SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Legal Toolkit
Recovery
from Cyber Attack
October 2016
www.linkedin.com/company/cyber-rescue-alliance
First presented in Oct 2016. For other presentations at this event
www.linkedin.com/company/cyber-rescue-alliance
Cyber Attacks
Dr Sam De Silva
Partner – Head of the Commercial IT &
Outsourcing Group, Nabarro LLP
International Advisory Board – Cyber Rescue
Alliance
13 October 2016
A Legal Toolkit to Manage Risk
• Action on becoming aware of breach
• Notification
• Contractual analysis – breach caused by a counter-party to a contract
• Further investigations and lessons learned
• Key action points
Outline
• Mobilise the Incident Response Team (IRT) and implement Response Plan
• Specialists across the business:
– HR, IT, security (IT and physical), legal, compliance, PR
– internal and external (particularly, IT, PR and legal)
– appropriate seniority
• Trained in advance (and rehearsed various scenarios)
• Clear about who is taking ultimate responsibility
• Need to understand and be aware of sector specific legislation / guidance
• Work with external lawyers to manage the creation and distribution of documents during the
response to the incident to maintain both confidentiality and privilege in documents
containing legal advice
Immediately after Becoming Aware
of an Attack
• Implement the steps required to stop or contain breach
• Many attacks are on-going and repeated - may involve the temporary suspension of
affected systems or websites
• If the ICO is notified or becomes involved in a data security breach:
– will want to know what has been done to stop or mitigate the breach
– what the business will do to ensure future compliance
Initial Damage Limitation
• Verification
• What has happened to the data
• The type of data affected
• The degree of sensitivity of the data
• Any protections in place, such as encryption
• How many individuals involved
• Who are the individuals
• The potential detriment to individuals
Breach Impact and Risk
Assessment
• Seek legal advice
– Payment of ransom may be a criminal offence
• Validation
• Technical solutions
Responding to Threats and
Extortion
• ICO / Regulators
– no regulatory obligation to notify ICO [current law]
– notification for "serious breaches“
 a large volume of personal data is involved and there is a real risk of
individuals suffering some harm
 breach concerns information that if released could cause a significant risk of
individuals suffering substantial detriment - sensitive personal data
– legal requirements to notify, under sector-specific legislation
– contractual requirements to notify
• Insurers
• Bank / credit card companies
• Police
• Data subjects
Consider who Needs to be Notified
• ICO cautions against the dangers of "over notifying" data subjects
• Need to consider:
– how notification could help the individual
– providing assistance in dealing with practical issues, e.g. identity fraud checking services
– most appropriate way to notify, taking into account the security of the medium as well as
the urgency of the situation
• Notification could include
– a description of how and when the breach occurred
– what data was involved
– details of what has already done to respond to the risks posed by the breach
– contact details for further information or to ask questions, such as a helpline number or
web address
• Seek legal advice prior to any notification
Notifying Data Subjects
• Do you have a claim for breach of a specific data protection or security obligation?
• Consider a claim or any liability for breach of confidence or a failure to take reasonable skill
and care
• Does the breach give rise to a right to claim damages?
• Is the value of the claim limited by the contractual limit of liability?
• Are the costs incurred as a result of the breach recoverable?
• Can any liability you may have following the sanctions taken by the ICO be transferred to the
data processor?
Check the Contract (1)
Breach caused by a counter-party to a contract
• Does the breach give rise to a right to terminate the contract?
• Consider whether the breach is sufficiently serious to give rise to the right to
terminate the contract at common law for repudiatory breach
• Does the data security breach trigger any other aspects of the contract, such as
audit rights or the implementation of business continuity and disaster recovery
plans?
• Are there are any specific contractual administration matters that need to be
observed to preserve rights, such as compliance with notice provisions or prescribed
alternative dispute resolution procedures?
Check the Contract (2)
Breach caused by a counter-party to a contract
• Investigation to include a review of whether appropriate security policies and
procedures were in place – were they were followed?
• Where one or more data processors may have caused the breach, consider whether
adequate contractual obligations were in place to comply with the DPA – are they in
breach of contract?
• Where security is found not to be appropriate for the purpose of the DPA, consider
what action needs to be taken to raise data protection and security compliance
standards to comply with the DPA
• If the ICO is notified or becomes involved in a data security breach - likely to request
this information
Further Investigations and
Lessons Learned
• Verify the breach
• Determine the extent of the breach
• Contain the breach
• Consider what data is affected, if any, and what risks arise as a result
• Consider whether there is a compulsory requirement to inform anyone (regulators, data subjects,
suppliers, and so on) of the breach, or if there are good reasons to do so even if there is not
• Consider any communications in the light of regulatory requirements, public relations
considerations and litigation risk
• Review and modify systems and processes in the light of the experience to limit the risk of
reoccurrence and to make sure the response is as effective as possible if it does
Key Action Points
Dr Sam De Silva
T +44 (0)20 7524 6223
s.desilva@nabarro.com
Thank You
Bespoke Commercial
Response Plan
Commercial Coach for
Cyber Attack Response
Cyber Rescue Alliance
Practice your Response
in Executive Simulations
Example Alliance Partners
Security Scorecard to
auto review Suppliers
Cost effective online
Staff Training
SEC-1 to conduct
penetration testing
Join Cyber Rescue
Cyber Rescue is a Membership organisation that helps CEOs lead recovery from cyber attack.
Cyber Rescue operates in 9 countries across Europe, helping leaders protect reputation and
revenues when hackers break through.
Members benefit from Executive Role Plays, bespoke Commercial Response Plans, and expert
Coaching during a catastrophic breach. Cyber Rescue's advisors have led response to
thousands of cyber attacks and hundreds of breaches. The Cyber Rescue team have expertise
the many functional areas that are impacted by a successful cyber attack, for example Legal,
PR, HR, Operations, Finance and Customer Service, as well as IT Forensics and Remediation.
+44 (0)20 7859 4320
www.linkedin.com/company/cyber-rescue-alliance

