Ironshore Data Privacy CE/CLE Seminar September 17, 2014 1 Life Cycle of a Breach Identification of the Threat or Security Incident What just happened? Triggering the Incident Response Team Making sure the right people / partners are part of the team Containment Have you stopped the “bleeding”? Remediation Have you taken steps to prevent this type of event from occurring in the future? Notification – and beyond Overview You are part of a company that operates retail stores throughout the United States. Payment-card and HR processing is handled by your corporate offices for all stores. The Company employees approximately 20,000 employees. 3 Cyber Attack! ATTACK! 4 SQL Demo SQL Injection 8/21/2014 Rafael Negron SQL Injection What is SQL? SQL Changes o Used to store, edit, and retrieve database data SQL o Applications issue SQL commands that manage data Database Retrieval o SQL: Structured Query Language Web Application SQL Injection Web Application Changes o Malicious SQL statements, are intended to do things, such as display, “Username and Password” Retrieval o Malicious SQL statements are inserted into an entry field for execution Database SQL Mini-Lesson "Users" Table UserName FirstName LastName Password CJONES Cynthia Jones XXXXXX BSMITH Bill Smith YYYYYY SKING Susan King ZZZZZZZ RSMITH Rob Smith AAAAA SELECT UserName, Password Column data returned FROM Users Table containing data WHERE LastName = 'Smith' Criteria rows must meet Query Results UserName Password BSMITH YYYYYY RSMITH AAAAA Exploitation Methodology Step 1 Scan Step 1 Vulnerability Assessment Step 3 Remote Exploitation Step 3 Privilege Escalate Windows Passwords SQL Demonstration Pass The Hash Pass The Hash Demo What Just Happened? Your Company was the victim of a sql injection attack against a web application that provided information on customers who had purchased the Company’s services. The hacker appears to have gained access to a database that was serving the web application. Question: What Do You Do? 19 Information Exposed The initial investigation shows that the database contained employees’ names, addresses, social security numbers, driver’s license numbers, position, and bank account information. The database has been operational for 5 years. The database appears to have stored cardholder information for repeat customers. Question: Now what? Does this impact your initial plan of action? 20 Monkey Wrench #1 You just learned that Brian Krebs, an online reporter who is credited with breaking the story that Target had been breached, and is followed by thousands of other publications, posted a story on his blog that the Company appears to have been breached. The story mentions that the Company failed to return phone calls for two days. 21 Monkey Wrench #2 The CEO of the Company contacts you, and tells you that he just received an e-mail from an unknown e-mail address, informing him that this person has the personal information of the CEO and his daughter, provides his driver’s license as proof, and threatens to post it online unless the CEO pays a ransom. 22 Update From Investigation The database contained a link to an application that was connected to the Company’s payment processing system, which is centrally located at the Company’s headquarters. The application automatically updated information for repeat customers, but also allowed the hacker to potentially access the payment card information of all customers, exposing over 2 million credit cards. Monkey Wrench #3 The FBI has just showed up at your door, and wants access to your data center so it can image your computers and servers in order to investigate the cyber attack. 24 Money Wrench #4 In the midst of your investigation, you receive an Inquiry from regulatory agency requesting more information about the event, asking for policies and procedures, and seeking a meeting. 25 Summary Responding Quickly, But Effectively Matters Know Who Your “Team” Members Are Before You Have An Event - Internal And External Training And Education Matters! No Two Events Are Alike - Expect The Unexpected 26 Ironshore Data Privacy CE/CLE Seminar September 17, 2014 27 CYBER RISKS THE BUCK STOPS WITH THE BOARD Panelists: Anjali C. Das, Partner Wilson Elser, LLP Ty R. Sagalow, President Innovation Insurance Group, LLC William A. Boeck, SVP Lockton Companies Lindsay B. Nickle, Partner Wilson Elser, LLP Kristi Janicek, Ironshore Brenda Barnat, Abernathy MacGregor Group 28 CYBER RISKS THE BUCK STOPS WITH THE BOARD OVERVIEW Corporate Exposures for a Data Breach Lack of Board Oversight for Data Privacy and Security SEC Guidance and Enforcement Rise in Shareholder Litigation Against D&Os Corporate Governance and Cyber Risk Management Cyber Insurance versus Other Insurance 29 CYBER RISKS THE BUCK STOPS WITH THE BOARD DATA BREACHES IN THE NEWS Target Neiman Marcus Advocate Healthcare Twitter Adobe Facebook Living Social Evernote Federal Reserve Bank 30 CYBER RISKS THE BUCK STOPS