Annual Seminar on Risk Management and Regulatory Examina7on/Compliance Issues Affec7ng Interna7onal Banks. October 7, 2014

Size: px
Start display at page:

Download "Annual Seminar on Risk Management and Regulatory Examina7on/Compliance Issues Affec7ng Interna7onal Banks. October 7, 2014"

Transcription

1 Annual Seminar on Risk Management and Regulatory Examina7on/Compliance Issues Affec7ng Interna7onal Banks October 7, 2014 Regulatory Expecta7ons for an Effec7ve Cyber Security Program Walter J. Mix III, Director/Financial Services Prac7ce Group Leader, BRG Nicole Jacoby, Special Counsel, Banking Division New York State Department of Financial Services Alan Avery, Partner, Lathan & Watkins LLP Stuart D. Levi, Partner, Skadden Arps, Slate, Meagher & Flom LLP

2 Summary of Presenta/ons 1. Overview of Enterprise Cyber Security and Risk Management Issues Walter J. Mix III, Director/Financial Services Prac7ce Group Leader, BRG 2. DFS Cyber Security Ini/a/ve - Nicole Jacoby, Special Counsel, Banking Division, New York State Department of Financial Services 3. Regulatory Expecta/ons for an Effec/ve Cybersecurity Program - Federal Ini/a/ves - Alan Avery, Partner, Latham & Watkins LLP 4. Cybersecurity 2014: The State of Li/ga/on - Stuart Levi, Partner, Skadden Arps, Slate, Meagher & Flom LLP 2

3 Overview of Enterprise Cyber Security and Risk Management Issues Presenter: Walter J. Mix III, Director/Financial Services Prac7ce Group Leader, BRG Tel: (213) ; expert.com Berkeley Research Group LLC (BRG) 550 Hope Street, Suite 2150, Los Angeles CA Website: expert.com 3

4 Overview 1. Governmental/Regulatory Responses 2. Cyber Security Acacks 3. Defini7ons 4. Bank Technology and Cyber Security Program - Bank Technology - Informa7on Security 5. Enterprise Security Strategy 6. Incident Response Team 7. Incident Priori7za7on 8. Issues Going Forward 9. Ques7ons 4

5 Governmental Regulatory Responses v FBI Cyber Acacks Eclipsing Terrorism v State Regulators v Federal Reserve v OCC v FDIC v SEC v Included in examina7on process v Safety and soundness issue 5

6 Cyber Security Acacks Breaches and Data Loss Verizon publishes an annual Data Breach Security Report. Last year s report analyzed 621 confirmed data breaches. Some of the findings were: 69% of breaches were spoced by an external party 9% were spoced by customers Social tac7cs using , phone calls and social networks to gain informa7on on individuals are olen ignored, but contributed to 29% of acacks. 76% of network intrusions exploited weak or stolen creden7als. Strict policies are required to reduce this easily preventable risk. 6

7 Cyber Security Acack Map.ipviking.com 7

8 Defini/ons o Cyber Security Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or acack o Malware Malicious solware programs designed to damage or perform unwanted ac7ons against computers and computer systems o Hacking A person who secretly gets access to a computer system in order to get informa7on, cause damage, etc. : a person who hacks into a computer system o Data Loss Loss of informa7on through hacking, malware or physical stealing of electronic or paper informa7on 8

9 Cyber Security Program Elements of an effec.ve Cyber Security Program o Enterprise Risk Management Opera7onal Risk Corporate Governance o Expect to be acacked and have plans, policies and procedures that have been tested and kept up to date o Policies and Procedures o Plans and Audits o Have test plans for acack scenarios o Early warning and ini7al response ac7ons o Communica7ons plans o Penetra7on tests and security audits o Third Party Provider Audits o Cybersecurity Providers o Make rela7onships with FBI and Law Enforcement before an incident occurs 9

10 Bank Technology and Cyber Security Several factors have led to banks having an7quated technology; Sun- seong legacy systems Implemen7ng new technologies IT resource constraints / ROIs The problems created by these factors include; Inconsistent and unreliable data Data security, data privacy and Cyber Security risk Comprehensive management reports Audits (both internal and regulatory) Enterprise risk management IT risk among highest 10

11 Bank Technology Cyber Security Financial ins7tu7ons are top targets of Cyber Criminals; Acacks on banks make news when they happen and they are happening more frequently and with more sophis7ca7on The profile of an acack and the acackers has changed drama7cally and will con7nue to change Na7on State acacks Organized Crime acacks Newer versions of Malware More sophis7cated acack profiles Costs and reputa7onal risk is high for banks that get acacked Banks are in defensive modes and are struggling to stay up to speed with these changes 11

12 Informa/on Security Informa7on Security methods and processes of protec7ng informa7on q People, Processes and Technology are the components of Informa7on Security People - the biggest security risk because they don t take all the necessary steps to secure access to informa7on Processes banks fail to have proper processes in place for training, disaster recovery and data breaches Technology In many cases, banks do not keep their systems current and have IT resource constraints 12

13 Informa/on Security Best Prac/ces Best prac7ces for protec7ng informa7on exists include: PEOPLE Strong passwords, clean desks, destruc7on of un- needed documents and data, use of encryp7on technology, protec7on of mobile devices and on- going training PROCESSES Training programs for on- boarding employees and for annual cer7fica7ons. Processes for off- boarding employees and receiving back all company informa7on. Disaster recovery plans, Cybersecurity acack plans, IT refresh policies TECHNOLOGY Proper configura7ons of networks and computers, secure wireless networks and secure remote access, current an7- virus and an7spyware solware, upgrades to equipment and proper disposal of older technology 13

