Data Breach Response Planning: Laying the Right Foundation



Similar documents
ICBA Summary of FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Cybersecurity. Are you prepared?

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

Click to edit Master title style

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

Data Breaches and Cyber Risks

Cybersecurity: What CFO s Need to Know

Attachment A. Identification of Risks/Cybersecurity Governance

Defending Against Data Beaches: Internal Controls for Cybersecurity

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Data Breach and Senior Living Communities May 29, 2015

AHLA. N. HIPAA Security Breaches: What Should We Be Doing to Keep Us Out of the Headlines? Diane E. Felix Armstrong Teasdale LLP Saint Louis, MO

Into the cybersecurity breach

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Top 10 Baseline Cybersecurity Controls Banks Aren't Doing

AGENDA HIP Ho AA w i rivacy d The B reach Happen? I P nc AA Secu dent R rit esp y o nse Corrective Action Plan What We Learned ACRONYMS USED

What s New with HIPAA? Policy and Enforcement Update

An Independent Member of Baker Tilly International

GEARS Cyber-Security Services

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Logging In: Auditing Cybersecurity in an Unsecure World

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

10 Smart Ideas for. Keeping Data Safe. From Hackers

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

HIPAA and Mental Health Privacy:

OCIE CYBERSECURITY INITIATIVE

HIPAA LIAISON MEETING PRESENTAITON. August 11, 2015 Leslie J. Pfeffer, BS, CHP University HIPAA Privacy Officer

Report on CAP Cybersecurity November 5, 2015

Cybersecurity Framework Security Policy Mapping Table

HIPAA Security Rule Compliance

Cybersecurity Awareness

Cyber Self Assessment

Overview of the HIPAA Security Rule

What Directors need to know about Cybersecurity?

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

Appendix B: Mapping Cybersecurity Assessment Tool to NIST

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

Data Breaches and Cyber Risks

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Cyber Risks in the Boardroom

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Information Blue Valley Schools FEBRUARY 2015

InfoGard Healthcare Services InfoGard Laboratories Inc.

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

plantemoran.com What School Personnel Administrators Need to know

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

September 20, 2013 Senior IT Examiner Gene Lilienthal

KEY STEPS FOLLOWING A DATA BREACH

What Data? I m A Trucking Company!

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Incident Response. Proactive Incident Management. Sean Curran Director

HIPAA Security & Compliance

Healthcare in the Crosshairs for Data Breaches. April 22, Deborah Hiser (512)

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Cybersecurity: Protecting Your Business. March 11, 2015

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

FACT SHEET: Ransomware and HIPAA

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

HIPAA Compliance: Efficient Tools to Follow the Rules

I ve been breached! Now what?

OCR UPDATE Breach Notification Rule & Business Associates (BA)

Cybersecurity Awareness. Part 2

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Transcription:

Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA I TENNESSEE

Attorneys from our Privacy and Information Security Team Paige M. Boshell Co-Team Leader, Privacy & Information Security Team Partner, Birmingham Office Amy S. Leopard Co-Team Leader, Privacy & Information Security Team Chair, AHLA Health Information and Technology Practice Group Vice Chair, HIMSS Legal Task Force Partner, Nashville Office 2

Agenda Cybersecurity Planning Data Breach Plan (incident response) Cybersecurity Program FTC Enforcement of Unfair Security Practices FFIEC Cybersecurity Assessment Tool (financial institutions) Healthcare Enforcement HIPAA Security Breach Risk Assessment 3

Cybersecurity Planning National Institute of Standards and Technology ( NIST ) Cybersecurity Framework Defined rubric and methodology for evaluating and addressing risk Technology neutral Relies on existing requirements, best practices and industry standards Voluntary for certain government contractors Widespread impact downstream chain, court and regulatory interpretations of reasonable or industry standard security practices and programs, applicability to variety of businesses 4

Cybersecurity Planning Information Sharing and Analysis Centers (ISAC): - ISACs are trusted entities established by Critical Infrastructure Key Resource (CI/KR) owners and operators to provide comprehensive sector analysis, which is shared within the sector, with other sectors, and with government. - Services provided by ISACs include risk mitigation, incident response, alert and information sharing. The goal is to provide users with accurate, actionable, and relevant information. - Member benefits vary across the ISACs and can include: access to a 24/7 security operations center; briefings; white papers; threat calls; webinars; and anonymous CIKR Owner/Operator reporting. 5

Cybersecurity Planning FS-ISAC: industry forum for collaboration on critical security threats facing the global financial services sector Global cyber and physical threat intelligence analysis and sharing (anonymous information sharing) Early warning of attacks Collaboration in response Coordination of assessment NH ISAC: healthcare and public health critical infrastructure resilience Expert guidance on avoiding and mitigating attacks 6

