SlideShare a Scribd company logo
Complex Issues – Here to Stay
CyberGroup
cybersecurity/data breach/privacy™
Complex Issues — Here to Stay
• Sophisticated Threats, Evolving Technology, Internet of Things
• Healthcare—frequently attacked industry
• Ransomware attacks
• 100 million healthcare records compromised 2015 (credit card, email, SSN, employment, med history data)
• High price on black market “dark internet”
• Cyber thieves use data to launch spear phishing attacks, commit fraud, steal medical identities
• But no industry immune—
• Manufacturing (automotive, chemical, IP networks)
• Financial Services (consumer banking, mobile apps)
• Government (IRS and HHS breaches)
• Transportation (freight, shipping, air)
• Retail/Wholesale
• Professional Services (engineering, accounting, law firms)
2
Costs
• Predicting costs of data breaches--DIFFICULT--lack of quality data.
• High INTEREST among firms at risk, insurance carriers, researchers,
and social planners.
• Based on recent survey data estimates the average cost of a data
breach is around $6.5 million (or, $217 per record; Ponemon 2015).
• Averages may be misleading: median losses may be lower but still
significant.
• Similarly skewed values arise for phishing and security incidents.
• Privacy violations, however, account for a much larger median loss of
$1.3 million.
3
Statistics Do Not Account For:
• Business interruption
• Reputational loss
• Customer retention/loss
• Cost of allocation of resources/time
• Responding to private litigation
• Potential class actions
• Federal and state regulatory investigations
4
Dealing With Threats
• There is no 100%
• Compliance ≠ Security
• Prioritize business objectives w/in risk tolerance
• Management of contractual relationships/terms
• Proactive Security Plan with technology and policy
• Coordinated and tested incident response plan
• Prepare Response to the Inevitable Attack
• Understand threat landscape
• Access right resources and skills
• Promote Culture of Security Awareness
• Train
• Avoid careless mistakes
• Protect key IP and business assets
5
Legal Management Issues
• Effective Privacy Notices
• Industry Specific Regulations
• Federal
• State
• Assessment of Legal Duties/ Disclosure
• Determination of Key Areas for Cyberinsurance
• Contractual Matters
• Indemnification
• Limitation of Liability
• Risk Transfer
• Representations & Warranties
• Acquisitions- Due Diligence
6
Legal Ramifications
• PRIVATE LITIGATION
• Suppliers, commercial customers
• Third Parties (no privity)
• Consumers, individuals, class actions
• GOVERNMENT INVESTIGATIONS
• State laws/ Attorney General Actions
• Federal Laws/ FTC and Industry Specific Regulations
• Privacy Actions
• Criminal Violations
In federal courts approximately 1700 pending legal actions over 50% are private civil actions,
17% are criminal actions.
7
FTC Real Life Lessons
• LABMD, A clinical laboratory, experienced unusual data breaches that
compromised personal, medical information of 9300 consumers. The FTC’s
decision, relying on extensive expert testimony, found that from 2005 to 2010
LabMD failed to:
• maintain file integrity monitoring;
• provide intrusion detection;
• monitor digital traffic across its firewalls;
• delete no longer needed consumer data;
• provide security training to employees;
• implement a strong password policy (a number of employees used the same password
“labmd”);
• update its software to deal with known vulnerabilities;
• control administrative rights to employee laptops and allowed employees to download any
software, business related or not;
• prevent use of peer-to-peer software (LimeWire), which enabled download of a file
containing 1,718 pages of confidential information on approximately 9,300 consumers
8
Lessons From LABMD
• FTC has made it clear that any industry in possession of sensitive
consumer data (such as names, addresses, dates of birth, Social
Security numbers, and insurance information) will be required to
maintain reasonable data security practices
• Enforcement actions may result even if there has been no identifiable harm
to the subjects of such data.
• the FTC is going to assert its authority expansively and stay in the cyber cop
business.
• In a data breach case, no actual harm is necessary.
• Employers must train their employees on infoSEC
• COMPANIES MUST establish reasonable protocols commensurate with their
risk profile to try to protect against cyber intrusions.
9
Role Of Management And Board
• Duty To Maintain, Grow, And Protect The Assets Of The Company
• Public Company Risks
• Failure To Maintain Adequate Controls
• Failure To Disclose
• Failure To Investigate And Make Informed Judgments
• Shareholder Actions And Derivative Claims
• Government Focus On Individual Liability
• Indemnification Issues
10
What You Need in Place in Before,
During & After
• Management commitment
• Clear lines of communication
• Set infosec as an organizational priority
• Specialized knowledge
• Business compliance and continuity plans
• Policies and procedures for data protection
• Statutory compliance by industry/profession/location
• Employee training/ response teams
• WHEN THE INFORMATION SECURITY/CYBER PROBLEM HAPPENS (and it will)
• 24/7 responsiveness w/ resources
• Ability to contain harm/ calm management of crisis
• Guidance on legal duties/notification/reputation management
• Dealing with government bodies
• Positioning/shaping facts w/future litigation in mind
• Avoid exorbitant costs/ potential liabilities
11
THINK IN THREE PHASES
•Legal
•Insurance
•IT/Network
•PR
•Forensic
Testing
Before a
Problem
Arises
•Legal
•PR
•Insurance
•Forensic
Investigation
Responding
to a Breach
•Legal
•PR
•IT/Network
Post Breach
12
Questions / Contact Information:
Glenn E. Davis
Lead Partner
HBCyberGroup
www.HeplerBroom.com |
glenn.davis@helperbroom.com
Direct: 314.480.4154 | Mobile: 314.550.5122
13