WITH THE BOARD CORPORATE EXPOSURES FOR A DATA BREACH 31 CYBER RISKS THE BUCK STOPS WITH THE BOARD Average Data Breach Response Costs Avg. total organizational cost of breach ($5,403,644) Avg. detection costs ($395,262) Avg. notification costs ($565,020) Avg. remediation costs ($1,412,548) Avg. lost business costs ($3,030,814) $200 a record Note: Figures do not include mega breaches in excess of 100,000 breached records Source: Ponemon Institute 2013 Cost of Data Breach Study 32 CYBER RISKS THE BUCK STOPS WITH THE BOARD Other Breach Related Costs Litigation costs Consumer class actions Shareholder suits Government investigations and proceedings Impact on corporate finances Cash flow Loan covenants and credit Shareholder value Reputational injury and loss of business 33 CYBER RISKS THE BUCK STOPS WITH THE BOARD Adverse Impact on Target’s Corporate Financials 5.5% decrease in sales in 4Q 2013 “Meaningfully softer results” following news of the breach 11% drop in stock price Reputational injury 34 CYBER RISKS THE BUCK STOPS WITH THE BOARD Target Data Breach Related Costs $88 million incurred for data breach response costs and related expenses to date Amounts include internal investigation costs credit monitoring staffing call centers $52 million in expected insurance recoveries $100 million in dedicated cyber liability insurance 35 CYBER RISKS THE BUCK STOPS WITH THE BOARD Target Management Shake Up CIO/CEO “resignations” CFO testifies before Congress Shareholder proxy advisor ISS recommends ousting Board members Appointment of new Chief Information Security Officer 36 CYBER RISKS THE BUCK STOPS WITH THE BOARD LACK OF BOARD OVERSIGHT FOR DATA SECURITY 37 CYBER RISKS THE BUCK STOPS WITH THE BOARD “Only a few executive officers understand security and the rest are clueless. . . . [T]his causes a big disconnect between the people performing information security to protect an organization’s data and the top-level executives at the organization.” Source: Larry Ponemon, Founder of the Ponemon Institute 38 CYBER RISKS THE BUCK STOPS WITH THE BOARD Many Boards are reassessing their skills in cyber risk management Experience in overseeing the growing threat of cyber security risk is one of the key attributes Boards will consider when appointing new directors IT expertise is now considered one of the top 5 attributes for today’s Board members Only 11% of Boards are “very confident” of their ability to manage cyber risk Source: NYSE 2014 Survey: What Directors Think 39 CYBER RISKS THE BUCK STOPS WITH THE BOARD SEC GUIDANCE AND ENFORCEMENT FOR DATA SECURITY AND PRIVACY 40 CYBER RISKS THE BUCK STOPS WITH THE BOARD SEC Cyber Risk Disclosure Guidance Discussion of aspects of business or operations that give rise to material cyber risks (costs and consequences) Outsourced functions that may give rise to a cyber risk and how company manages that risk Description of material cyber incidents to date (costs and consequences) Risks related to cyber incidents that may remain undetected for an extended period Description of relevant insurance coverage 41 CYBER RISKS THE BUCK STOPS WITH THE BOARD 5/1/13 Letter from SEC Chair Mary Jo White to Senator Rockefeller highlights the SEC’s interest in cyber risk Cybersecurity risks are an “increasing concern” for public companies and financial markets Since 2012, the SEC has issued 50 comment letters to companies regarding their cyber risk disclosures SEC continues to “prioritize” this issue SEC is evaluating the “efficacy” of its guidance Possibility that the SEC consider further action on this topic 42 CYBER RISKS THE BUCK STOPS WITH THE BOARD “Boards that choose to ignore, or minimize, the importance of cybersecurity oversight responsibility, do so at their own peril.” SEC Commissioner Luis Aguilar speaking at the NYSE Conference: Cyber Risks and the Boardroom (June 10, 2014) 43 CYBER RISKS THE BUCK STOPS WITH THE BOARD SEC “Blueprint” of Cybersecurity Issues for Wall Street Firms 1. Inventory of information security assets 2. Dedicated employees responsible for monitoring and detecting cybersecurity threats 3. Cyber liability insurance 4. Security policies, practices, and internal controls 5. Cybersecurity risks associated with third party vendors, service providers, and business partners 44 CYBER RISKS THE BUCK STOPS WITH THE BOARD D&O CYBER EXPOSURE: THE NEW FRONTIER FOR SHAREHOLDER SUITS 45 CYBER RISKS THE BUCK STOPS WITH THE BOARD Securities Class Actions Was there a stock drop following news of big data breach Did the D&Os knowingly conceal a material cyber risk (scienter) Were the stock losses caused by the bad news or by a “corrective disclosure” (loss causation) Did company adequately disclose cyber risks in its filings (per SEC guidance) 46 CYBER RISKS THE BUCK STOPS WITH THE BOARD Derivative Actions Breach of fiduciary duties and lack of oversight by Board Weak internal controls for cyber risk Damages to company resulting from data breach