Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?



Similar documents
$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

Mitigating and managing cyber risk: ten issues to consider

Data Breach and Senior Living Communities May 29, 2015

Cybersecurity y Managing g the Risks

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

CSR Breach Reporting Service Frequently Asked Questions

Cyber Risks in the Boardroom

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

Cybercrime: risks, penalties and prevention

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

CYBER LIABILITY CLAIMS

State of Security Survey GLOBAL FINDINGS

Security and Privacy

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Cyber/ Network Security. FINEX Global

Network Security & Privacy Landscape

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

CYBER & PRIVACY LIABILITY INSURANCE GUIDE

Cyber Risk Checklist: Compliance with Legal Obligations Grand Rapids Cyber Security Conference April 23, 2014

I ve been breached! Now what?

Cyber Liability Insurance: It May Surprise You

U. S. Attorney Office Northern District of Texas March 2013

Delaware Cyber Security Workshop September 29, William R. Denny, Esquire Potter Anderson & Corroon LLP

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

By Daniel E. Frank and Don Borelli

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

Cyber Security Issues - Brief Business Report

Information Security Addressing Your Advanced Threats

Into the cybersecurity breach

Cyber Risks and Insurance Solutions Malaysia, November 2013

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Aftermath of a Data Breach Study

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Working with the FBI

External Supplier Control Requirements

BOARD OF GOVERNORS MEETING JUNE 25, 2014

What s Lurking in Your Network & The Business Impact of Data Breaches. Colby Clark Director of Incident Management FishNet Security

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Cybersecurity: Protecting Your Business. March 11, 2015

Data Security Incident Response Plan. [Insert Organization Name]

Insurance for Data Breaches in the Hospitality Industry

Information Technology Policy

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Identifying Cyber Risks and How they Impact Your Business

CyberSecurity for Law Firms

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Discussion on Network Security & Privacy Liability Exposures and Insurance

Jefferson Glassie, FASAE Whiteford, Taylor & Preston

Clients Legal Needs in HIPAA Security Compliance

THE CHANGING FACE OF CYBERCRIME AND WHAT IT MEANS FOR BANKS

Anatomy of a Hotel Breach

Meeting the Information Security Management Challenge in the Cyber-Age

CONSULTING IMAGE PLACEHOLDER

Assessing the strength of your security operating model

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked

White Paper on Financial Industry Regulatory Climate

Cyber and data Policy wording

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Law Firm Cyber Security & Compliance Risks

Managing Cyber & Privacy Risks

The Top Ten of Information Security - For 2015

10 Smart Ideas for. Keeping Data Safe. From Hackers

Cyber Exposure for Credit Unions

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Privilege Gone Wild: The State of Privileged Account Management in 2015

The potential legal consequences of a personal data breach

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

DATA BREACH COVERAGE

Logging In: Auditing Cybersecurity in an Unsecure World

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Cybersecurity Executive Order

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Data Breach Response Planning: Laying the Right Foundation

Cyber-Crime Protection

Cyber and Privacy Risk What Are the Trends? Is Insurance the Answer?

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Beyond Data Breach: Cyber Trends and Exposures

Data Privacy & Security: Essential Questions Every Business Must Ask

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

ACE European Risk Briefing 2012

Preventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

Information Security in Business: Issues and Solutions

Zip It! Feds, State Strengthen Privacy Protection. Practice Management Feature July Tex Med. 2012;108(7):33-37.

