Big Data As a Threat? An Alternative Approach to Cybersecurity



Similar documents
The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School

Field/Customer FAQs. What is the SAFETY Act?

Cyber Liability Security for Asset Managers. July 17, 2014

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Cybersecurity. Are you prepared?

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

Data Breach Response Planning: Laying the Right Foundation

Health Care Data Breach Discovery Strategies for Immediate Response

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

Big Data, Big Risk, Big Rewards. Hussein Syed

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

CYBERSECURITY RISK MANAGEMENT

The SAFETY Act: Providing Critical Liability Protections for Cyber and Physical Security Efforts

Enterprise Forensics and ediscovery (EnCase) Privacy Impact Assessment

Understanding the Business Risk

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Cyber Risks in the Boardroom

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Rogers Insurance Client Presentation

Cyber Security Risk Management

Managing cyber risks with insurance

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

Cyber Security and Privacy - Program 183

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Public Private Partnerships and National Input to International Cyber Security

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015

Cyber Insurance: How to Investigate the Right Coverage for Your Company

The NIST Cybersecurity Framework

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Cybersecurity and internal audit. August 15, 2014

NIST Cybersecurity Framework What It Means for Energy Companies

Cybersecurity Risk Transfer

PwC s Advanced Threat and Vulnerability Management Services

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Cybersecurity: Protecting Your Business. March 11, 2015

Defending Against Data Beaches: Internal Controls for Cybersecurity

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Cyber-insurance: Understanding Your Risks

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Logging In: Auditing Cybersecurity in an Unsecure World

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

Cybersecurity: What CFO s Need to Know

Cybersecurity and Privacy Hot Topics 2015

Roadmaps to Securing Industrial Control Systems

Security Breach: 10 Industries Impacted

Developing a robust cyber security governance framework 16 April 2015

SCAC Annual Conference. Cybersecurity Demystified

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Data Loss Prevention: Data-at-Rest vs. Data-in-Motion

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

CYBER SECURITY SPECIALREPORT

Cyber security Building confidence in your digital future

Transcription:

Big Data As a Threat? An Alternative Approach to Cybersecurity February 11, 2015 Brian Finch, Pillsbury Winthrop Shaw Pittman Brian Fox, PwC Pillsbury Winthrop Shaw Pittman LLP

Data Breaches and Cyber Attacks Exposure of corporate secrets, trade secrets, and other proprietary information Exposure of personally identifiable information (employees and customers), including health information Disruption/destruction of operations Attacks are cheap: ($2 for crashing a website; $30 for malware verification; $5,000 for zero day ) Malware now tends to be one time use 1 Big Data As a Threat? An Alternative Approach to Cybersecurity

Who is Conducting Cyber Attacks? 2 Big Data As a Threat? An Alternative Approach to Cybersecurity

Data-Borne Problems End-of-Life Issues Insider Threat Corrupted Data 3 Big Data As a Threat? An Alternative Approach to Cybersecurity

Too Much Data? 4 Big Data As a Threat? An Alternative Approach to Cybersecurity

Reduce Your Value 5 Big Data As a Threat? An Alternative Approach to Cybersecurity

Disparate Information Risk Management Records Management Cybersecurity Privacy E-Discovery 6 Big Data As a Threat? An Alternative Approach to Cybersecurity

Information Risk Management Companies are starting to understand how fundamentally these information risks are related Projects in the various areas often overlap or produce conflicting work products Training efforts developed separately create feeling of training overload Companies want: Holistic view of information and data Understanding of what you have and where you have it Ownership over information in the business Disposal of unnecessary data Better identification of high-value information assets Improved protection, security and access 7 Big Data As a Threat? An Alternative Approach to Cybersecurity

Integrated Information Risk Management Records Management Cybersecurity IRM Policy Framework and Leadership Privacy E-Discovery 8 Big Data As a Threat? An Alternative Approach to Cybersecurity

Records & Information Management RIM and Cybersecurity Complement Each Other in the Management of High Value Data ( HVD ) RIM Cybersecurity Identifying Records and Non-Records Identifying Crown Jewels Using records repositories to manage HVD Focusing security resources on HVD Defensible Disposition Reducing the Attack Surface 9 Big Data As a Threat? An Alternative Approach to Cybersecurity

