How GCs And Boards Can Brace For The Cybersecurity Storm - Law360
|
|
|
- Edwina Butler
- 10 years ago
- Views:
Transcription
1 Page 1 of 6 Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY Phone: Fax: [email protected] How GCs And Boards Can Brace For The Cybersecurity Storm Law360, New York (March 17, 2015, 4:59 PM ET) -- America is awakening to a new era of cyber-risk and the need for hard cybersecurity. Cyberthreats pose significant risks to a company s reputation and competitive position, while creating substantial legal exposure. Therefore, cybersecurity should be a priority for companies of all sizes. Comprehensive cyberoversight from the board level down is essential to protect Corporate America s key asset intellectual property. Storm Warning In 2012, former Defense Secretary Leon Panetta warned of an advancing cyber-pearl Harbor. The president recently issued an executive order instructing U.S. businesses to heighten their degree of vigilance to safeguard against cyberattacks. And for good reason: Scott D. Marrs Those who manage Corporate America s critical control systems big and small know their organizations are unprepared for a sophisticated cyberattack. Lightning Strike The cyber-risk disconnect is troubling given the prominent cyberstrikes that have already occurred in various industry sectors. For example, in 2008, a Turkish oil pipeline caught fire after the security camera system s vulnerable software was purportedly used to enter the pipeline s control network and increase the pressure without setting off alarms. In 2011, hackers stole login credentials, industrial drawings and contracts from at least 10 oil and gas companies in Norway. In 2012, Saudi Aramco was attacked by a virus affecting thousands of its critical overseas facilities. In 2014, 300 energy companies were targeted by hackers in the largest ever coordinated cyber-attack in Norway. Recently, the highly publicized Sony Pictures Entertainment cyberattack involved substantial intellectual property, private s, and other sensitive and proprietary material allegedly stolen by North Korea s cyber warfare unit dubbed Bureau 121. In 2014 alone, numerous commercial and governmental entities have suffered significant cyberattacks on their systems including JP Morgan Chase, the U.S. Postal Service, Yahoo and the White House to name but a few. Forewarned is Forearmed
2 Page 2 of 6 Corporate America s boardroom is paying attention. The NACD Public Company Governance Survey reveals increasing dissatisfaction by board members regarding answers to their cyber-risk inquiries. Eighty-seven percent of respondents reported that their board s understanding of IT and cyber-risks needed improvement. This is not surprising. The average age of S&P 500 board members is 63 years old. Most were not introduced to the Internet until they were in their 40s. Unlike the generations that followed, they were not born with a keyboard in one hand and a smart phone in the other. It is evident that a board or management team that does not understand cybersecurity cannot effectively oversee the company s cybersecurity activities. This mitigates in favor of adding IT / cybersecurity and cyber legal expertise on the board or making such expertise available (via internal or external IT consultant presentations, independent advisers, cyber lawyers, and industry associations). High Connectivity, High Risk Corporate America s infrastructures are increasingly reliant upon remote management, operation and monitoring with interconnection via the Internet exponentially increasing vulnerability to attack. While the use of other connected services and devices make business more efficient, they further exacerbate the risk. The use of employee-owned devices and programs, 24/7 (and international) access to company systems, and the merging different corporate systems also magnify exposure. Cybercriminals are becoming more disruptive. Their motives are many. They are very focused on our cyber-vulnerabilities. We are not. In the not too distant future a precipitating event will put cybersecurity on your company s radar. Corporate America must engage in developing various levels of preventative and responsive plans to match the ever increasing sophistication of cyberattacks. Know Thy Enemy A 2012 Verizon Data Breach Investigations Report indicates from which direction most attacks occur: 98 percent stem from external agents 58 percent of all data theft is tied to activist groups 4 percent implicate internal employees 1 percent or less involves business partners The methods used are known as well: 81 percent of such breaches utilize hacking 69 percent utilize malware 10 percent involve physical attacks 7 percent employ social tactics 5 percent involve privilege misuse Verizon s report also reveals how avoidable most attacks are: 97 percent of the breaches were avoidable though simple controls 96 percent of attacks were not sophisticated 94 percent of all data compromised came from servers (although user devices are trending upward) 92 percent of attacks were discovered by a third party
