Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015



Similar documents
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Cybersecurity y Managing g the Risks

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Data Breach and Senior Living Communities May 29, 2015

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Data Breach Response Planning: Laying the Right Foundation

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Cybersecurity: Protecting Your Business. March 11, 2015

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Network Security & Privacy Landscape

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Cyber Risks in the Boardroom

October 24, Mitigating Legal and Business Risks of Cyber Breaches

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

Privacy Law Basics and Best Practices

CSR Breach Reporting Service Frequently Asked Questions

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Standard: Information Security Incident Management

Legislative Language

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

HIPAA and Mental Health Privacy:

Cybersecurity Issues for Community Banks

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide

Anatomy of a Hotel Breach

Cybersecurity The role of Internal Audit

HIPAA Data Breaches: Managing Them Internally and in Response to Civil/Criminal Investigations

Jefferson Glassie, FASAE Whiteford, Taylor & Preston

Franchise Data Compromise Trends and Cardholder. December, 2010

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Cybersecurity: What CFO s Need to Know

Privacy and Data Breach Protection Modular application form

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

How To Protect Yourself From Cyber Threats

Is Your Company Ready for a Big Data Breach?

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Contact: Henry Torres, (870)

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

INFORMATION TECHNOLOGY POLICY

Data Security Incident Response Plan. [Insert Organization Name]

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

Logging In: Auditing Cybersecurity in an Unsecure World

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

Data Breach Response Basic Principles Under U.S. State and Federal Law. ABA Litigation Section Core Knowledge January

Nine Network Considerations in the New HIPAA Landscape

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Security Information Lifecycle

Aftermath of a Data Breach Study

Information Security Program Management Standard

White Paper September 2013 By Peer1 and CompliancePoint PCI DSS Compliance Clarity Out of Complexity

SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Data Privacy & Security: Essential Questions Every Business Must Ask

What are you trying to secure against Cyber Attack?

Fraud and Abuse in the Sale and Marketing of Drugs

How To Protect Your Cybersecurity From Cyber Incidents

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Transcription:

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1

Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas L. Townsend Counsel, National and Homeland Security, Arnold & Porter LLP Troy M. Pearsall Chief Information Officer, In-Q-Tel, Inc. Bill Karazsia Assistant General Counsel and Chief Privacy Officer, National Student Clearinghouse 2

The Threat Recently published statistics: 79,790 data security incidents in 2014 2,133 confirmed data breaches In 60 per cent of cases, attackers are able to compromise an organization within minutes. Source: Verizon, 2015 Data Breach Investigations Report High profile examples Nonprofits equally vulnerable 3

Agenda I. Data Privacy & Security II. Regulatory Landscape III. Being Prepared IV.Responding to a Breach 4

DATA PRIVACY Building Awareness & Distinctions Privacy & Information Security Domain Awareness & Role Differentiation The Law and Ethics of Big Data Effect of Acquisition Models on Influence 5

Data Privacy & Information Security What does each mean to you (now/after)? Where are the boundaries? Who holds the expertise? 6

Privacy Professional s View of Data Privacy InfoSec Notice Consent Choice Access Confidentiality Use Availability Integrity *IAPP Architecture 7

Influence across Acquisition Models Outright Owner Licensee Lessee Agent 8

Regulatory Standards State Law Federal Trade Commission PCI Standards NIST Cybersecurity Framework Other Requirements HIPAA Government Contractors Grantees Contractual Pending Federal Legislation 9

State Laws Patchwork quilt Focus on location of business, breach and/or individual or entity whose data is compromised Some substantive privacy requirements Notification requirements AG or other regulatory involvement 10

FTC Enforcement Authority Broad authority under Sec. 5(a) of the FTC Act The FTC has the authority to enforce violations of unfair and deceptive acts in the commercial marketplace The FTC has asserted violations of numerous statutes in its data security enforcement actions, including the GLBA and FCRA Over 60 data security enforcement actions over the past 12 years, affecting nearly all sectors of the economy Note: Pending challenges to FTC Authority 11

Pending Federal Legislation Cyber Threat and Prevention Information- Sharing House passed two different bills in April 2015 Senate bill pending for committee and floor action Anticipated enactment of compromise measure Data Security and Breach Notification Standards Standards for data protection Requirements for breach notification Preemption of varying state laws 12

PCI Standards 1. Build & Maintain Secure Network Firewalls Passwords (do not use defaults) 2. Protect Cardholder Data Protect stored data Encrypt transmissions 3. Maintain a Vulnerability Management Program Anti-virus software Maintain secure systems/applications 4. Implement Strong Access Controls Need-to-Know Unique IDs Restrict Physical Access 5. Regularly Monitor and Test Networks Track and monitor all access Regularly test systems and processes 6. Maintain an Information Security Policy 13

NIST Cybersecurity Framework Executive Order 13636 directed NIST to work w/ stakeholders to develop voluntary cybersecurity framework for critical infrastructure 1. Framework Core Functions: Identify, Protect, Detect, Respond, Recover 2. Implementation Tiers: Companies select appropriate Cybersecurity posture from Partial and reactive (Tier 1) to Adaptive and risk-informed (Tier 4) 3. Profile: The outcomes selected based on business needs can be used to perform self assessments and to set goals 14