U.S. DOJ: Cyber Incident Best Practices (April 2015) Before Cyber Attack ID mission critical data and assets: Crown Jewels Actionable Incident Response Plan before intrusion, Test and update contingency plans Align organizational policies (e.g. HR) with Incident Response Plan Obtain authorization, technology and services to permit lawful network monitoring and address incidents Ensure legal counsel is familiar with technology and cyber incident management to reduce incident response time Engage with law enforcement, outside counsel, PR Firms, cybersecurity firms Establish relationships with cyber information sharing organizations for best practices (ISACs) 7

During A Cyber Attack Make initial assessment of scope and nature of incident Implement measures to minimize continuing damage Record and preserve data related to incident (image network, audit logs, records of attacks) Notify management, law enforcement, victims, DHS HIPAA = > Individuals, HHS/OCR, Media, DO NOT: use compromised systems to communicate OR Hack back After Recovering Continue monitoring for anomalous activity to document intruder expelled Who controls your network? Conduct Post-Incident review for deficiencies in Incident Response Plan Update and revise security policies or controls Review documentation periodically, and update as needed, in response to environmental or operational changes affecting the security of ephi. HIPAA 164.316(b)(2)(iii) Cyber Incident Best Practices (US DOJ: April 2015) 8

FTC enforcement authority Wyndham 2015 WL 4998121 (3d Cir. 8.24.15) Section 5 of the FTC Act: Unfair and Deceptive Acts or Practices Deceptive: Not implementing stated privacy policies Misrepresenting extent to which privacy and security of information collected, used, maintained is protected Unfair: Alleged failure to implement reasonable and appropriate security measures Elements: Practice causes or is likely to cause substantial injury to consumers Consumers are not reasonably able to avoid injury Injury is not outweighed by countervailing consumer benefit, competition Fair notice: That a company s conduct could fall within statute, not FTC s interpretation of cybersecurity practices. FTC has published data security guidance and data security complaints MUST keep abreast of FTC guidance and complaints 9

What is Fair Notice under Wyndham? Issue Card Systems Solutions (FTC 2006) 1 Wyndham Risk Assessment and Network Monitoring Security Monitoring and Management Generally Password Management Maintenance of PI Network Risk Management Did not adequately assess the vulnerability of its web application and computer network to commonly known or reasonably foreseeable attacks; did not implement simple, low-cost and readily available defenses to such attacks, CSS at 6(2)-(3). Failed to employ sufficient measures to detect unauthorized access to personal information or to conduct security investigations, CSS at 6(6). Failed to use strong passwords to prevent a hacker from gaining control over computers on its computer network and access to personal information stored on the network, CSS at 6(4). Created unnecessary risks to personal information by storing it in a vulnerable format for up to 30 days, CSS at 6(1). Did not use readily available security measures to limit access between computers on its network and between those computers and the Internet, CSS at 6(5). Failed to monitor network for the malware used in a previous intrusion, Compl. at 24(i), reused by hackers later to access the system again, id. at 34. Failed to employ reasonable measures to detect and prevent unauthorized access to computer network or to conduct security investigations, Compl. at 24(h). Did not employ common methods to require user IDs and passwords difficult for hackers to guess. (e.g., allowed remote access to a hotel s property management system that used default/factory setting passwords) Compl. at 24(f). Allowed software to store payment card information in clear readable text, Compl. At 24(b). Did not use readily available security measures, such as firewalls, to limit access between and among hotels property management systems, the Wyndham network, and the Internet, Compl. at 24(a). 1 No. C-4168 (FTC 2006) 10

10 FTC Lessons Learned from >50 Enforcement Actions 1. Start with Security. 6. Secure remote access to your network. 2. Control access to data sensibly. 7. Control access to data sensibly. 3. Require secure passwords and authentication. 8. Make sure your service providers implement reasonable security measures. 4. Store sensitive personal information securely and protect it during transmission. 5. Segment your network and monitor who s trying to get in and out. 9. Put procedures in place to keep your security current and address vulnerabilities that may arise. 10. Secure paper, physical media, and devices. Source: FTC Lessons Learned from FTC Enforcement Actions business.ftc.gov 11

FFIEC Cybersecurity Assessment Tool FFIEC Cybersecurity Assessment Tool: intended to help financial institutions evaluate their own ISP and risk profile Inherent Risk Profile Cybersecurity Maturity 12