14 Enterprise Security Strategy Business Goals and Strategies Informa7on Risk Enterprise Opera/onal Risk Business Opera7ons Risk Legal and Regulatory Risk Regula/ons Threats Threat Strategy Governance and Risk Management Security Service Control Objec7ve Iden7ty and Access Management Security Service Control Objec7ve Enterprise Risk Management Threat Management Security Service Control Objec7ve Data Protec7on Management Security Service Control Objec7ve Secure Applica7on Development Security Service Control Objec7ve Business Con7nuity Security Service Control Objec7ve Physical Security Security Service Control Objec7ve Regulatory Compliance Security Service Control Objec7ve Control Framework 14

15 Incident Response Team Establish Contract With a Third Party Partner 15

16 Incident Priori/za/on Priority Based On: Health and Safety of Staff Confiden7ality, Privacy, and Integrity of Informa7on Business Impact Regulatory / Customer No7fica7on Resource Impact for Eradica7on and Recovery 16

17 Issues Going Forward IT S NOT IF OR WHEN, IT S WHERE Corporate Boards All business sectors Ask: Could this happen to us? Ask: Has this happened to us? Banks Technology Officers Need a strategic/holis7c solu7on Understand the poten7al threats Be proac7ve Future Con7nued evolu7on of acacks Checking the box does not equal security Long- term changes in payment system technology 17

18 QUESTIONS 18

19 DFS Cyber Security Ini/a/ve Presentation by Nicole Jacoby Special Counsel, Banking Division

20 DFS Cyber Security Overview Industry Outreach & Survey Results DFS- Specific Ini7a7ves Next Steps Enhanced IT Examina7ons

21 DFS Cyber Security Industry Survey & Findings Management of IT Systems Informa7on Security Framework Use of Security Technologies Penetra7on Tes7ng Budget & Costs Corporate Governance Incidents & Breaches Planning for the Future Con7nuing Challenges

22 DFS- Specific Ini7a7ves: DFS Cyber Security Anonymous Industry Benchmarking via DFS- hosted Webcast Industry Lecer re FS- ISAC Membership (hcp:// pdf) Report on Cyber Security in the Banking Sector (hcp:// pr140505_cyber_security.pdf)

23 Next Steps: Report on Insurance Industry Enhanced IT Examina7ons: Addi7onal focus in the areas of IT management and governance, incident response and event management, access controls, network security, vendor management, and disaster recovery Holis7c view of an ins7tu7on s cyber readiness Tailored to reflect each ins7tu7on s unique risk profile

24 Regulatory Expectations for an Effective Cybersecurity Program IIB Annual Seminar on Risk Management and Regulatory Examination/Compliance Issues Alan Avery October 7, 2014 Latham & Watkins operates worldwide as a limited liability partnership organized under the laws of the State of Delaware (USA) with affiliated limited liability partnerships conducting the practice in the United Kingdom, France, Italy and Singapore and as affiliated partnerships conducting the practice in Hong Kong and Japan. The Law Office of Salman M. Al-Sudairi is Latham & Watkins associated office in the Kingdom of Saudi Arabia. In Qatar, Latham & Watkins LLP is licensed by the Qatar Financial Centre Authority. Copyright 2014 Latham & Watkins. All Rights Reserved.

25 Federal Regulatory Perspective Recent Initiatives Federal Financial Institutions Examination Council (FFIEC) Cybersecurity and Critical Infrastructure Working Group (CCWIG) Cybersecurity Web Page Cybersecurity Assessment Program SEC Risk Alert on Cybersecurity Preparedness (April 15, 2014) FINRA Cybersecurity Sweep Letter Announcement (January 2014)

26 FFIEC Recent Initiatives Cybersecurity and Critical Infrastructure Working Group (CCWIG) Formed June 2013 Coordinates with intelligence, law enforcement, Homeland Security, and industry officials Seeks to ensure member agencies (CFPB, FDIC, Federal Reserve, NCUA, OCC, State Liaison Committee) have accurate and timely threat information to assist institutions in protecting themselves and customers

27 FFIEC - Recent Initiatives Cybersecurity Web Page Launched June 2014 Central repository for FFIEC-related materials on cybersecurity

28 FFIEC Recent Initiatives Cybersecurity Assessment Program Announced June 2014 Current focus on community institutions Pilot program at 500 community institutions Conducted by state and federal agencies as part of regularly scheduled examinations Designed to give state and federal agencies the ability to assess institutions vulnerability to cyber threats and their preparedness to mitigate risks Key areas of focus: Risk management and oversight Threat intelligence and collaboration Cybersecurity controls Service provider and vendor risk management Cyber incident management and resilience

29 SEC Recent Initiatives Risk Alert on Cybersecurity Preparedness SEC s Office of Compliance Inspections and Examinations (OCIE) announced in a Risk Alert on April 15, 2014, that the SEC would be examining 50 registered broker-dealers and investment advisers to assess cybersecurity preparedness in the securities industry and to obtain information about the industry s recent experiences with certain types of cyber threats.

30 SEC Recent Initiatives As part of this risk assessment, OCIE will conduct examinations that will be focused on: the individual broker-dealer and/or investment adviser s cybersecurity governance; identification and assessment of cybersecurity risks; protection of networks and information; risks associated with remote customer access and funds transfer requests; risks associated with vendors and other third parties; and detection of unauthorized activity and experiences with certain cybersecurity threats.

