Presentation to ACC Charlotte. Data Security & Privacy. November 2, 2011. Presented by: William J. Cook C. Andrew Konia Mark J.



Similar documents
Data Security & Privacy

Network Security & Privacy Landscape

Data Breach Response Planning: Laying the Right Foundation

Are You Still HIPAA Compliant? Staying Protected in the Wake of the Omnibus Final Rule Click to edit Master title style.

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

Aug. Sept. Oct. Nov. Dec. Jan. Feb. March April May-Dec.

Information Security Addressing Your Advanced Threats

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Preventing And Dealing With Cyber Attacks And Data Breaches. Arnold & Porter LLP Lockheed Martin WMACCA February 12, 2014

Big Data, Big Risk, Big Rewards. Hussein Syed

Data Breach and Senior Living Communities May 29, 2015

Overview of the HIPAA Security Rule

PCI Compliance for Healthcare

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Managing Your Cyber & Data Risk 2010 NTA Convention Montreal, Quebec

Network Security & Privacy Landscape

Data Breach Cost. Risks, costs and mitigation strategies for data breaches

Why Lawyers? Why Now?

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

Cybersecurity: Protecting Your Business. March 11, 2015

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

Solutions Brief. PC Encryption Regulatory Compliance. Meeting Statutes for Personal Information Privacy. Gerald Hopkins Cam Roberson

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

HIPAA Compliance: Efficient Tools to Follow the Rules

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

Cybersecurity y Managing g the Risks

Delaware Cyber Security Workshop September 29, William R. Denny, Esquire Potter Anderson & Corroon LLP

Franchise Data Compromise Trends and Cardholder. December, 2010

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Presented by Dave Olsen, CPA, President

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Page 1. Copyright MFA - Moody, Famiglietti & Andronico, LLP. All Rights Reserved.

Intelligent Vendor Risk Management

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Cybersecurity Workshop

HOW DID NETWORK SECURITY AND PRIVACY ISSUES BECOME D&O EXPOSURES?

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

3/4/2015. Scope of Problem. Data Breaches A Daily Phenomenon. Cybersecurity: Minimizing Risk & Responding to Breaches. Anthem.

Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

The Age of Data Breaches:

Data Security Breaches: Learn more about two new regulations and how to help reduce your risks

Standard: Information Security Incident Management

Cyber Risks in the Boardroom

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Data Privacy & Security in the Cloud: Legal Basics and New Developments

Security Compliance, Vendor Questions, a Word on Encryption

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Security Is Everyone s Concern:

Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Managing Cyber & Privacy Risks

HIPAA Security Risk Analysis for Meaningful Use

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Managing data security and privacy risk of third-party vendors

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Hot Topics and Trends in Cyber Security and Privacy

Security. Tiffany Trent-Abram VP, Global Product Management. November 6 th, One Connection - A World of Opportunities

Anatomy of a Privacy and Data Breach

Cybersecurity: What CFO s Need to Know

HCCA Compliance Institute 2013 Privacy & Security

The Evolution of Data Breaches

Project Title slide Project: PCI. Are You At Risk?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr.

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Jefferson Glassie, FASAE Whiteford, Taylor & Preston

HIPAA Enforcement. Emily Prehm, J.D. Office for Civil Rights U.S. Department of Health and Human Services. December 18, 2013

HIPAA Security Alert

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Healthcare in the Crosshairs for Data Breaches. April 22, Deborah Hiser (512)

UF IT Risk Assessment Standard

Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir.

CYBER READINESS FOR FINANCIAL INSTITUTIONS

CHIS, Inc. Privacy General Guidelines

How To Protect Your Credit Card Information From Being Stolen

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

HIPAA in the Cloud How to Effectively Collaborate with Cloud Providers

When HHS Calls, Will Your Plan Be HIPAA Compliant?

