SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Cyber-Readiness in the 
Securities and Brokerage 
Industry 
September 24, 2014 
Scott K.G. Kozak & Jeffrey Schultz 
© 2014 Armstrong Teasdale 
LLP 
© 2014 Armstrong Teasdale 
LLP
Current Events 
 2013 
• Target 
− 40 million+ customers affected 
 2014 
• Home Depot 
− Breach in April 2014, discovered in August 2014 
− 50 million + affected ; class action filed 9/10/14 in Eastern District of Missouri 
− Offered customers and employees free credit monitoring, fraud protection and identity 
protection services for 1 year 
• Benjamin F. Edwards & Co 
− Discovered 3 days after breach took place 
− Firm offered customers and employees free credit monitoring, fraud protection and 
identity protection services for 1 year 
• BAE Systems reported hedge fund customer lost millions due to “lag time” malware 
installed through “spearfishing” email 
© 2014 Armstrong Teasdale 
LLP
Privacy and Information Security 
 Privacy: 
• The right to be left alone 
• The right of an individual to be protected 
against intrusion into her personal life or affairs 
 Information/Data Security: 
• Defending information from unauthorized access, use, 
disclosure, disruption, modification, perusal, 
inspection, recording, or destruction 
© 2014 Armstrong Teasdale 
LLP
Internet vs. Privacy: 
“a helpful Venn diagram” 
The 
Internet Privacy 
By David Hoffman, available at http://bit.ly/bqU5vU 
© 2014 Armstrong Teasdale 
LLP
Who is the Top Information Security 
Threat? 
Hackers? 
© 2014 Armstrong Teasdale 
LLP 
Spies? 
Cyber 
terrorists?
INFORMATION SECURITY ENEMY #1 
© 2014 Armstrong Teasdale 
LLP
Evolving Expectations of Privacy? 
Zuckerberg’s Law 
“I would expect that next year, people will share twice 
as much information as they share this year, and the 
next year, they will be sharing twice as much as they 
did the year before.” 
© 2014 Armstrong Teasdale 
LLP
Social Engineering: an 
Increasingly Common Threat 
 Significant majority of external intrusions contain 
social engineering element 
 Phishing attacks becoming increasingly 
sophisticated. 
 Use of email/web based attacks 
 Personalized emails: information gleaned from 
Facebook or Linked In 
 Fake Internal Company Emails 
© 2014 Armstrong Teasdale 
LLP
Common Problems 
 Lack of Employee Training 
• Employees unaware of potential problems 
 No Security Culture 
• Employees aren’t thinking about security implications 
 Ineffective Internal Controls 
• Too much access to information 
© 2014 Armstrong Teasdale 
LLP
Overview of Privacy Law 
 Fundamentally different legal/regulatory schemes in 
different jurisdictions: 
United States 
• No comprehensive “law” 
• Patchwork of sector-specific 
(e.g. HIPAA) and jurisdiction-specific 
regulations 
© 2014 Armstrong Teasdale 
LLP 
Europe 
• Comprehensive data protection 
scheme 
• Strict privacy protection 
• “Privacy as a human right”
Some Important Privacy and Data 
Security Laws in the U.S. 
 Fair Credit Reporting Act (FCRA) 
 Health Insurance Portability and Accountability Act 
(HIPAA) 
 Computer Fraud and Abuse Act (CFAA) 
 Stored Communications Act 
 Gramm-Leach-Bliley Act (GLBA) 
 Children’s Online Privacy Protection Act (COPPA) 
 Section 5 of the Federal Trade Commission Act 
 State Data Theft, Breach Notification, and Other 
Privacy Laws 
© 2014 Armstrong Teasdale 
LLP
Cybersecurity Focus in Securities 
Industry 
“Cybersecurity [has] become a top concern … mounting 
evidence that the constant threat of cyber-attack is real, 
lasting and cannot be ignored” – Commissioner Aguilar 
2012 Survey: 89% identify cyber-crime as potential 
systemic risk, with 53% reporting a cyber-attack in 
previous year 
© 2014 Armstrong Teasdale 
LLP
SEC Regulatory Approach 
 October 2011 – Division of Corporate Finance 
• Guidance on disclosure obligations 
• Requires disclosure of material information regarding 
cybersecurity risks and cyber incidents 
 Proposed Rule – Regulation Systems, Compliance and 
Integrity 
• Aims to require covered entities to test automated systems, 
continuity and disaster recovery plans and notify SEC of 
intrusions 
• SEC professed goal as of March 2014 is to make 
significant progress in 2014 
© 2014 Armstrong Teasdale 
LLP
SEC Regulatory Approach 
 Regulation S-ID (http://www.sec.gov/rules/final/2013/34-69359.pdf) 
• Requires certain regulated financial institutions to adopt 
and implement identity theft programs 
• SEC expects institutions to know “Identity Theft Red Flags” 
and incorporate into policies 
− http://www.sec.gov/info/smallbus/secg/identity-theft-red-flag-secg. 
© 2014 Armstrong Teasdale 