FFIEC Cybersecurity Assessment Tool: Inherent Risk Profile Inherent Risk Profile -level of risk posed by the following: Technologies and Connection Types Delivery Channels Online/Mobile Products and Technology Services Organizational Characteristics External Threats 13

FFIEC Cybersecurity Assessment Tool: Inherent Risk Profile Risk Levels For each of the categories above, there is a risk level that the institution can choose based on descriptions provided in the Tool. For instance, in reviewing External Threats, institutions are given five risk levels to choose from, which are defined for each category. The table below illustrates the various risk levels. Category: External Threats Risk Levels Least Minimal Moderate Significant Most Attempted cyber No attempted Few attempts Several attempts monthly Significant number of attempts Substantial number attacks attacks or monthly (101-500); phishing monthly (501-100,000); spear of attempts reconnaissance. (<100); may campaigns targeting phishing campaigns targeting monthly (> have had employees or customers at high net worth customers and 100,000); generic the institution or third employees at the institution or persistent attempts phishing parties supporting critical third parties supporting critical to attack senior campaigns by employees activities; may have experienced an attempted activities; Institution specifically is named in threat reports; may management and/or network and Distributed Denial of have experienced multiple administrators; customers. Service (DDoS) attack within the last year. DDoS attacks within the last year. frequently targeted for DDoS attacks. 14

FFIECCybersecurity Assessment Tool: Cybersecurity Maturity 15

FFIECCybersecurity Assessment Tool: Cybersecurity Maturity Domain 1: Cyber Risk Management and Oversight Training and Culture Culture Baseline Management holds employees accountable for complying with the information security program. (FFIEC Information Security Booklet, page 7) Evolving The institution has formal standards of conduct that hold all employees accountable for complying with cybersecurity policies and procedures. Cyber risks are actively discussed at business unit meetings. Employees have a clear understanding of how to identify and escalate potential cybersecurity issues. CULTURE Intermediate Management ensures performance plans are tied to compliance with cybersecurity policies and standards in order to hold employees accountable. The risk culture requires formal consideration of cyber risks in all business decisions. Cyber risk reporting is presented and discussed at the independent risk management meetings. Advanced Management ensures continuous improvement of cyber risk cultural awareness. Innovative The institution leads efforts to promote cybersecurity culture across the sector and to other sectors that they depend upon. 16

FFIEC Cybersecurity Assessment Tool: Cybersecurity Maturity Baseline Characterized by minimum expectations required by law and regulations or recommended in supervisory guidance. This level includes compliance-driven objectives. Management has reviewed the evaluated guidance. 17

FFIEC Cybersecurity Assessment Tool: Mapping Inherent Risk Against Cybersecurity Maturity 18

FFIEC Cybersecurity Assessment Tool: Evolving Process 19

FFIEC Cybersecurity Assessment Tool: Board (and Management) Oversight Risk Management Oversight What is the process for ensuring ongoing and routine discussions by the board and senior management about cyber threats and vulnerabilities? How is accountability determined for managing cyber risks across our enterprise? Does this include management s accountability for business decisions that may introduce new cyber risks? What is the process for ensuring ongoing employee awareness and effective response to cyber risks? Cyber Security Controls What is our process for classifying data and determining appropriate controls based on risk? What is our process for ensuring that risks identified through our detective controls are remediated? Cyber Incident Management and Resilience In the event of a cyber attack, how will we respond internally and with customers, third parties, regulators, and law enforcement? How are cyber incident scenarios incorporated in our business continuity and disaster recovery plans? Have these plans been tested? Source: Federal Financial Institutions Examination Council (FFIEC) 20

Recurring Issues in Healthcare Enforcement 1. Risk Analysis 2. Vendor (Business Associate) Agreements 3. Failure to Manage Identified Risk, e.g. Encrypt 4. Lack of Transmission Security 5. Lack of Appropriate Auditing 6. No Patching of Software 7. Insider Threat 8. Improper Disposal 9. Insufficient Data Backup and Contingency Planning Many have RA+, NY/Columbia $4.8M, St. Elizabeth: document sharing application to store PHI without analyzing risk $250K Almost 1000 cloud providers/hospital Concentra $1.7M stolen unencrypted laptop Anchorage Community Mental Health Malware from unpatched vulnerabilities $150K Cornell Prescription Rx $125K Resolution Agreements often involve allegations of widespread noncompliance, lack of any risk analysis. Source: US HHS Office for Civil Rights (OCR), 9/2015 21

Questions? Paige M. Boshell 205.521.8639 pboshell@babc.com www.babc.com/paige-m-boshell Amy S. Leopard 615.252.2309 aleopard@babc.com www.babc.com/amy-s-leopard 22