Cybersecurity: What Does a Breach Mean to



Similar documents
Corporate Spying An Overview

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

Cybersecurity Primer

CRISIS MANAGEMENT AND FIRST AID: WHEN GOVERNMENT CONTRACTORS ARE THE HEADLINERS WELCOME

Cybercrime: risks, penalties and prevention

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Anatomy of a Hotel Breach

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Confrontation or Collaboration?

I ve been breached! Now what?

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

Cybersecurity: Protecting Your Business. March 11, 2015

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

Cyber Liability. What School Districts Need to Know

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Public Law th Congress An Act

Legislative Language

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING

Cybersecurity: Authoritative Reports and Resources

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

Cyber Insurance and Your Data Ted Claypoole, Partner, Womble Carlyle and Jack Freund, PhD, InfoSec Mgr, TIAA-CREF

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

Developing a robust cyber security governance framework 16 April 2015

Answering your cybersecurity questions The need for continued action

Introduction to Computer Security

Thank You To Our Sponsors

China s Economic Espionage

Cyber-insurance: Understanding Your Risks

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

Cybersecurity: Authoritative Reports and Resources

EY Cyber Security Hacktics Center of Excellence

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

U. S. Attorney Office Northern District of Texas March 2013

Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M?

CYBERSECURITY RISK MANAGEMENT

Network Security & Privacy Landscape

Cybersecurity y Managing g the Risks

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

114 th Congress March, Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Second Annual Conference September 16, 2015 to September 18, 2015 Chicago, IL

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

Cybersecurity: Authoritative Reports and Resources

How To Protect Yourself From Cyber Crime

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

How GCs And Boards Can Brace For The Cybersecurity Storm - Law360

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Data Breach and Senior Living Communities May 29, 2015

Cyber Risk and the Utility Industry

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Middle Class Economics: Cybersecurity Updated August 7, 2015

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

HIPAA and Health Information Privacy and Security

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

How To Write A National Cybersecurity Act

Transcription:

Cybersecurity: What Does a Breach Mean to Your Job, Identity or Security? American Bar Association David Z. Bodenheimer Public Contract Law Section Crowell & Moring LLP Toronto, Canada August 7, 2011 2011 Crowell & Moring LLP

Cyber Contrarians Why Cyber Contrarians are Clueless pork-hungry politicians no substantive basis for cybersecurity threats ulterior motives and conflicts of interest The $100 billion Washington will spend on cybersecurity in the next decade may be less about guarding America from a real threat, and more about enriching revolving-door lobbyists and satisfying pork-hungry politicians. The notion that our power grid, air traffic control system, and financial networks are rigged to blow at the press of a button would be terrifying if it were true, Brito and Watkins write. But fear should not be a basis for public policymaking. The public has been given no substantive basis for such fears. [Carney, The Washington Examiner (Apr. 28, 2011)] 2

Signs of the Cyber Apocalypse 2010 Crowell & Moring LLP

74% Expect Foreign Attack Cyber 9/11 on Banks S. 773 4

Foreign Cyber Threats Foreign Penetration of Grid The Chinese are relentless and don t seem to care about getting caught. And we have seen Chinese network operations inside certain of our electricity grids. Do I worry about those grids, and about air traffic control systems, water supply systems, and so on? You bet I do. (Joel Brenner, head of U.S. Office of National Counterintelligence Executive, Apr. 21, 2009) Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national security officials. The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven t sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war. The Chinese have attempted to map our infrastructure, such as the electrical grid, a senior intelligence official. So have the Russians. 5

Chinese Cyber Threats Chinese Cyber Threats 40,000 Hackers: There are forty thousand Chinese hackers who are collecting intelligence off U.S. information systems and those of our partners. (Adm. McConnell, Jan. 2008) Daily Attacks. A defence force source said yesterday that attacks initiated from China occurred almost on a daily basis (Australian Defense Force, Apr. 2009) Classified Data Compromised. a China-based cyber espionage network had accessed 1200 computers in 103 countries containing classified documents. (Munk Centre for Int l Studies, Apr. 2009) China Cyber Dominance According to its Cyber Warfare Doctrine, China s military strategy is designed to achieve global electronic dominance by 2050, to include the capability to disrupt financial markets, military and civilian communications capabilities, and the electric grid prior to the initiation of traditional military operations. *Securing the Modern Electric Grid from Physical and Cyber Attacks: House Homeland Security Subcomm. (July 21, 2009) 6

