course vs. in-person?
– Monthly staff meetings?
– Newsletters?
• ePlace resources
Recording of this session via any media type is strictly prohibited.
Page 29
Risk Assessment
• Periodic Review of Administrative Safeguards
• Periodic Review of Physical Safeguards
• Periodic Review of Technical Safeguards
• Periodic Review of the information you are
handling – has it changed?
Recording of this session via any media type is strictly prohibited.
Page 30
Policies & Procedures
• Incident and Breach Response Plan
• Social Media Policy
• Information Security and User Policies
– What users can and must do to use network and organization's computer
equipment
– Define limitations on users to keep the network secure (password policies,
use of proprietary information, internet usage, system use, remote access
• IT Policies
–
–
–
–
–
–
–
Virus incident and security incident
Logs
Backup policies
Server configuration, patch update, modification policies
Firewall policies
Wireless, VPN, router, and switch security
Email retention
Recording of this session via any media type is strictly prohibited.
Page 31
Policies & Procedures (cont.)
• General Policies
– Program Policy
– Crisis Management Plan
– Disaster Recovery
•
•
•
•
•
•
Server Recovery
Data Recovery
End-user Recovery
Phone system recovery
Emergency response plan
Workplace recovery
Recording of this session via any media type is strictly prohibited.
Page 32
Vendor Management
• Service providers
– Mail
– Cleaning
– Security
– Off-site storage/shredding
– Data processing/storage
• Benefits
• Banking
Recording of this session via any media type is strictly prohibited.
33
Page 33
“Dusty Old Contract Provisions”
• Vendor dictates security requirements that
don't reflect current state of the laws
• Liability shifting
• Liquidated Damages
• Force Majeure
Recording of this session via any media type is strictly prohibited.
34
Page 34
Considerations for Incident Prevention/Control
(Forensic/Technical Perspective):
Encryption at rest, on devices, in transit, and of databases
Two-factor authorization
Effective malware detection and response
Employee access monitoring
Quality control in system implementations
– verification of system parameters
SIEM implementation
Recording of this session via any media type is strictly prohibited.
Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005
Page 35
Considerations for Incident Prevention/Control
(Forensic/Technical Perspective):
Control email box size
Education of employees
Don’t email data within an organization
Perform data processing on a server or in a database
Control and limit data access (need to know)
Effective detection and monitoring
Recording of this session via any media type is strictly prohibited.
Adapted from Source: ©Teacher & Educational Development, University of New Mexico School of Medicine, 2005
Page 36
Regulatory and Legal
Considerations
Recording of this session via any media type is strictly prohibited.
Page 37
What Will You Encounter?
• Issuing banks advising
cardholders
• Forensic investigation
• Media & customer inquiries
• Regulatory inquiries
• Operational challenges
• Decisions on public
statements
• State breach notification law
analysis
•
•
•
•
Law enforcement
Consumer class actions
Issuing bank lawsuits
Card network
fines/assessments
• System remediation and
revalidation
• Reporting of impact
• Regaining customer trust
Recording of this session via any media type is strictly prohibited.
38 Page 38
What Do Regulators Expect?
• Transparency
• Prompt and thorough investigation
• Good attitude & cooperation: commitment to compliance and safeguarding PII
• Appropriate and prompt notification
• Corrective action: know the root cause and address it; staff training; awareness
program; technical safeguards; new policies/procedures/physical safeguards
• Remediation and mitigation
Recording of this session via any media type is strictly prohibited.
39 Page 39
Best Practices
•
•
•
•
•
•
•
Prepare and practice a
response plan
Respond quickly
Bring in the right team
Preserve evidence
Contain & remediate
Let the forensics drive the
decision-making
Law enforcement
•
•
•
•
Document analysis
Involve the C-suite
∙ Be guarded, consistent,
and honest in
communications
Plan for likely reaction of
customers, employees &
key stakeholders
Mitigate harm
Recording of this session via any media type is strictly prohibited.
Page 40
10 Questions You Might be Asked
1. Describe your network
environment.
2. Do you have a network
diagram?
3. Describe the data that
you process or store.
4. Describe the logs that
you maintain.
5. Are you preserving the
environment?
6. Are there critical 3rd
party vendors?
7. What IT resources do
you have?
8. Do you have a WISP or
breach response plan?
9. How did you detect the
intrusion?
10. What have you done so
far?