Weitere ähnliche Inhalte

Was ist angesagt?

2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
Phil Agcaoili
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
PECB
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
ITSM Academy, Inc.
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on Security
Ina Luft
 

Was ist angesagt? (20)

Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
 
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
 
Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on Security
 
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
 

Ähnlich wie Cyber Recovery - Legal Toolkit

Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Lisa Abe-Oldenburg, B.Comm., JD.
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
Surendhar57
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
William Tanenbaum
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
Matthew Rosenquist
 

Ähnlich wie Cyber Recovery - Legal Toolkit (20)

How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
My_notes_part1.pdf
My_notes_part1.pdfMy_notes_part1.pdf
My_notes_part1.pdf
 
William A. Tanenbaum Association of Benefit Administrators April 2015
William A. Tanenbaum  Association of Benefit Administrators April 2015William A. Tanenbaum  Association of Benefit Administrators April 2015
William A. Tanenbaum Association of Benefit Administrators April 2015
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
#7 Insurance
#7 Insurance#7 Insurance
#7 Insurance
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 

Mehr von Kevin Duffey

Mehr von Kevin Duffey (20)

Cyber Insights from 100 surveys
Cyber Insights from 100 surveysCyber Insights from 100 surveys
Cyber Insights from 100 surveys
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
Ensuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance SectorEnsuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance Sector
 
Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022
 
Best Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveysBest Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveys
 
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so LowBreaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so Low
 
Cyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptxCyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptx
 
Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022
 
Breaches Anticipated - because firms have weak cyber security visible to hac...
Breaches Anticipated  - because firms have weak cyber security visible to hac...Breaches Anticipated  - because firms have weak cyber security visible to hac...
Breaches Anticipated - because firms have weak cyber security visible to hac...
 
Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022
 
Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial Services
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
 
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
 
Cyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersCyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and Suppliers
 
London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 Executives
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Kürzlich hochgeladen (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 

