Cybersecurity Workshop



Similar documents
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Cybersecurity. Are you prepared?

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

DATA BREACH COVERAGE

Data Breaches and Cyber Risks

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Data Security: Risks, Compliance and How to be Prepared for a Breach

Network Security & Privacy Landscape

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Is the PCI Data Security Standard Enough?

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Cyber Risks in Italian market

Cybersecurity Awareness. Part 1

PCI Compliance: How to ensure customer cardholder data is handled with care

OCIE Technology Controls Program

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Reducing Cyber Risk in Your Organization

CYBERSECURITY HOT TOPICS

Brief. The BakerHostetler Data Security Incident Response Report 2015

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

CYBER SECURITY SPECIALREPORT

ACE Advantage PRIVACY & NETWORK SECURITY

Information Technology

Data Breaches and Cyber Risks

Topic 1 Lesson 1: Importance of network security

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the

FINAL May Guideline on Security Systems for Safeguarding Customer Information

APIP - Cyber Liability Insurance Coverages, Limits, and FAQ

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

H 6191 SUBSTITUTE A AS AMENDED ======= LC02663/SUB A/2 ======= STATE OF RHODE ISLAND IN GENERAL ASSEMBLY JANUARY SESSION, A.D.

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014

Data Breach and Senior Living Communities May 29, 2015

Click to edit Master title style

Cyber Threats: Exposures and Breach Costs

What Data? I m A Trucking Company!

CYBERSECURITY INVESTIGATIONS

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

Franchise Data Compromise Trends and Cardholder. December, 2010

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

New York State Department of Financial Services. Report on Cyber Security in the Banking Sector

PCI Compliance for Healthcare

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Five Trends to Track in E-Commerce Fraud

Cybersecurity: Protecting Your Business. March 11, 2015

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.

Privacy Rights Clearing House

SAMPLE TEMPLATE. Massachusetts Written Information Security Plan

Mitigating and managing cyber risk: ten issues to consider

Cybersecurity Awareness

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Top Fraud Trends Facing Financial Institutions

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Internet threats: steps to security for your small business

Cyber-insurance: Understanding Your Risks

Personal Information Protection Act Information Sheet 11

EXHIBIT A Identity Theft Protection Program. Definitions. For purposes of the Policy, the following definitions apply (1);

S 0134 SUBSTITUTE B ======== LC000486/SUB B/2 ======== S T A T E O F R H O D E I S L A N D

Cyber Insurance: How to Investigate the Right Coverage for Your Company

CYBERSECURITY EXAMINATION SWEEP SUMMARY

Common Data Breach Threats Facing Financial Institutions

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Transcription:

Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C.

E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153 eakeeney@kaufcan.com http://www.kaufmanandcanoles.com/movies/credit-unions.html 2

Overview and Agenda Value What electronically stored data has value to thieves? Why is cybersecurity critically important to credit unions? Breaches External vs. Internal Threats Hackers/Employee error/rogue Employee 3

Overview and Agenda continued Responses Prevention Insurance Laws and regulations Key takeaways/best practices 4

Horror Stories 5

Data Security Data & Cybersecurity: the practice of protecting data and systems from unwanted use. Data breach: security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. 6

Why only a general awareness? Complacency seems to still be the norm. There is a view that cybersecurity measures do not add to the bottom line; rather, it is a cost. There is a dearth in knowledge among management-level individuals about actual, current risks. There is a general misunderstanding of specific risks that are known. Belief abounds that it won t happen to our business. 7

We re in a day when a person can commit about 15,000 bank robberies sitting in their basement. -Robert Anderson Executive Assistant Director of the FBI s Criminal Cyber Response and Services Branch You re going to be hacked. -Joseph Demarest Assistant Director of the FBI s Criminal Cyber Response and Services Branch 8

Categories of Business Organizations Those that will suffer a breach. Those that have suffered a breach. And those that will suffer a breach again. No business organization is spared. 9

Source: CUNA Mutual Group and NetDiligence 2013 Cyber Liability & Data Breach Insurance Claims 10