LLP 
htm 
 Regulation S-P (http://www.sec.gov/rules/final/34-42974.htm) 
• Privacy of consumer financial information 
• Notice to customers of privacy policy and practices 
− Consumer knowledge and “opt-out” option
SEC Actions 
March 2014 – SEC Roundtable 
• Integrity of Market Systems 
• Customer Data Protection 
• Disclosure of Material Information 
April 2014 – OCIE Cybersecurity Initiative 
• Designed to assess cybersecurity preparedness 
• Method to collect information of industry experience 
• Examinations to be conducted of more than 50 broker-dealers 
© 2014 Armstrong Teasdale 
LLP 
and registered investment advisors
OCIE Cybersecurity Governance 
 Focus Areas 
• Identification of Risks 
• Policies and Procedures 
• Documentation 
• Third-Party Exposure 
• Detection 
© 2014 Armstrong Teasdale 
LLP
Identification of Risks 
System Access 
• What can account holders do? 
− Fund Transfers, Beneficiary Changes, Emailed action 
requests 
• What can employees do? 
− Remote access, Client account management 
Third Party Management 
• Hardware and Software 
• Storage and Backup 
© 2014 Armstrong Teasdale 
LLP
Policies and Procedures 
Network & Information Security 
 Risk management process standard? 
 What is the source or model of this standard? 
 What practices and controls are utilized by the firm? 
© 2014 Armstrong Teasdale 
LLP
Policies and Procedures 
Access 
• Employees 
− Training 
− Security protocols (passwords, 2-step verification) and User 
privileges (escalation control) 
• Customers 
− Remote access security (2-step verification, key fob) 
− Verification of email requests 
− Limitations (Transfers, Beneficiary changes, Account holder) 
• Third Parties 
− Financial management applications (Mint, Personal Capital, 
etc.) 
− Periodic access restriction requiring verification 
© 2014 Armstrong Teasdale 
LLP
Policies and Procedures 
IT Assets 
 Software 
• Loss prevention software 
• Internet protection software (DoS) 
• Malware / Virus protection and detection 
 Encryption 
• Types of data encrypted 
• Methods of encryption 
• Devices (iPhone, iPad, laptops, open internet portals) 
© 2014 Armstrong Teasdale 
LLP
Policies and Procedures 
IT Assets 
 Architecture 
• Environment 
− Segregation of application and testing 
• “Locked” basic configuration 
− Baseline access and data organization 
• Maintenance (patching, upgrades) 
• Backup System 
 Quality Control 
• Periodic testing and compliance assessments 
• Penetration and Vulnerability scans 
− Who and How Often (Internal IT, Third Party Vendors) 
© 2014 Armstrong Teasdale 
LLP
Documentation 
 Security/Hacking guarantees and policy 
• What security is offered to customers 
• What information is provided to customers in the event of a breach 
 Written data destruction policy 
• Lawful destruction limits potential for large-scale data breach 
 Incoming/Departing employee policy 
• Employees are security threat – not just outsiders 
 Cybersecurity incident response policy 
• Update schedule 
• Response guidelines 
 Training for vendors and authorized partners 
• Clear identification of expectations and requirements 
© 2014 Armstrong Teasdale 
LLP
Documentation 
Reporting 
 Customer 
 Law Enforcement 
 Treasury Financial Crimes Enforcement Network 
(FinCEN) 
• Suspicious Activity Report 
− http://www.fincen.gov/news_room/rp/sar_guidance.html 
 SEC/FINRA 
 State Securities Commissioner 
 Public Interest Group 
© 2014 Armstrong Teasdale 
LLP
Documentation 
Records, Records, Records 
 Number of experienced events 
• SEC Focus: After January 1, 2013 
 Significance of event(s) 
• Repeated incidents or sources (10+) 
• Amount of losses ($5K+) 
• What was accessed 
• How was Firm service compromised 
© 2014 Armstrong Teasdale 
LLP
Third Party Exposure 
Risk Assessment 
• Who conducts 
• Assessment standards 
− Questionnaire 
− Minimum security requirements 
− Independent audits and security verification 
• Contractual provisions and requirements 
• Segregation of network resources 
− Universal access or firewalled 
• Remote maintenance policy 
© 2014 Armstrong Teasdale 
LLP
Detection 
 Who is responsible for oversight 
• Specific responsibility assignments 
• Organizational chain for detection + reporting 
 Baseline development 
• Standard expectations 
− Access timing (market-based, geographical base) 
− Outside access (remote vs. office) 
−Weekday/Weekend/After Hours 
© 2014 Armstrong Teasdale 
LLP
Detection 
 Establish thresholds 
• “Incident Alert” threshold 
− Internal / Satellite 
− Identification of anomalies 
 Monitoring 
• Software 
− Unauthorized access 
− Unauthorized software 
