Renaissance Executive Forums 2019 CEO Summit presentation by Shawn E. Tuma, Co-Chair, Data Privacy & Cybersecurity Group, Spencer Fane, LLP
March 7, 2019
Dallas, Texas
7. Spencer Fane LLP | spencerfane.com
Cyber Incident Response Checklist
1. Determine whether to escalate incident
2. Begin documenting decisions and actions
3. Begin mitigation of compromise
4. Phish all workforce (esp. leadership).
5. Engage experienced legal counsel to guide through
the process, determine privilege vs. disclosure
tracks, likelihood of “breach”
6. Activate Incident Response Plan and notify and
convene Incident Response Team
7. Notify cyber insurance carrier
8. Notify affected business partners per contractual
obligations
9. Engage forensics to mitigate continued harm,
gather evidence, and investigate
10. Assess scope and nature of data compromised
11. Preliminarily determine legal obligations based on
type of data and jurisdictions
12. Determine whether to notify law enforcement
13. Begin preparing public relations message
14. Engage notification / credit services vendor
15. Investigate whether data has been truly “breached”
16. Determine when notification “clock” started
17. Remediate and protect against future breaches
18. Confirm notification / remediation obligations
19. Determine proper remediation services
20. Assemble contact information for notifications
21. Prepare notification letters, frequently asked
questions, and call centers
22. Plan and time notification “drop”
23. Implement public relations strategy
24. Administrative reporting (Ags, HHS, FTC, SEC)
25. Implement Cyber Risk Management Program
8. Spencer Fane LLP | spencerfane.com
Is it really always the Russians?
• 63% confirmed breaches from weak, default, or
stolen passwords
• Data is lost over 100x more than stolen
• Phishing used most to install malware
Easily Avoidable Incidents
91% in 2015
91% in 2016
93% in 2017
9. Spencer Fane LLP | spencerfane.com
Common Cybersecurity Best Practices
1. Risk assessment.
2. Policies and procedures focused on
cybersecurity.
– Social engineering, password, security
questions
3. Training of all workforce on P&P, then
security.
4. Phish all workforce (esp. leadership).
5. Multi-factor authentication.
6. Signature based antivirus and malware
detection.
7. Encrypt your devices.
8. Internal controls / access controls.
9. No outdated or unsupported software.
10. Security patch updates management policy.
11. Backups segmented offline, cloud,
redundant.
12. Incident response plan.
13. Encrypt sensitive and air-gap hypersensitive
data.
14. Adequate logging and retention.
15. Third-party security risk management
program.
16. Firewall, intrusion detection and prevention
systems.
17. Managed services provider (MSP) or
managed security services provider (MSSP).
18. Cyber risk insurance.
10. Spencer Fane LLP | spencerfane.com
What is
reasonable
cybersecurity?
Too little – “just
check the box”
Too much –
“boiling the ocean”
12. Spencer Fane LLP | spencerfane.com
Cyber / Privacy Risk Insurance
Key presumptions about cyber
insurance:
• If you don’t know you have it, you don’t.
• If your broker doesn’t really “get” cyber, you don’t have the right
coverage.
• If you don’t know you can use your lawyer, you can’t.
13. Spencer Fane LLP | spencerfane.com
Shawn Tuma
Co-Chair, Cybersecurity & Data Privacy
Spencer Fane LLP
972.324.0317
stuma@spencerfane.com
• Board of Directors & General Counsel, Cyber Future
Foundation
• Board of Advisors, SMU Cyber Program
• Board of Advisors, North Texas Cyber Forensics Lab
• Policy Council, National Technology Security Coalition
• Practitioner Editor, Bloomberg BNA – Texas
Cybersecurity & Data Privacy Law
• Cybersecurity & Data Privacy Law Trailblazers,
National Law Journal (2016)
• SuperLawyers Top 100 Lawyers in Dallas (2016)
• SuperLawyers 2015-18
• Best Lawyers in Dallas 2014-18, D Magazine
(Cybersecurity Law)
• Council, Computer & Technology Section, State Bar of
Texas
• Privacy and Data Security Committee of the State Bar of
Texas
• College of the State Bar of Texas
• Board of Directors, Collin County Bench Bar Conference
• Past Chair, Civil Litigation & Appellate Section, Collin
County Bar Association
• Information Security Committee of the Section on
Science & Technology Committee of the American Bar
Association
• North Texas Crime Commission, Cybercrime Committee
& Infragard (FBI)
• International Association of Privacy Professionals (IAPP)