How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495



Similar documents
Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Preservation of longstanding, roles and missions of civilian and intelligence agencies

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

114 th Congress March, Cybersecurity Legislation and Executive Branch Activity I. ADMINSTRATION S CYBERSECURITY PROPOSALS

How To Pass Cybersecurity Legislation

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Presidential Summit Reveals Cybersecurity Concerns, Trends

Cybersecurity and Information Sharing: Comparison of H.R and H.R. 1731

National Cyber Threat Information Sharing. System Strengthening Study

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

S. ll IN THE SENATE OF THE UNITED STATES A BILL

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

The Matrix Reloaded: Cybersecurity and Data Protection for Employers. Jodi D. Taylor

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Delaware Cyber Security Workshop September 29, William R. Denny, Esquire Potter Anderson & Corroon LLP

No. 33 February 19, The President

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

CYBER SECURITY A L E G A L P E R S P E C T I V E

The U.S. Department of Homeland Security s Response to Senator Franken s July 1, 2015 letter

Thank you for the opportunity to join you here today.

DEPARTMENT OF JUSTICE WHITE PAPER. Sharing Cyberthreat Information Under 18 USC 2702(a)(3)

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

Cyber Legislation & Policy Developments 2014

Senate Subcommittee Hearing and Report Regarding Online Advertising and Hidden Hazards to Consumer Security and Data Privacy

How To Protect Yourself From Cyber Crime

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Authoritative Reports and Resources

Government Focus on Cybersecurity Elevates Data Breach Legislation. by Experian Government Relations and Experian Data Breach Resolution

Preventing and Defending Against Cyber Attacks November 2010

S AN ACT. To codify an existing operations center for cybersecurity.

THE WHITE HOUSE Office of the Press Secretary

September 28, MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

Privacy Issues Airports

Cybersecurity: Authoritative Reports and Resources

CYBERSECURITY INFORMATION SHARING BILLS FALL SHORT ON PRIVACY PROTECTIONS

DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION

White Paper on Financial Industry Regulatory Climate

Summary of Privacy and Data Security Bills- 112 th Congress. Prepared for September 15, 2011 CT Privacy Forum

Testimony of. Wm. Douglas Johnson. American Bankers Association. Subcommittee on Information Technology

Delving Into FCC's 'Damn Important' Cybersecurity Report

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Changing Legal Landscape in Cybersecurity: Implications for Business

NSA Data Collection and its Impact on Cloud and Outsourcing and Recent Privacy and Security Developments on Capitol Hill

Cybersecurity: Authoritative Reports and Resources

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER

Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Cyber Risks in the Boardroom

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, Agenda

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Preventing and Defending Against Cyber Attacks June 2011

One Hundred Thirteenth Congress of the United States of America

Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

WRITTEN TESTIMONY OF

White House Report May Have Long-Term Effect on Consumer Privacy and How Companies Do Business

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Prepared for distribution at the CYBERSECURITY 2015: MANAGING THE RISK Program September 25, 2015

Preventing and Defending Against Cyber Attacks October 2011

Virginia Joint Commission on Technology and Science. Cybersecurity Legislation

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

Cybersecurity: Authoritative Reports and Resources

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

When Can We Expect a Federal Data Breach Notification Law?

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

Privacy Risks and Public Benefits of Big Data Federal Proposals Regarding Data Security and Privacy Regulation

Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

Mitigating and managing cyber risk: ten issues to consider

THE WHITE HOUSE Office of the Press Secretary. FACT SHEET: Administration Cybersecurity Efforts 2015

Clients Legal Needs in HIPAA Security Compliance

Corporate Perspectives On Cybersecurity: A Survey Of Execs

Middle Class Economics: Cybersecurity Updated August 7, 2015

February Introduction

005ASubmission to the Serious Data Breach Notification Consultation

Trends in Data Breach and CybersecurityRegulation, Legislation and Litigation. Part I

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

The Department of Homeland Security The Department of Justice

FINAL // FOR OFFICIAL USE ONLY. William Noonan

Department of Homeland Security

Legislative Language

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

Legislative Language

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Data Breach Notifications. Submission by the Australian Communications Consumer Action Network to the Attorney General s Department

12/4/2013. Regulatory Updates. Eric M. Wright, CPA, CITP. Schneider Downs & Co., Inc. December 5, 2013

Cybersecurity: Authoritative Reports and Resources

Privacy Amendment (Notification of Serious Data Breaches) Bill 2015 Regulation Impact Statement

BIG DATA: SEIZING OPPORTUNITIES, PRESERVING VALUES

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

The era of hacks and cyber regulation

Public Law th Congress An Act

Transcription:

