MANAGING CYBERSECURITY INVESTIGATIONS



Similar documents
Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

EU Regulatory Trends in Data Protection & Cybersecurity What should be on the industry s agenda?

University of Sunderland Business Assurance Information Security Policy

CESG CIR SCHEME AND CREST CSIR SCHEME FREQUENTLY ASKED QUESTIONS

Global investigations: what employers need to know about investigating employees

Inhouse Masterclass: Data Developments - Cyber Security & the Right to be Forgotten. MHC.ie

2015 A CyberSecurity Year. Robert

KEY STEPS FOLLOWING A DATA BREACH

Cybercrime: risks, penalties and prevention

INFORMATION SECURITY MANAGEMENT POLICY

HOW WILL FRANCHISORS IN EUROPE MEET THE CHALLENGES EU PROPOSED CYBERCRIME DIRECTIVE

Cybersecurity: Protecting Your Business. March 11, 2015

Committees Date: Subject: Public Report of: For Information Summary

Research Topics in the National Cyber Security Research Agenda

Cyber Security Risk Management

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

How To Protect Decd Information From Harm

Caedmon College Whitby

KEY TRENDS AND DRIVERS OF SECURITY

Some thoughts about cloud computing risks. Andris Soroka 28 th of January, 2015 Riga, Latvia

The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide

Cyber Security - What Would a Breach Really Mean for your Business?

CESG Certification of Cyber Security Training Courses

External Supplier Control Requirements

The potential legal consequences of a personal data breach

Third Party Security Requirements Policy

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Cybersecurity and internal audit. August 15, 2014

Article 29 Working Party Issues Opinion on Cloud Computing

The IRS s New Whistleblower Program Another Enforcement Alert for International Business

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

Information Security Management System (ISMS) Policy

Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported

HOW TO HANDLE A WHISTLEBLOWER REPORT IN THE EU

Cybersecurity and Insurance Companies

Using a Managed File Transfer technology to prepare your customers for the GDPR (whatever is next)

Cybersecurity y Managing g the Risks

Incident Response Plan for PCI-DSS Compliance

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Central Agency for Information Technology

HIPAA Compliance Evaluation Report

BSA GLOBAL CYBERSECURITY FRAMEWORK

OCIE Technology Controls Program

Align Technology. Data Protection Binding Corporate Rules Processor Policy Align Technology, Inc. All rights reserved.

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

ESI Risk Assessment: Critical in Light of the new E-discovery and notification laws

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Computer Security Incident Response Team

Into the cybersecurity breach

Montgomery County, Unique Aspects of the Medicaid Control System

TELEFÓNICA UK LTD. Introduction to Security Policy

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

Digital Forensics G-Cloud Service Definition

Whistleblower Laws & Internal Investigations: Tactics & Best Practices

DUUS Information Technology (IT) Incident Management Standard

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

INCIDENT RESPONSE CHECKLIST

CYBERSECURITY INVESTIGATIONS

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Privacy Governance and Compliance Framework Accountability

Data Security Incident Response Plan. [Insert Organization Name]

Cyber Security. John Leek Chief Strategist

Information Security Incident Management Policy and Procedure

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Standard: Information Security Incident Management

Cybersecurity: What In-House Counsel Needs to Know

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

SUPPLIER SECURITY STANDARD

Why Encryption is Essential to the Safety of Your Business

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Mitigating and managing cyber risk: ten issues to consider

Accountable Privacy Management in BC s Public Sector

A practical guide to IT security

Cyber Security Incident Response Supplier Selection Guide

Who s next after TalkTalk?

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

Cyber Security Issues - Brief Business Report

The Association of Professional Compliance Consultants Professional Standards for Member Firms

IS INFORMATION SECURITY POLICY

Privacy Policy. February, 2015 Page: 1

AN INSIDE VIEW FROM THE EU EXPERT GROUP ON CLOUD COMPUTING

What Data? I m A Trucking Company!

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

PRIVACY MANAGEMENT ACTIVITIES

Information Security Policies. Version 6.1

Ed McMurray, CISA, CISSP, CTGA CoNetrix

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

Health Care Data Breach Discovery Strategies for Immediate Response

Transcription:

MANAGING CYBERSECURITY INVESTIGATIONS Tara Swaminatha, Of Counsel, Washington, DC Sam Millar, Partner, London May 12, 2016 If you cannot hear us speaking, please make sure you have called into the teleconference number on your invite information. US participants: 1 800 893 0176 Outside the US: 212 231 2928 The audio portion is available via conference call. It is not broadcast through your computer. *This webinar is offered for informational purposes only, and the content should not be construed as legal advice on any matter. www.dlapiper.com May 12, 2016 0

Speakers Tara Swaminatha Of Counsel, Washington, DC Sam Millar Partner, London www.dlapiper.com May 12, 2016 1

If you have a breach, call counsel yesterday Contact inside and outside counsel early (ideally before a breach) In the wake of a suspected or actual breach, using counsel (properly) allows you to keep things under wraps until you have a chance to get facts straight As you triage internally, keep your internal discussions and documents confidential Better to take a minute and sort out game plan before saying anything *Privilege is not automatic simply by using counsel Fact-specific inquiry Requires adherence to protocol www.dlapiper.com May 12, 2016 2