or other cyber threat 47 CYBER RISKS THE BUCK STOPS WITH THE BOARD Target Shareholder Suits Shareholder derivative suits against Target’s D&Os for breach of fiduciary duty related to the 2013 data breach Suits filed in Minnesota federal court Suits name CEO, CFO, CIO and Board of Directors D&Os allegedly failed to: (1) promptly notify customers of the data breach, and (2) implement internal controls to detect and prevent a data breach Complaints highlight Company’s Privacy Policy Company allegedly failed to use the PCI Data Security Standard for large retail companies 48 CYBER RISKS THE BUCK STOPS WITH THE BOARD Company’s Purported Damages 1. Reputational injury and loss of business 2. Loss of revenue and profits 3. Costs of defending and/or settling consumer class actions 4. Costs incurred in response to government investigations 5. Costs incurred from Company’s internal investigation 6. Data breach remediation costs 49 CYBER RISKS THE BUCK STOPS WITH THE BOARD Corporate Governance and Cyber Risk Management Best Practices 50 CYBER RISKS THE BUCK STOPS WITH THE BOARD SEC Recommendations to Boards to Manage Cyber Risk 1. Use the NIST Framework as Guidance 2. Retain Directors with technical and security expertise 3. Companies should have skilled employees to manage cyber risk on a day-to-day basis 4. Boards should make sure that companies have a tested data breach response and recovery plan in place 51 CYBER RISKS THE BUCK STOPS WITH THE BOARD National Institute of Standards & Technology Framework 1) Identify critical IT and electronic data assets 2) Protect these assets 3) Detect cybersecurity threats 4) Respond to cyber attacks (breach response plan) 5) Recover lost, stolen, or impaired assets (recovery plan) 52 CYBER RISKS THE BUCK STOPS WITH THE BOARD Privacy Policy Due Diligence Who is responsible for Privacy Policy (i.e., Chief Privacy Officer) What PII does the Company collect From which states/countries is PII collected Who has access to the PII (both inside and outside the Company) Drafting the Privacy Policy Does it provide notice of the Company’s collection of PII Does it provide consumers with opt-in/opt-out for use of their information Is PII being protected through appropriate (industry standard) security Is the Policy prominently located on the Company’s Website Compliance/Auditing Are employees trained on protecting PII Does the Company employ effective security measures to protect PII Does the Company periodically audit compliance with its Privacy Policy 53 CYBER RISKS THE BUCK STOPS WITH THE BOARD Contracts with Vendors/Business Associates ID type of data to be stored or processed (PHI, PII, etc.) Where will data be stored, transferred, access Specify baseline security standards that Vendor must adhere to Does Vendor have its own Privacy Policy Definition of a reportable security breach Who will be responsible for notifying consumers (Company or Vendor) Data disposal and deletion requirements and time-frame Company’s right to audit Vendor for compliance with data security/privacy Address Vendor’s use of Subcontractors Who has to comply with what laws, and who is financially responsible (Company or Vendor, or both) 54 CYBER RISKS THE BUCK STOPS WITH THE BOARD More Data Security Policies and Procedures Training employees Restricting users and access to network resources Implementing a process for managing IT assets Adopting a security policy that addresses mobile media Maintaining controls to secure portable media Maintaining protection against DDoS attacks Maintaining a written data destruction policy Maintaining a written cybersecurity breach response plan Testing computer backup systems Using data encryption Conducting periodic audits to ensure compliance with security policies 55 Carnegie Mellon’s Corporate Governance Best Practices Checklist for Cyber Risk Establish a Board Cyber Risk Committee Recruit directors with IT and security expertise Conduct an annual audit of security and breach response programs and controls Require management to give periodic reports on privacy and security risks Require the Board to conduct an annual review of budgets for privacy and security risk management Evaluate potential liabilities and losses for cyber risk Review the adequacy of cyber risk insurance coverage 56 CYBER RISKS THE BUCK STOPS WITH THE BOARD Privacy and Security Risk Disclosures Privacy concerns relating to our technology could damage our reputation and deter current and potential users from using our products and services. In addition, as nearly all of our products and services are web-based, the amount of data we store for our users on our servers (including personal information) has been increasing. Any systems failure or compromise of our security that results in the release of our users’ data could seriously limit the adoption of our products and services, as well as harm our reputation and brand and, therefore, our business. We expect to continue to