CYBERSECURITY RISK MANAGEMENT



Similar documents
Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

NIST Cybersecurity Framework What It Means for Energy Companies

Middle Class Economics: Cybersecurity Updated August 7, 2015

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

How To Protect Your Data From Being Hacked

Building Insecurity Lisa Kaiser

The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT CONTRACTORS ARE THE HEADLINERS WELCOME

Cyber Risks in the Boardroom

Data Breach Response Planning: Laying the Right Foundation

What are you trying to secure against Cyber Attack?

Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP

Answering your cybersecurity questions The need for continued action

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

What The OMB Cybersecurity Proposal Does And Doesn't Do

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

CIP Supply Chain Risk Management (RM ) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

Data Breach and Senior Living Communities May 29, 2015

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Legislative Language

Cyber Security for Advanced Manufacturing Next Steps

Big Data, Big Risk, Big Rewards. Hussein Syed

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cyberprivacy and Cybersecurity for Health Data

An Overview of Large US Military Cybersecurity Organizations

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

State of Security Survey GLOBAL FINDINGS

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

Cyber-Security. FAS Annual Conference September 12, 2014

The Comprehensive National Cybersecurity Initiative

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Cybersecurity: What CFO s Need to Know

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Legal Issues / Estonia Cyber Incident

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Partnership for Cyber Resilience

Big Data As a Threat? An Alternative Approach to Cybersecurity

Roadmaps to Securing Industrial Control Systems

Rogers Insurance Client Presentation

future data and infrastructure

OECD PROJECT ON CYBER RISK INSURANCE

Actions and Recommendations (A/R) Summary

What is Cyber Liability

Reducing Cyber Risk in Your Organization

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

SCADA Security Training

Into the cybersecurity breach

Cyber Security Strategy

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities

FINAL // FOR OFFICIAL USE ONLY. William Noonan

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Transcription:

CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233

Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS Safeguarding Rule Internet of Things Assessing and Managing Cybersecurity Risk 234

Cybersecurity Risk Overview 235

What Are The Threats? Insider threats Snowden Negligent employees Vendors/Supply Chain Target Nation States China Russia Iran Hacktivists Organized Crime Dude in his Mom s basement 236

What Are They After? Intellectual property/trade secrets Damage and disruption to infrastructure Financial gain (PCI, PII, PHI) Reputational harm (email) National security impact 237

What are the Potential Consequences? Claims and Recovery Negligence Breach of Contract Unfair Trade Practices Tort Claims Federal privacy and cybersecurity laws State laws e.g., CMIA Shareholder actions Direct impact/business harm Reputational harm C-Suite impact 238

Cybersecurity Trends 239

Cybersecurity Trends Increased White House Involvement Summit on Cybersecurity and Consumer Protection Executive Orders, Legislation More Federal Entities, More Guidance, More Compliance Challenges Alphabet Soup: DOD, DOJ, DHS, HHS, FAA, FCC, FDA, FTC, CFPB, SEC, NIST, NTIA, OIGs... Reporting Cybersecurity Incidents: Gotcha or Centralized Clearing House? Criminal authorities Federal regulatory authorities State authorities

Cybersecurity Trends (cont.) More Legislative Initiatives Federal and state legislative focus hearings and bills Tension between federal and state authority More Litigation Federal and State Enforcement Actions Breach Litigation (Sony/Anthem) Victim or Defendant? Public/Private Collaboration Insider Threat Initiatives

Cybersecurity and Critical Infrastructure

Critical Infrastructure Vulnerabilities Infrastructure is aging and becoming obsolete. Industrial Control Systems and Supervisory Control and Data Acquisition Systems were built with efficiency and safety NOT SECURITY in mind. Use of commercially available ( off the shelf ) ICS and SCADA technology reduces costs but increases vulnerability. On/Off operation and lack of redundancy 243

Scary Times for Critical Infrastructure 100 % increase in attacks on SCADA systems in 2014. 2015 Dell Security Annual Threat Report In 2014, ICS-CERT received and responded to 245 incidents reported by facility and asset owners. ICS-CERT Monitor (9/2014-2/2015) Several foreign governments have already hacked into U.S. energy, water and fuel distribution systems. NSA Director Rogers testimony before House Intelligence Committee (11/2014) 244

