Cybersecurity. Setting expectations. Are you susceptible to a data breach? Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.



Similar documents
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Cybersecurity y Managing g the Risks

Preventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014

Mitigating and managing cyber risk: ten issues to consider

October 24, Mitigating Legal and Business Risks of Cyber Breaches

How To Buy Cyber Insurance

Cybersecurity: Lessons from 2014 Prevention, Reaction & Communication

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

Cyber Insurance: How to Investigate the Right Coverage for Your Company

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

IDENTIFYING AND RESPONDING TO DATA BREACHES

What Data? I m A Trucking Company!

Anatomy of a Privacy and Data Breach

Into the cybersecurity breach

How To Find Out If You Were Hacked By An Employee Of Ancient.Com

How to Prepare for a Data Breach

WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Cyber-insurance: Understanding Your Risks

Health Care Data Breach Discovery Strategies for Immediate Response

DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Cybersecurity Workshop

GAO s High-Risk Program

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

DATA BREACH RESPONSE READINESS Is Your Organization Prepared?

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Best Practices for a Healthcare Data Breach: What You Don t Know Will Cost You

Foregenix Incident Response Handbook. A comprehensive guide of what to do in the unfortunate event of a compromise

Cybersecurity: Protecting Your Business. March 11, 2015

Network Security & Privacy Landscape

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

BOARD OF GOVERNORS MEETING JUNE 25, 2014

A Privacy and Cybersecurity Primer for Nonprofits

By Daniel E. Frank and Don Borelli

INVESTIGATIONS REPORT

Data Breach Response Planning: Laying the Right Foundation

Cyber Risks in the Boardroom

North Texas ISSA CISO Roundtable

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013


ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ISOO Notice : Update on Recent Cyber Incidents at OPM

Anatomy of a Hotel Breach

In an age where so many businesses and systems are reliant on computer systems,

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Data Breach and Senior Living Communities May 29, 2015

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

CYBERSECURITY INVESTIGATIONS

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Insurance for Data Breaches in the Hospitality Industry

MAKING THE RIGHT CHOICE

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

Data Security Best Practices for In-House Counsel

THE PUBLIC RELATIONS CONSULTANTS ASSOCIATION. Find A PR agency Terms and Conditions for Clients

GEARS Cyber-Security Services

DATA BREACH COVERAGE

HOW DID NETWORK SECURITY AND PRIVACY ISSUES BECOME D&O EXPOSURES?

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Cyber-Crime Protection

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Public charities are all 501(c)(3) but have various missions. Each mission carries significant risks and innocuous risks. Amount of risk depends upon:

Embracing Cyber Risk: Insurance Solutions

plantemoran.com What School Personnel Administrators Need to know

The Data Breach: How to stay defensible before, during and after the incident. Alex Ricardo, CIPP/US Breach Response Services

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER

Beazley Group Beazley Breach Response. A data breach isn t always a disaster Mishandling it is.

AB 1149 Compliance: Data Security Best Practices

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

Cyber Risks in Italian market

4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, Agenda

Case Study: Hiring a licensed Security Provider

Managing cyber risks with insurance

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Law Firm Cyber Security & Compliance Risks

Digital Forensics Services

Insuring Innovation. CyberFirst Coverage for Technology Companies

Business Associates under HITECH: A Chain of Trust

Key Trends, Issues and Best Practices in Compliance 2014

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

2012 CyberSecurity Watch Survey

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

Medical Information Breaches: Are Your Records Safe?

Cyber/ Network Security. FINEX Global

cyber liability insurance.

Transcription:

Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? 1

October 7, 2014 Setting expectations Victim Perpetrator 2

It s only a matter of time 14% 17% Insider theft Hacking 42% 27% Accidental exposure or negligence Subcontractor Breach Types 2007 through 2013 (4215 breaches) Breach trends Financial Institutions Retail (B&M and ecommerce) Healthcare Higher Education Governmental Entities Defense and Aerospace Technology Energy/Utilities All employers 2005 Today 3

Part I: Cybersecurity and data breach law Part II: What you should do right now 4

Get the management on board Ensure focus on cybersecurity Provide oversight of the risk management process Identify and empower experts Include cybersecurity as a regular agenda item Create an information security plan Why? Minimize employee related breaches Reduce overall exposure Reductions for CISO, information security program, strong security Legally important 5

Create an information security plan Designate a lead Conduct a systems assessment Implement a security program include visual hacking measures Policies and training Consider cyber insurance Review third party contracts Create and implement a crisis response plan Create your crisis response team Think dress rehearsal versus the show Useful for other situations, too Whistleblowers Create a crisis response team Identify the key constituents Recognize their motivations Identify and empower the decision maker 6

Part III: I ve been breached (and I can t get up) 7

Crisis response Feel free to take all the time you need!... yeah. Just kidding. Clock starts ticking from DOB (discovery of breach**) **Nobody else knows what this means, either. Crisis response What did Part II give you? Faster reaction time More thorough reaction Ability to minimize risk and damage Without Part II... 8

Crisis response Coordinate first response team (IT, HR, legal, PR, etc.) Investigate, isolate, contain, and secure Notify (federal, state, int l, individual, media, and other) Consider referral to law enforcement and/or civil remedy Re evaluate Crisis response Coordinate first response team (IT, HR, legal, PR, etc.) Investigate, isolate, contain, and secure Notify (federal, state, int l, individual, media, and other) Consider referral to law enforcement and/or civil remedy Re evaluate 9

Crisis response Coordinate first response team (IT, HR, legal, PR, etc.) Investigate, isolate, contain, and secure Retain forensic investigator Interview witnesses Preserve documents and systems Identify what was compromised Document everything Notify (federal, state, int l, individual, media, and other) Consider referral to law enforcement and/or civil remedy Re evaluate Crisis response Coordinate first response team (IT, HR, legal, PR, etc.) Investigate, isolate, contain, and secure Notify (federal, state, int l, individual, media, and other) Federal, state, international Individuals Insurers and credit card companies (PFI!) Media Employees Consider referral to law enforcement and/or civil remedy Re evaluate 10

Crisis response Coordinate first response team (IT, HR, legal, PR, etc.) Investigate, isolate, contain, and secure Notify (federal, state, int l, individual, media, and other) Consider referral to law enforcement and/or civil remedy E.g., 18 U.S.C. 1030 Re evaluate Crisis response Coordinate first response team (IT, HR, legal, PR, etc.) Investigate, isolate, contain, and secure Notify (federal, state, int l, individual, media, and other) Consider referral to law enforcement and/or civil remedy Re evaluate 11

Contact Information Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 shamoil.shipchandler@bgllp.com We Know Energy Approximately 70% of our total revenue is generated from energy transactions Represent companies throughout the energy value chain: oil, natural gas and renewables, chemical companies, refiners and power Named one of the Energy Groups of the Year by Law360 in 2011 2014. 12