IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope



Similar documents
Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

NIST Cybersecurity Framework. ARC World Industry Forum 2014

How To Write A Cybersecurity Framework

NIST Cybersecurity Framework What It Means for Energy Companies

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

Why you should adopt the NIST Cybersecurity Framework

No. 33 February 19, The President

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Cybersecurity for Medical Devices

Cybersecurity Framework: Current Status and Next Steps

Into the cybersecurity breach

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

PROTIVITI FLASH REPORT

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

September 28, MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

The NIST Cybersecurity Framework

Framework for Improving Critical Infrastructure Cybersecurity

Our Commitment to Information Security

EU Regulatory Trends in Data Protection & Cybersecurity What should be on the industry s agenda?

Department of Homeland Security

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Framework for Improving Critical Infrastructure Cybersecurity

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Vendor Management. Outsourcing Technology Services

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Business Continuity for Cyber Threat

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

NIST Cybersecurity Framework & A Tale of Two Criticalities

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

Framework for Improving Critical Infrastructure Cybersecurity

Cybersecurity Framework Security Policy Mapping Table

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Information Security Program CHARTER

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

Applying Framework to Mobile & BYOD

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Cybersecurity: What CFO s Need to Know

Presidential Summit Reveals Cybersecurity Concerns, Trends

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

What are you trying to secure against Cyber Attack?

White Paper on Financial Institution Vendor Management

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

Framework for Improving Critical Infrastructure Cybersecurity

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

Christine M. Frye, CIPP/US, CIPM, Chief Privacy Officer, Bank of America

CYBERSECURITY RISK MANAGEMENT

LEGAL ISSUES IN SHARING CYBER THREAT INTELLIGENCE: WHAT ARE THE REAL CONCERNS?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Legislative Language

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Improving Critical Infrastructure Cybersecurity Executive Order Preliminary Cybersecurity Framework

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

CHAPTER Committee Substitute for Committee Substitute for Committee Substitute for House Bill No. 1033

Cybersecurity The role of Internal Audit

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Privacy Risk Assessments

The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School

Developing National Frameworks & Engaging the Private Sector

Transcription:

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 vking@ups.com Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com

What is Privacy and Data Security? Privacy is the appropriate use of information as defined by: Laws and regulations Individuals expectations Security is the protection of information Protection of data Confidentiality Data integrity 2

Privacy and Data Security Risks Privacy Risks Legal compliance Reputation Investment Reticence Security Risks Loss of sensitive or business confidential data Data corruption Disruption of business processes / systems Reputation 3

Threat actors Cybersecurity Landscape Threat vectors Information and systems targeted 4

Numerous bills proposed U.S. Legislative Landscape Key privacy-related provisions Information sharing Liability protections Reasons for failure 5

U.S. Policy Landscape February 2013: the President announced two new initiatives 1) Executive Order 13636: Improving Critical Infrastructure Cybersecurity 2) Presidential Policy Directive 21: Critical Infrastructure Security and Resilience Together, they create an opportunity to work together to effect a comprehensive national approach to security and risk management Implementation efforts will drive action toward system and network security and resiliency 6

Executive Order 13636: Improving Critical Infrastructure Cybersecurity Directs the Executive Branch to: Develop a technology-neutral, voluntary cybersecurity framework Promote and incentivize the adoption of cybersecurity practices Increase the volume, timeliness and quality of cyber threat information sharing Incorporate strong privacy and civil liberties protections into every initiative to secure our critical infrastructure Explore the use of existing regulation to promote cyber security 7

Executive Order Privacy Provisions Section 5 requires that privacy and civil liberties protections be incorporated into the various activities required of agencies under the EO Protections should be based on FIPPs CPO of DHS must assess against FIPPs privacy risks of DHS programs The same is required of other agencies privacy officials Data submitted voluntarily by private entities under the EO will be protected from disclosure to the fullest extent permitted by law Framework must include methodologies to protect privacy 8

Cybersecurity Framework Developed by NIST and industry stakeholders Intended to provide guidance on managing cybersecurity risk Reliance on existing standards, guidance and best practices Risk-based approach Composed of three parts: Framework Core Framework Profile Framework Implementation Tiers Significance of Framework 9