How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495

Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity Framework! Obama Administration s Agenda and Efforts! Congressional Responses: Hearings and Legislation 2015 2

Agenda! Big Data: White House Report! Cyber Threat Information Sharing: CTIIC and Executive Order! White House Summit! Consumer Privacy Bill of Rights Act of 2015! Questions 3

U.S. Data Breaches on the Rise! Data breaches hit a record high in 2014! 783 incidents according to a recent report! 27 percent over the number of breaches reported in 2013! 18.3 percent over the previous high of 662 breaches tracked in 2010! So far in 2015:! As of April 21, 2015, 256 data breaches exposing 102,374,010 records Report by Identity Theft Resource Center (ITRC) 4

U.S. Data Breaches on the Rise! Data breaches hit a record high in 2014 2010 2013 2014 662 breaches 618 breaches 783 breaches As of April 21, 2015: 256 data breaches exposing 102,374,010 records Source: Identity Theft Resource Center (ITRC) 5

Effect of Increasing Cybersecurity Threats Regulatory Changes?! The Obama Administration has announced an aggressive cybersecurity and data security agenda.! Congress has held a number of hearings and proposed new legislation in an attempt to address the issue. 6

Effect of Increasing Cybersecurity Threats Regulatory Changes?! Some of these new privacy, data security, and cybersecurity proposals may come to bear on operators in the coming years, adding to their already substantial regulatory burden. 7

Obama s Administration Cybersecurity Framework! First announced in President s 2013 State of the Union Address! Released on February 12, 2013! Intended to encourage companies to adopt best practices for critical infrastructure including global digital infrastructure, such as undersea communications cables that land in the U.S. 8

Obama s Administration Cybersecurity Framework Current Status: Remains entirely voluntary Lacks key incentives sought by industry stakeholders But it is too soon to handicap the success of the initiative 9

Obama s Administration Cybersecurity Agenda! On January 13 th, President Obama delivered remarks on cybersecurity initiatives at the Department of Homeland Security s (DHS) National Cybersecurity Communications Integration Center (NCCIC)! Proposed cybersecurity legislation! incentivizing the private sector to share cyber threat information with DHS! providing liability protections for companies that share information on cyber threats!. 10

Obama s Administration Cybersecurity Agenda! Obama also highlighted an initiative to update the authorities of law enforcement to better combat cyber crime! Given the rise of cyber crime, including recent announcement regarding IRS hack, the item will move higher up in priority 11

Obama s Administration Privacy and Data Security Efforts! On January 20 th, in the State of the Union Address, President Obama urged lawmakers to pass comprehensive cybersecurity legislation! White House Report- Big Data: Seizing Opportunities, Preserving Values! Executive Order - Cyber Threat Information Sharing! Consumer Privacy Bill of Rights 12

Congressional Response Hearings on Privacy and Data Security January 21 The U.S. Senate Commerce, Science, and Transportation Committee s hearing entitled, Protecting the Internet and Consumers Through Congressional Action January 27 The U.S. House Energy and Commerce Committee s Subcommittee on Commerce, Manufacturing, and Trade s hearing entitled, What Are the Elements of Sound Data Breach Legislation? The House Science, Space, and Technology Committee s Subcommittee on Research and Technology s hearing entitled, The Expanding Cyber Threat March 18 The U.S. House Energy and Commerce Committee s Subcommittee on Commerce, Manufacturing, and Trade s hearing entitled, Discussion Draft of H.R., Data Security and Breach Notification Act of 2015 13

Congressional Response Cybersecurity Legislation H.R. 1560 - Protecting the Cyber Networks Act improve cybersecurity through enhanced sharing of information about cybersecurity threats permit companies to voluntarily share cyberthreat information with the government and receive protection from liability require companies to omit individual personal information not related to a cybersecurity threat before submitting information to the government HR 1731 - National Cybersecurity Protection Advancement Act of 2015 amend the Homeland Security Act of 2002 enhance multi-directional sharing of information and strengthen privacy and civil liberties protections designate NCCIC as lead civilian portal for voluntary cyber threat information sharing require double scrubbing of personal information unrelated to cybersecurity risk by companies and NCCIC enhance voluntary information sharing 14

Big Data White House Report! On February 5 th, the White House published an interim report entitled, Big Data: Seizing Opportunities, Preserving Values calls for utilization of big data, for law enforcement activities, among other things details the impact that big data has on the economy, government, and society, as well as the privacy concerns raised in its collection 15

Big Data White House Report concludes that individual privacy is far from perfect and technology alone cannot protect privacy absent strong social norms and a responsive policy and legal framework 16