31 FINRA Recent Initiatives Cybersecurity Sweep Letters FINRA announced in January 2014, that it would be sending sweep letters to broker-dealers asking for information pertaining to their approaches to managing cybersecurity risks in order to assess such broker-dealers approaches to managing threats and protecting their IT systems. These cybersecurity sweep letters are intended to enable FINRA to: understand better the types of threats that firms face; increase its understanding of firms risk appetite, exposure and major areas of vulnerabilities to their IT systems; understand better firms approaches to managing these threats, including through risk assessment processes, IT protocols, application management practices and supervision; and share its observations and findings with firms, where appropriate.

32 FINRA Recent Initiatives The targeted sweep letters focus of the following areas: approaches to information technology risk assessment; business continuity plans in case of a cyber-attack; organizational structures and reporting lines; processes for sharing and obtaining information about cybersecurity threats; understanding of concerns and threats faced by the industry; assessment of the impact of cyber-attacks on the firm over the past 12 months; approaches to handling distributed denial of service attached; training programs; insurance coverage for cybersecurity-related events; and contractual arrangement with third-party service providers

33 Federal Legislation Current Status Cybersecurity Information and Sharing Act of 2014 (S. 2588) Cyber Intelligence Sharing and Protection Act (CISPA) (H.R. 624)

34 Thank You Alan W. Avery Partner, New York E: T: Although this seminar presentation may provide information concerning potential legal issues, it is not a substitute for legal advice from qualified counsel. The presentation is not created or designed to address the unique facts or circumstances that may arise in any specific instance, and you should not and are not authorized to rely on this content as a source of legal advice and this seminar material does not create any attorney-client relationship between you and Latham & Watkins.

35 Cybersecurity 2014: The State of Liitgation Presented by Stuart Levi Beijing Houston PaloAlto Tokyo Boston London Paris Toronto Brussels LosAngeles SãoPaulo Washington,D.C. Chicago Moscow Shanghai Wilmington Frankfurt Munich Singapore HongKong NewYork Sydney Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 35 Skadden, Arps, Slate, Meagher & Flom LLP

36 PRIVACY V. CYBERSECURITY Privacy Privacy policy compliance Big data mining Privacy regulations Internet of things Do not track Location data Global enforcement Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 36 Skadden, Arps, Slate, Meagher & Flom LLP

37 PRIVACY V. CYBERSECURITY Cybersecurity Data breaches Non-data cyber theft Denial of service attacks Compliance with security policies NIST guidelines Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 37 Skadden, Arps, Slate, Meagher & Flom LLP

38 PRIVACY V. CYBERSECURITY Government Spying Snowden revelations Access to records through public companies Government monitoring Global implications Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 38 Skadden, Arps, Slate, Meagher & Flom LLP

39 PRIVACY V. CYBERSECURITY Increased demands for privacy regulation Government spying PRIVACY Data Breaches CYBERSECURITY Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 39 Skadden, Arps, Slate, Meagher & Flom LLP

40 KEY LEGAL THREATS TODAY FTC enforcement activity Misleading consumers by promising industry-standard or robust security Inadequate security protection Shareholder litigation For any cybersecurity loss (not just data breaches)» Denial of service» Loss of intellectual property or confidential information Data breach class actions Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 40 Skadden, Arps, Slate, Meagher & Flom LLP

41 THE RESPONSE CLOCK HAS ACCELERATED HISTORICAL PRACTICE COMPANIES OFTEN DELAYED NOTICE UNTIL FULL FORENSIC ANALYSIS WAS DONE» Provided time to formulate a response and manage PR, communications and legal» Companies often hopeful that forensics analysis would reveal notice was not required» Sometimes delay was required by law enforcement, but this was the exception Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 41 Skadden, Arps, Slate, Meagher & Flom LLP

42 THE RESPONSE CLOCK HAS ACCELERATED Today, companies face a new and pressing reality: Privacy advocates/activists» Learning of breaches and threatening to go public if the company does not disclose» Generally unsympathetic to pleas that the company needs more time to formulate its response Insurance plans may require prompt notice Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 42 Skadden, Arps, Slate, Meagher & Flom LLP

43 THE RESPONSE CLOCK HAS ACCELERATED States starting to define an upper limit on delaying notice California AG Complaint Kaiser Foundation Health Plan» September 24, 2011 Learns an external hard drive with unencrypted personal information was purchased at a third store» December 11, 2011 Obtains hard drive» December 21, 2011 Completes first round of forensic testing» Mid-February 2012 Completes testing» March 19, 2012 Commences notification Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 43 Skadden, Arps, Slate, Meagher & Flom LLP

44 THE FTC AND PLAINTIFF LAWYERS NEED A HOOK The company failed to install or implement adequate security protections. Were there internal or consultant recommendations that were ignored? The company misled customers about the level of its security. The company s procedures or policies were lacking or not followed. Security policies Vendor policies C-suite and/or board was not adequately kept apprised of security procedures. The company took too long to provide notice of a data breach or to respond to an attack Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 44 Skadden, Arps, Slate, Meagher & Flom LLP

45 KEY TAKEAWAY The goal of every company today should be to eliminate as many of these hooks as possible Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 45 Skadden, Arps, Slate, Meagher & Flom LLP

46 STEPS EVERY COMPANY SHOULD BE TAKING TODAY Privacy audit and implementation Risk assessment Establish a rapid response team Testing Privacy by design Evaluate insurance coverage Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 46 Skadden, Arps, Slate, Meagher & Flom LLP

