Implementation of the Cybersecurity Executive Order



Similar documents
What is Cyber Liability

Cybersecurity Executive Order

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

Changing Legal Landscape in Cybersecurity: Implications for Business

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

NIST Cybersecurity Framework What It Means for Energy Companies

How To Write A Cybersecurity Framework

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

Cybersecurity Framework: Current Status and Next Steps

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

No. 33 February 19, The President

NIST Cybersecurity Framework. ARC World Industry Forum 2014

Delaware Cyber Security Workshop September 29, William R. Denny, Esquire Potter Anderson & Corroon LLP

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

September 28, MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

What are you trying to secure against Cyber Attack?

Corporate Perspectives On Cybersecurity: A Survey Of Execs

Westlaw Journal. What is the Cybersecurity Framework? Risk Management Process And Pathway to Corporate Liability? Expert Analysis

How To Write A National Cybersecurity Act

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

Senate Committee on Commerce, Science, and Transportation March 19, 2015, Hearing Examining the Evolving Cyber Insurance Marketplace

Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Cyber Legislation & Policy Developments 2014

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

S. ll IN THE SENATE OF THE UNITED STATES

The Cybersecurity Framework and the SAFETY Act a Primer for Temple Business School

White Paper on Financial Industry Regulatory Climate

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

CYBERSECURITY RISK MANAGEMENT

Legislative Proposals for the Maryland Commission on Cyber Security Innovation and Excellence

The NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework

Framework for Improving Critical Infrastructure Cybersecurity

Cyber After Snowden. Can DC Help Protect Your Networks? Matthew Rhoades, Director, Cyberspace & Security Program

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

THE WHITE HOUSE Office of the Press Secretary

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

Virginia Joint Commission on Technology and Science. Cybersecurity Legislation

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Diane Honeycutt National Institute of Standards and Technology (NIST) 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

State Governments at Risk: The Data Breach Reality

Mitigating and managing cyber risk: ten issues to consider

Sharing Cybersecurity Threat Info With the Government -- Should You Be Afraid To Do So?

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

Framework for Improving Critical Infrastructure Cybersecurity

Can Cyber Insurance Be Linked to Assurance?

H. R SEC DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

United States House of Representatives United States House of Representatives. Washington, DC Washington, DC 20515

Business Continuity for Cyber Threat

Cybersecurity Information Sharing Legislation Protecting Cyber Networks Act (PCNA) National Cybersecurity Protection Advancement (NCPA) Act

Billing Code: 3510-EA

Implementing the U.S. Cybersecurity Framework at Intel A Case Study

S AN ACT. To codify an existing operations center for cybersecurity.

Understanding the Business Risk

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

Cybersecurity Primer

America s New Cybersecurity Framework: Help or New Source of Exposure?

WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW TECHNOLOGY AND TELECOM COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES

Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Technological Evolution

Global Cybersecurity Outlook:

One Hundred Twelfth Congress of the United States of America

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Framework for Improving Critical Infrastructure Cybersecurity

4/21/2015. Jim Reavis CEO, Cloud Security Alliance. Cloud Security Alliance, Agenda

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

Framework for Improving Critical Infrastructure Cybersecurity

Willis Healthcare Practice 11 th Annual Forum July 10,2007. Managing and Insuring Risks in Network Privacy/Cyber Risk

1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection

One Hundred Thirteenth Congress of the United States of America

EMERGING CYBER RISK CYBER ATTACKS AND PROPERTY DAMAGE: WILL INSURANCE RESPOND?

Cyber Risks Connect With Directors and Officers

Preservation of longstanding, roles and missions of civilian and intelligence agencies

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

Cyber Security and the White House

Voluntary Cybersecurity Initiatives in Critical Infrastructure. Nadya Bartol, CISSP, SGEIT, 2014 Utilities Telecom Council

CYBER RISK SECURITY, NETWORK & PRIVACY

Legislative Language

The Dow Chemical Company. statement for the record. David E. Kepler. before

Cybersecurity: Authoritative Reports and Resources

istockphoto/ljupco 36 June 2015 practicallaw.com 2015 Thomson Reuters. All rights reserved.

