SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Complex Issues – Here to Stay
CyberGroup
cybersecurity/data breach/privacy™
Complex Issues — Here to Stay
• Sophisticated Threats, Evolving Technology, Internet of Things
• Healthcare—frequently attacked industry
• Ransomware attacks
• 100 million healthcare records compromised 2015 (credit card, email, SSN, employment, med history data)
• High price on black market “dark internet”
• Cyber thieves use data to launch spear phishing attacks, commit fraud, steal medical identities
• But no industry immune—
• Manufacturing (automotive, chemical, IP networks)
• Financial Services (consumer banking, mobile apps)
• Government (IRS and HHS breaches)
• Transportation (freight, shipping, air)
• Retail/Wholesale
• Professional Services (engineering, accounting, law firms)
2
Costs
• Predicting costs of data breaches--DIFFICULT--lack of quality data.
• High INTEREST among firms at risk, insurance carriers, researchers,
and social planners.
• Based on recent survey data estimates the average cost of a data
breach is around $6.5 million (or, $217 per record; Ponemon 2015).
• Averages may be misleading: median losses may be lower but still
significant.
• Similarly skewed values arise for phishing and security incidents.
• Privacy violations, however, account for a much larger median loss of
$1.3 million.
3
Statistics Do Not Account For:
• Business interruption
• Reputational loss
• Customer retention/loss
• Cost of allocation of resources/time
• Responding to private litigation
• Potential class actions
• Federal and state regulatory investigations
4
Dealing With Threats
• There is no 100%
• Compliance ≠ Security
• Prioritize business objectives w/in risk tolerance
• Management of contractual relationships/terms
• Proactive Security Plan with technology and policy
• Coordinated and tested incident response plan
• Prepare Response to the Inevitable Attack
• Understand threat landscape
• Access right resources and skills
• Promote Culture of Security Awareness
• Train
• Avoid careless mistakes
• Protect key IP and business assets
5
Legal Management Issues
• Effective Privacy Notices
• Industry Specific Regulations
• Federal
• State
• Assessment of Legal Duties/ Disclosure
• Determination of Key Areas for Cyberinsurance
• Contractual Matters
• Indemnification
• Limitation of Liability
• Risk Transfer
• Representations & Warranties
• Acquisitions- Due Diligence
6
Legal Ramifications
• PRIVATE LITIGATION
• Suppliers, commercial customers
• Third Parties (no privity)
• Consumers, individuals, class actions
• GOVERNMENT INVESTIGATIONS
• State laws/ Attorney General Actions
• Federal Laws/ FTC and Industry Specific Regulations
• Privacy Actions
• Criminal Violations
In federal courts approximately 1700 pending legal actions over 50% are private civil actions,
17% are criminal actions.
7
FTC Real Life Lessons
• LABMD, A clinical laboratory, experienced unusual data breaches that
compromised personal, medical information of 9300 consumers. The FTC’s
decision, relying on extensive expert testimony, found that from 2005 to 2010
LabMD failed to:
• maintain file integrity monitoring;
• provide intrusion detection;
• monitor digital traffic across its firewalls;
• delete no longer needed consumer data;
• provide security training to employees;
• implement a strong password policy (a number of employees used the same password
“labmd”);
• update its software to deal with known vulnerabilities;
• control administrative rights to employee laptops and allowed employees to download any
software, business related or not;
• prevent use of peer-to-peer software (LimeWire), which enabled download of a file
containing 1,718 pages of confidential information on approximately 9,300 consumers
8
Lessons From LABMD
• FTC has made it clear that any industry in possession of sensitive
consumer data (such as names, addresses, dates of birth, Social
Security numbers, and insurance information) will be required to
maintain reasonable data security practices
• Enforcement actions may result even if there has been no identifiable harm
to the subjects of such data.
• the FTC is going to assert its authority expansively and stay in the cyber cop
business.
• In a data breach case, no actual harm is necessary.
• Employers must train their employees on infoSEC
• COMPANIES MUST establish reasonable protocols commensurate with their
risk profile to try to protect against cyber intrusions.
9
Role Of Management And Board
• Duty To Maintain, Grow, And Protect The Assets Of The Company
• Public Company Risks
• Failure To Maintain Adequate Controls
• Failure To Disclose
• Failure To Investigate And Make Informed Judgments
• Shareholder Actions And Derivative Claims
• Government Focus On Individual Liability
• Indemnification Issues
10
What You Need in Place in Before,
During & After
• Management commitment
• Clear lines of communication
• Set infosec as an organizational priority
• Specialized knowledge
• Business compliance and continuity plans
• Policies and procedures for data protection
• Statutory compliance by industry/profession/location
• Employee training/ response teams
• WHEN THE INFORMATION SECURITY/CYBER PROBLEM HAPPENS (and it will)
• 24/7 responsiveness w/ resources
• Ability to contain harm/ calm management of crisis
• Guidance on legal duties/notification/reputation management
• Dealing with government bodies
• Positioning/shaping facts w/future litigation in mind
• Avoid exorbitant costs/ potential liabilities
11
THINK IN THREE PHASES
•Legal
•Insurance
•IT/Network
•PR
•Forensic
Testing
Before a
Problem
Arises
•Legal
•PR
•Insurance
•Forensic
Investigation
Responding
to a Breach
•Legal
•PR
•IT/Network
Post Breach
12
Questions / Contact Information:
Glenn E. Davis
Lead Partner
HBCyberGroup
www.HeplerBroom.com |
glenn.davis@helperbroom.com
Direct: 314.480.4154 | Mobile: 314.550.5122
13