Grid Attack > $700 Billion FERC Warning $700 Billion Threat greater than the August 2003 blackout For a society that runs on power, the discontinuity of electricity to chemical plants, banks, refineries, hospitals, and water systems presents a terrifying scenario. Economists recently suggested that the loss of power to a third of the country for three months would result in losses of over $700 billion. 7

262 Million Breaches (2009) Compromised Personal Records ( 09) 2008 Data Breach Total Soars: 47% Increase over 2007 Identity Theft News (Identity Theft Daily, Jan. 5, 2009) Records with sensitive personal information involved in security breaches in the U.S. since January 2005: 262,442,156 records (Privacy Rights Clearinghouse, June 11, 2009) Millions of Americans have been victimized, their privacy violated, their identities stolen, their lives upended, and their wallets emptied. (President Obama, May 29, 2009) 8

514 Million Breaches (2011) 271 Million Records Exposed Since June 2009 Records with sensitive personal information involved in security breaches in United States since January 2005: 533,686,975 records June 4, 2011 262,424,592 records June 4, 2009 [www.privacyrights.org] According to the Privacy Rights Clearinghouse, more than 340 million records containing sensitive personal information have been involved in data security breaches since 2005. 9

Cybersecurity: Why General Counsels & CFOs Need to Worry Now! Secrets Gone? 2011 Crowell & Moring LLP

Cyber Risks SEC Scrutiny Security Problem - Not disclosing material risks Impact SEC scrutiny or actions Cyber risk management is a critical corporate responsibility. Federal securities law requires publicly traded companies to disclose material risks and events, including cyber risks and network breaches. A review of past disclosures suggests that a significant number of companies are failing to meet these requirements. [News Release, May 12, 2011] 11

Cyber Risks Shareholders Security Problem - Risking personal data Impact Shareholder or private suits $20 Million Suit. Countrywide s lax internal procedures & security breach [Courthouse News, Apr. 5, 2010] Stock-Price Hit. Sony fell 2.3 percent to 2,262 yen after security breach of 101 million records. [Bloomberg News (May 6, 2011)] $6.75 Million/Incident. average cost per incident of a data breach in U.S. [Sen. Comm. Hearings, Sept. 2010] Sony Breach 101 Million In addition to losing an estimated revenue stream of $10 million a week, Sony will probably have to reimburse customers who pay for its premium service, rebuild its computer systems and beef up security measures, said Michael Pachter, an analyst with Wedbush Securities who said the incident could cost the company $50 million. [L.A. Times, Apr. 28, 2011] 12

Cyber Risks Lost IP 2x Library of Congress As an example of the threat, one American company had 38 terabytes of sensitive data and intellectual property exfiltrated from its computers equivalent to nearly double the amount of text contained in the Library of Congress. [Sen. Sheldon Whitehouse (May 10, 2010)] 2 x Bet-the-Company $1 Trillion Losses. Cyber criminals stole intellectual property from businesses worldwide worth up to $1 trillion. [President Obama, 2009] $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ Greatest Damage The greatest damage to the American economy from cyber attacks is due to massive thefts of business information. [Scott Borg (Dir., U.S. Cyber Consequences Unit)] $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $400 Million Theft. A single employee of an American company was convicted of stealing intellectual property reportedly worth $400 million. [President Obama, 2009] 13

Cyber Risks FCA Actions Security Problem - Improper disposal of data Impact False Claims Act suit PLASTILAM, INC. failed to take sufficient steps to safeguard confidential data, including the names and Social Security numbers of over 100 Medicare beneficiaries. The investigation revealed that a number of misprinted beneficiary cards were discarded, whole, in an unsecured dumpster. 14

