Are Data Breaches a Real Concern? Protecting Your Sensitive Information. Phillips Auction House NY- 03/24/2015

Similar documents
Cloudy With a Chance Of Risk Management

LEGAL AND REGULATORY RAMIFICATIONS OF A DATA BREACH

Data Breach and Senior Living Communities May 29, 2015

Cyber Liability. Michael Cavanaugh, RPLU Vice President, Director of Production Apogee Insurance Group Ext. 7029

CYBER RISK Threats, Loss Control, Liability & Claims

Network Security & Privacy Landscape

Cyber/Information Security Insurance. Pros / Cons and Facts to Consider

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Cyber Liability & Data Breach Insurance Claims

GALLAGHER CYBER LIABILITY PRACTICE. Cyber Risk Exposures and Solutions

Discussion on Network Security & Privacy Liability Exposures and Insurance

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Updates within Network Security and Privacy Risk Management

CYBER INSURANCE. Cyber Insurance and Gaps in Traditional Insurance. Cyber and E&O Team Willis FINEX North America

Cyber Liability & Data Breach Insurance Claims

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber-insurance: Understanding Your Risks

Cybersecurity Workshop

CLOUD SECURITY LAW MICHAEL KEELING, PE, ESQ. KEELING LAW OFFICES, PC PHOENIX AND CORONADO

Privacy / Network Security Liability Insurance Discussion. January 30, Kevin Violette RT ProExec

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Cyber Liability Insurance: It May Surprise You

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Health Care Data Breach Discovery Strategies for Immediate Response

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

Data security: A growing liability threat

Cyberinsurance: Insuring for Data Breach Risk

CYBER SECURITY SPECIALREPORT

Cybersecurity: Protecting Your Business. March 11, 2015

Privacy and Data Breach Protection Modular application form

Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr.

Managing Cyber & Privacy Risks

Understanding the Business Risk

Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide

Be Afraid, Be Very Afraid!!! Hacking Out the Pros and Cons of Captive Cyber Liability Insurance

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Law Firm Cyber Security & Compliance Risks

THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident.

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

Understanding Professional Liability Insurance

Joe A. Ramirez Catherine Crane

Cyber and CGL Insurance Coverage for Data Breach Claims

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

Cyber-Crime Protection

AlienVault for Regulatory Compliance

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Cyber/ Network Security. FINEX Global

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

Cyber Liability & Data Breach Insurance Claims

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Cyber Insurance Presentation

Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor

Cybersecurity Risk Transfer

Incident Response. Proactive Incident Management. Sean Curran Director

The Business Case for Security Information Management

What Data? I m A Trucking Company!

Transcription:

Are Data Breaches a Real Concern? Protecting Your Sensitive Information Phillips Auction House NY- 03/24/2015 1

Agenda Current Data Breach Issues & Legal Implications Data Breach Case Study Risk Management & Avoidance 2

Speakers Jay Brodsky- Managing Director, Executive Risk Practice, DeWitt Stern John Mullen- Chair, Data Security & Network Security Practice, Lewis, Brisbois, Bisgaard, & Smith LLP Mark Greisiger- CEO, NetDiligence Vinny Sakore, CIPP/IT- Assistant HIPAA Security Officer, Verizon 3

Current Data Breach Landscape Business shift: Bricks and Mortar to Clicks and Orders Supply of cyber-attack tools and stolen personal, credit card, and account information is way up; cost is down High profile breaches up (Anthem, Sony, Target, Neiman Marcus, Home Depot, etc.) Rising tensions between U.S. and other nations such as Russia and Iran increasing risk of retaliatory cyber attacks towards U.S. interests 4

Popular Attack Methods Botnets (collection of compromised computers; a zombie army) Distributed Denial of Service or DDoS (disruptive attack) Advanced Persistent Threats (network breach and data exfiltration) Malware (SQLi, Trojans, key loggers, fake popups, MitB/ATOs) Social Engineering (phone cons/phishing emails, scams, and sites) Ransomware (locked out of system, must pay fee to regain access) Internal Threats (poor data mgmt., system design, and hiring/training) 5

Duties Imposed By Legal Landscape State laws (statute and common law) Federal laws/regulations - HIPAA, SOX, GLB/Red Flags, etc. PCI International

State Regulatory Exposures State level breach notice: 47 states (plus Puerto Rico, Wash. D.C., Virgin Islands) require notice to customers after unauthorized access to PII/PHI. Require firms that conduct business in state to notify resident consumers of security breaches of unencrypted computerized personal information Many require notification of state attorney general, state consumer protection agencies, and credit monitoring agencies Notice due without unreasonable delay Some states allow private right of action for violations

Federal Regulatory Exposures HIPAA - set of national standards to protect PHI that is created, received, used, or maintained Applies to covered entities and business associates When a data security incident occurs, a breach is presumed: unauthorized access May require notice to the media, to HHS, and the patients within 60 days Other Gramm Leach Bliley, Sarbanes Oxley, FACTA

Payment Card Industry (PCI) Payment Card Industry Security Standards Council (Visa, Mastercard, AmEx, Discover, JCB International) Requires merchants and service providers to abide by certain protocols to protect customers credit card information Payment brands may fine acquiring bank $5,000 to $100,000/month for non-compliance. Banks often pass this fine on to merchant. Violations of PCI DSS have multiple consequences Impact on standard of care industry investigations, outside lawsuits Small minority of states have incorporated PCI-DSS requirements into data protection laws

