Cyber Incident Response When You Didn t Have a Plan

Similar documents
Contract Fundamentals Part II

Preparing for a Divestiture: An In-house Counsel s Guide September 20, 2017

College and University Retirement Plan Fees and Controversial Class Action Litigation

Port Legal Issues Workshop

AN OVERVIEW. The Obama Agenda Labor Law Proposals. Obama/Pelosi Agenda Employment Law HEALTH, SAFETY AND OTHER

Cyber-Insurance: Fraud, Waste or Abuse?

We re Under Cyberattack Now What?! John Mullen, Partner/Co-founder, Mullen Coughlin Jason Bucher, Senior Underwriting Manager, Schinnerer Cyber

CYBERSECURITY AND PRIVACY: REDUCING YOUR COMPANY S LEGAL RISK. By: Andrew Serwin

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

RIMS Cyber Presentation

Evaluating Your Company s Data Protection & Recovery Plan

CYBER LIABILITY INSURANCE: CLAIMS ISSUES AND TRENDS THAT AUDITORS NEED TO KNOW

Cybersecurity Insurance: New Risks and New Challenges

Cybersecurity Insurance: The Catalyst We've Been Waiting For

Anatomy of a Data Breach

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

Cyber Risks & Cyber Insurance

Surprisingly, only 40 percent of small and medium-sized enterprises (SMEs) believe their

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

Edward J. Finn 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax:

Cybersecurity Threats: What Retirement Plan Sponsors and Fiduciaries Need to Know and Do

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

An Overview of Cyber Insurance at AIG

James E. Prendergast 1275 Drummers Lane, Suite 302 Office: Wayne, PA Fax:

Trends in Cyber-Insurance Coverage to Meet Insureds Needs

Cyberinsurance: Necessary, Expensive and Confusing as Hell. Presenters: Sharon Nelson and Judy Selby

PRIVACY AND CYBERSECURITY ISSUES IN M&A TRANSACTIONS

Sara Robben, Statistical Advisor National Association of Insurance Commissioners

Highlights of the Jobs And Growth Tax Relief Reconciliation Act of 2003 ("2003 Act")

DEBUNKING MYTHS FOR CYBER INSURANCE

Equifax Data Breach: Your Vital Next Steps

Cyber Risk Mitigation

SUMMARY: The Federal Trade Commission ( FTC or Commission ) requests public

Protecting Against the High Cost of Cyberfraud

L EW) S BRISBOIS BISGAARD. & SMITH LLP Fax: ATTORNEYS AT Law www, lewisbrisbols.com

Cyber Risk Management

Information Security and Third-Party Service Provider Agreements

University Data Policies

Port Jefferson Union Free School District. Annual Risk Assessment Update Pertaining to the Internal Controls Of District Operations.

HEALTHCARE INDUSTRY SESSION CYBER IND 011

August 18, Re: Security Incident Notice. Dear Attorney General Ferguson:

Cyber Liability Insurance for Sports Organizations

Cybersecurity and Personal Finance. Identity Theft by Sue Lynn Sasser

Tax Diligence, Representations, Covenants and Indemnifications in Business Acquisitions

Cyber Risks & Insurance

Insuring your online world, even when you re offline. Masterpiece Cyber Protection

Cyber Liability Launch Event Moscow

Launching a Hedge Fund: 10 Keys to Success. from marketing to technology, the top tips for achieving startup success

HIPAA COMPLIANCE ROADMAP AND CHECKLIST FOR BUSINESS ASSOCIATES

Hayes Connor Solicitors

Vaco Cyber Security Panel

Whitepaper: Cyber Liability Insurance Overview

945 East Paces Ferry Rd., Suite 1475, Atlanta, GA aptos.com

Nature of the Data Security Incident ALBUQUERQUE ATLANTA BEAUMONT BOSTON CHARLESTON CHICAGO DALLAS DENVER FORT LAUDERDALE HOUSTON LAQUINTA

Critical Issues in Cybersecurity:

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

M&A ACADEMY. Privacy and Data Security Issues in M&A Transactions. Ezra Church, Don Shelkey, Pulina Whitaker March 5, 2019

Hot Topics in Software as a Service and Cloud

Designing Privacy Policies and Identifying Privacy Risks for Financial Institutions. June 2016

Insurance Requirement Provisions in Technology Contracts: Mitigating Risk, Maximizing Coverage

Crowdfunding under the JOBS Act. Brian Korn November 27, 2012

MANAGING DATA BREACH

May 15, VIA

A GUIDE TO CYBER RISKS COVER

Insuring intangible assets: Is the insurance industry keeping pace with its customers changing requirements?

