SECURITY CONSIDERATIONS FOR LAW FIRMS



Similar documents
Cybersecurity: What CFO s Need to Know

How-To Guide: Cyber Security. Content Provided by

The Protection Mission a constant endeavor

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

INFORMATION SECURITY FOR YOUR AGENCY

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Better secure IT equipment and systems

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Network Segmentation

Automation Suite for. 201 CMR Compliance

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

External Supplier Control Requirements

Enterprise Computing Solutions

How To Protect Yourself From A Hacker Attack

SANS Top 20 Critical Controls for Effective Cyber Defense

Presented by Frederick J. Santarsiere

Information Technology Security Review April 16, 2012

Is Your IT Environment Secure? November 18, Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Presented by Evan Sylvester, CISSP

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

BYOD: End-to-End Security

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Penetration testing & Ethical Hacking. Security Week 2014

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

Are you prepared to be next? Invensys Cyber Security

Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits

HOW SECURE IS YOUR PAYMENT CARD DATA?

Overcoming PCI Compliance Challenges

Risk Assessment Guide

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Becoming PCI Compliant

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Network & Information Security Policy

Cybersecurity: Protecting Your Business. March 11, 2015

Achieving Compliance with the PCI Data Security Standard

RISK ASSESSMENT GUIDELINES

Department of Education. Network Security Controls. Information Technology Audit

Cybersecurity. Are you prepared?

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Network and Security Controls

93% of large organisations and 76% of small businesses

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Cyber Security Management

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

DeltaV System Cyber-Security

Cybersecurity and internal audit. August 15, 2014

Information Security Policy

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Information Blue Valley Schools FEBRUARY 2015

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Enterprise Risk Management taking on new dimensions

September 20, 2013 Senior IT Examiner Gene Lilienthal

F G F O A A N N U A L C O N F E R E N C E

Protecting your business interests through intelligent IT security services, consultancy and training

Transcription:

SECURITY CONSIDERATIONS FOR LAW FIRMS

Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally, nationally, and internationally Serves the private and public sectors Serves more than 12 different industries www.emrisk.com

Speaker Silka Maria Gonzalez President and Founder - Enterprise Risk Management Prior Experience Price Waterhouse Assurant Diageo PLC 30 years of experience in the field of cyber security

Speaker Education Massachusetts Institute of Technology - Entrepreneurial Masters Program Florida International University - Master of Accounting Information Systems Xavier University - Bachelor of Science, Computer Information Systems - Bachelor of Arts, Accounting

Speaker Certifications Certified Public Accountant (CPA) Certified Information Systems Security Professional (CISSP) Certified Information Systems Manager (CISM) Certified Information Systems Auditor (CISA) Certified Information Technology Professional (CITP) Certified in Risk and Information Systems Control (CRISC) Payment Card Industry Qualified Security Assessor (QSA)

Agenda Lawyer s Responsibilities Security Problem General Lawyers Logical Security Physical Security Administrative Security New Technologies and New Trends Questions and Answers

LAWYERS RESPONSIBILITIES

Lawyers Responsibilities Ethics rules require lawyers to protect the confidentiality of clients information New ethics advisory opinions regarding new technologies Responsibility to obtain training and understanding of new information systems technologies and risks Responsibility to evaluate information systems and security risks and manage such risks

Florida Bar Ethics Opinion 10-2 Devices that Contain Storage Media Lawyers must take reasonable steps to ensure that confidentiality is maintained, including: Identification of potential threats to confidentiality, such as unauthorized access Development and implementation of policies to address the potential threats to confidentiality Keeping abreast of changes in technology to identify new threats to confidentiality

Florida Bar Proposed Ethics Opinion 12-3 Cloud Computing Cloud computing is permissible as long as the lawyer adequately addresses the potential risks associated with it. Lawyers have an ethical obligation to understand the technology they are using and how it potentially impacts confidentiality of information relating to client matters. Lawyers should consider whether to use additional security in specific matters in which the lawyer has proprietary client information or has other particularly sensitive information.

Ethics Opinions throughout United States Multiple State Bars have issued ethics opinions regarding cloud computing and similar technology. Lawyers must exercise reasonable care. Lawyers must educate themselves and determine what are sufficient safeguards depending on: the level of sensitivity of the client information, and evolving technology and threats.

Ethics Opinions throughout United States State Bars with opinions on cloud computing or similar technology: Alabama Arizona California Iowa Maine Massachusetts New Hampshire New Jersey New York North Carolina Oregon Pennsylvania Vermont

SECURITY PROBLEM

Security Problem Global and large Affects everything Increasing and growing in complexity Lack of awareness and understanding Ignored or not addressed properly Impact can be extensive

Security Attacks Source: IBM Security Services Cyber Security Intelligence Index June 2013

Categories of Incidents Source: IBM Security Services Cyber Security Intelligence Index June 2013

Categories of Attackers Source: IBM Security Services Cyber Security Intelligence Index June 2013

Attacker Motivation Source: IBM Security Services Cyber Security Intelligence Index June 2013