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

Overview of Topics Covered

Network Security and Data Privacy Insurance for Physician Groups

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

Transcription:

Presentation to ACC Charlotte Data Security & Privacy Presented by: November 2, 2011 William J. Cook C. Andrew Konia Mark J. Maier www.mcguirewoods.com

Agenda Identifying the Issues/Concerns Current State/Impact of Breaches Susceptible Targets Key Terms and Standards Questions You Should Ask The Laws and Enforcement Case Studies PCI/HIPAA/Industrial Espionage Consequences The 12-Step Program Mitigating Risk Q&A McGuireWoods LLP 2

What s the Problem? Russia & Bulgaria Organized Crime China Advanced Persistent Threat Unaffiliated Internet Gangs US / Europe Corporate Inattention Employees Not aware of threat magnitude Not aware of noncompliance sanctions McGuireWoods LLP 3

In the News Unprecedented rise in the number of hacker attacks and data breaches Wide range of companies and organizations have been attacked Sony Citigroup ADP Google EMC Corp Epsilon Lockheed Martin International Monetary Fund Senate website Industry survey showed cost to breached companies averaged $7.2 million (Ponemon Institute survey) McGuireWoods LLP 4

October 2011 Hannaford Data Breach Lawsuit (October 20, 2011) Class upheld Foreseeable that data loss will cause individual damages A jury could reasonably conclude, therefore, that an implicit agreement to safeguard the data is necessary to effectuate the contract." Widely Used Web Encryption Algorithm is Vulnerable XML encryption, used to secure communications between Web services, can be exploited. Allows remote break in without physical access. DOD $4.98B Data Breach Lawsuit Proposed class action suit involves TRICARE, seeks $1,000 per victim. Physical loss of unencrypted data Healthcare, banks, telecom, governments (fed/state/local) at risk JavaScript Hacking Tool Can Intercept PayPal & Other Secure Sessions (9/2011) Bank transactions may not be secure. Yale Warns 43,000 about 10-month Long Data Breach (8/2011) Prompt and ongoing monitoring McGuireWoods LLP 5

The Million Dollar Subway Ride An employee of General Hospital Corporation and Massachusetts General Physicians Organization Inc. ( Mass General ) left documents on a subway that included a patient schedule containing PHI of 192 patients, and billing forms with PHI for 66 of those patients. This included PHI of patients with HIV/AIDS. The records were bound only by a rubber band! Mass General paid $1 Million to settle the matter McGuireWoods LLP 6

Current Targets of Hostile Technology Individual company loss $1 million to $52 million per incident Payment Processor Breaches: 130 million customer records Account Transfers Fraud: $85 million to $255 million keyloggers Securities and Marketing Trading Exploitation Bank ID and DDOS - $399,000 from account ATM Skimming / POS Schemes one net $600,000 Mobile Banking Exploits Insider Access Vendors- Industrial Espionage Malvertising Supply Chain Infiltration Teleco and Network Disruption DDOS Source: September 2011 FBI report and Bill Cook McGuireWoods LLP 7

Know Your Geek Quiz You Should Know Each of These AES 128 bit SSL RBAC 2 Factor Authentication 8 Characters with Symbol and # Social Engineering Law Enforcement Notification Delay Business Associate PCI DSS Breach Notification Cloud Security contracting DDOS attack Social Engineering Ping attack McGuireWoods LLP 8

Corporate Managers are Forced to Ask How safe are our systems? What can be done in advance to prepare for an attack? How should we respond if attacked? What will our liability exposure be in the event of an attack? What can be done to protect customers, consumers and trade secrets? What can be done to reduce losses, minimize potential damages, and protect shareholder value? McGuireWoods LLP 9

Enforcement Retail environment - Actual damages from intrusion - Noncompliance with PCI DSS HIPAA - OCR- 150 audits by KPMG before 12/31/12 SEC 10K disclosures under discussion States - Breach notification requirements (all but 4 states) - Security standards based on PCI standards - Some encryption requirements - AG lawsuits The FTC and online/mobile marketers EU vs. US data storage issues McGuireWoods LLP 10