Recording of this session via any media type is strictly prohibited.
Page 41
What are regulators looking at?
•
•
•
•
•
•
•
•
•
•
•
•
Transparency
Risk assessments
Encryption
Business Associate Agreements (health care)/Vendor Agreements
Minimum necessary (health care)
Documentation of breaches
Policies and procedures
Old data
Prompt and thorough investigation
Good attitude & cooperation (commitment to compliance and safeguarding PII)
Appropriate and prompt notification
Remediation and Mitigation
•Regulators look beyond the breach incident and look at information security enterprise
wide.
Recording of this session via any media type is strictly prohibited.
42 Page 42
Regulatory Scrutiny
• FTC (section 5) – “unfair or deceptive acts or
practices in or affecting commerce”
• HHS OCR (HIPAA Privacy and Security Rules)
• Department of Education
• State Attorneys General
Recording of this session via any media type is strictly prohibited.
43 Page 43
Litigation - Four Big Issues
•
•
•
•
Standing
Theories of harm on the merits
Class certification
Novel theories of liability
Recording of this session via any media type is strictly prohibited.
44 Page 44
Litigation - Standing
• Standing and pleading requirements continue to be significant
hurdles for plaintiffs
• Courts continue to be faced with questions such as:
– Whether the loss of personal information alone is an injury cognizable by law?
– Whether an increased risk of identity theft is sufficient injury?
– Whether unauthorized access to personal information alone causes real
harm?
• So far, most courts answer no
• Require some more tangible injury before a data breach lawsuit can
continue
Recording of this session via any media type is strictly prohibited.
45 Page 45
Litigation – Theories of Harm
•
•
•
•
•
•
•
•
•
•
•
•
Statutory damages
Increased risk of identity theft
Time and effort to monitor/fix credit
Emotional distress
Personal information as property
Invasion of privacy
Breach of contract
Breach of fiduciary duty
Negligence
Unfair, deceptive and unlawful business practices
Defamation, libel, and slander
Unjust enrichment
Recording of this session via any media type is strictly prohibited.
46 Page 46
Litigation – Damages
• The next big issue – even assuming standing, what
damages are recoverable?
• Defines the scope of the potential class and
defendant’s potential liability
• Damages without any identity theft/fraudulent charges
– are these “cognizable”? (No - Pisciotta)
• Some cases have taken a broader view of this, at least
where there has been identity theft/fraudulent charges
(Hannaford)
• If there are allegations of actual identity theft or
fraudulent charges, central issue becomes causation
(AvMed)
Recording of this session via any media type is strictly prohibited.
47 Page 47
Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138 (Feb. 26, 2013)
• Amendments to FISA
• Plaintiffs alleged communications being chilled, increased travel
expenses
• Second circuit: standing (objectively reasonable likelihood)
• Supreme Court – No standing, injury not “certainly impending”
• “[W]e have repeatedly reiterated that threatened injury must be
certainly impending to constitute injury in fact, and that allegations of
possible future injury are not sufficient.”
– The Court held plaintiffs also cannot “manufacture standing” by incurring
expenses to mitigate against non-imminent harm
• Clapper applied in data breach cases
– Polanco v. Omnicell (D.N.J.)
– In re Barnes & Noble (N.D. Ill.)
Recording of this session via any media type is strictly prohibited.
48 Page 48
Litigation – Theories of Liability
• Negligence
– Economic loss rule
– Impact rule – alleged emotional distress
• Breach of Implied Contract (Hannaford, Avmed)
• Breach of fiduciary duty
– Good body of case law holding no fiduciary duty to
safeguard information
• Invasion of privacy claims
• Consumer protection statutory claims
• Federal statutory claims – Stored Communications Act,
Fair Credit Reporting Act
Recording of this session via any media type is strictly prohibited.
49 Page 49
Litigation – Class Certification
• Limited case law on whether certification proper in the
privacy context
– Hannaford – No, but might statistical evidence suffice?
– Data collection cases have fared better, especially when
there are statutory damages at stake – E.g. comScore v.
Dunstan (N.D. Ill. 2013)
• Major issues in data breach class actions
– Predominance
• Causation – is this an individual question?
• Damages – can plaintiff prove them statistically?
– Superiority – what if the defendant offered relief?
Recording of this session via any media type is strictly prohibited.
50 Page 50
Case Study: Anatomy of a Breach
Recording of this session via any media type is strictly prohibited.