47 DATA SECURITY CLASS ACTIONS ARE ON THE RISE Plaintiffs lawyers are looking to cash in on the increase in data security breaches at retailers, banks and other institutions. Their tool of choice: large-scale class actions based around theories of alleged damage to consumers privacy. While few cases have been filed so far, the number will undoubtedly grow. Examples: In re Sony Gaming Networks & Customer Data Security Breach Litig., No. MDL , 2014 U.S. Dist. LEXIS 7353 (S.D. Cal. Jan. 21, 2014) Amburgy v. Express Scripts, Inc., 671 F. Supp. 2d 1046 (E.D. Mo. 2009) Allison v. Aetna, Inc., 2010 U.S. Dist. LEXIS (E.D. Pa. Mar. 9, 2010) In re Barnes & Noble Pin Pad, 2013 U.S. Dist. LEXIS (N.D. Ill. Sept. 3, 2013) Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 47 Skadden, Arps, Slate, Meagher & Flom LLP

48 DATA SECURITY CLASS ACTIONS ARE ON THE RISE Most cases are brought under the same theories, usually including some combination of claims based on: Violation of state data breach notification laws» 47 states currently have such laws, which vary from state to state Violation of state consumer fraud statutes Negligence Negligent misrepresentation Breach of express and implied contract Breach of express and implied warranties Unjust enrichment Invasion of privacy These claims will usually be governed by the laws of each plaintiff s home state. Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 48 Skadden, Arps, Slate, Meagher & Flom LLP

49 DATA SECURITY CLASS ACTIONS ARE ON THE RISE There are ways to fight back against this new breed of class action. Typical defense arguments on motion to dismiss include: Plaintiffs lack standing Plaintiffs lack cognizable injury Plaintiffs have no private right of action Economic loss doctrine bars plaintiffs claims Consumer fraud claims fail under some states laws Remedial efforts by companies may moot some claims Defending against class certification Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 49 Skadden, Arps, Slate, Meagher & Flom LLP

50 DEFENSES TO DATA SECURITY CLASS ACTIONS Lack of standing For Article III standing, plaintiffs must suffer:» Injury in fact that is concrete and particularized and actual or imminent» Not merely conjectural or hypothetical Most plaintiffs allege damages for risk of future harm Courts disagree whether an increased risk of personal data being misused in the future is sufficient to constitute concrete and imminent injury necessary for Article III standing Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 50 Skadden, Arps, Slate, Meagher & Flom LLP

51 DEFENSES TO DATA SECURITY CLASS ACTIONS Lack of standing Some courts have held that an increased risk of personal data being misused in the future is not sufficient» Amburgy v. Express Scripts, Inc., 671 F. Supp. 2d 1046 (E.D. Mo. 2009) (where no one could say if and/or when any confidential information may be fraudulently used, the likelihood of such an occurrence is speculative, and the time when any such occurrence would come to pass (if ever) is entirely uncertain )» Allison v. Aetna, Inc., 2010 U.S. Dist. LEXIS 22373, at *19-20 (E.D. Pa. Mar. 9, 2010) ( Plaintiff s alleged injury of an increased risk of identity theft is far too speculative ) Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 51 Skadden, Arps, Slate, Meagher & Flom LLP

52 DEFENSES TO DATA SECURITY CLASS ACTIONS Lack of standing There was hope that the U.S. Supreme Court s decision in Clapper v. Amnesty International, 133 S. Ct. 1138, 1147 (2013), would strengthen this argument for defendants But even after Clapper, courts are still divided:» In re Sony Gaming Networks & Customer Data Security Breach Litig., No. MDL , 2014 U.S. Dist. LEXIS 7353 (S.D. Cal. Jan. 21, 2014) ( Although Sony argues that Plaintiffs allegations are insufficient because none of the named Plaintiffs have alleged that their Personal Information was actually accessed by a third party, Clapper does not require such allegations )» In re Barnes & Noble Pin Pad, 2013 U.S. Dist. LEXIS , at *8 (N.D. Ill. Sept. 3, 2013) (under Clapper, [m]erely alleging an increased risk of identity theft or fraud is insufficient to establish standing because threatened injury must be certainly impending to constitute injury in fact, and... [a]llegations of possible future injury are not sufficient ) (quoting Clapper, 133 S. Ct. at 1147) Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 52 Skadden, Arps, Slate, Meagher & Flom LLP

53 DEFENSES TO DATA SECURITY CLASS ACTIONS The economic loss doctrine bars many tort claims Prohibits recovery of purely economic losses in tort absent personal injury or property damage» Not all states have accepted the doctrine Plaintiffs in data security cases will only allege economic losses, if they assert any damages at all» Includes credit monitoring fees, payment of fraudulent charges (that are reimbursed later by the financial institution) or lowered credit score These claims are barred by the doctrine» See, e.g., In re Sony Gaming Networks & Customer Data Security Breach Litig., No. MDL , 2014 U.S. Dist. LEXIS 7353 (S.D. Cal. Jan. 21, 2014) (granting motion to dismiss negligence claims based on economic loss doctrine without leave to amend) Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 53 Skadden, Arps, Slate, Meagher & Flom LLP

54 DEFENSES TO DATA SECURITY CLASS ACTIONS No private right of action under state data breach statutes 47 states have adopted such statutes Most do not provide a private right of action» Example: Amburgy, 671 F. Supp. 2d at 1056 ( [T]he Missouri Attorney General has exclusive authority in bringing claims against data handlers for violation of Missouri s data breach notification law, Mo. Rev. Stat ) But some state statutes do allow private suits» Cal. Civ. Code (b) ( Any customer injured by a violation of this title may institute a civil action to recover damages )» N.H. Rev. Stat. 359-C:21(I) ( Any person injured by any violation under this subdivision may bring an action for damages )» Va. Code Ann (I) ( Nothing in this section shall limit an individual from recovering direct economic damages from a violation of this section ) Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 54 Skadden, Arps, Slate, Meagher & Flom LLP