3 Page 3 of 6 85 percent of breaches took weeks or months to discover (compared to only hours for the culprits to accomplish) 79 percent of victims were targets of opportunity These mostly avoidable attacks are costly. In 2012, a Ponemon Institute study indicated that the average cost of a data breach was $8.9 million, the most costly was $46 million, and the least costly was $1.4 million. Although the risks are known and can be mitigated, meaningful assessment and preventative measures have been slow in coming for most companies. The study also shows that only 17 percent of the 599 security executives at utility, oil, gas, energy and manufacturing companies surveyed had deployed the major IT initiatives needed to effectively fend off cyberattacks. Only 28 percent responded that cybersecurity was within their company s top five strategic priorities. There is a big disconnect between the C-suite and those actually conducting cybersecurity. The bad guys are getting more proficient, while we are just starting to wake up. It s time to get procyberactive. On the Radar There is an increased awareness and collaboration among the U.S. government, universities, industry and end users to advance research and development in cybersecurity. Their work in this area has provided Corporate America with the guidelines to develop cybersecurity protocols and programs. For example, Executive Order (Improving Critical Infrastructure Cybersecurity) issued in February 2013 directed the National Institute of Standards and Technology to work with industry to develop a voluntary framework to reduce cyber-risks to critical infrastructure. NIST released the first version of this framework in February It contains standards, guidelines and practices to protect critical infrastructure. The U.S. Department of Homeland Security has also issued helpful publications, together with suggested implementations of cybersecurity best practices for various industry sectors. The National Association of Corporate Directors has also developed a wealth of knowledge on cyber-education and best practices. The NACD, in association with AIG and the Internet Security Alliance, has identified five steps to enhance corporate oversight of cyber-risks, which include acknowledging cybersecurity as an enterprise-wide risk management issue, understanding the legal implications, adding cybersecurity discussions to board agendas and setting the expectation that a framework will be put in place to manage cyberattacks. Get Grounded There are a number of ways Corporate America can ensure that management is taking preventative steps to protect the company from a cyberattack: Build a Culture of Security Cybersecurity best practices should be developed and extensive training, education, and communication should be implemented. Boards and management should examine and map out their cyber DNA, data highways, vulnerabilities, and the larger ecosystems they are connected with. Measure, Monitor and Assess Cyber-Risks Tools should be developed to assess security postures in a way that accelerates the ability to mitigate potential risks at every level. General counsel, company management and the board should consider the following questions:
4 Page 4 of 6 1. Who is in charge of cybersecurity within the company? 2. Is there a system of checks and balances by having cyber and IT duties divided between relevant positions within the company? 3. What role does board oversight of cyber security issues play within the company and who takes the lead for information security? 4. Is IT/cybersecurity a function of the entire board or of the audit committee? 5. Has the company mapped our network against security functions and protections and identified the likely external and internal threats to the company? 6. For our industry, which threats are most common? 7. What incident patterns are we seeing that enable us to map out control recommendations? 8. Is the company adequately monitoring cybersecurity legislation and regulation? 9. Is our IT manager adequately and regularly assessing systems for vulnerabilities and intrusions and staying attuned to the latest cyber incidents in our industry to immediately react when necessary to prevent a disruptive event? 10. Has the company performed a penetration test or other external test or assessment of our cyber ecosystem(s)? If so, what were the results? 11. What physical and cyber security protocol and procedures are in place? Are they in writing? 12. Does the company allow its employees to use their own devices, download programs from the Internet, access or use cloud services, or access private or social networks from company computers? If so, what policies and safeguards are in place to compensate for the increased risk? 13. Have security vulnerabilities at single-point assets (stores, refineries, storage terminals and other buildings, as well as the networked features of other facilities and cyber systems) been evaluated? 14. How are other potential vulnerabilities, such as employee smart phone (and other device) access to company systems, remote desktops and the like, being assessed? 15. What is the company s incident response plan and how is it communicated internally? 16. Does the company have a systematic framework to assess and implement adequate cyber hygiene? See example 1 and example In what situations will law enforcement or other governmental entities be advised of a breach?