2014: A Year of Mega Breaches

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015

Transcription:

Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies participating suffered losses greater than $5 million Reputation damage was the greatest fear among the participants 2 in 5 said their organization does not conduct cyber security training Global Cyber Crime is now more lucrative than trafficking drugs! Targets are no longer large financial institutions PwC, Global Economic Crime Survey, Nov 2011 Causes of Cyber Attacks Why Cybercrime? Economic Crime Espionage Activism Terrorism Who is the Internal Cybercrime Risk? Junior employee or a middle manager Less than 40 years old Employed for less than 5 years Significant use of social media 1

Causes of Cyber Attacks Why Cybercrime? Economic Crime Espionage Activism Terrorism Who is the Internal Cybercrime Risk? Junior employee or a middle manager Less than 40 years old Employed for less than 5 years Significant use of social media Often disgruntled Not as tech savvy as s/he thinks Subject to employment agreement (confidentiality, computer use policy) TEDx www.swanisland.net/tedtalks Do you have an established cybergovernance program? 1. Yes 2. No 3. In Progress 33% 33% 33% 1 2 3 2

Has your organization suffered a data breach event? 1. Yes 2. No 50% 50% 1 2 Has your organization suffered a DDoS or DoS attack? 1. Yes 2. No 50% 50% 1 2 How concerned are you about a malicious cyber event at your organization? 1. Critically Concerned 25% 25% 25% 25% 2. Very Concerned 3. Somewhat Concerned 4. No Concerned 1 2 3 4 3

Federal Regulatory Risk Relevant to data breaches involving federally protected information Education Information (FERPA) Financial Information (EFTA, FCRA) Health Information (HIPPA) Personal Communications (ECPA, SCA, Wiretap Act) Any other Identifiable, non public information (GLBA) Federal Regulatory Risk Remedies for Breach Victims Private Rights of Action Government imposed fines (up to $1.5M under HIPPA) FTC injunctions, reporting, and standards Remedies for your company Federal law enforcement investigative assistance Temporary and permanent remedies from federal courts Executive Branch assistance in international incidents State Regulatory Risk A regulatory patchwork with some common themes: Generally protect non public information ( NPI ) Often impose physical and technical data security standards (encryption in Massachusetts) Generally require breach notification State cyber security laws are evolving rapidly State laws may apply across state lines State law provides most remedies for internal breaches (breach of contract, tort law) 4

Foreign Regulatory Risk More and more international jurisdictions are passing cyber privacy and security laws Foreign laws often impose stricter requirements than U.S. laws a race to the top? Foreign operations subject your company to foreign regulation Foreign laws may not always provide effective legal remedies against breaches Added Complexity from the Cloud Risks to the Enterprise Greater access to data = greater risk of breach = costlier breaches Collateral damage from attacks on co located cloud resources ( know your cloud neighbors ) Denial of Service Attacks and Continuity of Business ( the fiber optic umbilical cord ) Geolocation of data and jurisdictional risk Regulatory compliance and the cloud Added Complexity from the Cloud Risks to Consumers Enterprises and customers are storing more and more PII in the cloud, raising the risk and cost of a breach The growing specter of social engineering attacks Who owns my data? Consumer confidence in the cloud 5

What Matters to Your CEO Increasing Revenue and Value Managing Cost and Leading Risks and Vulnerabilities* Complexity Ensuring Survival through attention to Risk and Vulnerabilities Reputation Theft of PII IP Theft Service Financial Regulatory Recovery Damage Disruption Loss Risk Costs *Law and the Boardroom Study, FTI Consulting 2012 Cybercrime s MasterCard Moment Supporting privacy, access control efforts, formalizing internal checks and balances Meeting Regulatory or Contractual Compliance Requirements $226 per employee annually* $3.5 Million* Avoiding a Data Disaster Priceless! *taken from the True Cost of Compliance, a 2011 research study done by Ponemon Institute Data Breach Costs $214 per record lost* You do the math *Ponemon Institute, US Cost of Data Breach, 2010, and Reputation Impact of a Data Breach, Nov 2011 6