55 SETTLEMENTS HAVE BEEN MODEST TJ Maxx data breach class settlement was touted as a $41 million settlement» In reality, far fewer class members participated than expected (approximately 3% of eligible individuals)» Total claims were approximately $6.1 million» Plaintiffs attorneys received $6.5 million in fees Curry v. AvMed, Inc., No. 10-CV JLLK (S.D. Fla. Feb. 28, 2014)» Settlement fund is $3 million» If no identity theft, maximum recovery is $30» AvMed will pay actual damages to class members who suffered identity theft (up to $250,000 total) Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 55 Skadden, Arps, Slate, Meagher & Flom LLP

56 SETTLEMENTS HAVE BEEN MODEST In re Countrywide Fin. Corp. Customer Data Sec. Breach Litig., MDL 1998, 2009 WL (W.D. Ky. Dec. 22, 2009)» Settlement included a reimbursement component for class members who suffered identify theft, up to $50,000 per class member, capped at $1m» Also included an offer of free credit monitoring» Company also paid $3.5 million in attorneys fees In re Heartland Payment Sys., Inc. Customer Data Sec. Breach Litig., 851 F. Supp. 2d 1040 (S.D. Tex. 2012)» Settlement provided between $1 million and $2.4 million in benefits to class members» Only 11 valid claims; bulk of the $1 million that the company committed to pay went to cy pres» $600,000 in attorneys fees Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 56 Skadden, Arps, Slate, Meagher & Flom LLP

57 Skadden, Arps, Slate, Meagher & Flom LLP & Affiliates Cyberattacks 2014 How to Prepare Today and Respond Tomorrow 57 Skadden, Arps, Slate, Meagher & Flom LLP

Client Alert. Accountants and Auditors as SEC Whistleblowers. Categories of Persons Eligible or Not Eligible for SEC Whistleblower Awards

Client Alert. Accountants and Auditors as SEC Whistleblowers. Categories of Persons Eligible or Not Eligible for SEC Whistleblower Awards Number 1462 February 5, 2013 Client Alert Latham & Watkins Litigation Department Accountants and Auditors as SEC Whistleblowers Nearly every public company and financial industry firm subject to the enforcement

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

Data Breach Law and Litigation

Data Breach Law and Litigation Technological Evolution The Impact of Social Media, Big Data and Privacy on Business Data Security: Before and After a Breach Occurs Archis A. Parasharami Partner Mayer Brown LLP David Hale Chief Privacy

More information

Insights Conversations: Cybersecurity

Insights Conversations: Cybersecurity January 2015 This article is from Skadden s 2015 Insights and is available at skadden.com/insights. Contributing Partners Cyrus Amir-Mokri New York Patrick Fitzgerald Chicago Marc S. Gerber Washington,

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT Advisor Article DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT By James R. Carroll, David S. Clancy and Christopher G. Clark* Skadden, Arps, Slate, Meagher & Flom Customer data security

More information

SKADDEN, ARPS, SLATE, MEAGHER & FLOM LLP & AFFILIATES CAPABILITIES CYBERSECURITY PREPAREDNESS AND RAPID RESPONSE

SKADDEN, ARPS, SLATE, MEAGHER & FLOM LLP & AFFILIATES CAPABILITIES CYBERSECURITY PREPAREDNESS AND RAPID RESPONSE SKADDEN, ARPS, SLATE, MEAGHER & FLOM LLP & AFFILIATES CAPABILITIES CYBERSECURITY PREPAREDNESS AND RAPID RESPONSE 94% of cybersecurity incidents fall into nine basic attack patterns (Verizon 2014 Data Breach

More information

Privacy and Cybersecurity Compliance, Preparedness and Rapid Response

Privacy and Cybersecurity Compliance, Preparedness and Rapid Response Privacy and Cybersecurity Compliance, Preparedness and Rapid Response Skadden, Arps, Slate, Meagher & Flom LLP and Affiliates The Americas Boston Chicago Houston Los Angeles New York Palo Alto São Paulo

More information

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January 2015 1

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January 2015 1 Data Breach Response Basic Principles Under U.S. State and Federal Law ABA Litigation Section Core Knowledge January 2015 1 I. Introduction Data breaches have become an unfortunate reality for many of

More information

SEC Cybersecurity Findings May Establish De Facto Standard

SEC Cybersecurity Findings May Establish De Facto Standard Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com SEC Cybersecurity Findings May Establish De Facto

More information

CYBERSECURITY EXAMINATION SWEEP SUMMARY

CYBERSECURITY EXAMINATION SWEEP SUMMARY This Risk Alert provides summary observations from OCIE s examinations of registered broker-dealers and investment advisers, conducted under the Cybersecurity Examination Initiative, announced April 15,

More information

Cybersecurity Risk Factors: Five Tips to Consider When Any Public Company Might be The Next Target

Cybersecurity Risk Factors: Five Tips to Consider When Any Public Company Might be The Next Target 10 February 2014 Practice Groups: Capital Markets Insurance Coverage The text of this article was first published by Law360 on February 10, 2014. Cybersecurity Risk Factors: Five Tips to Consider When

More information

Data Privacy And Cybersecurity For Investment Funds. Gregory J. Nowak Angelo A. Stio III October 28, 2014

Data Privacy And Cybersecurity For Investment Funds. Gregory J. Nowak Angelo A. Stio III October 28, 2014 Data Privacy And Cybersecurity For Investment Funds Gregory J. Nowak Angelo A. Stio III October 28, 2014 WHY IS DATA PRIVACY AND SECURITY IMPORTANT? 2 Why is it important to protect data? Data privacy

