Cybersecurity: Opportunities & Pitfalls for Selling in the US Marketplace Enterprise Ireland Forum David Z. Bodenheimer June 16, 2009 Crowell & Moring LLP © 2009 Crowell & Moring LLP Urgency for Cyber Defense The Cyber Crisis is Now!! – Everyone Agrees Congress: “time to combat cyber terror was yesterday” (Senators Rockefeller & Snowe, May 29, 2009) Whitehouse: “This status quo is no longer acceptable” (President Obama, May 29, 2009) Industry: “Quite frankly, the bad guys are winning” (Cyber Security Industry Alliance testimony, Mar. 12, 2008) Cyber Report: “one of the most urgent national security problems” (CSIS Commission on Cybersecurity, Dec. 2008) 2 Signs of the Cyber Apocalypse © 2009 Crowell & Moring LLP 262 Million Breaches No One Remains to Have an ID Stolen “2008 Data Breach Total Soars: 47% Increase over 2007” Identity Theft News (Identity Theft Daily, Jan. 5, 2009) Records with sensitive personal information involved in security breaches in the U.S. since January 2005: 262,442,156 records (Privacy Rights Clearinghouse, June 11, 2009) “Millions of Americans have been victimized, their privacy violated, their identities stolen, their lives upended, and their wallets emptied.” (President Obama, May 29, 2009) 4 Cyber-Crime > $100 Billion Hacking is More Lucrative than Doping INTERNET LAW – “Cyber-Crime Hits $100 Billion in 2007, Out-earning Illegal Drug Trade” (IBLS Internet Law, Oct. 15, 2007) “$1 trillion globally in lost intellectual property and expenditures for repairing the damage” (House Homeland Security Committee Hearing, Mar. 31, 2009) > 5 President’s Data Breached Any Hacker Can Pretend to the Throne “Source In Iran Sees Plans for President’s Chopper” (USA Today, Mar. 2, 2009) “The U.S. Navy is investigating how an unauthorized user in Iran gained online access to blueprints and other information about a helicopter in President Obama’s fleet.” Hacking Obama’s Website “It’s no secret that my presidential campaign harnessed the Internet and technology to transform politics. What isn’t widely known is that during the general election hackers managed to penetrate our computer systems.” (President Obama, May 29, 2009) 6 Infrastructure at Risk The Scary Names Are Used Up “Cyber Katrina” “Digital Pearl Harbor” “Cyber Barbarians Storming the Security Walls” 7 Everyone’s On-Board Government & Industry Agree “Cybersecurity . . . a top priority” (DHS Secretary nominee Janet Napolitano, Jan. 15, 2009) “DHS Puts Cybersecurity Toward Top of 2008 To-Do List” (DHS Secretary Chertoff, Federal Computer Week, Dec. 13, 2007) “Data Breach Likely to be Hot Topic at Porn Summit” (Technology Daily, Jan. 14, 2008) XXX 8 Cybersecurity in US: Top Priority & Huge Market © 2009 Crowell & Moring LLP U.S. Federal IT Marketplace 800-Pound Information Gorilla “The Federal government is the largest single producer, collector, consumer, and disseminator of information in the United States and perhaps the world.” (OMB, 2007) US IT Budgets • $72.9 billion – (FY O9) • $75.8 billion – (FY 10) 10 US Federal Information Information Treasure Trove • National Security • Personal Data • Infrastructure Data • Technology • Trade Secrets 11 US Federal Cybersecurity Information Security Spending • $14.6 Billion – (FY 09) • $25.5 Billion – (FY 13) • $30-40 Billion – (Next 5 Years) 12 US Homeland Security Homeland Security Priorities & Dollars • 6% FY10 DHS Budget (FY10) over FY09 • $7.5 Billion (12% ) – Transportation Security • $918 Million (15% ) – Critical Infrastructure – Electrical Grid – Financial Sector • $127 Million (30% ) – Inspector General 13 US Healthcare Technology Heathcare Technology Priorities & Dollars • Top Presidential Priority • Health Information Technology for Economic & Clinical Health (HITECH, Title XIII, ARRA) • $31 Billion Infrastructure & Health Information Technology • $19 Billion Health IT • 33% in Veterans Administration IT Budget Computerizing America’s health Records in five years. The current, paper-based medical records system that relies on patients’ memory and reporting of their medical history is prone to error, time-consuming, costly, and wasteful. With rigorous privacy standards in place to protect sensitive medical records, we will embark on an effort to computerize all Americans’ health records in five years. This effort will help prevent medical errors, and improve health care quality, and is a necessary step in starting to modernize the American health care system and reduce health care costs. 14 Global Cyber Markets Cyber Gold Rush Global Arms Race “Contractors Vie for Plum Work, Hacking for U.S.” “Cyber security the new ‘arms race’” Van Loan “Nearly all of the largest military companies – including Northrop Grumman, General Dynamics, Lockheed Martin, and Raytheon – have major cyber contracts with the military and intelligence agencies.” (NYT, May 31, 2009) “I really look at [cybersecurity] almost as the new arms race. There isn’t a day that goes by without someone somewhere trying to breach the Government of Canada’s information systems.” (Public Safety Minister Van Loan, CTV News, May 27, 2009) 15 Congress’ Cyber Scrutiny Congressional Pressure (2008-2009 Actions) • Congressional Scrutiny – Over 30 Hearings & Actions – 9 Different Committees • GAO Reviews – Congress’ Investigative Arm – 22 Reports on Cyber Issues • Legislative Actions – Senate Bill (S. 773) – House Bill (H.R. 2195) 16 Presidential Priority Presidential Priority “My administration will pursue a new comprehensive approach to securing America’s digital infrastructure. This new approach starts at the top with this commitment from me: From now on, our digital infrastructure – the networks and computers we depend on every day – will be treated as they should be: as a strategic national asset. Protecting this infrastructure will be a national security priority.” (President Obama, May 29, 2009) 17 Expanding Security Rules OMB (whitehouse.gov/omb) OMB Circular A-130, Transmittal Memorandum #4, Management of Federal Information Resources (Nov. 28, 2000) OMB Memo M-08-09, New FISMA Privacy Reporting Requirements for FY 2008 (Jan. 18, 2008) OMB Memo M-07-16, Safeguarding Against and Responding to the Breach of Personally Identifiable Information (May 22, 2007) NIST (csrc.nist.gov) SP 800-53 A Guide for Assessing the Security Controls in Federal Information Systems (July 2008) SP 800-53 Rev. 3 DRAFT Recommended Security Controls for Federal Information Systems and Organizations (Feb. 5, 2009) SP 800-61 Rev. Computer Security Incident Handling Guide (Mar. 2008) SP 800-83 Guide to Malware Incident Prevention and Handling (Nov. 2005) SP 800-100 Information Security Handbook: A Guide for Managers (Oct. 2006) SP 800-122 DRAFT Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (Jan. 13, 2009) 18 Cybersecurity Technology Opportunities And Challenges • No Technology Limits • Product Differentiation • No Boundaries • Customer Fragmentation • Dual-Use Technologies • Private-Use Barriers • Instant Demand • Development Funds??? – Data Mining & Analysis – Encryption & Biometrics – Penetration & Detection – Federal, State, Local – International – Public/Private – Ready-to-go Technology – Multiple Solutions – Little Effectiveness Proof – No Central Data Bank – No Single Entry Point – Export Restrictions – National Security – Short-term Horizon 19 Questions? David Z. Bodenheimer Crowell & Moring LLP dbodenheimer@crowell.com (202) 624-2713 8180322 20