A Life-Cycle Methodology 10

NIST Core Framework Structure Function Category Subcategory Industry Standards IDENTIFY PROTECT DETECT RESPOND RECOVER 11

Function Categories 6 Functions, 22 Categories, 98 Sub Categories Identify Asset management, business environment, governance, risk assessment, risk management Protect Access control, awareness & training, data security, process & procedures, maintenance, protective technologies Detect Anomalies & events, continuous monitoring, detection processes Respond Response planning, communications, analysis, mitigation, improvement Recover - Recovery planning, improvements, communications 12

Executive Information * This same roadmap visualization can be applied to the categories and subcategories within each function. 13

Background Appendix B Framework Privacy Provisions Workshop discussions Final framework addresses privacy in the How to Use section Now a general set of considerations 14

EU Cybersecurity Issues eprivacy Directive breach notification requirements, but limited to telecos and ISPs Some breach notification requirements at Member State level NIS Directive draft Member states must adopt NIS strategy and designate a national NIS authority Creation of network for governments to share threat information Critical infrastructure and information services companies (e.g., social networks) must implement security measures and report significant incidents to NIS Authority Overlap with proposed General Data Protection Regulation Requires reporting of personal data breaches to DPA 15

DHS CRADA U.S. Information Sharing Required for private-sector entities to participate in NCCIC and CISCP Facilitates information sharing FBI MOA MOA delineates expectations and obligations for participating companies So FBI can share actionable cyber information with industry partners Industry partners are encouraged to share data with FBI Privacy risks associated with information sharing 16

Managing the Changing Landscape This is a governance issue, not an IT issue Senior executives set the tone Cybersecurity used to be the CISO s responsibility Those days are over Interdisciplinary efforts are key CISO, IT, CPO, GR, Communications, other stakeholders The issue has now spread throughout the organization and the CPO s involvement is crucial 17

Organizational Shift is Needed Managing cybersecurity implicates privacy at every turn Data identification and classification is necessary to manage cyber risks Sharing data is necessary for incident prevention Access controls are key Use of data often is required for response actions 18

Integrating Privacy Into the CISO s Suite Coordinated governance between CISO and CPO Formalized issue review process Integration of privacy into information security s risk assessment process Cross-functional team reviews Privacy by design for new products and processes Periodic review of current processes Cross-training Communication 19

Training and Awareness Proselytize early and often so personnel have an understanding of global privacy considerations Tailored approach: no one-size-fits-all Formal training Creative communications tools Knowing communication tricks Measuring effectiveness 20

Protecting PII in an Insecure World Identify categories of PII stored and know locations Identify key threats to PII and plug vulnerabilities Focus on most sensitive data Ensure strict access controls to databases containing sensitive PII Frequently revisit PII access permissions Ensure other strong safeguards to PII in your system Also consider vendor systems Practice data minimization 21

Privacy Considerations During an Event Anonymize or delete PII before sharing in connection with a cybersecurity investigation or remediation activities Limit disclosure of PII to what is necessary to mitigate the incident When performing forensics, retain only the PII necessary to the investigation Understand global breach reporting obligations 22

Key Privacy Issues When Interacting with Law Enforcement Collection limitation Purpose specification Use limitation Disclosure limitation Data integrity Retention limitation 23

1 Event Data Breach Response Timeline 2 Mobilize 3 Stabilize 4 Investigate 5 Notify 6 Review & Improve 7 Regulatory Response PwC 8 Lawsuits March 2011 24

Contacts Victoria King Global Privacy Officer UPS (404) 828-6550 vking@ups.com Lisa Sotto Partner Hunton & Williams LLP lsotto@hunton.com www.huntonprivacyblog.com 25

Karen Neuman Chief Privacy Officer.48 Privacy in the DHS Cybersecurity Enterprise Privacy Process Embed People Establish Policy Conduct PIAs Conduct PCRs Privacy Protections Limit collection Protection at the edge (re)enforce oversight Drive Transparency www.dhs.gov/cybersecurity-and-privacy