More information

Cybercrime and Regulatory Priorities for Cybersecurity

Cybercrime and Regulatory Priorities for Cybersecurity NRS Technology and Communication Compliance Forum Cybercrime and Regulatory Priorities for Cybersecurity Copyright 2014 by K&L Gates LLP. All rights reserved. Sean P. Mahoney sean.mahoney@klgates.com K&L

More information

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF October 9, 2013 1 Cyber Insurance Why? United States Department of Commerce: Cyber Insurance

More information

2015 ROBINS KAPLANLLP TOOLS, TIPS, AND TRENDS: DATA PRIVACY AND CYBERSECURITY

2015 ROBINS KAPLANLLP TOOLS, TIPS, AND TRENDS: DATA PRIVACY AND CYBERSECURITY TOOLS, TIPS, AND TRENDS: DATA PRIVACY AND CYBERSECURITY PANEL MEMBERS Stacy Bettison, Founder and President, BETTISON Candice Ciresi, Head of Stratasys US Legal and Legal Counsel to SSYS, Inc and LATAM

More information

Cybersecurity Workshop

Cybersecurity Workshop Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

Cybersecurity Issues for Community Banks

Cybersecurity Issues for Community Banks Eastern Massachusetts Compliance Network Cybersecurity Issues for Community Banks Copyright 2014 by K&L Gates LLP. All rights reserved. Sean P. Mahoney sean.mahoney@klgates.com K&L Gates LLP State Street

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the retail sector of the Fortune 1000.

More information

Data Breach Response Planning: Laying the Right Foundation

Data Breach Response Planning: Laying the Right Foundation Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA

More information

Memorandum. Connecticut State Courts Address the Definition of Injury in the Data Breach Context. Introduction. June 22, 2015

Memorandum. Connecticut State Courts Address the Definition of Injury in the Data Breach Context. Introduction. June 22, 2015 Memorandum Connecticut State Courts Address the Definition of Injury in the Data Breach Context June 22, 2015 Introduction Quantifying the degree of harm resulting from a data breach can be an inherently

More information

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you

More information

Beyond Credit Reporting: The Extension of Potential Class Action Liability to Employers under the Fair Credit Reporting Act

Beyond Credit Reporting: The Extension of Potential Class Action Liability to Employers under the Fair Credit Reporting Act April 7, 2014 Practice Groups: Financial Institutions and Services Litigation Commercial Disputes Labor, Employment and Workplace Safety Consumer Financial Services Beyond Credit Reporting: The Extension

More information

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats

More information

Recent Court Rulings May Affect Protection Responsibilities

Recent Court Rulings May Affect Protection Responsibilities FINPRO Practice april 2013 Recent Court Rulings May Affect Companies Cyber and Data Protection Responsibilities Contents: Krottner v. starbucks corp. page 2 Clapper v. amnesty international page 3 Amgen,

More information

Black Hats, Firewalls, and Data Loss: Insurers Confront Data Breach Litigation

Black Hats, Firewalls, and Data Loss: Insurers Confront Data Breach Litigation Thomas W. Curvin Phillip E. Stano Mark Thibodeaux Tracey K. Ledbetter December 9, 2014 Black Hats, Firewalls, and Data Loss: Insurers Confront Data Breach Litigation INSURANCE AND FINANCIAL SERVICES LITIGATION

More information

Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014

Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014 Is Your Financial Institutions' Insurance Policy vulnerable to a cyber claim? Joan D Ambrosio, James Cooper and Kim West 22 January 2014 Cyber Exposures Joan D Ambrosio Reported data breaches continue

More information

SEC update: Cybersecurity initiatives. SEC update: Cybersecurity initiatives. Intelligize // 02

SEC update: Cybersecurity initiatives. SEC update: Cybersecurity initiatives. Intelligize // 02 Intelligize // 02 As is tradition, at the beginning of the year, the U.S. Securities and Exchange Commission outlined both its current state of affairs and annual goals for maintaining proper compliance

More information

Client Update SEC Releases Updated Cybersecurity Examination Guidelines

Client Update SEC Releases Updated Cybersecurity Examination Guidelines Client Update September 18, 2015 1 Client Update SEC Releases Updated Cybersecurity Examination Guidelines NEW YORK Jeremy Feigelson jfeigelson@debevoise.com Jim Pastore jjpastore@debevoise.com David Sarratt

More information

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Ed McMurray, CISA, CISSP, CTGA CoNetrix Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats

More information

PRIVACY & CYBERSECURITY

PRIVACY & CYBERSECURITY PRIVACY & CYBERSECURITY UPDATE AUGUST 2014 CONTENTS (click on the titles below to view articles) NIST Announces October Workshop and Releases Framewok Update...1 Insurance Company Succeeds in Cybersecurity

More information

REGULATION OF COMPANIES DATA SECURITY PRACTICES UNDER THE FTC ACT AND CALIFORNIA UNFAIR COMPETITION LAW By Kathryn F. Russo 1

REGULATION OF COMPANIES DATA SECURITY PRACTICES UNDER THE FTC ACT AND CALIFORNIA UNFAIR COMPETITION LAW By Kathryn F. Russo 1 REGULATION OF COMPANIES DATA SECURITY PRACTICES UNDER THE FTC ACT AND CALIFORNIA UNFAIR COMPETITION LAW By Kathryn F. Russo 1 I. Introduction News of data breaches dominates the headlines. Technology is

More information

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons WSECU Cyber Security Journey David Luchtel VP IT Infrastructure & Opera:ons Objec:ve of Presenta:on Share WSECU s journey Overview of WSECU s Security Program approach Overview of WSECU s self- assessment