Page 51
Incident Background
•Lost Laptop
 Not encrypted
 Belonged to an employee that works with
sensitive data
 Reported five (5) days after the loss
 Occurred in another state while the employee
was traveling
Recording of this session via any media type is strictly prohibited.
Page 52
Initial Considerations for a Forensic Investigation
… What type of computer, size, operating
system did it have?
… Has the laptop been recovered?
… Is there a recent backup of the laptop?
… What proxies exist that may indicate the data
on the lost laptop?
… Change user credentials
Recording of this session via any media type is strictly prohibited.
Page 53
Forensic Considerations for a Recovered Laptop
•
•
Prepare image of laptop
Has anyone logged onto the computer since it went missing?
•
•
•
•
•
•
If yes, by which user account and when?
Was the email software opened during the period it was
unaccounted for?
Were other files accessed?
DVD and USB usage?
What internet sites were connected to during the period it
was unaccounted for?
Assess file access dates
Recording of this session via any media type is strictly prohibited.
Page 54
Case Study: Anatomy of a Breach
Analysis Steps for Laptop Not Recovered
•Starting Point: Best available data source for
what was on the computer at the time of the
loss.
•Goal: Mine the data contents to identify the
files that contain PHI and/or PII and the
identifiers for the specific individuals contained
in such files.
Recording of this session via any media type is strictly prohibited.
Page 55
Case Study: Anatomy of a Breach
Analysis Steps for Laptop Not Recovered
•Solution: Forensic analysis tools and
sophisticated data mining.
•Next Step: Enrich the data to get names and
current addresses. This can usually be
accomplished by running a query against certain
systems in your organizations.
Recording of this session via any media type is strictly prohibited.
Page 56
Case Study: Anatomy of a Breach
After the Forensic Analysis
•
•
•
•
•
•
Select notification/call center vendor
Prepare notification letter
Prepare answers to frequently asked questions
Address going forward prevention steps
Determine “offering” to impacted individuals
Send notification letters out
Recording of this session via any media type is strictly prohibited.
Page 57
Insider Perspective - Client Risk
Management
•
•
•
•
Key Internal Relationships
IT (especially IT Security)
Legal
Security
Operating Units
Recording of this session via any media type is strictly prohibited.
Page 58
Insider Perspective - Client Risk Management
Processes to have in place
• Cyber-specific Incident Response Plan
•
Annual test
• External legal counsel and Forensics vendors hired
• Claims Dept. relationships with broker and primary
Cyber carrier
•
Leverage broker & carrier resources
• Contract input whenever network access involved
•
Cloud providers
• Re-visit exposures annually
Recording of this session via any media type is strictly prohibited.
Page 59
Insider Perspective - Closing Considerations
• Remember Watergate - It’s the cover-up not the crime that gets you
in the most trouble.
• Dealing with data breaches, many times the most substantive fall
out comes not from the breach itself but from the government and
plaintiffs' bar lifting the hood to see what your privacy practices
actually are.
• Infrastructure costs – Privacy by design is much cheaper in the long
run than privacy by government or class action fiat.
• Turn risk management into legal investment reputation preserving
and branding opportunity – Security as a value proposition to
customers, consumers, regulators and business partners
• Be forward thinking – Mobile, Cloud, BYOD
Recording of this session via any media type is strictly prohibited.
60 Page 60
Heartbleed
•
•
•
•
•
•
Vulnerability in OpenSSL Encryption Cryptographic Software
OpenSSL is used encrypt internet data traffic
OpenSSL is widely used by U.S. businesses
New version of OpenSSL is available
New version has been implemented by many companies
Before implementation of the fix, data traffic thought to have been
encrypted could have been exposed
• Other complex security considerations
• Potential exposure since December 2011
• Fix become available April 7th
Recording of this session via any media type is strictly prohibited.
Page 61
Contact Information
Ted Kobus, Esq. tkobus@bakerlaw.com
(212) 271-1504
Katherine Keefe, Esq. katherine.keefe@beazley.com
(215) 446-8421
Steve Visser svisser@navigant.com
(303) 383-7305
Jim Morley morleyjamesp@johndeere.com
(309) 765-5377
Recording of this session via any media type is strictly prohibited.
Page 62
EVALUATION/SURVEY
Please complete the session survey on the RIMS14 mobile application.
Recording of this session via any media type is strictly prohibited.
Page 63
Download