Litigation Trends - Defense Eroding Stollenwerk v. Tri West assert actual identity theft Krottner v. Starbucks Corp. increased risk of identity theft constitutes an injury-in-fact Anderson v. Hannaford alleged fraud in population and money spent in mitigation efforts sufficient (instead of time/effort) Resnick v. AvMed 11 th Cir. Similar to Anderson; also, unjust enrichment claims are viable for failure to keep promise to protect information following this decision ---------------------------------------------------------------------------------------------------------------------- In re Hannaford Bros. Data Security Breach Litigation does time equal money? No. But fraud plus purchase of credit monitoring may equal standing. ChoicePoint Data Breach Settlement FTC paid for time they may have spent monitoring their credit or taking other steps in response Target Class Action Judge denies Target s motion for dismissal, holding that Banks established plausible allegation that failure to detect intrusion caused the financial institutions harm

Case Study # 1 An employee traveling on business loses an unencrypted laptop with data on approximately 10,000 clients and/or employees- Your business deals with both individuals and corporations as your clients There is a mix of corporate information, that your business has a contractual obligation to keep confidential, and sensitive personal information You transact business with clients in numerous different states The employee who lost the laptop does not notify IT for three days, hoping that he/she will be able to locate the device 11

Case Study # 2 Vendor used to process credit card transactions is hacked- Your clients credit card information is in the custody of the vendor Your contract with the vendor limits their liability to the value of your contract You transact business with clients in numerous different states 12

PII was the most frequently exposed data (41% of breaches), followed by PHI (21%) and PCI (19%). Hackers were the most frequent cause of loss (29%), followed by Staff Mistakes (13%). Healthcare was the sector most frequently breached (23%), followed closely by Financial Services (22%). Net Diligence Study - Based on 140 Claims Reported to 15 Different Insurance Carriers

Average claim $733K (median $144k) Large Co = $2.9 mil Medium = $688k Small = $664k *Target insurance claim payout ~$44M* Per Record Costs Average per-record cost*** $956 (up, 2013 was $307) Average records lost 2.4 million (Median records lost: 3.5K) Crisis Services Costs (forensics, legal counsel, notification & credit monitoring) Average cost of crisis services $366k (down, $737 in 2013) Median cost of crisis services $110K Legal Costs (defense & settlement) Average cost of defense $698K (up, $575K in 2013) Average cost of settlement $558K ( up, $258k in 2013) Net Diligence Study - Based on 140 Claims Reported to 15 Different Insurance Carriers

4 COMMON WEAK SPOTS PROBLEM 1) IDS or Intrusion Detection Software (Bad guy alert system) Studies show that 70% of actual breach events are NOT detected by the victim-company, but by 3 rd parties (and many more go undetected completely). FTC and plaintiff lawyers often cite failure to detect PROBLEM 2) Encryption (of private data) Identity Theft Resource Center: Only 2.4% of all breaches had encryption Issues: Budgets, complexities and partner systems Key soft spots: data at rest...in database & laptops (lesser extent) Benefits: Safe harbor (usually) PROBLEM 3) Patch Management Challenges: All systems need constant care (patching) to keep bad guys out. Lack of time: Gartner Group estimates that IT Managers spend an average of 2 hours per day managing patches. Problem 4). NO Centralized Security Event Logs SIEM (security information & event mgmt): central brain that can synthesize raw security data feeds, this includes: aggregate data from many internal company servers, databases real-time monitoring, correlation of events, notifications Post breach importance of SIEM: the computer forensics investigation takes much longer and cost greatly increase without SIEM.

Preparedness Tips Perform a Cyber Risk Assessment Include any 3rd party dependencies (contractors, clouds etc) map your sensitive client data assets Review privacy with security (e.g. wrongful data collection exposure) Establish an internal working group of senior execs to acclimate to a future data breach crisis Develop and operationalize an Incident Response Plan Leverage erisk Hub to bolster IRP... Self-help with outside experts Tiger Team experts o Breach Coach (legal expert) o Computer Forensics (triage and establish the facts who, what, when, where & how) o Notification & call ctr o Credit & ID Monitoring o PR Conduct training on a regular basis to all employees and vendors Review insurance coverage for gaps 16

Risk Transfer Third Party Coverages (Negligence) Security & Privacy Liability Media Content Liability First Party Coverages (Costs) Network Interruption Cyber Extortion Data Restoration Event Management Expenses &/or Often includes a Regulatory Action Sublimit Cyber Terrorism Retention Each Claim from $5,000 to $1M 17

Insurance Marketplace ACE Endurance AIG Hartford Allied World Liberty Axis Lloyd s of London Beazley Philadelphia CNA XL CFC Zurich Chubb There are approximately 30 other insurers who offer some modicum of coverage 18

Not All Policies Created Equal Coverage purporting to be Cyber Liability Sublimits offered on other policies such as Property, General Liability, Package Policies, and Errors & Omissions policies Not all stand alone Cyber Liability policies are created equal Who is the insurer? Limits being offered for first party expenses Breach of Contract Exclusion Hammer Clause PCI Fines & Penalties Coverage Unencrypted Mobile Device Exclusions Claims Handling 19

Questions & Thank You 20