PCI Case Handling Define the damage - Preserve data environment - Determine point of intrusion - How long has vulnerability existed - How long has it been exploited - Vendor involvement with vulnerability - Contact law enforcement Communicate with your bank Determine, with bank, need for forensic audit Respond to all credit card company inquiries Prepare presentation with assistance of outside counsel Negotiate settlements McGuireWoods LLP 11

HIPAA Breach Case Study Laptop stolen from key vendor Investigation disclosed all company PHI, PII and salary details lost Audit clause of contract triggered at vendors expense - Vendor didn t know data location most overseas and insecure - Contrary to contract vendor didn t have uniform security practices - Contrary to contract vendor didn t notify company of breach Contract modification worked out to preserve contract McGuireWoods LLP 12

ephi Security: HIPAA vs. NIST Standard HIPAA NIST Role-Based Access Controls Addressable Based on assigned duties; employee satisfies personal security criteria Unique User ID Required Ensures that system activity can be traced to a specific user Two-Factor Authentication N/A Provides high level of confidence in validity of identity Automatic Session Termination Addressable Achieved by locking session or disconnecting network Password Requirements (e.g. character length) N/A 8-character minimum Encryption Technology Addressable 128-bit AES Encrypted Communication Transmission Channels Addressable Risk Assessment/Management Required Recommended Utilizes secure email connections and message-level standards McGuireWoods LLP 13

McGuireWoods LLP 14

Industrial Espionage Case Study Immediate Emergency Response Team meeting Investigate to determine sensitivity level Bring in outside counsel to supervise and develop plan Consider outside forensic examination Interview potential targets Seize personal computers and personal computing devices Obtain civil search warrant for subject s home Keep written record of each step taken and why Enforcement options: TRO, law enforcement, meet other side McGuireWoods LLP 15

Consequences Noncompliance (DSSs, Laws, etc.) - Fines/Penalties from card associations On acquiring bank as well (passed through) - Possible sanctions from federal agencies - Curtailment/termination of card processing - Probation - Actual damages are irrelevant Data Security Breach Reputational Damage Even without breach or noncompliance Whistleblowing Exponential effect of social media Director/Officer Liability/Fiduciary Duties McGuireWoods LLP 16

The 12-Step Program 1. Be proactive! 2. Establish intracorporate, interdisciplinary Emergency Response Team with authority, mission statement and plan Pre and post; internal and external 3. Create risk-based internal information security regime (policies, technology and HR) Ensure appropriate and consistent application and updating (patches) Employee education (keep a record) Discipline and Termination 4. Protect Personal Information Collection, storage and destruction; Encryption; Non- Disclosure 5. Notification Regime McGuireWoods LLP 17

The 12-Step Program (cont.) 6. Cooperate with and use law enforcement and its resources (pre/post) 7. Consider intrusion insurance 8. Protect website, marketing & advertising 9. Media Management (pre/post) 10. Routine audits (QSA) Requires regular monitoring and testing (per PCI DSS) 11. Vendor/contract management (pre/post) All vendors are not created equal Give contract drafting due consideration; ensure responsibilities are specific and feasible; Follow-up McGuireWoods LLP 18

The 12-Step Program (cont.) 12.Know the law and standards that apply to you, and consult with outside counsel when warranted Focus on PCI DSS, SEC requirements and federal and state laws applicable to your business Understand the rapidly changing nature of the laws, regulations and standards Work with experienced and tech-focused outside counsel to establish - The Emergency Response Team and its functions and policies - Due diligence track record (pre/post) - Compliance programs that meet laws, regulations and standards McGuireWoods LLP 19

Questions or Comments? 900 Lawyers 19 Offices www.mcguirewoods.com 2011 McGuireWoods LLP 34436978.1 McGuireWoods LLP 20