How Breaches Occur Source: IBM Security Services Cyber Security Intelligence Index June 2013

Some Major Sources of the Problem Inadequate Configurations Malware Hacking Social Engineering Physical Issues Opportunistic situations

Security Problem Law firms are vulnerable Firm s client information Firm s information Security breaches Fraud Lawsuits Reputational damage Financial losses

Security Problem In November 2011 the FBI met with top law firms in New York to address the growing number of cyber attacks on law firms While financial institutions and corporations have strengthened cyber security, law firms remain easier targets Law firms hold valuable client information Example: Hackers began hitting several law firms Hackers were looking for information regarding a $40 billion acquisition deal

LOGICAL SECURITY

Logical Security Logical security covers the protection of information assets using different types of automated mechanisms. Logical security refers to technical and automated security controls within computer information systems and software. Logical security focuses on systems, configurations, timely updates, monitoring, and remediation. Strong logical security applies the principle of defense in depth.

Key Elements of Information Security Confidentiality Prevention of intentional or unintentional unauthorized disclosure of a message s contents. Loss of confidentiality can occur in many ways, such as through the intentional release of private company information or through the misapplication of network rights. Integrity Ensuring that modifications are not made to data by unauthorized personnel or processes and that unauthorized modifications are not made to data by authorized personnel or processes. Availability Ensuring the reliable and timely access to data and computing resources by the appropriate personnel.

Security Components Relationship Threat Agent Give rise to Exploits Threat Leads to Vulnerability Directly affect Risk Asset Can damage Exposure And causes an Safeguard Can be mitigated by a

Logical Security Network Layer Components: Firewalls Routers Switches IDS\IPS

Logical Security Network Layer Components: Virtual Private Networks(VPNs) Wireless Mobile

Logical Security Computer Systems Layer Components: Operating Systems Applications Systems Database Systems Email Systems Backup Systems

Logical Security Computer Systems Layer Component: Imaging Systems Anti-Virus Systems Anti-malware Systems Security Systems Logging and Monitoring Systems

Some Logical Security Issues Inadequate network design and segmentation Inadequate configurations of systems Lackofsystem updatesorpatches Inadequate user access controls Inadequate resource access controls

Some Logical Security Issues Data integrity can be compromised Data confidentiality can be compromised Inadequate logging, monitoring, and follow up Inadequate control of data leakage Improper control of data outside the organization

Key Considerations for Logical Security Adequate design and segmentation of networks Adequate security policies, standards, and procedures Adequate system configurations Periodic upgrades and patching Adequate user access controls Adequate resource access controls

Key Considerations for Logical Security Proper logging, monitoring, review, and retention Proper use of encryption Qualified and trained security professionals Proper use of on-going automated tools Performance of periodic security reviews On-going remediation

PHYSICAL SECURITY

Physical Security Physical security covers the protection of information assets using different physical mechanisms. Physical security focuses on both human disasters such as human error, misappropriation of assets, and natural disasters. Strong physical security applies the principle of defense in depth.

Physical Security Parking Building Visitors Offices Computer rooms Telecommunication/ wire rooms Sensitive areas Storage media

Physical Security Access Card Systems Alarm Systems Surveillance Systems Windows Doors Gates Locks Boxes Documents

Physical Security Mobile devices Printer and fax areas Filing cabinets Garbage

Some Physical Security Issues Unathorized access to organization, sensitive areas, and sensitive data Theft and misuse of organizational data Gaining physical connections to the internal network to access information logically from outside locations Gaining access to law firms clients networks and data.

Key Considerations for Physical Security Adequate policies, standards, and procedures Adequate access controls to key areas Use of proper encryption mechanisms Limitofdatausageviamobiledevices Adequate configuration of systems Adequate user access controls

Key Considerations for Physical Security Adequate resource access controls Proper logging, monitoring, review, and retention Qualified and trained security professionals Performance of periodic security reviews On-going remediation

ADMINISTRATIVE SECURITY

Administrative Security Administrative security covers organizational aspects, management directives, and overall governance considerations. Administrative security covers the softer side of information security.

Administrative Security Organizational structure Security function Information security personnel Information security program Information security policies Information security standards Information security procedures

Administrative Security Security administration Security training and awareness Security incident response Business continuity planning Periodic security reviews and remediation Useofautomatedtools

Key Decision Makers Key decision makers should: Involved in the information security process Set policies and strategies Provide resources for information security Assign responsibilities to management and set priorities

NEW TECHNOLOGIES AND NEW TRENDS

New Technologies Mobile device technologies Wireless technologies Cloud computing technologies New security software tools email channel protection

Social Engineering Exploit the weakest link in information security- People. Why go technical when you can manipulate people into divulging the information? People are basically helpful by nature. Exploit the human hardware bugs. Organizations spend large amounts of money on information security infrastructure and yet fall prey to the oldest tricks in the book. Thatreassuringly expensive firewallisofnouseifthehumanfirewallisweak. Security isonlyasstrongastheweakestlink.

Contact ERM Phone : 305.447.6750 E-mail : info@emrisk.com www.emrisk.com