• Hardware 
− Unauthorized connections or devices 
© 2014 Armstrong Teasdale 
LLP
Industry Snapshot 
Identification of Risks 
 85% used multiple electronic devices to access client information 
 42% did not use any authentication procedures for client 
instructions received via email or electronic messaging 
• Only 41.1% required dual-factor authentication 
 Only 41.5% had a policy on accessing client information or 
communications from a non-business device 
 Only 38% had policy for detecting unauthorized activity on 
networks or devices 
© 2014 Armstrong Teasdale 
LLP
Industry Overview 
Vendors and Third Parties 
 37% did not conduct risk assessments 
 40% of those that conducted risk assessments did so only 
on an annual basis 
 23% had no confidentiality agreements with third-party 
providers and servicers 
• BUT -- 76% use on-line or remote backup of electronic files 
© 2014 Armstrong Teasdale 
LLP
Industry Overview 
Polices and Procedures 
 Only 44.6% had cybersecurity policies, procedures or 
training programs 
 23.1% had no policies whatsoever 
© 2014 Armstrong Teasdale 
LLP
Industry Overview 
Policies and Procedures 
 Only 47.4% had data storage device destruction 
policies 
 Only 39.2% had loss of electronic device policies 
(e.g., laptop, smartphone) 
© 2014 Armstrong Teasdale 
LLP
OCIE Examination Process 
 Factors favoring examination 
• Statutory directive 
• Entity risk profile 
• Tip, complaint or referral 
• Review of specific risk area 
 Examination 
• Announced or unannounced 
• Initial interview – “critical … determine[s] tone and focus of examination” 
• Tour – analysis of workflow and control environment 
• Cooperation, including provision of persons with knowledge, is key 
• Follow-up may include telephone interviews 
© 2014 Armstrong Teasdale 
LLP 
http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
OCIE Examination Process 
 Third Party Providers 
• OCIE will request relevant information from examinee or from 
agents/custodians 
 Clients & Customers 
• OCIE will “routinely contact” to gather and/or verify information 
 Exit Interview 
• Last day of site visit 
• Entity afforded opportunity to discuss issues raised by exam staff 
− Includes actions entity has taken or plans to take to address 
issues 
© 2014 Armstrong Teasdale 
LLP 
http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
OCIE Examination Process 
 Examination Conclusion 
• SEC Section 4E – completion due on later of two dates 
− 180 days after completion of on-site portion of exam; or 
− 180 days after all records requested are examined or inspected 
• 180-day extension available for “complex examinations” 
 Exam Results 
• Deficiency Letter 
− Entity to respond timely, addressing all identified issues 
• Referral to Division of Enforcement 
− Direct referral without exit exam may be made in “exigent circumstances” 
• Referral to SRO, State regulatory agency or law enforcement 
© 2014 Armstrong Teasdale 
LLP 
http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
Challenge: Decision Makers’ Lack of 
Familiarity with the Technology 
“If I'm applying the First Amendment, I have to apply it to a world where 
there's an Internet, and there's Facebook, and there are movies like ... The 
Social Network, which I couldn't even understand .” 
© 2014 Armstrong Teasdale 
LLP 
—Justice Stephen Breyer 
Justice Roberts: “I thought, you know, you push a button; it goes right to the 
other thing.” 
Justice Scalia: “You mean it doesn't go right to the other thing?” 
—Justice John Roberts to Justice 
Antonin Scalia Regarding How a 
Text-Messaging Service Works
To Do List 
 Identify/Organize Persons with Knowledge 
• Cybersecurity Committee and/or Response Team 
 Audit Cybersecurity Status 
• Review internal and external Policies 
• Review access, verification and recovery 
 Third Party Vendors 
• Review contracts and policies 
 Quality Control and Assessment 
• Update records … or get started 
 Insurance 
• Mind the gap 
© 2014 Armstrong Teasdale 
LLP
Be Proactive 
© 2014 Armstrong Teasdale 
LLP
How Can We Help? 
 Securities Regulatory & Litigation Group 
• Former MO Securities Commissioner 
• Former federal prosecutor 
• Experienced securities litigators 
 Data Security and Privacy Group 
• CIPP|US and Ethical Hacker Certified 
• International and Domestic experience 
© 2014 Armstrong Teasdale 
LLP
Questions? 
Scott K.G. Kozak 
Partner, Litigation 
314.259.4714 
skozak@ArmstrongTeasdale.com 
Jeffrey Schultz 
Partner, Litigation 
314.259.4732 
jschultz@ArmstrongTeasdale.com 
CLE Webinar Confirmation Code: KS0912 
© 2014 Armstrong Teasdale 
LLP