Big Data Policy Recommendations! The Report makes policy recommendations for the President and Congress to consider, including: Advancing the Consumer Privacy Bill of Rights Passing national data breach legislation Extending privacy protections to non-u.s. persons Amending the Electronic Communications Privacy Act 17

Big Data Policy Recommendations! The Report specifically examines how big data may be used to strengthen the nation s local, state, and federal law enforcement communities. 18

Cyber Threat Information Sharing Creation of CTIIC! On February 10 th, the White House announced the creation of the Cyber Threat and Intelligence Integration Center (CTIIC) aims to enhance cyber threat information sharing across government agencies 19

Cyber Threat Information Sharing Creation of CTIIC! CTIIC will operate under the Office of the Director of National Intelligence collect and analyze cyber threat information to efficiently distribute to government agencies enable the government to quickly analyze and assess fast-moving cyber threats or cyberattacks enable existing government cyber units to do their jobs more effectively 20

Cyber Threat Information Sharing Executive Order! On February 12 th, President Obama issued an Executive Order: with the goal of promoting private sector cybersecurity information sharing discussing the importance of cybersecurity information sharing across government agencies, as well as between the government and the private sector. 21

Cyber Threat Information Sharing Executive Order! According to the Order, [r]apid information sharing is an essential element of effective cybersecurity, because it enables U.S. companies to work together to respond to threats, rather than operating alone. 22

Cyber Threat Information Sharing Executive Order! Framework to Enhance Information Sharing Developing a common set of voluntary standards for information sharing organizations Clarifying the Department of Homeland Security s authority to enter into agreements with information sharing organizations Streamlining private sector companies ability to access classified cybersecurity threat information 23

White House Summit Cybersecurity and Consumer Protection! On February 13 th, President Obama delivered prepared remarks which outlined four principles for private entities and government agencies to consider: 1. Share cybersecurity information with each other 2. Recognize when the government may be able to assist or provide information related to cybersecurity 24

White House Summit Cybersecurity and Consumer Protection 3. Evolve the company s or agency s cybersecurity practices 4. Focus on protecting the privacy and civil liberty of the American people 25

Consumer Privacy Bill of Rights Act of 2015! On February 27 th, the White House released a draft! Requires companies to:! provide conspicuous notice of how they use consumer data,! ensure that data is being used for its intended purpose, and! provide consumers with a method of having their data deleted 26

Consumer Privacy Bill of Rights Act of 2015! Permits industries to develop codes of conduct that would have to be approved by the Federal Trade Commission! Empowers the FTC and state attorneys general to enforce the privacy and data security policies and practices outlined in the proposal through civil penalties 27

Consumer Privacy Bill of Rights Baseline Protections for Consumers Individual Control Transparency Respect for Control Security Access and Accuracy Focused Collection Accountability 28

Baseline Protections for Consumers! Individual Control: Right to exercise control over what personal data organizations collect from them and how they use it.! Transparency: Right to easily understandable information about privacy and security practices.! Respect for Context: Right to expect that organizations will collect, use, and disclose personal data in ways that are consistent with the context in which consumers provide the data. 29

Baseline Protections for Consumers! Security: Right to secure and responsible handling of personal data.! Access and Accuracy: Right to access and correct personal data in usable formats, in a manner that is appropriate to the sensitivity of the data and the risk of adverse consequences to consumers if the data are inaccurate. 30

Baseline Protections for Consumers! Focused Collection: Right to reasonable limits on the personal data that companies collect and retain.! Accountability: Right to have personal data handled by companies with appropriate measures in place to assure they adhere to the Consumer Privacy Bill of Rights. 31

Recent Developments! Acquisition: Telstra finalized its acquisition of Pacnet Limited last month. " Telstra is the largest telecommunications and media company in Australia. " Pacnet provides connectivity and data center services to carriers, multinational corporations and governments in the Asia-Pacific region. 32

Recent Developments! Data Breach: Shortly have the acquisition, it was revealed that Pacnet s corporate system had been accessed by an unauthorized third party through an SQL vulnerability that enabled malicious software to be uploaded to the network and ultimately led to the theft of admin and user credentials. 33

Recent Developments " Telstra immediately addressed the vulnerability and has continued to monitor the network through its incident response capabilities. " There is no evidence that any activity extended to Telstra s networks the Pacnet corporate IT network remains isolated. " Pacnet customers and staff have been informed of the incident, Australian Federal Police have been notified as well. " Currently, there is no evidence that information was stolen from Pacnet s Network. 34

Questions?

For more information: Ross Buntrock ross.buntrock@agg.com 202.669.0495 All rights reserved. This presentation is intended to provide general information on various regulatory and legal issues. It is NOT intended to serve as legal advice or counsel on any particular situation or circumstance. 2015. Arnall Golden Gregory LLP