More information

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator

More information

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com

More information

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? FREEMAN WOOD HEAD OF MERCER SENTINEL NORTH AMERICA GREGG SOMMER HEAD OF OPERATIONAL RISK ASSESSMENTS MERCER

More information

Cybersecurity and the Threat to Your Company

Cybersecurity and the Threat to Your Company Why is BIG Data Important? March 2012 1 Cybersecurity and the Threat to Your Company A Navint Partners White Paper September 2014 www.navint.com Cyber Security and the threat to your company September

More information

THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal

THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal THE BBA TABLE OF CONTENTS CONTACT US The Boston Bar Journal Legal Analysis Data Breach Class Action Litigation A Tough Road for Plaintiffs By Timothy H. Madden Introduction With the increased prevalence

More information

Preventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014

Preventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014 Preventing And Dealing With Cyber Attacks And Data Breaches Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014 Charles A. Blanchard Arnold & Porter LLP Formerly General Counsel, U.S. Air Force

More information

The Age of Data Breaches:

The Age of Data Breaches: The Age of Data Breaches: HOW TO AVOID BEING THE NEXT HEADLINE MARCH 24, 2015 2015 Epstein Becker & Green, P.C. All Rights Reserved. ebglaw.com This presentation has been provided for informational purposes

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

HIT Audit Workshop. Jeffrey W. Short. jshort@hallrender.com

HIT Audit Workshop. Jeffrey W. Short. jshort@hallrender.com HIT Audit Workshop Jeffrey W. Short jshort@hallrender.com 1 Audits and Investigations to be Discussed Meaningful Use Audits HIPAA Audits Data Breach Investigations Software Vendor Audits FTC Investigations

More information

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES

More information

Cyber Risks in Italian market

Cyber Risks in Italian market Cyber Risks in Italian market Milano, 01.10.2014 Forum Ri&Assicurativo Gianmarco Capannini Agenda 1 Cyber Risk - USA 2 Cyber Risk Europe experience trends Market size and trends Market size and trends

More information

The Problems With SEC s Cybersecurity Approach

The Problems With SEC s Cybersecurity Approach Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com The Problems With SEC s Cybersecurity Approach Law360,

More information

Data Privacy and Cybersecurity Task Force

Data Privacy and Cybersecurity Task Force Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,

More information

Latham & Watkins Health Care Practice

Latham & Watkins Health Care Practice Number 928 September 9, 2009 Client Alert Latham & Watkins Health Care Practice Violation of this rule will be treated by the FTC as an unfair or deceptive act in violation of the Federal Trade Commission

More information

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks? Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks? August 27, 2014 Presented by: Terry Ammons, Partner, Porter Keadle Moore Tim Davis, Senior,

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

Outsourcing has become a critical component of financial institutions management

Outsourcing has become a critical component of financial institutions management Skadden Skadden, Arps, Slate, Meagher & Flom LLP & Affiliates If you have any questions regarding the matters discussed in this memorandum, please contact the following attorneys or call your regular Skadden

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

Anatomy of a Hotel Breach

Anatomy of a Hotel Breach Page 1 of 6 Anatomy of a Hotel Breach Written by Sandy B. Garfinkel Monday, 09 June 2014 15:22 Like 0 Tweet 0 0 Data breach incidents have dominated the news in 2014, and they are only becoming more frequent

More information

Brief. The BakerHostetler Data Security Incident Response Report 2015

Brief. The BakerHostetler Data Security Incident Response Report 2015 Brief The BakerHostetler Data Security Incident Response Report 2015 The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 the year of the

More information

What Data? I m A Trucking Company!

What Data? I m A Trucking Company! What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 marc.tucker@smithmoorelaw.com Presented by: Rob D. Moseley, Jr. 2 West

More information

How To Protect Your Cybersecurity From Cyber Incidents

How To Protect Your Cybersecurity From Cyber Incidents SEC ENFORCEMENT The SEC s Two Primary Theories in Cybersecurity Enforcement Actions By Daniel F. Schubert, Jonathan G. Cedarbaum and Leah Schloss WilmerHale Cyber attacks are increasingly common and affect

More information

Expert Analysis Employee Data Privacy Issues: Risk And Responsibility in Cyberincidents

Expert Analysis Employee Data Privacy Issues: Risk And Responsibility in Cyberincidents Westlaw Journal Employment Litigation News and Analysis Legislation Regulation Expert Commentary VOLUME 29, issue 15 / february 18, 2015 Expert Analysis Employee Data Privacy Issues: Risk And Responsibility

More information

OCIE CYBERSECURITY INITIATIVE

OCIE CYBERSECURITY INITIATIVE Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.

More information

FTC Data Security Standard

FTC Data Security Standard FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls

More information

Data Breach and Senior Living Communities May 29, 2015

Data Breach and Senior Living Communities May 29, 2015 Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs

More information

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Minnesota Society for Healthcare Risk Management September 22, 2011 Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer? Melissa Krasnow, Partner, Dorsey & Whitney, and Certified Information

More information

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL Using Insurance Coverage to Mitigate Cybersecurity Risks To Warranty and Service Contract Businesses Barry Buchman, Partner

More information

CYBER SECURITY SPECIALREPORT

CYBER SECURITY SPECIALREPORT CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber

More information

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial

More information

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf GRC/Cyber Insurance February 18, 2014 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London Join the conversation: 1 Generously sponsored by: 2 Welcome Conference Moderator Allan Wall ISSA Web Conference

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Lloyd s of London (Reuters) May 8, 2000 Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day Rivers Casino, Pittsburgh November 17, 2014