Weitere ähnliche Inhalte

Was ist angesagt?

Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigmpparam02
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummiesIvo Depoorter
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...The University of Texas (UTRGV)
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and HealthcareJonathon Coulter
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 

Was ist angesagt? (20)

Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigm
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Ethical privacy and security issues
Ethical privacy and security issuesEthical privacy and security issues
Ethical privacy and security issues
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
Need for cybersecurity
Need for cybersecurityNeed for cybersecurity
Need for cybersecurity
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 

Ähnlich wie Cyber Readiness in the Securities and Brokerage Industries Featuring Armstrong Teasdale Attorneys: Jeff Schultz Scott Kozak

Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointbradleyl2
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist, LLC
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales DeckEvan Francen
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the HourVijay Dalmia
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovCyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovEric Vanderburg
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
"Everything as a Service" Contracts - Presentation
"Everything as a Service" Contracts  - Presentation "Everything as a Service" Contracts  - Presentation
"Everything as a Service" Contracts - Presentation MorningstarLaw
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowkCura_Relativity
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 

Ähnlich wie Cyber Readiness in the Securities and Brokerage Industries Featuring Armstrong Teasdale Attorneys: Jeff Schultz Scott Kozak (20)

Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power point
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovCyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
"Everything as a Service" Contracts - Presentation
"Everything as a Service" Contracts  - Presentation "Everything as a Service" Contracts  - Presentation
"Everything as a Service" Contracts - Presentation
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 