Federal Initiatives to Improve Critical Infrastructure Obama Administration recommended $15 billion in new spending programs or tax credits to carry out a major overhaul of the nation s energy infrastructure (April 2015 Quadrennial Energy Review). Executive Order 13631 (Improving Critical Infrastructure Cybersecurity) shifted federal government s regulatory focus to voluntary, risk-based standards. 245

Federal Initiatives to Improve Critical Infrastructure (cont.) NIST Cybersecurity Framework Core: Activities to help organizations address cybersecurity risks and respond to and recover from cyber-attacks Tiers: Metric to help organizations assess their implementation of Core Profiles: Snapshot of risk management posture (e.g., asis and to be ) 246

Critical Infrastructure Regulations and Best Practices Chemical Facility Anti- Terrorism Standards (CFATS) The Maritime Transportation Security Act (MTSA) regulations FERC s Critical Infrastructure Protection (CIP) Standards Transportation Security Administrative (TSA) Pipeline Security Standards 247

Risk Reduction for Critical Infrastructure Risk-based cybersecurity program, including governance framework Risk management tools (SVAs and SSPs) Vendor management agreements Cybersecurity training and reporting Support Anti-Terrorism by Fostering Effective Technologies Act of 2002 ( SAFETY Act ) Cybersecurity insurance Cybersecurity Framework Public and private informationsharing opportunities Familiarity with cybersecurity trends, standards, and best practices 248

Cybersecurity and DFARS

What s the DFARS Safeguarding Rule? Incorporated into all defense contracts with mandatory flowdowns Applicable to defense contractors with controlled technical or scientific information on their information systems Requires adequate security and cyber incident reporting 250

What s New Since Last Year? Procedures, Guidance, and Instructions 204.73 (12/2014) Guidance to Requiring Activities for Implementing DFARS Clause (2/2015) DoD Memorandum on DFARS Compliance (2/2015) 251

What Should I Know Up Front? Uncertain whether actual presence of technical information triggers requirements DoD responsible for noting when contract involves technical information 252

Is There Anything New About Reporting? Report as much as possible and supplement later Subs report to primes, and primes report to DoD Additional DIB reporting voluntary 253

What Happens After I Report an Incident? DoD may request self-assessment of DFARS compliance and vulnerabilities Suffering cyber incident does not mean you re non-compliant Failure to implement adequate security constitutes breach of contract 254

What If My Contracts Don t Have the DFARS Safeguarding Clause? Not retroactive Expect a contract modification 255

256

Cybersecurity and the Internet of Things 257

Defining (?) the Internet of Things IoT refer[s] to things such as devices or sensors other than computers, smartphones, or tablets that connect, communicate or transmit information with or between each other through the Internet. FTC Staff Report, Internet of Things: Privacy & Security in a Connected World (Jan. 2015) IoT is a a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies. Cloud Security Alliance, Security Guidance for Early Adopters of the Internet of Things (IoT) (April 2015) (quoting International Telecommunications Union Recommendation ITU-T Y.2060 (June 2012)) It really ought to be called the Internet of Things and Humans. Tim O Reilly, radar.oreilly.com (April 16, 2014) 258

Internet of Things Cybersecurity Challenges Absence of regulations, standards, and best practices Ease of market entry By design, IoT devices interact with other devices, networks, and systems with limited oversight and limited user involvement Limited ability to control data flow Limited ability to detect unauthorized users and unauthorized data access Difficulty of detecting and remediating security flaws in deployed devices Security vulnerabilities result not only from individual devices and systems, but also from interactions among devices, systems, and users Responsibility for detecting, reporting, and remediating IoT incidents IoT vulnerabilities already being exploited 259

Cybersecurity Risk Management 260

Assessing and Managing Cybersecurity Risk 1. Identify and Classify Sensitive Data and Regulated Systems 2. Establish Clear Governance 3. Review and Update P&P 4. Prepare for an Incident 5. Review Vendor Management Process 6. Analyze Audit and Reporting Processes 7. Conduct Training 8. Participate in Industry and Government Partnerships 9. Implement Controls to Protect Data and Systems 261

Questions? Peter Miller 202-624-2506 pmiller@crowell.com Evan Wolff 202-624-2615 ewolff@crowell.com Maida Lerner 202-624-2596 mlerner@crowell.com Kate Growley 202-624-2698 kgrowley@crowell.com 262