Weitere ähnliche Inhalte

Was ist angesagt?

Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskWilliam Gamble
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethicsKriscila Yumul
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesIISPEastMids
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance Hubbard Insurance Group
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...Rabelani Dagada
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2MLG College of Learning, Inc
 

Was ist angesagt? (19)

Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Review questions
Review questionsReview questions
Review questions
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
S719a
S719aS719a
S719a
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 

Andere mochten auch

Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015Randy V. Miller
 
India’s First SAS based SAN deployment
India’s First SAS based SAN deploymentIndia’s First SAS based SAN deployment
India’s First SAS based SAN deploymentTyrone Systems
 
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?Christopher Mohritz
 
Almanática - O almanaque da Matemática
Almanática - O almanaque da MatemáticaAlmanática - O almanaque da Matemática
Almanática - O almanaque da MatemáticaProf. Materaldo
 
Iskf Seminario Master Yaguchi 2013
Iskf Seminario Master Yaguchi 2013Iskf Seminario Master Yaguchi 2013
Iskf Seminario Master Yaguchi 2013Jorge Noceda Moreno
 
Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Trabalho Multidisciplinar com Africanidade e Cultura Indígena Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Trabalho Multidisciplinar com Africanidade e Cultura Indígena Eduardo Mariño Rial
 
PDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation ServicesPDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation ServicesPDS Tech Inc.
 
Apresentação evarejo
Apresentação evarejoApresentação evarejo
Apresentação evarejoEderson Varejo
 
Fel Flyer F11
Fel Flyer F11Fel Flyer F11
Fel Flyer F11chitlesh
 
Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )Sean Fitzgerald
 
I.E. AGROINDUSTRIAL LOS PASTOS
I.E. AGROINDUSTRIAL LOS PASTOSI.E. AGROINDUSTRIAL LOS PASTOS
I.E. AGROINDUSTRIAL LOS PASTOSNelly Garreta
 

Andere mochten auch (20)

Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015
 
Bitten By Python
Bitten By PythonBitten By Python
Bitten By Python
 
Super pac hacks for your library
Super pac hacks for your librarySuper pac hacks for your library
Super pac hacks for your library
 
India’s First SAS based SAN deployment
India’s First SAS based SAN deploymentIndia’s First SAS based SAN deployment
India’s First SAS based SAN deployment
 