Mehr von Armstrong Teasdale

How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry TuckerHow to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry TuckerArmstrong Teasdale
 
Don't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan NelsonDon't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan NelsonArmstrong Teasdale
 
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...Armstrong Teasdale
 
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...Armstrong Teasdale
 
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...Armstrong Teasdale
 
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...Armstrong Teasdale
 
Multijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downeyMultijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downeyArmstrong Teasdale
 
BUCKLE UP! How the NLRB is Changing the Rules of the Road
BUCKLE UP!  How the NLRB is Changing the Rules of the RoadBUCKLE UP!  How the NLRB is Changing the Rules of the Road
BUCKLE UP! How the NLRB is Changing the Rules of the RoadArmstrong Teasdale
 
China 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth EnvironmentChina 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth EnvironmentArmstrong Teasdale
 
Employment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas CityEmployment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas CityArmstrong Teasdale
 
Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web Armstrong Teasdale
 
Employment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. LouisEmployment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. LouisArmstrong Teasdale
 
2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas City2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas CityArmstrong Teasdale
 
2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. Louis2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. LouisArmstrong Teasdale
 
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F..."The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...Armstrong Teasdale
 
Fundamental Intellectual Property Strategies
Fundamental Intellectual Property StrategiesFundamental Intellectual Property Strategies
Fundamental Intellectual Property StrategiesArmstrong Teasdale
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationArmstrong Teasdale
 
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...Armstrong Teasdale
 
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared EmployersSuper Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared EmployersArmstrong Teasdale
 
How to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance ProcessHow to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance ProcessArmstrong Teasdale
 

Mehr von Armstrong Teasdale (20)

How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry TuckerHow to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
 
Don't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan NelsonDon't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan Nelson
 
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
 
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
 
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
 
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
 
Multijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downeyMultijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downey
 
BUCKLE UP! How the NLRB is Changing the Rules of the Road
BUCKLE UP!  How the NLRB is Changing the Rules of the RoadBUCKLE UP!  How the NLRB is Changing the Rules of the Road
BUCKLE UP! How the NLRB is Changing the Rules of the Road
 
China 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth EnvironmentChina 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth Environment
 
Employment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas CityEmployment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas City
 
Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web
 
Employment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. LouisEmployment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. Louis
 
2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas City2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas City
 
2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. Louis2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. Louis
 
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F..."The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
 
Fundamental Intellectual Property Strategies
Fundamental Intellectual Property StrategiesFundamental Intellectual Property Strategies
Fundamental Intellectual Property Strategies
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities Presentation
 
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
 
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared EmployersSuper Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
 
How to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance ProcessHow to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance Process
 

Kürzlich hochgeladen

The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...Milind Agarwal
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxNeeteshKumar71
 

Kürzlich hochgeladen (20)

The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
What Types of Social Media Frauds Are Prevalent in India? Investigator Perspe...
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
The Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptxThe Prevention Of Corruption Act Presentation.pptx
The Prevention Of Corruption Act Presentation.pptx
 

Cyber Readiness in the Securities and Brokerage Industries Featuring Armstrong Teasdale Attorneys: Jeff Schultz Scott Kozak