CYBER INTELLIGENCE SHARING

How To Protect Yourself From Cyber Crime

Cyber Side-Effects: How Secure is the Personal Information Entered into the Flawed Healthcare.gov? Statement for the Record

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

S. ll IN THE SENATE OF THE UNITED STATES A BILL

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber-insurance: Understanding Your Risks

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

S. 21 IN THE SENATE OF THE UNITED STATES

Transcription:

Implementation of the Cybersecurity Executive Order November 13 th, 2013 Ben Beeson, Partner, Lockton Companies Gerald J. Ferguson, Partner, BakerHostetler Mark Weatherford, Principal, The Chertoff Group

Mark Weatherford is a Principal at The Chertoff Group and advises clients on a broad array of cybersecurity issues. As one of the nation s leading experts on cybersecurity, Mr. Weatherford works with organizations around the Nation and the world by creating comprehensive security strategies for core business operations and objectives. Prior to joining The Chertoff Group, Mr. Weatherford was appointed by President Obama as the Department of Homeland Security s first Deputy Under Secretary for Cybersecurity.

Gerald J. Ferguson Jerry Ferguson serves as the Coordinator for the Intellectual Property, Technology and Media Group in BakerHostetler s New York office and as the National Co Leader of BakerHostetler s Privacy and Data Protection Team. Since the enactment of the first modern privacy and data protection statutes in the 1990s, Jerry has assisted hundreds of clients in creating and implementing national and global privacy and data protection policies. He has extensive experience advising companies suffering data security breaches that may trigger obligations under state and federal breach notification laws. 3

Ben Beeson Lockton Companies Ben leads the Global Technology and Privacy Practice at Lockton based in London. A team of associates in the USA, Europe and Asia assist Lockton clients in dealing with emerging intangible risks including cyber, technology intellectual property and supply chain. Ben is directly involved in advising both the US and UK governments as to how the insurance industry can support improved cyber security for critical infrastructure industries. 4

Evolution of Concern One of my gauges of the importance and security maturity of a company is by identifying who is most concerned. If it s the CISO or the CIO, there s a problem. If it s the CEO or the Board - there s hope. We re finally starting to see an evolution of concern and awareness about security

Legislation Over 50 different pieces of Legislation introduced in the past two years. In the 113 th Congress: H.R. 624 Cyber Intelligence Sharing and Protection Act (CISPA) Rogers S.??? Senate version of CISPA Chambliss and Feinstein H.R. 1163 Federal Information Security Amendments Act of 2013 (FISAA) Issa Discussion Draft National Cybersecurity and Critical Infrastructure Protection Act (NCCIP Act) of 2013 McCaul S.1353 Cybersecurity Act of 2013 Rockefeller S. 21 Cybersecurity and Cyber Competitiveness Act of 2013 Rockefeller H.R.756 Cybersecurity Enhancement Act of 2013 McCaul

Executive Order 13636 Cybersecurity Standards Privacy Requires development of a Cybersecurity Framework Develops voluntary critical infrastructure cybersecurity program and proposes incentives Identifies regulatory gaps Mandates strong privacy and civil liberties protections Directs regular assessments of agency activities Information Sharing Expands the voluntary DHS Enhanced Cybersecurity Service (ECS) program. Expedites private sector threat reporting, both classified and unclassified. Expedites issuance of security clearances to critical infrastructure members in the private sector

The Sins and the Sinners

Sins The Sins fall into 3 basic categories: 1. Cyber-espionage 2. Cyber-crime 3. Cyber-hacktivism

Sinners And the Sinners are: 1. Nation States 2. Criminal Groups 3. Hacktivists and Terrorists

Et tu Brute? One of the most recurring conversations I have is, I didn t think we were: big enough important enough valuable enough to be concerned about hackers. It s like Caesar when he heard the Ides of March premonitions. He recognized the omens he just didn t think they applied to him.

Context of the Order Congress Has Failed to Enact National Cybersecurity Law Federal Security Standards Concerns Information Sharing Concerns Republicans: Liability Limitation Democrats: Civil Liberty Concerns 12

Characteristics of the Order Vague Material Terms not defined or discussed Intentionally vague? Specific Action Deferred Review, Comment, Report 13

What is Critical Infrastructure? Defined Broadly and Generally (Section 2) Secretary of Homeland Security Will Identify Key Threats (Section 9) Communications, Manufacturing, Energy, Food and Agriculture, Financial, Healthcare Transportation, Shipping Critical Infrastructure Partnership Advisory Council www.dhs.gov/council members criticalinfrastructure partnership advisory council 14

Developing the Cybersecurity Framework NIST was given 240 days (mid October) to publish a preliminary version of the Cybersecurity Framework. The final Framework must be complete by mid February, 2014 The Cybersecurity Framework shall provide a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, to help owners and operators of critical infrastructure identify, assess and manage cyber risk. 15