Cyber Recovery - Legal Toolkit

  • 1. Legal Toolkit Recovery from Cyber Attack October 2016 www.linkedin.com/company/cyber-rescue-alliance
  • 2. First presented in Oct 2016. For other presentations at this event www.linkedin.com/company/cyber-rescue-alliance
  • 3. Cyber Attacks Dr Sam De Silva Partner – Head of the Commercial IT & Outsourcing Group, Nabarro LLP International Advisory Board – Cyber Rescue Alliance 13 October 2016 A Legal Toolkit to Manage Risk
  • 4. • Action on becoming aware of breach • Notification • Contractual analysis – breach caused by a counter-party to a contract • Further investigations and lessons learned • Key action points Outline
  • 5. • Mobilise the Incident Response Team (IRT) and implement Response Plan • Specialists across the business: – HR, IT, security (IT and physical), legal, compliance, PR – internal and external (particularly, IT, PR and legal) – appropriate seniority • Trained in advance (and rehearsed various scenarios) • Clear about who is taking ultimate responsibility • Need to understand and be aware of sector specific legislation / guidance • Work with external lawyers to manage the creation and distribution of documents during the response to the incident to maintain both confidentiality and privilege in documents containing legal advice Immediately after Becoming Aware of an Attack
  • 6. • Implement the steps required to stop or contain breach • Many attacks are on-going and repeated - may involve the temporary suspension of affected systems or websites • If the ICO is notified or becomes involved in a data security breach: – will want to know what has been done to stop or mitigate the breach – what the business will do to ensure future compliance Initial Damage Limitation
  • 7. • Verification • What has happened to the data • The type of data affected • The degree of sensitivity of the data • Any protections in place, such as encryption • How many individuals involved • Who are the individuals • The potential detriment to individuals Breach Impact and Risk Assessment
  • 8. • Seek legal advice – Payment of ransom may be a criminal offence • Validation • Technical solutions Responding to Threats and Extortion
  • 9. • ICO / Regulators – no regulatory obligation to notify ICO [current law] – notification for "serious breaches“  a large volume of personal data is involved and there is a real risk of individuals suffering some harm  breach concerns information that if released could cause a significant risk of individuals suffering substantial detriment - sensitive personal data – legal requirements to notify, under sector-specific legislation – contractual requirements to notify • Insurers • Bank / credit card companies • Police • Data subjects Consider who Needs to be Notified
  • 10. • ICO cautions against the dangers of "over notifying" data subjects • Need to consider: – how notification could help the individual – providing assistance in dealing with practical issues, e.g. identity fraud checking services – most appropriate way to notify, taking into account the security of the medium as well as the urgency of the situation • Notification could include – a description of how and when the breach occurred – what data was involved – details of what has already done to respond to the risks posed by the breach – contact details for further information or to ask questions, such as a helpline number or web address • Seek legal advice prior to any notification Notifying Data Subjects
  • 11. • Do you have a claim for breach of a specific data protection or security obligation? • Consider a claim or any liability for breach of confidence or a failure to take reasonable skill and care • Does the breach give rise to a right to claim damages? • Is the value of the claim limited by the contractual limit of liability? • Are the costs incurred as a result of the breach recoverable? • Can any liability you may have following the sanctions taken by the ICO be transferred to the data processor? Check the Contract (1) Breach caused by a counter-party to a contract
  • 12. • Does the breach give rise to a right to terminate the contract? • Consider whether the breach is sufficiently serious to give rise to the right to terminate the contract at common law for repudiatory breach • Does the data security breach trigger any other aspects of the contract, such as audit rights or the implementation of business continuity and disaster recovery plans? • Are there are any specific contractual administration matters that need to be observed to preserve rights, such as compliance with notice provisions or prescribed alternative dispute resolution procedures? Check the Contract (2) Breach caused by a counter-party to a contract
  • 13. • Investigation to include a review of whether appropriate security policies and procedures were in place – were they were followed? • Where one or more data processors may have caused the breach, consider whether adequate contractual obligations were in place to comply with the DPA – are they in breach of contract? • Where security is found not to be appropriate for the purpose of the DPA, consider what action needs to be taken to raise data protection and security compliance standards to comply with the DPA • If the ICO is notified or becomes involved in a data security breach - likely to request this information Further Investigations and Lessons Learned
  • 14. • Verify the breach • Determine the extent of the breach • Contain the breach • Consider what data is affected, if any, and what risks arise as a result • Consider whether there is a compulsory requirement to inform anyone (regulators, data subjects, suppliers, and so on) of the breach, or if there are good reasons to do so even if there is not • Consider any communications in the light of regulatory requirements, public relations considerations and litigation risk • Review and modify systems and processes in the light of the experience to limit the risk of reoccurrence and to make sure the response is as effective as possible if it does Key Action Points
  • 15. Dr Sam De Silva T +44 (0)20 7524 6223 s.desilva@nabarro.com Thank You
  • 16. Bespoke Commercial Response Plan Commercial Coach for Cyber Attack Response Cyber Rescue Alliance Practice your Response in Executive Simulations
  • 17. Example Alliance Partners Security Scorecard to auto review Suppliers Cost effective online Staff Training SEC-1 to conduct penetration testing
  • 18. Join Cyber Rescue Cyber Rescue is a Membership organisation that helps CEOs lead recovery from cyber attack. Cyber Rescue operates in 9 countries across Europe, helping leaders protect reputation and revenues when hackers break through. Members benefit from Executive Role Plays, bespoke Commercial Response Plans, and expert Coaching during a catastrophic breach. Cyber Rescue's advisors have led response to thousands of cyber attacks and hundreds of breaches. The Cyber Rescue team have expertise the many functional areas that are impacted by a successful cyber attack, for example Legal, PR, HR, Operations, Finance and Customer Service, as well as IT Forensics and Remediation. +44 (0)20 7859 4320 www.linkedin.com/company/cyber-rescue-alliance

Hinweis der Redaktion

  1. Welcome, to CEOs leading Recovery from Cyber Attack.
  2. Welcome, to CEOs leading Recovery from Cyber Attack.