  • 1. Cyber-Readiness in the Securities and Brokerage Industry September 24, 2014 Scott K.G. Kozak & Jeffrey Schultz © 2014 Armstrong Teasdale LLP © 2014 Armstrong Teasdale LLP
  • 2. Current Events  2013 • Target − 40 million+ customers affected  2014 • Home Depot − Breach in April 2014, discovered in August 2014 − 50 million + affected ; class action filed 9/10/14 in Eastern District of Missouri − Offered customers and employees free credit monitoring, fraud protection and identity protection services for 1 year • Benjamin F. Edwards & Co − Discovered 3 days after breach took place − Firm offered customers and employees free credit monitoring, fraud protection and identity protection services for 1 year • BAE Systems reported hedge fund customer lost millions due to “lag time” malware installed through “spearfishing” email © 2014 Armstrong Teasdale LLP
  • 3. Privacy and Information Security  Privacy: • The right to be left alone • The right of an individual to be protected against intrusion into her personal life or affairs  Information/Data Security: • Defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction © 2014 Armstrong Teasdale LLP
  • 4. Internet vs. Privacy: “a helpful Venn diagram” The Internet Privacy By David Hoffman, available at http://bit.ly/bqU5vU © 2014 Armstrong Teasdale LLP
  • 5. Who is the Top Information Security Threat? Hackers? © 2014 Armstrong Teasdale LLP Spies? Cyber terrorists?
  • 6. INFORMATION SECURITY ENEMY #1 © 2014 Armstrong Teasdale LLP
  • 7. Evolving Expectations of Privacy? Zuckerberg’s Law “I would expect that next year, people will share twice as much information as they share this year, and the next year, they will be sharing twice as much as they did the year before.” © 2014 Armstrong Teasdale LLP
  • 8. Social Engineering: an Increasingly Common Threat  Significant majority of external intrusions contain social engineering element  Phishing attacks becoming increasingly sophisticated.  Use of email/web based attacks  Personalized emails: information gleaned from Facebook or Linked In  Fake Internal Company Emails © 2014 Armstrong Teasdale LLP
  • 9. Common Problems  Lack of Employee Training • Employees unaware of potential problems  No Security Culture • Employees aren’t thinking about security implications  Ineffective Internal Controls • Too much access to information © 2014 Armstrong Teasdale LLP
  • 10. Overview of Privacy Law  Fundamentally different legal/regulatory schemes in different jurisdictions: United States • No comprehensive “law” • Patchwork of sector-specific (e.g. HIPAA) and jurisdiction-specific regulations © 2014 Armstrong Teasdale LLP Europe • Comprehensive data protection scheme • Strict privacy protection • “Privacy as a human right”
  • 11. Some Important Privacy and Data Security Laws in the U.S.  Fair Credit Reporting Act (FCRA)  Health Insurance Portability and Accountability Act (HIPAA)  Computer Fraud and Abuse Act (CFAA)  Stored Communications Act  Gramm-Leach-Bliley Act (GLBA)  Children’s Online Privacy Protection Act (COPPA)  Section 5 of the Federal Trade Commission Act  State Data Theft, Breach Notification, and Other Privacy Laws © 2014 Armstrong Teasdale LLP
  • 12. Cybersecurity Focus in Securities Industry “Cybersecurity [has] become a top concern … mounting evidence that the constant threat of cyber-attack is real, lasting and cannot be ignored” – Commissioner Aguilar 2012 Survey: 89% identify cyber-crime as potential systemic risk, with 53% reporting a cyber-attack in previous year © 2014 Armstrong Teasdale LLP
  • 13. SEC Regulatory Approach  October 2011 – Division of Corporate Finance • Guidance on disclosure obligations • Requires disclosure of material information regarding cybersecurity risks and cyber incidents  Proposed Rule – Regulation Systems, Compliance and Integrity • Aims to require covered entities to test automated systems, continuity and disaster recovery plans and notify SEC of intrusions • SEC professed goal as of March 2014 is to make significant progress in 2014 © 2014 Armstrong Teasdale LLP
  • 14. SEC Regulatory Approach  Regulation S-ID (http://www.sec.gov/rules/final/2013/34-69359.pdf) • Requires certain regulated financial institutions to adopt and implement identity theft programs • SEC expects institutions to know “Identity Theft Red Flags” and incorporate into policies − http://www.sec.gov/info/smallbus/secg/identity-theft-red-flag-secg. © 2014 Armstrong Teasdale LLP htm  Regulation S-P (http://www.sec.gov/rules/final/34-42974.htm) • Privacy of consumer financial information • Notice to customers of privacy policy and practices − Consumer knowledge and “opt-out” option