Framework Development Cybersecurity Framework defined as set of voluntary standards and best practices to guide industry in cyber risks. Order directs NIST to engage in open public review and comment process in developing the Framework involving all stakeholders in public and private sectors. Patrick Gallagher, NIST Director: Framework will not be a NIST work product; it will be developed by and belong to private industry. 16

Preliminary NIST Cybersecurity Framework Preliminary version released October 22, 2013: http://www.nist.gov/itl/upload/preliminary-cybersecurity-framework.pdf Core: five functions Identify Protect Detect Respond Recover For each, categories, e.g., Asset Management, and subcategories, e.g., inventorying of software platforms and applications Profile: establishing an organizational road map to get from here to there, i.e., substantially reduced cyber risks Implementation Tiers: (i) partial; (ii) risk-informed; (iii) risk-informed and repeatable; (iv) adaptive 17

Preliminary NIST Cybersecurity Framework Appendix B: Methodology to Protect Privacy and Civil Liberties for a Cybersecurity Program Quite detailed outline of best practices for handling PII Criticized for imposing government standards on industry 18

Issues for Further Development i. Authentication; ii. iii. iv. Automated indicator sharing; Conformity assessment; Data analytics; v. International aspects, impacts, and alignment; vi. Privacy; and vii. Supply chains and interdependencies. 19

Voluntary or Industry Standard May be Implemented by Resolution Under Statutory Authority Financial Institutions Utilities Authoritative Source Extensive Industry Interactive Over 3,000 industry comments Four workshops Consistent with Security Literature 20

Responding to NIST Framework Revise Policies To Reflect Language of The Framework Make Policies Adaptive Identify new threats Revise Evaluate Senior Management Must Drive Process 21

DoD Information Sharing From 2010 Defense Industrial Base ( DIB ) Pilot Companies must apply to be approved Approved companies receive threat information they can use to protect their systems Participating companies must share threat information back with the Government to be shared with other participants DoD will undertake reasonable efforts to anonymize before sharing DoD will resist FOIA disclosure requests to the extent permitted by law 22

DIB Information Sharing Pluses Greater threat information Preferred consideration in government contracts Minuses Loss of control of information FOIA uncertainty May not be sufficiently anonymized DoD may use info to assert contract breach and for law enforcement purposes 23

Other Information Sharing Regulatory Initiatives Treasury Cyber Intelligence Group Financial Services Information Sharing and Analysis Center Federal Energy Regulatory Commission Enhanced Cybersecurity Services Program Liability Concerns From Information Sharing Blaming the victim: Emerging Liabilities SEC enforcement Shareholder suits Third Party contract claims 24

Cyber Insurance Marketplace & Cyber Security Impact White House Cyber Insurance Meeting Discussion Topics: Cyber Security Privacy Civil Liberties and Policy National Security Government Approach Cyber Security Incentives Cyber security Insurance Grants Process Preference Liability Limitation Streamline Regulations Public Recognition Rate Recovery for Price Regulated Industries Cyber Security Research At the White House on August 26, 2013 National Institute of Standards and Technology (NIST) Framework 25

What are Cyber Risks? Ubiquitous Sabotage Espionage Media Operational Data Security and Privacy Tech filepath 26

Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE filepath 27

Cyber Insurance Marketplace Tailored insurance Solutions based on your exposures No coverage/policy uniformity in the marketplace Capacity $350M - $400M 28

Operational Risk Network outage from non-physical trigger and non-tangible loss Includes dependent business interruption to cloud providers or other vendors Loss of Revenue Extra Expense INSURABLE 29

Cyber Espionage Who? State Sponsored or Organized Crime What? First Party Loss of Intellectual Property UNINSURABLE filepath 30

Operational Risk - Cyber Sabotage Non physical damage and physical damage business interruption. Property Damage Bodily Injury Stuxnet Flame PARTIALLY INSURABLE filepath 31

One Broker s Response 32

What is CL380? CL380 33

SCADA Automating Processes 34

Insured Events Accidental Damage or Destruction Administrative or Operational Mistakes Computer Crime and Computer Attacks Denial of Service/Distributed Denial of Service Malicious Code Unauthorised Access Unauthorised Use 35

Indemnity What does SCADA product cover Business Interruption caused by an insured peril Business Interruption as a result of property damage caused by an insured peril Property Damage (on a case by case). Digital Asset Damage What does SCADA product NOT cover Bodily Injury Technology Service Errors & Omissions Seepage and Pollution or TPL 36