expend significant resources to protect against security breaches. The risk that these types of events could seriously harm our business is likely to increase as we expand the number of web-based products and services we offer, and operate in more countries. (Source: Google Form 10-Q 7/24/14) 57 CYBER RISKS THE BUCK STOPS WITH THE BOARD Privacy and Security Risk Disclosures We experienced a significant data security breach in the fourth quarter of fiscal 2013 and are not yet able to determine the full extent of its impact and the impact of government investigations and private litigation on our results of operations, which could be material. We are currently subject to a number of governmental investigations and private litigation and other claims relating to the Data Breach, and in the future we may be subject to additional investigations and claims of this sort. These investigations and claims could have a material adverse impact on our results of operations or profitability. Finally, we believe that the greatest risk to our business arising out of the Data Breach is the negative impact on our reputation and loss of confidence of our guests, as well as the possibility of decreased participation in our REDcards Rewards loyalty program which our internal analysis has indicated drives meaningful incremental sales. (Source: Target Form 10-K 3/14/14) 58 CYBER RISKS THE BUCK STOPS WITH THE BOARD Don’t Count on Traditional Insurance to Respond to Cyber Exposures CGL Coverage D&O Insurance Cyber Liability Insurance 59 CYBER RISKS THE BUCK STOPS WITH THE BOARD CGL Policy Coverage A: Bodily Injury or Property Damage Property damage means physical injury to tangible property, including loss of use of property Is electronic data physical or tangible property? Evolution of ISO standard form CGL Policies Pre-2001: No exclusion for electronic data Post-2001: Electronic data excluded Post-2004: Exclusion for damages arising out of the loss of, damage to, corruption of, or inability to access electronic data 60 CYBER RISKS THE BUCK STOPS WITH THE BOARD CGL Policy Coverage B: Personal and Advertising Injury Includes “oral or written publication of material that violates a person’s right to privacy” Coverage B might apply to theft of consumer data or misuse of customer information Post-2001 ISO standard form CGL policy exclude coverage for Internet-related activities 61 CYBER RISKS THE BUCK STOPS WITH THE BOARD New ISO Exclusion for CGL Policies 1). Arising out of any access or disclosure of any person’s or organization’s confidential or personal information; OR 2). Arising out of the loss of, damage to, corruption of, or inability to access or manipulate electronic data 62 CYBER RISKS THE BUCK STOPS WITH THE BOARD Public Company D&O Policy Coverage for shareholder suits Limited coverage for investigations Entity coverage limited to Securities Claims No specific cyber exclusions Bodily injury and property damage exclusion Personal injury exclusion Other insurance provision 63 CYBER RISKS THE BUCK STOPS WITH THE BOARD Private Company D&O Policy Duty to defend Broad entity coverage Could include claims for negligence for failure to reasonably safeguard customer information Bodily injury / property damage exclusion that applies to injury to physical or tangible property Personal injury exclusion that applies to claims for “invasion of privacy” Courts have held that loss or theft of PII pursuant to a data breach does not give rise to a typical tort claim for invasion of privacy 64 CYBER RISKS THE BUCK STOPS WITH THE BOARD Cyber Liability Policy 1. First Party Coverage, including: Breach notification costs Forensic investigation Credit monitoring or identity theft Public relations / crisis management Call centers 2. Business Interruption Coverage 3. Cyber Extortion Coverage 4. Third Party Claims against Insureds 5. Regulatory Investigations 65 CYBER RISKS THE BUCK STOPS WITH THE BOARD D&O and Corporate Cyber Exposure Takeaways The buck stops with the Board No companies are immune to a data breach If the Target shareholder suits gain traction, more may follow Companies should have adequate cyber risk management policies and procedures Boards should be well-informed of cyber risks Duty to disclose material cyber risks Boards should consider how insurance responds to cyber-related claims 66 CYBER RISKS THE BUCK STOPS WITH THE BOARD HYPOTHETICAL DATA BREACH SCENARIO & MOCK EMERGENCY BOARD MEETING 67 Ironshore Data Privacy CE/CLE Seminar September 17, 2014 68 Imagine someone trying to break into your house. Now imagine it 60,000 times a day. http://www.ibm.com/smarterplanet/ie/en/business_resilience_management/overview/inde x.html?re=spf 69 Agenda From a forensic, legal, and insurance perspective: Bring Your Own Device (BYOD) Vendor and Supply Chain Risks What Data Do I Collect, Where Is My Data, Who Has Access To My Data The Insider Threat 70 Thank You For Attending Company Panel Participants: 71