  • 15. SEC Actions March 2014 – SEC Roundtable • Integrity of Market Systems • Customer Data Protection • Disclosure of Material Information April 2014 – OCIE Cybersecurity Initiative • Designed to assess cybersecurity preparedness • Method to collect information of industry experience • Examinations to be conducted of more than 50 broker-dealers © 2014 Armstrong Teasdale LLP and registered investment advisors
  • 16. OCIE Cybersecurity Governance  Focus Areas • Identification of Risks • Policies and Procedures • Documentation • Third-Party Exposure • Detection © 2014 Armstrong Teasdale LLP
  • 17. Identification of Risks System Access • What can account holders do? − Fund Transfers, Beneficiary Changes, Emailed action requests • What can employees do? − Remote access, Client account management Third Party Management • Hardware and Software • Storage and Backup © 2014 Armstrong Teasdale LLP
  • 18. Policies and Procedures Network & Information Security  Risk management process standard?  What is the source or model of this standard?  What practices and controls are utilized by the firm? © 2014 Armstrong Teasdale LLP
  • 19. Policies and Procedures Access • Employees − Training − Security protocols (passwords, 2-step verification) and User privileges (escalation control) • Customers − Remote access security (2-step verification, key fob) − Verification of email requests − Limitations (Transfers, Beneficiary changes, Account holder) • Third Parties − Financial management applications (Mint, Personal Capital, etc.) − Periodic access restriction requiring verification © 2014 Armstrong Teasdale LLP
  • 20. Policies and Procedures IT Assets  Software • Loss prevention software • Internet protection software (DoS) • Malware / Virus protection and detection  Encryption • Types of data encrypted • Methods of encryption • Devices (iPhone, iPad, laptops, open internet portals) © 2014 Armstrong Teasdale LLP
  • 21. Policies and Procedures IT Assets  Architecture • Environment − Segregation of application and testing • “Locked” basic configuration − Baseline access and data organization • Maintenance (patching, upgrades) • Backup System  Quality Control • Periodic testing and compliance assessments • Penetration and Vulnerability scans − Who and How Often (Internal IT, Third Party Vendors) © 2014 Armstrong Teasdale LLP
  • 22. Documentation  Security/Hacking guarantees and policy • What security is offered to customers • What information is provided to customers in the event of a breach  Written data destruction policy • Lawful destruction limits potential for large-scale data breach  Incoming/Departing employee policy • Employees are security threat – not just outsiders  Cybersecurity incident response policy • Update schedule • Response guidelines  Training for vendors and authorized partners • Clear identification of expectations and requirements © 2014 Armstrong Teasdale LLP
  • 23. Documentation Reporting  Customer  Law Enforcement  Treasury Financial Crimes Enforcement Network (FinCEN) • Suspicious Activity Report − http://www.fincen.gov/news_room/rp/sar_guidance.html  SEC/FINRA  State Securities Commissioner  Public Interest Group © 2014 Armstrong Teasdale LLP
  • 24. Documentation Records, Records, Records  Number of experienced events • SEC Focus: After January 1, 2013  Significance of event(s) • Repeated incidents or sources (10+) • Amount of losses ($5K+) • What was accessed • How was Firm service compromised © 2014 Armstrong Teasdale LLP
  • 25. Third Party Exposure Risk Assessment • Who conducts • Assessment standards − Questionnaire − Minimum security requirements − Independent audits and security verification • Contractual provisions and requirements • Segregation of network resources − Universal access or firewalled • Remote maintenance policy © 2014 Armstrong Teasdale LLP
  • 26. Detection  Who is responsible for oversight • Specific responsibility assignments • Organizational chain for detection + reporting  Baseline development • Standard expectations − Access timing (market-based, geographical base) − Outside access (remote vs. office) −Weekday/Weekend/After Hours © 2014 Armstrong Teasdale LLP
  • 27. Detection  Establish thresholds • “Incident Alert” threshold − Internal / Satellite − Identification of anomalies  Monitoring • Software − Unauthorized access − Unauthorized software • Hardware − Unauthorized connections or devices © 2014 Armstrong Teasdale LLP