More information

Big Data As a Threat? An Alternative Approach to Cybersecurity

Big Data As a Threat? An Alternative Approach to Cybersecurity Big Data As a Threat? An Alternative Approach to Cybersecurity February 11, 2015 Brian Finch, Pillsbury Winthrop Shaw Pittman Brian Fox, PwC Pillsbury Winthrop Shaw Pittman LLP Data Breaches and Cyber

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

Cybersecurity and Insurance Companies

Cybersecurity and Insurance Companies Cybersecurity and Insurance Companies ACLI Forum 500 CEO Leadership Retreat Timothy J. Nagle Vice President & Chief Privacy Counsel Prudential Financial 1 May 13, 2015 What is cybersecurity? Protecting

More information

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Thank you for joining us. We have a great many participants in today s call. Your phone is currently

More information

Perspectives on Cybersecurity and Its Legal Implications

Perspectives on Cybersecurity and Its Legal Implications Survey Results 2015 Perspectives on Cybersecurity and Its Legal Implications a 2015 survey of corporate executives The National Institute of Standards and Technology (NIST), a non-regulatory agency of

More information

FINRA Publishes its 2015 Report on Cybersecurity Practices

FINRA Publishes its 2015 Report on Cybersecurity Practices Securities Litigation & Enforcement Client Service Group and Data Privacy & Security Team To: Our Clients and Friends February 12, 2015 FINRA Publishes its 2015 Report on Cybersecurity Practices On February

More information

The Legal Pitfalls of Failing to Develop Secure Cloud Services

The Legal Pitfalls of Failing to Develop Secure Cloud Services SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global

More information

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in

More information

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

The Practical Realities of Cybersecurity

The Practical Realities of Cybersecurity & present The Practical Realities of Cybersecurity Best practices for crafting policies and procedures to protect your company Andrew Morentz, Member Telecommunications Law Professionals PLLC email amorentz@telecomlawpros.com

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014

CYBER LIABILITY. Bring on tomorrow. Network Security and Privacy. May 15, 2014 CYBER LIABILITY Network Security and Privacy Bring on tomorrow May 15, 2014 1 AGENDA I. Identify Exposures II. Identify how a breach can occur III. The Coverage (Third Party Liability + First Party Losses)

More information

Cybersecurity y Managing g the Risks

Cybersecurity y Managing g the Risks Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking

More information

Below is a summary of certain recent guidance from the Securities and Exchange

Below is a summary of certain recent guidance from the Securities and Exchange Skadden SEC Recent Developments April 3, 2013 Skadden, Arps, Slate, Meagher & Flom LLP & Affiliates If you have any questions regarding the matters discussed in this memorandum, please contact the following

More information

Recent Developments in Privacy/Security Litigation

Recent Developments in Privacy/Security Litigation Recent Developments in Privacy/Security Litigation Elizabeth F. Hodge February 25, 2015 Privacy & Security Enforcement HIPAA Office for Civil Rights State Attorneys General Federal Trade Commission (FTC)

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing

More information

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Data Breach Cost. Risks, costs and mitigation strategies for data breaches Data Breach Cost Risks, costs and mitigation strategies for data breaches Tim Stapleton, CIPP/US Deputy Global Head of Professional Liability Zurich General Insurance Data Breaches: Greater frequency,

More information

Joe A. Ramirez Catherine Crane

Joe A. Ramirez Catherine Crane RIMS/RMAFP PRESENTATION Joe A. Ramirez Catherine Crane RISK TRANSFER VIA INSURANCE Most Common Method Involves Assessment of Risk and Loss Potential Risk of Loss Transferred For a Premium Insurance Contract

More information

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP

More information

ESI and Predictive Coding

ESI and Predictive Coding Beijing Boston Brussels Chicago Frankfurt Hong Kong ESI and Predictive Coding Houston London Los Angeles Moscow Munich New York Palo Alto Paris São Paulo Charles W. Schwartz Chris Wycliff December 13,

More information

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability

Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Reducing Risk. Raising Expectations. CyberRisk and Professional Liability Are you exposed to CyberRisk? Like nearly every other business, you have likely capitalized on the advancements in technology today

More information

Mind Your Business: Privacy, Data Security & Regulatory Compliance Best Practices & Guidance

Mind Your Business: Privacy, Data Security & Regulatory Compliance Best Practices & Guidance Mind Your Business: Privacy, Data Security & Regulatory Compliance Best Practices & Guidance National Bar Association - Commercial Law Section 2015 Corporate Counsel Conference February 26, 2015 www.alston.com

More information

TO: ALL PERSONS AND BUSINESSES WITH A VERIZON.NET EMAIL ADDRESS

TO: ALL PERSONS AND BUSINESSES WITH A VERIZON.NET EMAIL ADDRESS TO: ALL PERSONS AND BUSINESSES WITH A VERIZON.NET EMAIL ADDRESS This Notice Is Given To Inform You Of The Proposed Settlement Of A Class Action. If The Settlement Is Approved By The Court, Certain Benefits

More information

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015 Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas

More information

Clients Legal Needs in HIPAA Security Compliance

Clients Legal Needs in HIPAA Security Compliance Clients Legal Needs in HIPAA Security Compliance Robyn A. Meinhardt, JD, RN FOLEY & LARDNER LLP 2004 Preserving Attorney-Client Privilege and Work Product Protections 1 Relevance to Security Compliance

More information

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs

IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE. Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs IDENTITY THEFT IN SOUTH CAROLINA: 2014 UPDATE Marti Phillips, Esq. Director, Identity Theft Unit South Carolina Department of Consumer Affairs This presentation is not meant to serve as a substitute for

More information

Cyber-insurance: Understanding Your Risks

Cyber-insurance: Understanding Your Risks Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some

More information