Busy Year 2013 617 documented breaches Average costs of these 317 breaches: $5 dollars per customer notification multiplied by millions $30 per card cancellation/related monitoring of credit PER customer $2000 per hours in forensic examinations and data security analysis costs $500,000 per breach in legal expenses 1 million dollars per breach in corporate settlement costs 1 million dollars per breach in regulatory fines or related expenses https://www.privacyrights.org/data-breach 11

2014 Identity Theft Resource Center reports that between 2005 (when record keeping commenced) and October 14, 2014 there were 4,854 recorded breaches exposing 669,680,671 records. Major data breaches are reported almost weekly JP Morgan Chase; Target; Home Depot; ebay; Michaels; Neiman Marcus; Citibank; Sony, etc. 12

Data Breach Basics (cont d) If large-scale breaches are regularly reported, then the number of smaller-scale breaches necessarily must be larger. Average cost to a company that suffers a breach now is approximately $200.00 per compromised record. 13

Data Breach Basics (cont d) Average cost of lost laptop containing personally identifiable information now has approached $50,000, with only 2% representing the actual cost of the device. Forensic experts hired to identify, contain, and respond to data breaches easily cost 6- figures within the first two weeks of engagement. 14

Target Breach Expenses (does not include legal expenses) Severance for CEO amounted to 15.9 million dollars alone Regulatory fines 1 billion dollars for negligence to the government Fraudulent credit card charges whopping 2.2 billion dollars Was to be refunded by the company for losses from those 40 million card accounts The retail chain suffered 440 million dollars in revenue losses fueling 2014 so far as a result of lowered consumer confidence from the hacks 15

Vulnerability of So-Called Secure Systems Viruses, spyware, worms, or Trojans Malware, including zero-day malware Web-based attacks Employee actions (both negligent and intentional) phishing 16

Simple Data Loss Lost or stolen devices Smartphones with weak or no password protection Laptops with weak or no password protection Flash drives or other portable memory devices Improper disposal of documents Improper disposal of computers and other devices Improper disposal of system components Palm Springs Federal Credit Union 17

Financial Sector Threats The number of incidents and level of sophistication has increased dramatically in recent years triggering active Cyber Division of the FBI to take larger active role. Account Takeovers Exploitation of online financial and market systems, such as Automated Clearing House systems, payment card transactions, and market trades. 18

Threats (cont d) Compromise typically is accomplished by accessing an authorized user s weak account credentials. Third-Party Payment Processor Breaches Bad actors target these companies systems, because the volume of personally identifiable information and payment card information is massive, and because such information has immediate value on the black market. 19

Threats (cont d) Payment Card Skimming and Point of Sale Schemes Steal card data to sell or create fake payment card Obsolete operating systems for ATMs and POS machines is easily compromised 20

Threats (cont d) Mobile Banking Exploitation Increased risks Malware starting to show up Man-in-the-middle attacks utilizing special malware sent via texts More prevalent in Androids Apple s mobile payment system 21

Threats (cont d) Insider Access Direct access to confidential information, data, and other insider information. Supply Chain Infiltration/Vendor Management Bad actors can gain physical and technical access to credit union by compromising trusted suppliers of technical, computer, and security equipment, software, and hardware. 22

Consequences of Inaction Loss of goodwill Reputation risk Transactional costs associated with loss mitigation Forensic expert fees Civil liability exposure Exposure to fines and other penalties 23

Inherent risk FFIEC Cybersecurity Assessment Connection types Technologies used Preparedness Risk management and oversight Collaboration and controls Incident management 24

FS-ISAC Financial Services Information Sharing and Analysis Center Launched in 1999 as the global go-to resource for cyber threat www.fsisac.com 25

Consumers Breach fatigue Complacency Not likely to impact shopping habits Credit unions should educate members and encourage monitoring of account 26

Laws and regulations 27

Risk Assessment/Prevention Preventive measures Including Identifying foreseeable threats Assess likelihood and danger of potential threats Assess sufficiency of policies, procedures Proper disposal of information 28

Loss Prevention Employee Awareness Training Patch Management Encryption Periodic Testing of Computer Security 29

Loss Prevention (cont d) Strengthen Account Credentials Pass-phrases, rather than passwords Combine various character types Limit and restrict administrative access Cybersecurity and Data Protection Policies and Procedures 30