More Related Content

What's hot

Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
William Gamble
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerceDamo Ward
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
Ujjwal Joshi
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
Raymond Cunningham
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
Charles Mok
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
AnuMarySunny
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
Kriscila Yumul
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
IISPEastMids
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
Hubbard Insurance Group
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...
Rabelani Dagada
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
MLG College of Learning, Inc
 

What's hot (19)

Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Review questions
Review questionsReview questions
Review questions
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
S719a
S719aS719a
S719a
 
Information system ethics
Information system ethicsInformation system ethics
Information system ethics
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...
 
Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2Information Assurance And Security - Chapter 3 - Lesson 2
Information Assurance And Security - Chapter 3 - Lesson 2
 

Viewers also liked

Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015Randy V. Miller
 
Bitten By Python
Bitten By PythonBitten By Python
Bitten By Python
Vijay Kumar Bagavath Singh
 
Super pac hacks for your library
Super pac hacks for your librarySuper pac hacks for your library
Super pac hacks for your library
Patrick "PC" Sweeney
 
India’s First SAS based SAN deployment
India’s First SAS based SAN deploymentIndia’s First SAS based SAN deployment
India’s First SAS based SAN deployment
Tyrone Systems
 
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
Christopher Mohritz
 
Almanática - O almanaque da Matemática
Almanática - O almanaque da MatemáticaAlmanática - O almanaque da Matemática
Almanática - O almanaque da MatemáticaProf. Materaldo
 
Regulamento Junte & Ganhe
Regulamento Junte & GanheRegulamento Junte & Ganhe
Regulamento Junte & Ganhe
diariocatarinense
 
Iskf Seminario Master Yaguchi 2013
Iskf Seminario Master Yaguchi 2013Iskf Seminario Master Yaguchi 2013
Iskf Seminario Master Yaguchi 2013
Jorge Noceda Moreno
 
Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Trabalho Multidisciplinar com Africanidade e Cultura Indígena Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Eduardo Mariño Rial
 
PDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation ServicesPDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation ServicesPDS Tech Inc.
 
Apresentação evarejo
Apresentação evarejoApresentação evarejo
Apresentação evarejo
Ederson Varejo
 
Fel Flyer F11
Fel Flyer F11Fel Flyer F11
Fel Flyer F11
chitlesh
 
Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )Sean Fitzgerald
 
Personal Work
Personal WorkPersonal Work
Personal Work
Tamas Aleandra Maria
 
I.E. AGROINDUSTRIAL LOS PASTOS
I.E. AGROINDUSTRIAL LOS PASTOSI.E. AGROINDUSTRIAL LOS PASTOS
I.E. AGROINDUSTRIAL LOS PASTOS
Nelly Garreta
 

Viewers also liked (20)

Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015Randy V MILLER-RESUME 2015
Randy V MILLER-RESUME 2015
 
Bitten By Python
Bitten By PythonBitten By Python
Bitten By Python
 
Super pac hacks for your library
Super pac hacks for your librarySuper pac hacks for your library
Super pac hacks for your library
 
India’s First SAS based SAN deployment
India’s First SAS based SAN deploymentIndia’s First SAS based SAN deployment
India’s First SAS based SAN deployment
 
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
Is 100 the New 60? Living Longer, Living Better. What's on the Horizon?
 