Incident response (IR) policy important elements Purpose Roles and responsibilities Escalation procedures Types of incidents Incident-specific response procedures Communications plan Contact information (consider alternative methods of communication) www.dlapiper.com May 12, 2016 3

Other important elements of strong IR plan (improves efficacy of investigations) Response plan cheat sheets organized by role Proper training for team members Vendors engaged through counsel Privileged protocol established Pre-existing relationships with law enforcement Tabletop/security drill Continually revise and adapt plans and protocol www.dlapiper.com May 12, 2016 4

Phase 1 Phase 2 Phase 3 Phase 4 Role `` Role Role ` Role Role Role www.dlapiper.com May 12, 2016 5

Security incident triage guidelines www.dlapiper.com May 12, 2016 6

Roles & Responsibilities Matrix www.dlapiper.com May 12, 2016 7

Chain of custody www.dlapiper.com May 12, 2016 8

Data breach incident response quick start guide Assemble an incident response team (IRT) Contact inside and outside counsel to establish a privileged reporting and communication channel Coordinate with legal counsel to bring in cybersecurity experts and forensic examiners Stop additional data loss Secure evidence Preserve computer logs Document the breach Define legal obligations Contact law enforcement (possibly) Conduct interviews of personnel involved Reissue or force security access changes Do not probe computers and affected systems Do not turn off computers and affected systems Do not image or copy data, or connect storage devices/media, to affected systems Do not run antivirus programs or utilities Do not reconnect affected systems www.dlapiper.com May 12, 2016 9

Importance of attorney-client privilege and confidentiality (in USA) Confidential discussions or documents ( privileged communications ) Write and distribute documents within organization with reduced likelihood of disclosure Forensic exam analysis kept confidential Tradeoffs in a risk analysis Purpose of attorney-client privilege www.dlapiper.com May 12, 2016 10

Discuss confidentiality procedures External team engaged through counsel PR/communications experts Forensic cybersecurity experts Internal team IT Legal HR PR/communications Customer relations Risk management Operations (physical breaches) Finance (company financial information lost) www.dlapiper.com May 12, 2016 11

Choosing a forensic partner/vendor Recent launch of two UK government schemes to help companies choose a cybersecurity incident response supplier CESG/CPNI CIR and CREST CSIR. Recognized set of professional qualifications and best practice standards Technical expertise to carry out sophisticated security incident investigations quickly and effectively Expert forensic ability Consider which elements of the investigation will be outsourced and which will be dealt with in-house Consider location of investigation e.g., does the business require a forensic vendor with international reach and ability to deploy teams globally? www.dlapiper.com May 12, 2016 12

Critical protections/lessons learned Strong security culture whistleblowing Businesses should have a robust set of policies and procedures to manage cyber security risks. Having such policies is not enough companies need to ensure that they are implemented correctly by monitoring compliance Regular training on cybersecurity issues linked to these policies is also important Screening: pre-employment and at regular intervals for employees and contractors to help manage "insider threat" Physical/digital security strong link Portable devices ban? encryption? www.dlapiper.com May 12, 2016 13

Critical protections/lessons learned (continued) Clear accountability for cybersecurity risk within the business Contract management to incorporate security controls User privileges Anti-virus software/malware detection Audit: security audits to include insider threat audit Incident management planning www.dlapiper.com May 12, 2016 14

Cybersecurity trends in the EU The FCA has identified cybercrime as a priority in its 2016-2017 Business Plan EY's Global Information Security Survey 2015 indicates that the threats people are most concerned about are phishing and malware The Panama Papers leak highlights the risk of cybersecurity/data breaches for law firms Increased coordination and information sharing between the police and the NCA in responding to and managing cybersecurity threats CPNI, GCHQ, BIS and the Cabinet Office have published an updated '10 Steps to Cyber Security' practical steps businesses can take to improve the security of their networks and the information carried on them Increased reporting www.dlapiper.com May 12, 2016 15

EU General Data Protection Regulation Key provisions include: Harmonization: single set of rules, directly applicable in all EU member states Enforcement: power for regulators to levy heavy financial sanctions of up to 4% of the annual worldwide turnover of the organization. This significantly increases the risk associated with privacy non-compliance Offshore processing: application of EU regulatory framework to companies established outside the EU if they target EU citizens Governance: increased responsibility and accountability on organizations to manage how they control and process personal data One-stop-shop: ability to nominate a single national data protection authority as the lead regulator for all compliance issues in the EU, where the organization has multiple points of presence across the EU www.dlapiper.com May 12, 2016 16

EU General Data Protection Regulation (continued) Consent: adoption of a more active consent based model to support lawful processing of personal data Right to be forgotten: a statutory right to be forgotten which will allow individuals the right to require a controller to delete data files relating to them if there are not legitimate grounds for retaining it www.dlapiper.com May 12, 2016 17

Questions? Contact us to learn more Tara Swaminatha Of Counsel, Washington, DC tara.swaminatha@dlapiper.com +1 202 799 4323 Sam Millar Partner, London sam.millar@dlapiper.com +44 (0)20 7153 7714 www.dlapiper.com May 12, 2016 18

www.dlapiper.com May 12, 2016 19