Data Breach Costs $214 per record lost* You do the math Collateral Damage Brand Reputation Share Price Employee Morale Brand Value Diminished 21% in Value Post a Breach Event* Business Relations *Ponemon Institute, US Cost of Data Breach, 2010, and Reputation Impact of a Data Breach, Nov 2011 Workshop Scenario You are the CCEO for a large organization with 12,000 employees. The organization sells internationally and has hundreds of thousands of users You arrive at work and the office is buzzing; the CISO comes in to tell you that the company has experienced a DDoS and that the systems are still down. All efforts with the ISP and internal resources have been ineffective Workshop Scenario At 9:30 you are called to a meeting with the CEO In the room are the CISO, CEO, CCEO and the CTO. The CTO shares the bad news that the DDoS was apparently a diversion and that the database had been hacked. The CEO asked how bad was the hack? The CTO tells the team that based on his early estimates as many as 400,000 user names, passwords and some PII could have been compromised. You ask when he will know the extent of the damage? He shares it will be a couple of days. 7

Workshop Scenario Later that afternoon the CISO gets a phone call from a friend of his from college that works for the NSA. He shares that about 1000 names and hashed passwords were posted on the deep web with a request for information on how to unencrypt the passwords. The hacker shared in his request that he had successfully hacked your company. The CEO calls another meeting and asked the team what do we do now? Just so you know We agree, this is a scary scenario! But, it wasn t completely fictional All experienced LinkedIn Yahoo something like Formspring this in 2012! May we ask again. 8

How concerned are you about a malicious cyber event at your organization? 1. Critically Concerned 25% 25% 25% 25% 2. Very Concerned 3. Somewhat Concerned 4. No Concerned 1 2 3 4 Workshop Key Questions that should be asked How many records are affected? Who alerted us to the breach? Was the breach malicious or accidental? When did it occur? What is the quality of the data? Was PII involved Was it encrypted? What is the expected impact? What press coverage impact should we expect? 9

Breach Response Best Practices Prior to a breach, establish a breach response team with clear roles. Make sure you have all the facts before you reveal information about the breach to those impacted. Engage outside expertise early to determine which steps to take and the laws that must be complied with. Talk with counsel before alerting authorities or outside agencies; once they are involved your best interests become less important. Notify the appropriate authorities (federal/state/local law enforcement and regulators) Breach Response Best Practices Do not put the CEO in front of press too early or lead with a message that the breach is no big deal. Is the organization at risk of legal action? Be a transparent as possible with the breached population. They will forgive you for being hacked, but not for holding back the truth. Understand any data breach or cyber liability insurance that your company may have in place, and if there is coverage, notify your insurer early. Exercise a consistent communication strategy directed at everyone in the company. Breach Response Best Practices The risk of legal action is high, assume you will need to defend your response in court Keep the proper documentation of your decisions throughout the response process Preserve evidence of breach for investigation Segregate affected computers, hard drives, etc. Hire data forensics firm to conduct breach analysis Hire computer security firm to audit network and security infrastructure If an internal breach is suspected, re screen key employees for cyberbreach risk factors Divorce, catastrophic illness, financial distress, etc. Don t take retaliatory counter measures against cyber criminals: these may violate federal law Consider filing for emergency judicial relief (e.g. injunction against disclosure of trade secrets) 10

Cyber Governance Means Cyber Vigilance Traditional Anti Intrusion Defenses Today s Cyber Warfare Tools The Cyber Relationship Cyber Compliance Cyber Governance Cyber Vigilance Understand your cyber risks Create a mechanism to constantly review the changing cyber landscape Develop and implement cyber incident response protocols and procedures Conduct periodic testing and mock drills to ensure the effectiveness of information security policies and data loss procedures Establish the appropriate cyber threat awareness Communicate up and down the chain of command Tone at the top Mood in the middle Buzz at the bottom 11

The Cyber Relationship Cyber Compliance Cyber Governance Cyber Vigilance Monitor incidents and track cyber incident trending Know your cyber neighbors Share information intelligently Assess, triage and respond consistently to cyber events Review your processes toward constant improvement Thank You! David Childers david.childers@compli.com Vivek Krishnamurthy vkrishnamurthy@foleyhoag.com 12