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
 
Almanática - O almanaque da Matemática
Almanática - O almanaque da MatemáticaAlmanática - O almanaque da Matemática
Almanática - O almanaque da Matemática
 
Test
TestTest
Test
 
Ahmed my gfmer course experience
Ahmed my gfmer course experienceAhmed my gfmer course experience
Ahmed my gfmer course experience
 
Dx bumil
Dx bumilDx bumil
Dx bumil
 
Regulamento Junte & Ganhe
Regulamento Junte & GanheRegulamento Junte & Ganhe
Regulamento Junte & Ganhe
 
Iskf Seminario Master Yaguchi 2013
Iskf Seminario Master Yaguchi 2013Iskf Seminario Master Yaguchi 2013
Iskf Seminario Master Yaguchi 2013
 
Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Trabalho Multidisciplinar com Africanidade e Cultura Indígena Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Trabalho Multidisciplinar com Africanidade e Cultura Indígena
 
PDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation ServicesPDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation Services
 
Apresentação evarejo
Apresentação evarejoApresentação evarejo
Apresentação evarejo
 
Fel Flyer F11
Fel Flyer F11Fel Flyer F11
Fel Flyer F11
 
Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )
 
mark resume 2015
mark resume 2015mark resume 2015
mark resume 2015
 
Personal Work
Personal WorkPersonal Work
Personal Work
 
ford company
ford companyford company
ford company
 
I.E. AGROINDUSTRIAL LOS PASTOS
I.E. AGROINDUSTRIAL LOS PASTOSI.E. AGROINDUSTRIAL LOS PASTOS
I.E. AGROINDUSTRIAL LOS PASTOS
 

Ähnlich wie Complex Issues Here to Stay

Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Financial Poise
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsFinancial Poise
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurityIT Governance Ltd
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceFinancial Poise
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdfstirlingvwriters
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team SportQuarles & Brady
 

Ähnlich wie Complex Issues Here to Stay (20)

Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 

Kürzlich hochgeladen

Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxfilippoluciani9
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxSHIVAMGUPTA671167
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptxPamelaAbegailMonsant2
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteDeepikaK245113
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfPoojaGadiya1
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...Finlaw Associates
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 

Kürzlich hochgeladen (20)

Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptxMunicipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
Municipal-Council-Ratlam-vs-Vardi-Chand-A-Landmark-Writ-Case.pptx
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
The doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statuteThe doctrine of harmonious construction under Interpretation of statute
The doctrine of harmonious construction under Interpretation of statute
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
Appeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdfAppeal and Revision in Income Tax Act.pdf
Appeal and Revision in Income Tax Act.pdf
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 