Almanática - O almanaque da Matemática
Almanática - O almanaque da MatemáticaAlmanática - O almanaque da Matemática
Almanática - O almanaque da Matemática
 
Test
TestTest
Test
 
Ahmed my gfmer course experience
Ahmed my gfmer course experienceAhmed my gfmer course experience
Ahmed my gfmer course experience
 
Dx bumil
Dx bumilDx bumil
Dx bumil
 
Regulamento Junte & Ganhe
Regulamento Junte & GanheRegulamento Junte & Ganhe
Regulamento Junte & Ganhe
 
Iskf Seminario Master Yaguchi 2013
Iskf Seminario Master Yaguchi 2013Iskf Seminario Master Yaguchi 2013
Iskf Seminario Master Yaguchi 2013
 
Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Trabalho Multidisciplinar com Africanidade e Cultura Indígena Trabalho Multidisciplinar com Africanidade e Cultura Indígena
Trabalho Multidisciplinar com Africanidade e Cultura Indígena
 
PDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation ServicesPDS Tech Inc. Aviation Services
PDS Tech Inc. Aviation Services
 
Apresentação evarejo
Apresentação evarejoApresentação evarejo
Apresentação evarejo
 
Fel Flyer F11
Fel Flyer F11Fel Flyer F11
Fel Flyer F11
 
Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )Sean's Resume 2015 (Linkedin update )
Sean's Resume 2015 (Linkedin update )
 
mark resume 2015
mark resume 2015mark resume 2015
mark resume 2015
 
Personal Work
Personal WorkPersonal Work
Personal Work
 
ford company
ford companyford company
ford company
 
I.E. AGROINDUSTRIAL LOS PASTOS
I.E. AGROINDUSTRIAL LOS PASTOSI.E. AGROINDUSTRIAL LOS PASTOS
I.E. AGROINDUSTRIAL LOS PASTOS
 

Similar to 74 x9019 bea legal slides short form ged12.12.16

Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
Resilient Systems
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
Patrick Florer
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Financial Poise
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
Financial Poise
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Chris Hails
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
Financial Poise
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
IT Governance Ltd
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Financial Poise
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
cliff_rudolph
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
stirlingvwriters
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
Ravindra Babu
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
The Network Support Company
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Financial Poise
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
Next Dimension Inc.
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
Quarles & Brady
 

Similar to 74 x9019 bea legal slides short form ged12.12.16 (20)

Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Introduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and RequirementsIntroduction to US Privacy and Data Security: Regulations and Requirements
Introduction to US Privacy and Data Security: Regulations and Requirements
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
IT risk discusion qustion.pdf
IT risk discusion qustion.pdfIT risk discusion qustion.pdf
IT risk discusion qustion.pdf
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 

Recently uploaded

Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
FernandoSimesBlanco1
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
gaelcabigunda
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 

Recently uploaded (20)

Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
Agrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quizAgrarian Reform Policies in the Philippines: a quiz
Agrarian Reform Policies in the Philippines: a quiz
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 