Incident Readiness: Being Prepared 15

Fundamental Steps for Preparedness Identify areas of risk Implement safeguards State-of-the-art firewalls IT security Physical security Adopt prudent vendor management and contracting practices Establish written policies and procedures Conduct training for employees and agents Designate Security Officer Obtain insurance coverage 16

Governance and Compliance Structure Board Committee Oversight Committee Charter Resolutions Approval of Policies Designation of Officers Periodic Report and Review Officer Responsibilities Line, compliance, technology, risk management, and audit Organization Chart / Map People, business units, systems, vendors, functions 17

External Team and Resources Identify/retain in advance: Outside legal counsel Forensic consultants Public relations firms Credit monitoring service providers 18

Responding to a Breach 19

Initial Concerns Veracity of allegation Possible extortion Reputational exposure Civil/criminal exposure How to investigate? 20

Investigation Options Contact police Notify FBI Interview company employees Engage private investigator Engage (through legal counsel) forensic vendor 21

Strategic Considerations Actions by legal department v. security department Role of outside counsel Independence Expertise Privilege Forensic vendors Privilege issues Internal investigations v. external investigation Upjohn warning Civil lawsuit tools to further investigation Theft; Intrusion 18 U.S.C. 1030; Lanham Act 22

Contacting Law Enforcement: Benefits Using criminal law as a weapon against wrongdoers: Grand jury subpoenas and search warrants Arrest and conviction Restitution (damages) Mandatory in some cases 18 U.S.C. 3663A May get investigation costs (including legal fees) 23

Contacting Law Enforcement: Downsides Lose control of litigation Can t change the prosecutor s mind Prosecutor s timing may interfere with your needs The Oscar Wilde problem Unanticipated exposure Corporate criminal exposure Employee s actions are attributed to corporation FCPA Corporate espionage 24

Victim Notification Federal agency requirements Different state requirements (various standards) Application to out-of-state entities Personal information definition Breach definition Consideration of harm Timing for notices Form and content of notices SEC disclosure statement 25

Offering Credit Monitoring to Victims Pros: Mitigate damages Mitigate reputational harm Cons: Expense Admission of fault? 26

Media Exposure Preempt adverse reports Get your own message out first Monitor all communication channels (Twitter, Facebook, etc.) Use experienced PR consultants Don t try to master the media on your own Consult with legal counsel regarding all press statements 27

Managing Litigation Risk Plan for litigation at outset Keep in mind in everything you do Press releases Investigation Remediation Communications with government, customers, employees A good preventative plan is not only a way to avoid a breach, but is also a great defense 28

Kenneth L. Chernof, Partner, Arnold & Porter LLP kenneth.chernof@aporter.com /+1 202.942.5940 Ken Chernof is chair of the firm's Business Litigation practice. He focuses his practice on complex commercial, antitrust, and IP litigation. His practice is centered on defending leading business clients, particularly consumer products or services corporations, in multistate class actions and government litigation and investigations, and he applies a "bring order out of chaos" approach to each matter by devising creative litigation and nonlitigation strategies. He has particular experience advising clients on the potential impact of civil litigation resulting from data breaches and mitigating associated risks, and in defending class action data breach litigation. Nicholas L. Townsend, Counsel, Arnold & Porter LLP nicholas.townsend@aporter.com /+1 202.942.5249 Nicholas Townsend is Counsel in the firm's National Security and Public Policy practices. His national security work focuses on cybersecurity, US export controls and trade sanctions, biodefense, and information sharing within the intelligence community and more broadly across the government and the private sector. Mr. Townsend's privacy work includes drafting privacy policies governing companies' collection and use of customer data. He also advises clients on data breaches, including customer notice requirements and government inquiries regarding such breaches. 29

Troy M. Pearsall, Chief Information Officer, In-Q-Tel tpearsall@iqt.org / +1 703.248.3063 Troy Pearsall serves as Chief Information Officer of In-Q-Tel (IQT), the independent, non-profit, strategic investor for the CIA and the U.S. Intelligence Community. He also serves of the board of directors of Product Lab, LLC, a company incubator. Before assuming the CIO role, Pearsall led Big Data and Open Source initiatives at IQT. Prior to his Big Data role, Pearsall served as Executive Vice President of Architecture & Engineering at IQT where he oversaw IQT s investment strategy, technology assessments and selection process and client support functions. Before assuming the role of Executive Vice President of Architecture & Engineering, Pearsall served as a Visionary Solutions Architect on IQT s technical team, championing investments in the areas of information visualization and visual analytics. Bill Karazsia, Assistant General Counsel & Chief Privacy Officer, National Student Clearinghouse karazsia@studentclearinghouse.org /+1 703.742.4847 Bill Karazsia is Assistant General Counsel and Chief Privacy Officer at National Student Clearinghouse, a nonprofit organization that serves the higher education community by facilitating the exchange of student information. Bill s main customers at the Clearinghouse are responsible for the organization s revenue-generating lines of business. His portfolio includes strategic transactions, commercial contracts, information privacy, and corporate governance. Ten years ago Bill earned a JD from the Georgetown University Law Center, and later this year he will graduate with an MBA from the global executive program at Bocconi University, a specialized business and finance university in Milan, Italy. He has held the Certified Information Privacy Professional credential for the US since 2013 and this year earned the European credential. 30