Complex Issues Here to Stay

  • 1. Complex Issues – Here to Stay CyberGroup cybersecurity/data breach/privacy™
  • 2. Complex Issues — Here to Stay • Sophisticated Threats, Evolving Technology, Internet of Things • Healthcare—frequently attacked industry • Ransomware attacks • 100 million healthcare records compromised 2015 (credit card, email, SSN, employment, med history data) • High price on black market “dark internet” • Cyber thieves use data to launch spear phishing attacks, commit fraud, steal medical identities • But no industry immune— • Manufacturing (automotive, chemical, IP networks) • Financial Services (consumer banking, mobile apps) • Government (IRS and HHS breaches) • Transportation (freight, shipping, air) • Retail/Wholesale • Professional Services (engineering, accounting, law firms) 2
  • 3. Costs • Predicting costs of data breaches--DIFFICULT--lack of quality data. • High INTEREST among firms at risk, insurance carriers, researchers, and social planners. • Based on recent survey data estimates the average cost of a data breach is around $6.5 million (or, $217 per record; Ponemon 2015). • Averages may be misleading: median losses may be lower but still significant. • Similarly skewed values arise for phishing and security incidents. • Privacy violations, however, account for a much larger median loss of $1.3 million. 3
  • 4. Statistics Do Not Account For: • Business interruption • Reputational loss • Customer retention/loss • Cost of allocation of resources/time • Responding to private litigation • Potential class actions • Federal and state regulatory investigations 4
  • 5. Dealing With Threats • There is no 100% • Compliance ≠ Security • Prioritize business objectives w/in risk tolerance • Management of contractual relationships/terms • Proactive Security Plan with technology and policy • Coordinated and tested incident response plan • Prepare Response to the Inevitable Attack • Understand threat landscape • Access right resources and skills • Promote Culture of Security Awareness • Train • Avoid careless mistakes • Protect key IP and business assets 5
  • 6. Legal Management Issues • Effective Privacy Notices • Industry Specific Regulations • Federal • State • Assessment of Legal Duties/ Disclosure • Determination of Key Areas for Cyberinsurance • Contractual Matters • Indemnification • Limitation of Liability • Risk Transfer • Representations & Warranties • Acquisitions- Due Diligence 6
  • 7. Legal Ramifications • PRIVATE LITIGATION • Suppliers, commercial customers • Third Parties (no privity) • Consumers, individuals, class actions • GOVERNMENT INVESTIGATIONS • State laws/ Attorney General Actions • Federal Laws/ FTC and Industry Specific Regulations • Privacy Actions • Criminal Violations In federal courts approximately 1700 pending legal actions over 50% are private civil actions, 17% are criminal actions. 7
  • 8. FTC Real Life Lessons • LABMD, A clinical laboratory, experienced unusual data breaches that compromised personal, medical information of 9300 consumers. The FTC’s decision, relying on extensive expert testimony, found that from 2005 to 2010 LabMD failed to: • maintain file integrity monitoring; • provide intrusion detection; • monitor digital traffic across its firewalls; • delete no longer needed consumer data; • provide security training to employees; • implement a strong password policy (a number of employees used the same password “labmd”); • update its software to deal with known vulnerabilities; • control administrative rights to employee laptops and allowed employees to download any software, business related or not; • prevent use of peer-to-peer software (LimeWire), which enabled download of a file containing 1,718 pages of confidential information on approximately 9,300 consumers 8
  • 9. Lessons From LABMD • FTC has made it clear that any industry in possession of sensitive consumer data (such as names, addresses, dates of birth, Social Security numbers, and insurance information) will be required to maintain reasonable data security practices • Enforcement actions may result even if there has been no identifiable harm to the subjects of such data. • the FTC is going to assert its authority expansively and stay in the cyber cop business. • In a data breach case, no actual harm is necessary. • Employers must train their employees on infoSEC • COMPANIES MUST establish reasonable protocols commensurate with their risk profile to try to protect against cyber intrusions. 9
  • 10. Role Of Management And Board • Duty To Maintain, Grow, And Protect The Assets Of The Company • Public Company Risks • Failure To Maintain Adequate Controls • Failure To Disclose • Failure To Investigate And Make Informed Judgments • Shareholder Actions And Derivative Claims • Government Focus On Individual Liability • Indemnification Issues 10
  • 11. What You Need in Place in Before, During & After • Management commitment • Clear lines of communication • Set infosec as an organizational priority • Specialized knowledge • Business compliance and continuity plans • Policies and procedures for data protection • Statutory compliance by industry/profession/location • Employee training/ response teams • WHEN THE INFORMATION SECURITY/CYBER PROBLEM HAPPENS (and it will) • 24/7 responsiveness w/ resources • Ability to contain harm/ calm management of crisis • Guidance on legal duties/notification/reputation management • Dealing with government bodies • Positioning/shaping facts w/future litigation in mind • Avoid exorbitant costs/ potential liabilities 11
  • 12. THINK IN THREE PHASES •Legal •Insurance •IT/Network •PR •Forensic Testing Before a Problem Arises •Legal •PR •Insurance •Forensic Investigation Responding to a Breach •Legal •PR •IT/Network Post Breach 12
  • 13. Questions / Contact Information: Glenn E. Davis Lead Partner HBCyberGroup www.HeplerBroom.com | glenn.davis@helperbroom.com Direct: 314.480.4154 | Mobile: 314.550.5122 13