74 x9019 bea legal slides short form ged12.12.16

  • 1. Complex Issues – Here to Stay CyberGroup cybersecurity/data breach/privacy™
  • 2. Complex Issues — Here to Stay • Sophisticated Threats, Evolving Technology, Internet of Things • Healthcare—frequently attacked industry • Ransomware attacks • 100 million healthcare records compromised 2015 (credit card, email, SSN, employment, med history data) • High price on black market “dark internet” • Cyber thieves use data to launch spear phishing attacks, commit fraud, steal medical identities • But no industry immune— • Manufacturing (automotive, chemical, IP networks) • Financial Services (consumer banking, mobile apps) • Government (IRS and HHS breaches) • Transportation (freight, shipping, air) • Retail/Wholesale • Professional Services (engineering, accounting, law firms) 2
  • 3. Costs • Predicting costs of data breaches--DIFFICULT--lack of quality data. • High INTEREST among firms at risk, insurance carriers, researchers, and social planners. • Based on recent survey data estimates the average cost of a data breach is around $6.5 million (or, $217 per record; Ponemon 2015). • Averages may be misleading: median losses may be lower but still significant. • Similarly skewed values arise for phishing and security incidents. • Privacy violations, however, account for a much larger median loss of $1.3 million. 3
  • 4. Statistics Do Not Account For: • Business interruption • Reputational loss • Customer retention/loss • Cost of allocation of resources/time • Responding to private litigation • Potential class actions • Federal and state regulatory investigations 4
  • 5. Dealing With Threats • There is no 100% • Compliance ≠ Security • Prioritize business objectives w/in risk tolerance • Management of contractual relationships/terms • Proactive Security Plan with technology and policy • Coordinated and tested incident response plan • Prepare Response to the Inevitable Attack • Understand threat landscape • Access right resources and skills • Promote Culture of Security Awareness • Train • Avoid careless mistakes • Protect key IP and business assets 5
  • 6. Legal Management Issues • Effective Privacy Notices • Industry Specific Regulations • Federal • State • Assessment of Legal Duties/ Disclosure • Determination of Key Areas for Cyberinsurance • Contractual Matters • Indemnification • Limitation of Liability • Risk Transfer • Representations & Warranties • Acquisitions- Due Diligence 6
  • 7. Legal Ramifications • PRIVATE LITIGATION • Suppliers, commercial customers • Third Parties (no privity) • Consumers, individuals, class actions • GOVERNMENT INVESTIGATIONS • State laws/ Attorney General Actions • Federal Laws/ FTC and Industry Specific Regulations • Privacy Actions • Criminal Violations In federal courts approximately 1700 pending legal actions over 50% are private civil actions, 17% are criminal actions. 7
  • 8. FTC Real Life Lessons • LABMD, A clinical laboratory, experienced unusual data breaches that compromised personal, medical information of 9300 consumers. The FTC’s decision, relying on extensive expert testimony, found that from 2005 to 2010 LabMD failed to: • maintain file integrity monitoring; • provide intrusion detection; • monitor digital traffic across its firewalls; • delete no longer needed consumer data; • provide security training to employees; • implement a strong password policy (a number of employees used the same password “labmd”); • update its software to deal with known vulnerabilities; • control administrative rights to employee laptops and allowed employees to download any software, business related or not; • prevent use of peer-to-peer software (LimeWire), which enabled download of a file containing 1,718 pages of confidential information on approximately 9,300 consumers 8
  • 9. Lessons From LABMD • FTC has made it clear that any industry in possession of sensitive consumer data (such as names, addresses, dates of birth, Social Security numbers, and insurance information) will be required to maintain reasonable data security practices • Enforcement actions may result even if there has been no identifiable harm to the subjects of such data. • the FTC is going to assert its authority expansively and stay in the cyber cop business. • In a data breach case, no actual harm is necessary. • Employers must train their employees on infoSEC • COMPANIES MUST establish reasonable protocols commensurate with their risk profile to try to protect against cyber intrusions. 9
  • 10. Role Of Management And Board • Duty To Maintain, Grow, And Protect The Assets Of The Company • Public Company Risks • Failure To Maintain Adequate Controls • Failure To Disclose • Failure To Investigate And Make Informed Judgments • Shareholder Actions And Derivative Claims • Government Focus On Individual Liability • Indemnification Issues 10
  • 11. What You Need in Place in Before, During & After • Management commitment • Clear lines of communication • Set infosec as an organizational priority • Specialized knowledge • Business compliance and continuity plans • Policies and procedures for data protection • Statutory compliance by industry/profession/location • Employee training/ response teams • WHEN THE INFORMATION SECURITY/CYBER PROBLEM HAPPENS (and it will) • 24/7 responsiveness w/ resources • Ability to contain harm/ calm management of crisis • Guidance on legal duties/notification/reputation management • Dealing with government bodies • Positioning/shaping facts w/future litigation in mind • Avoid exorbitant costs/ potential liabilities 11
  • 12. THINK IN THREE PHASES •Legal •Insurance •IT/Network •PR •Forensic Testing Before a Problem Arises •Legal •PR •Insurance •Forensic Investigation Responding to a Breach •Legal •PR •IT/Network Post Breach 12
  • 13. Questions / Contact Information: Glenn E. Davis Lead Partner HBCyberGroup www.HeplerBroom.com | glenn.davis@helperbroom.com Direct: 314.480.4154 | Mobile: 314.550.5122 13