Security Problem - Misuse of DoD data Cyber Risks Suspension Impact Suspension Loss of $5B Contract But earlier this month the deputy general counsel of the U.S. Air Force suspended the L-3 unit responsible for the work from receiving new orders because of the investigation. Employees at L-3 s special support programs division were accused of copying government emails and forwarding them without the author s knowledge. L-3 Trips as Lockheed Snatches $5 Billion Contract A disputed U.S. military contract worth up to $5 billion was finally awarded to Lockheed Martin Corp. (LMT) this week after the U.S. Air Force launched an investigation into possibly inappropriate email activities at rival L-3 Communications Corp. (LLL). L-3, a New York-based provider of military and aerospace equipment, reduced its 2010 outlook as a result of the lost contract, which represented about 3% of its 2009 revenue, according to a government filing. Full-year profit is now expected to be in a range of $8.09 to $8.29 a share, compared to a prior view of $8.13 to $8.33 a share. 15

Cyber Risks Acquisitions Security Problem - Security as selection factor Impact Lost Government work Major legislation & agency actions to make cybersecurity a significant factor in federal acquisitions RFP Requirements The proposal will be evaluated for an effective plan and timeline to meet the DoD DIACAP documentation requirements within allowed timeframes. Senate & House legislation President s proposals Agency competitions 16

Cyber Risks Protests Security Problem - Multiple security breaches Impact Protests However, the USAJOBS screenshot, memoranda from OPM and OMB discussing the Government s policy on safeguarding social security numbers, and the three sets of internet articles discussing Monster s past security breaches ensure the completeness of the administrative record and shall be admitted. Monster Hackers Also Hit USAJobs.gov (Aug. 31, 2007) It now appears that Monster.com knew about a breach of its systems almost a month before Symantec told Monster of a massive phishing operation targeting Monster.com users. That long of a lag is "inexcusable," said W. David Stephenson, a homeland security and corporate crisis management consultant, "after the legacy of past problems." Allied Tech. Group v. U.S., (Fed. Cl. 2010) 17

Cyber Risks Congressional, DOJ & IG Investigations Security Problem - Failure to install safeguards Thompson, Langevin Demand Investigation into Department Cyber Attacks (Sept. 24, 2007) Impact IG investigation False statement risk Criminal exposure criminal investigation fraudulent statement 18

Cyber Risks State Actions Florida AG vs. Certegy 5.9 million records stolen Florida Safeguards Rule Info Security Program Designate accountable staff Assess risks Implement safeguards $850,000 Fine to AG $125,000 to Seniors Group Annual Security Report 5-Year Scrutiny 19

Cyber Risks State Actions Conn. AG Action Stolen computer drive 1.5 million medical & financial records (500,000 Conn. Residents) Added Information Security Safeguards $250,000 to Conn. AG $1 million of ID theft insurance 2-year credit monitoring Another Conn. AG Action Connecticut AG to Lead Coalition of States Investigating Google WiFi Data Collection (Privacy Law Watch, June 24, 2010) The Connecticut Attorney General s Office will lead a coalition of a significant number of states in investigating Google Inc. s collection of data from unsecured wireless internet connections, AG Richard Blumenthal (D) said in a June 21 statement. 20

Cyber Risks Liability Security Problem - IT security technology fails What Happens When You Sell IT Security that Fails? Gov. Contractor Defense Impact Insurance coverage? Contractor liability? Commercial specifications SAFETY Act Coverage No terrorist attack 85-804 Indemnification Limited agency authority Boyle vs. UTC, 487 US 500 (1988) Legislative Proposals Political limitations 21

Cyber Risks Warfare Risks Security Problem - Supporting cyber war Impact Unknown risks & liability International Law - Authority to attack? $50 Billion Lawsuit One lawsuit alone, filed May 12 by a purported national class of Verizon customers, seeks $50 billion in damages. [ Court Will Decide State Secrets Issues First in NSA Phone Surveillance Class Action Suit, Privacy Law Watch, June 9, 2006] US Law - Electronic surveillance & wiretapping laws - Covert operations (Title 10 vs. 50) - Posse Comitatus (DoD & CONUS) - 5th Amendment takings 22

Cyber s Toughest Topics Cyber Issues Cyber Challenges Managing Risk SEC/shareholder scrutiny Sharing Information Authority & WikiLeaks Partnering (Pub/Private) Working Models Waging Cyber War Private Rights of Action Addressing Liability Public/Private Risk Allocation 23

Questions? David Z. Bodenheimer Crowell & Moring LLP dbodenheimer@crowell.com (202) 624-2713 15269209 24