Cyber breaches: are you prepared?

Medical Data Security Beyond HIPAA: Practical Solutions for Red Flags and Security Breaches. April 3, 2009

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Largest Risk for Public Pension Plans (Other Than Funding) Cybersecurity

Mitigating the Existential Data Breach Risk A Complimentary LexisNexis Webinar March 12, 2014

Healthcare Data Breaches: Handle with Care.

The Wild West Meets the Future: Key Tips for Maximizing Your Cyber and Privacy Insurance Coverage

HEALTHCARE BREACH TRIAGE

NEW CYBER RULES FOR NEW YORK-BASED BANKING, INSURANCE AND FINANCIAL SERVICE FIRMS HAVE FAR-REACHING EFFECTS

Personal Information Protection Act Breach Reporting Guide

2016 Risk Practices Survey

RE \\I. NO'V o s 2ms. CONSUMER PROlECl\ON

Federal Reserve Bank of Philadelphia

Your defence toolkit. How to combat the cyber threat

July 6, Data Security Incident. Dear Assistant Attorney General Ferguson:

Excess Elite / Fast, simple, high performance

Data Breach and Cyber Risk Update November 17, 2011

Building a Program to Manage the Vendor Management Lifecycle

CYBER CLAIMS BRIEF A SEMI-ANNUAL PUBLICATION FROM YOUR WNA FINEX CLAIMS & LEGAL GROUP

PAI Secure Program Guide

Crawford & Company (Canada) Inc. Cyber Loss Management Program

NEGLIGENT SECURITY: WHAT YOU NEED TO KNOW ABOUT THEM

October 30, 2017 File No VIA ELECTRONIC SUBMISSION

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

SOX, Corporate Governance and Working with the Board

Aon Cyber Risk and Directors & Officers Forum CRM011

Business Associate Risk

CYBER LIABILITY REINSURANCE SOLUTIONS

Chapter 6 - Credit. Section 6.1

MICHIGAN STATE UNIVERSITY

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

Credit Card Data Breaches: Protecting Your Company from the Hidden Surprises

Transcription:

Cyber Incident Response When You Didn t Have a Plan April F. Doss Saul Ewing LLP

How serious is the cybersecurity threat? Some sobering numbers from 2015: Over half a billion personal records were stolen or lost Spear-phishing attacks targeting employees increased 55% Ransomware increased 35% 1 in 220 emails contained malware 431 million new varieties of malware were launched 78% of websites were vulnerable to cyber attack Some challenging trends: Mobile devices and bring your own device are greatly increasing cybersecurity risk Regulators and enforcement agencies are taking note: DHS OCR; FTC; FCC; SEC

What is the best response? One that s based on a plan Where the plan is: Tailored to your organization Tested through tabletop exercises and scenarios Trained for executives and line personnel Updated regularly And Puts relationships in place where needed With outside counsel With forensics experts With crisis communications firms But it doesn t always work that way

It s surprisingly easy Really? How can anyone not have a plan? They linger on a to-do list for too long The existing plan gets out of date People have turned over and no one remembers how to actually execute the actions in the plan Urgent trumps important in planning Resources (personnel time, funding) aren t available

How much does a cybersecurity incident cost? Two answers: It depends A lot Some data The average cost in 2015: $7 million per breach $221 per stolen record Biggest costs are often lost business Indirect costs outweight direct costs Regulated industries have the greatest costs But anyone with data on computers is at risk Some practical examples FTC decision In re LabMD, Aug. 10, 2016

Some quick wins to save money and reduce risk Know your IT Astonishing how many organizations don t have anyone who really knows their IT Where does different information map to? What internal access controls exist? Resist the temptation to DIY it Know the limits of what you know If you get contract help, read the contract carefully review indemnity clauses and manage vendor risk If you switch IT providers, get detailed documentation A forensic image might not be a bad idea

Don t Panic A cybersecurity incident creates a lot of chaos But it can be managed if you: Think fast Act deliberately Keep first things first And resist the temptation to DIY it Don t let the first incident you handle be your own Plenty of other people specialize in this: legal, forensics, crisis communications

So, you ve had an incident. What s first? Practical steps First: Do No Harm Act quickly towards three goals: Prevent the spread of damage (ransomware, unauthorized access, etc.) Assess what s at risk Understand your legal liability Some starting questions: What kind of incident is it? What kind of system has been compromised? How can you isolate that system and preserve information? What kind of data is at risk? What legal obligations are associated with that data?