5 Page 5 of What is the reporting threshold and route of reporting when an incident or breach occurs? 19. What is the company s budget for its cybersecurity and protection plans? 20. What insurance coverage is currently in place for cyber-risks and data breaches? 21. What IT, legal and public relations professionals do we have on speed dial in the event of a breach / cyber event? 22. If our systems crash because of a breach or attack, how do we implement the incident plans and protocols and otherwise communicate internally and externally? 23. How will the company conduct an exercise of its cyber preparedness plan to assess its effectiveness before a real event occurs? 24. What constitutes a material cyber event and when/how will it be disclosed to others (such as investors)? Develop New Protective Measures to Reduce Risk System vulnerabilities can be revealed through rigorous research, development, and testing, while mitigation options should be identified to harden control systems. Detect Intrusion and Implement Cyber-Response Strategies Cyber intrusion detection, remediation, recovery and restoration capabilities should be enhanced. Companies should identify the nature of the breach and the source of the security lapse, identify the type of data implicated, convene incident response team members, put insurance carriers on notice, and immediately engage counsel experienced in data security issues. Maintain an Ongoing Program for Security Improvements Active partnerships should be developed, with critical security information sharing, to collectively build on experiences and improve cybersecurity. Educate General Counsel and Company Directors About the Legal Implications of Cyber-Risks Individual, class and shareholder derivative lawsuits have been filed against some companies and their boards alleging breach of fiduciary duties by failing to ensure that company data and customer information were adequately safeguarded. This risk also makes it important to document the board s consideration of cybersecurity issues. There are approximately 20 industry-specific data security laws, and hundreds of similar state laws. The SEC requires that certain information regarding cybersecurity risks and incidents be disclosed. Currently, 46 states require that individuals be notified of a security breach involving their name plus a sensitive data element such as a social security or credit card number, or other government ID number. Federal laws also require notification of data breaches for information from financial institutions, health care information, and breaches of government agency information.
6 Page 6 of 6 Conclusion When it comes to cybersecurity, a little education goes a long way. Intellectual property constitutes the crown jewels of your company. Most IP is now digital and accessible via the Internet. The likelihood of falling prey to a cyberattack exponentially increases each year. As stewards of the company s crown jewels, general counsel and the board must be educated about cyberthreats and how to best guide management to secure the company from such threats. By Scott D. Marrs and Martin D. Beirne, Beirne Maynard & Parsons LLP Scott Marrs is an attorney, arbitrator and partner at Beirne Maynard & Parsons in Houston who has trial and arbitration experience in domestic and international matters. He is a board member of the General Counsel Forum (Houston), an advisory board member of the Institute for Energy Law (IEL), and a member of the National Association of Corporate Directors and the Association of International Petroleum Negotiators. Martin Beirne is a founding partner of Beirne Maynard & Parsons. He has trial experience in complex business litigation, energy, intellectual property, market representation/ franchise and antitrust. He also provides advice and representation to corporations, corporate officials and other individuals in investigations initiated by various government authorities, as well as internal investigations. on behalf of corporations. Corporate Legal Times has named Mr. Beirne a Top Drawer Litigator on its list of Go To lawyers in the U.S. The opinions expressed are those of the author(s) and do not necessarily reflect the views of the firm, its clients, or Portfolio Media Inc., or any of its or their respective affiliates. This article is for general information purposes and is not intended to be and should not be taken as legal advice. All Content , Portfolio Media, Inc.
Anatomy of a Hotel Breach
Page 1 of 6 Anatomy of a Hotel Breach Written by Sandy B. Garfinkel Monday, 09 June 2014 15:22 Like 0 Tweet 0 0 Data breach incidents have dominated the news in 2014, and they are only becoming more frequent
Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED
THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED THE CYBER SECURITY PLAYBOOK 2 03 Introduction 04 Changing Roles, Changing Threat
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
Presidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Presidential Summit Reveals Cybersecurity Concerns,
Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps
Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP [email protected]
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response
Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012
2012 雲 端 資 安 報 告 黃 建 榮 資 深 顧 問 - Verizon Taiwan August 2012 1 It s All About Security Protecting assets from threats that could impact the business Protecting Assets... Stationary data Data in transit
CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts
CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
Adopting a Cybersecurity Framework for Governance and Risk Management
The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance
Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies
Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan
The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost/Benefit Analysis
The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost/Benefit Analysis Paul A. Ferrillo March 2015 The NIST Cybersecurity Framework Encouraging NIST Adoption Via Cost Benefit Analysis Until
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
CyberSecurity for Law Firms
CyberSecurity for Law Firms Cracking the Cyber Code: Recent Headlines, Reinforcing the Need and Response Planning July 16, 2013 Making the Case Matthew Magner Senior Underwriting Officer Chubb & Son, a
CYBERSECURITY INVESTIGATIONS
CYBERSECURITY INVESTIGATIONS Planning & Best Practices May 4, 2016 Lanny Morrow, EnCE Managing Consultant [email protected] Cy Sturdivant, CISA Managing Consultant [email protected] Michal Ploskonka, CPA
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
Dealer Member Cyber-security
Administrative Notice General Please distribute internally to: Legal and Compliance Senior Management Contact: Wendy Rudd Senior Vice President, Member Regulation and Strategic Initiatives 416 646-7216
Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA
Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA HANS HENRIK BERTHING Married with Louise and dad for Dagmar and Johannes CPA, CRISC, CGEIT, CISA and CIA ISO 9000 Lead Auditor Partner and owner for Verifica
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
10Minutes. on the stark realities of cybersecurity. The Cyber Savvy CEO. A changed business environment demands a new approach:
10Minutes on the stark realities of cybersecurity The Cyber Savvy CEO Highlights Business leaders must recognise the exposure and business impact that comes from operating within an interconnected global
Assessing the Effectiveness of a Cybersecurity Program
Assessing the Effectiveness of a Cybersecurity Program Lynn D. Shiang Delta Risk LLC, A Chertoff Group Company Objectives Understand control frameworks, assessment structures and scoping of detailed reviews
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Impact of Data Breaches
Research Note Impact of Data Breaches By: Divya Yadav Copyright 2014, ASA Institute for Risk & Innovation Applicable Sectors: IT, Retail Keywords: Hacking, Cyber security, Data breach, Malware Abstract:
What Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 [email protected] Presented by: Rob D. Moseley, Jr. 2 West
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
Defensible Strategy To. Cyber Incident Response
Cyber Incident Response Defensible Strategy To Cyber Incident Response Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
Common Data Breach Threats Facing Financial Institutions
Last Updated: February 25, 2015 Common Data Breach Threats Facing Financial s Although exact figures are elusive, there is no question that the number of data security breaches both reported and unreported
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.
Cybersecurity: Minimizing Risk & Responding to Breaches March 5, 2015 Andy Chambers Michael Kelly Jimmie Pursell Scope of Problem Data Breaches A Daily Phenomenon Anthem JP Morgan / Chase Sony Home Depot
How Secure is Your SCADA System?
How Secure is Your SCADA System? Charles Drobny GlobaLogix, Inc. Houston, TX, USA Our Industry is a Target 40% of cyber attacks on Critical Infrastructure targets are aimed at the Energy Industry The potential
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
Defining the Gap: The Cybersecurity Governance Study
Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
CYBER SECURITY SPECIALREPORT
CYBER SECURITY SPECIALREPORT 32 The RMA Journal February 2015 Copyright 2015 by RMA INSURANCE IS AN IMPORTANT TOOL IN CYBER RISK MITIGATION Shutterstock, Inc. The time to prepare for a potential cyber
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
67% 61% STATE OF CLOUD SECURITY BULLETIN. Information Security in the Energy Sector. Summer 2013 FROM APR SEP 2012
STATE OF CLOUD SECURITY BULLETIN Information Security in the Energy Sector Summer 2013 FROM APR SEP 2012 67% of Alert Logic customers in the energy industry experienced BRUTE FORCE ATTACKS 61% of Alert
Answering your cybersecurity questions The need for continued action
www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:
Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com
Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
Supplier Vigilance: A Critical Layer of Defense
Supplier Vigilance: A Critical Layer of Defense Lockheed Martin Information Security 1 Supply Chain Cyber Security Lockheed Martin October 23, 2013 Debbie Stuckey Waide Jones, CISSP 2 Synopsis Lockheed
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
CYBERSECURITY HOT TOPICS
1 CYBERSECURITY HOT TOPICS Secure Banking Solutions 2 Presenter Chad Knutson VP SBS Institute Senior Information Security Consultant Masters in Information Assurance CISSP, CISA, CRISC www.protectmybank.com
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
Exercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
12/11/15. Evolving Cybersecurity Risks. Agenda. The current cyber risk landscape Overview. Results on EY s Global Information Security Survey
Evolving Cybersecurity Risks Results on EY s Global Information Security Survey Agenda Market insights: What are we seeing? Factoring cybersecurity into your planning and risk appetite Marketplace response
A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014
A Wake-Up Call? Fight Back Against Cybercrime Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 1 Coalfire Background Leading Information Security Consulting Firm Offices: Atlanta,