  • 28. Industry Snapshot Identification of Risks  85% used multiple electronic devices to access client information  42% did not use any authentication procedures for client instructions received via email or electronic messaging • Only 41.1% required dual-factor authentication  Only 41.5% had a policy on accessing client information or communications from a non-business device  Only 38% had policy for detecting unauthorized activity on networks or devices © 2014 Armstrong Teasdale LLP
  • 29. Industry Overview Vendors and Third Parties  37% did not conduct risk assessments  40% of those that conducted risk assessments did so only on an annual basis  23% had no confidentiality agreements with third-party providers and servicers • BUT -- 76% use on-line or remote backup of electronic files © 2014 Armstrong Teasdale LLP
  • 30. Industry Overview Polices and Procedures  Only 44.6% had cybersecurity policies, procedures or training programs  23.1% had no policies whatsoever © 2014 Armstrong Teasdale LLP
  • 31. Industry Overview Policies and Procedures  Only 47.4% had data storage device destruction policies  Only 39.2% had loss of electronic device policies (e.g., laptop, smartphone) © 2014 Armstrong Teasdale LLP
  • 32. OCIE Examination Process  Factors favoring examination • Statutory directive • Entity risk profile • Tip, complaint or referral • Review of specific risk area  Examination • Announced or unannounced • Initial interview – “critical … determine[s] tone and focus of examination” • Tour – analysis of workflow and control environment • Cooperation, including provision of persons with knowledge, is key • Follow-up may include telephone interviews © 2014 Armstrong Teasdale LLP http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
  • 33. OCIE Examination Process  Third Party Providers • OCIE will request relevant information from examinee or from agents/custodians  Clients & Customers • OCIE will “routinely contact” to gather and/or verify information  Exit Interview • Last day of site visit • Entity afforded opportunity to discuss issues raised by exam staff − Includes actions entity has taken or plans to take to address issues © 2014 Armstrong Teasdale LLP http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
  • 34. OCIE Examination Process  Examination Conclusion • SEC Section 4E – completion due on later of two dates − 180 days after completion of on-site portion of exam; or − 180 days after all records requested are examined or inspected • 180-day extension available for “complex examinations”  Exam Results • Deficiency Letter − Entity to respond timely, addressing all identified issues • Referral to Division of Enforcement − Direct referral without exit exam may be made in “exigent circumstances” • Referral to SRO, State regulatory agency or law enforcement © 2014 Armstrong Teasdale LLP http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
  • 35. Challenge: Decision Makers’ Lack of Familiarity with the Technology “If I'm applying the First Amendment, I have to apply it to a world where there's an Internet, and there's Facebook, and there are movies like ... The Social Network, which I couldn't even understand .” © 2014 Armstrong Teasdale LLP —Justice Stephen Breyer Justice Roberts: “I thought, you know, you push a button; it goes right to the other thing.” Justice Scalia: “You mean it doesn't go right to the other thing?” —Justice John Roberts to Justice Antonin Scalia Regarding How a Text-Messaging Service Works
  • 36. To Do List  Identify/Organize Persons with Knowledge • Cybersecurity Committee and/or Response Team  Audit Cybersecurity Status • Review internal and external Policies • Review access, verification and recovery  Third Party Vendors • Review contracts and policies  Quality Control and Assessment • Update records … or get started  Insurance • Mind the gap © 2014 Armstrong Teasdale LLP
  • 37. Be Proactive © 2014 Armstrong Teasdale LLP
  • 38. How Can We Help?  Securities Regulatory & Litigation Group • Former MO Securities Commissioner • Former federal prosecutor • Experienced securities litigators  Data Security and Privacy Group • CIPP|US and Ethical Hacker Certified • International and Domestic experience © 2014 Armstrong Teasdale LLP
  • 39. Questions? Scott K.G. Kozak Partner, Litigation 314.259.4714 skozak@ArmstrongTeasdale.com Jeffrey Schultz Partner, Litigation 314.259.4732 jschultz@ArmstrongTeasdale.com CLE Webinar Confirmation Code: KS0912 © 2014 Armstrong Teasdale LLP