Key Elements of an Integrated Program Data inventory and Business Process Taxonomy Identify the types & categories of data stored Surfaces what you have and where you have it Provides context for ownership and enrichment of data Information about how data should be stored, protected and managed can be derived through inference rather than direct analysis 10 Big Data As a Threat? An Alternative Approach to Cybersecurity

Key Elements of an Integrated Program Facilitate routine, policy-driven disposition Develop a risk-based, phased approach to the disposition and remediation of legacy data Less data means less legal risk & less info to protect, produce & recover Centralization can manage redundancy, offering greater insights into data & increased access to data Routine disposition creates a culture in the organization of separating high-value data from low-value data 11 Big Data As a Threat? An Alternative Approach to Cybersecurity

Many Theories of Liability Shareholder claims/ SEC Disclosures Loss of IP/trade secret claims Negligent selection, design or contracting Failure to take reasonable security measures for threats that a company knew or should have known about Strict liability FTC/State UDAP claims, international regulator liability 12 Big Data As a Threat? An Alternative Approach to Cybersecurity

What Would Litigation Look Like? From FTC v. Wyndham Failure to: remedy known security vulnerabilities such as allowing insecure server/network connections employ commonly used methods to require user IDs and passwords that are difficult for hackers to guess adequately inventory computers in order to manage network devices employ reasonable measures to detect and prevent unauthorized access or to conduct security investigations follow proper incident response procedures, including failing to monitor computer network for malware used in a previous intrusion adequately restrict 3d party vendor access share threat information/act upon shared information How can you make sure you are taking reasonable cyber security measures? 13 Big Data As a Threat? An Alternative Approach to Cybersecurity

The SAFETY Act Support Anti-Terrorism by Fostering Effective Technologies Act Part of the Homeland Security Act of 2002 Eliminates or minimizes tort liability for sellers of DHS-approved technologies should suits arise after an attack (physical or cyber), including: SAFETY Act protections obtained only by submitting an application to DHS Applies to services, products, policies This includes self-deployed programs Protections apply even if approved technologies are sold to commercial customers or if the attack originates from abroad so long as US interests implicated (i.e., economic losses) 14 Big Data As a Threat? An Alternative Approach to Cybersecurity

Act of Terrorism = Cyber Attack Any cyber security product, service, and/or policy is eligible for SAFETY Act protections Cyber attacks are encompassed under this definition There is NO requirement that the attacker s identity or motivation be identified/proven: Only mention of intent potentially relates to intent to cause injury or loss, NOT traditional terrorist intent This means that ANY cyber attack could potentially trigger SAFETY Act liability protections 15 Big Data As a Threat? An Alternative Approach to Cybersecurity

Designation vs. Certification Two levels of protection under the SAFETY Act Under Designation : Claims may only be filed in Federal court Damages are capped at a level set by DHS Bar on punitive damages and prejudgment interest Under Certification sellers also receive a presumption of immediate dismissal In both circumstances claims against CUSTOMERS are to be immediately dismissed 16 Big Data As a Threat? An Alternative Approach to Cybersecurity

Key Questions and How To Use Any costs for filing a SAFETY Act application? NO What kind of cybersecurity products are eligible for SAFETY Act protections? All PRODUCTS, SERVICES, AND/OR POLICIES, INCLUDING INTERNAL POLICIES. What is the practical effect of obtaining SAFETY Act protections? A cap on damages or immunity from damages arising out of or related to cyber attacks. Can I realize SAFETY Act benefits just by purchasing and using SAFETY Act approved cyber security solutions? YES Can I require SAFETY Act approval in procurements? YES What kind of claims will this help mitigate/eliminate? Negligence, third party liability, failure to take reasonable mitigation steps, D&O claims 17 Big Data As a Threat? An Alternative Approach to Cybersecurity

Thank You for Participating! Brian Finch, Partner Pillsbury Winthrop Shaw Pittman LLP Phone: 202.663.8062 brian.finch@pillsburylaw.com Brian Fox, Principal PwC Phone: 646.471.3398 brian.t.fox@us.pwc.com 18 Big Data As a Threat? An Alternative Approach to Cybersecurity