Breach Response Assess incident Notify NCUA or state supervisory authority Notify law enforcement File Suspicious Activity Report ( SAR ), if applicable Preservation of records and evidence Member notification 12 C.F.R. Parts 748 and 1016 31

Breach Response (cont d) Cybersecurity and Data Breach Response Plan Upon notice of a potential data compromise, immediately contact a law firm with cybersecurity expertise. Permit law firm to coordinate retention of forensic experts. 32

State Regulation Only 3 states do not currently have a law requiring notification of security breaches Minnesota and Washington have statutes that require a merchant to reimburse a financial institution for reissuance of cards under certain circumstances NJ bill introduced this year requires reimbursement for costs incurred by financial institutions 33

Connecticut Consumer Security Breach Notification Any person who conducts business in this state, and who, in the ordinary course of such person s business, owns, licenses or maintains computerized data that includes personal information, shall provide notice of any breach of security following the discovery of the breach to any resident of this state whose personal information was, or is reasonably believed to have been, accessed by an unauthorized person through such breach of security. Such notice shall be made without unreasonable delay, subject to the provisions of subsection (d) of this section and the completion of an investigation by such person to determine the nature and scope of the incident, to identify the individuals affected, or to restore the reasonable integrity of the data system. Such notification shall not be required if, after an appropriate investigation and consultation with relevant federal, state and local agencies responsible for law enforcement, the person reasonably determines that the breach will not likely result in harm to the individuals whose personal information has been acquired and accessed. 34

Connecticut Consumer Security Breach Notification Any person that maintains such person s own security breach procedures as part of an information security policy for the treatment of personal information and otherwise complies with the timing requirements of this section, shall be deemed to be in compliance with the security breach notification requirements of this section, provided such person notifies, as applicable, residents of this state, owners and licensees in accordance with such person s policies in the event of a breach of security and in the case of notice to a resident, such person also notifies the Attorney General not later than the time when notice is provided to the resident. Any person that maintains such a security breach procedure pursuant to the rules, regulations, procedures or guidelines established by the primary or functional regulator, as defined in 15 USC 6809(2), shall be deemed to be in compliance with the security breach notification requirements of this section, provided (1) such person notifies, as applicable, such residents of this state, owners, and licensees required to be notified under and in accordance with the policies or the rules, regulations, procedures or guidelines established by the primary or functional regulator in the event of a breach of security, and (2) if notice is given to a resident of this state in accordance with subdivision (1) of this subsection regarding a breach of security, such person also notifies the Attorney General not later than the time when notice is provided to the resident. 35

Federal Regulation Tax Identity Theft Awareness Week: www.mycreditunion.gov/protect/pages/taxidtheft.aspx Prevent Identity Theft: www.mycreditunion.gov/protect/pages/prevent-identity- Theft.aspx Frauds and Scams: www.mycreditunion.gov/protect/fraud/pages/default.aspx Cybersecurity Awareness: www.ffiec.gov/cybersecurity.htm NCUA Consumer Report: Frauds, Scams and Cyberthreats - Part I: http://youtu.be/3zlfy7_97vc NCUA Consumer Report: Frauds, Scams and Cyberthreats - Part II: http://youtu.be/5xfyfrgxsle 36

What Constitutes Cyber Liability 37

Insurance The vast majority of credit unions in the U.S. don t have adequate insurance coverage in the event of another online data breach. -Credit Union Journal, November 10, 2014 38

What Can You Do? Is your data security adequate? What does your insurance cover? What insurance is available for credit unions that may experience data breach exposure? 39

Cyber Insurance Approximately 50 companies in the U.S. offer cybersecurity insurance $2 billion is expected to be spent in the United States in 2014 on cyber insurance 67% increase from 2013 In 2010 cyber insurance premiums totaled $600,000 Notifying affected customers of a credit card breach can cost up to $500,000 40

Cyber Insurance continued $166,000 average cost of a breach to credit unions according to CUNA Mutual CUNA Mutual s cybersecurity policy includes access to: Resources to help credit unions manage risks Insurance protection Breach recovery services 41

Employee Awareness Training Patch Management Encryption Periodic Testing of Computer Security Policies and Procedures Proactive and quick response Review current insurance coverage 42

E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153 eakeeney@kaufcan.com http://www.kaufmanandcanoles.com/movies/credit-unions.html 43

Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C.