What next? More practical steps Figure out who you need to call C-Suite? Board? Other leadership? Figure out how you re going to reach them Have work email accounts been compromised? Figure out what outside help you need Outside counsel? Forensics experts? Crisis communications/public relations? Think about attorney-client privilege early and often Advantages to having counsel run the investigation and engage outside consultants

What s next? Questions to ask What precipitated the event? External hacker? Carelessness? Disgruntled employee? Has any kind of information been compromised? Personally identifiable information? Financial account or payment card information? Protected health information? Protected student information? Intellectual property? From what kinds of entities? Customers Employees Others

What s next? More questions to ask What laws are you subject to? Sectoral laws? HIPAA Gramm-Leach-Bliley State breach laws? Often tied to residence of the subject of the PII For some states, location of business International laws? E.g., European customers or business components Deadlines? Some states have open-ended deadlines Others have very strict, rigid deadlines Some sectoral laws have strict deadlines Burden of proof?

What to expect when you re handling a breach Expect to be on the phone every day The facts can and should unfold quickly Counsel should be on all calls and emails Counsel should be directing the investigation Expect to think about privilege a lot Not everything done at counsel s direction will be privileged, but you risk waiving any claim of privilege if you don t preserve it at the outset Expect to ask lots of questions Especially about data inventory, file directories, network connections, backups of data, and burdens of proof If you re not comfortable knowing what IT-related questions to ask, bring in someone who is

What if you need to make notifications? Consider optional, as well as mandatory notification Should you reach out to law enforcement? FBI, Secret Service, local and state police What s involved in your notifications? Notice to enforcement agencies & regulators? Notice to individual victims? Call centers? Credit monitoring? Can you handle the logistical burden? Outside consultants can provide support services

What should be your internal after-actions? Like everything else, it depends But here are some general considerations in using this incident to be better prepared next time Internal issues: How complete was your data inventory? Can you now create or update a plan? Does leadership understand the importance of planning? Is the business identifying resources personnel and funding to put towards preparedness?

What should be your external after-actions? Respond to all regulatory and enforcement requirements Prepare for possibility of litigation Assess whether indemnification may be available From your IT or other vendor for lax cybersecurity? From your provider of employee background checks for not catching concerns about insider threat? Review all your third-party vendor contracts for any potential issues going forward Consider requiring vendor IT security questionnaires Consider incorporating security requirements Check indemnification provisions Update employee policies and training Good IT can t fix the problems created by bad habits

Where does that leave you? Do you now have a data inventory? Have you assessed your IT preparedness against future threats? Have you updated personnel and IT policies and training? Is training on those policies now required, regular, and effective? Have you created an incident response plan? Have you identified members of the incident response team? Have you set a schedule for reviewing, training, and exercising that plan?

Better prepared for a future You can t drive cybersecurity risk to zero But, with preparation, you can: Reduce the risks of: incident Financial impact Reputational damage Interruption to business operations Respond more quickly Recover more effectively At lower cost

Remember: An ounce of prevention is worth a pound of response But if you find yourself underprepared and having to react, these tips may prove helpful

Baltimore Lockwood Place 500 East Pratt Street, Suite 900 Baltimore, MD 21202-3171 (tel) 410.332.8600 (fax) 410.332.8862 Boston 131 Dartmouth Street, Suite 501 Boston, MA 02116 (tel) 617.723.3300 (fax) 617.723.4151 Chesterbrook 1200 Liberty Ridge Drive, Suite 200 Wayne, PA 19087-5569 (tel) 610.251.5050 (fax) 610.651.5930 Harrisburg Penn National Insurance Plaza 2 North Second Street, 7th Floor Harrisburg, PA 17101-1619 (tel) 717.257.7500 (fax) 717.238.4622 New York 245 Park Avenue, 24th Floor New York, NY 10167 (tel) 212.672.1995 (fax) 212.372.8798 Newark One Riverfront Plaza Newark, NJ 07102 (tel) 973.286.6700 (fax) 973.286.6800 Philadelphia Centre Square West 1500 Market Street, 38th Floor Philadelphia, PA 19102-2186 (tel) 215.972.7777 (fax) 215.972.7725 Pittsburgh One PPG Place 30th Floor Pittsburgh, PA 15222 (tel) 412.209.2500 (fax) 412.209.2570 Princeton 650 College Road East, Suite 4000 Princeton, NJ 08540-6603 (tel) 609.452.3100 (fax) 609.452.3122 Washington 1919 Pennsylvania Avenue, N.W. Suite 550 Washington, DC 20006-3434 (tel) 202.333.8800 (fax) 202.337.6065 Wilmington 1201 North Market Street Suite 2300 P.O. Box 1266 Wilmington, DE 19899 (tel) 302.421.6800 (fax) 302.421.6813