SlideShare a Scribd company logo
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │1
GOOD. SMART.BUSINESS. PROFIT.
TM
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │2
CORPORATE CYBERATTACKS: MANAGING RISK
TO AVOID REPUTATIONAL HARM
September 18, 2014
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │3
Chelsie Chmela
Events Manager
Chelsie.Chmela@ethisphere.com
We encourage you to engage during the Q&A portion of today’s webcast by using
the “Submit Question” button located within your West LegalEdcenter experience
or the Chat Box in ReadyTalk
HOST
QUESTIONS
MATERIALS Included in your registration:
• Event recording and deck: West LegalEdcenter provides on-demand event
access for 180 days or until the end of your subscription, if sooner. Ethisphere
will provide the recording and presentation deck following the live event to
ReadyTalk attendees.
3
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │4
Stuart Levi
Partner
Skadden, Arps, Slate Meagher & Flom LLP & Affliates
Devon Kerr
Senior Consultant
Mandiant
SPEAKING TODAY
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │5
Beijing
Boston
Brussels
Chicago
Frankfurt
Hong Kong
Houston
London
Los Angeles
Moscow
Munich
New York
Palo Alto
Paris
São Paulo
Shanghai
Singapore
Sydney
Tokyo
Toronto
Washington, D.C.
Wilmington
Privacy and Cybersecurity 2014:
The Current State of Affairs
•Presented by
•Stuart Levi
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │6
PRIVACY V. CYBERSECURITY
• Privacy policy
compliance
• Big data mining
• Privacy regulations
• Internet of things
• Do not track
• Location data
• Global enforcement
Privacy
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │7
PRIVACY V. CYBERSECURITY
• Data breaches
• Non-data cyber theft
• Denial of service attacks
• Compliance with security
policies
• NIST guidelines
Cybersecurity
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │8
PRIVACY V. CYBERSECURITY
Government Spying
• Snowden revelations
• Access to records through
public companies
• Government monitoring
• Global implications
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │9
PRIVACY V. CYBERSECURITY
PRIVACY CYBERSECURITY
Government
spying
Data
Breaches
Increased
demands
for
privacy
regulation
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │10
THE REALITY COMPANIES FACE TODAY
• Data breaches and cyberattacks are increasingly common.
• More companies are considered “targets of choice.”
• A large segment of the security community has adopted
an “assume you’ve been breached” mentality.
• Attacks are from:
− Hackers looking to profit
− State-sponsored organizations
− Hackers looking to wreak havoc
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │11
THE REALITY COMPANIES FACE TODAY
• Attacks are not limited to personal information:
− Theft of intellectual property
− Theft of business information
− Denial of service attacks
• No industry is immune from attack.
• Rapid detection has become as important as threat prevention.
− Each day the threat is not detected, the level of damage and harm increases
• Locating the source of the harm is becoming more difficult
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │12
THE REALITY COMPANIES FACE TODAY
• Informative statistics from the Verizon 2013 Data Breach
Investigations Report:
− 78% of intrusions were rated as “low difficulty”
− 69% discovered by external parties
− 66% took multiple months to discover
− 75% are considered opportunistic attacks
− 80% involved authentication based attacks
• Each statistic presents a potential liability risk.
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │13
KEY LEGAL THREATS TODAY
• FTC enforcement activity
− “Misleading” consumers by “promising” industry-standard or robust security
− Inadequate security protection
• Shareholder litigation
− For any cybersecurity loss (not just data breaches)
» Denial of service
» Loss of intellectual property or confidential information
• Data breach class actions
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │14
THE RESPONSE CLOCK HAS
ACCELERATED
HISTORICAL PRACTICE
COMPANIES OFTEN
DELAYED NOTICE UNTIL
FULL FORENSIC
ANALYSIS WAS DONE
» Provided time to formulate a
response and manage PR,
communications and legal
» Companies often hopeful that
forensics analysis would reveal
notice was not required
» Sometimes delay was required
by law enforcement,
but this was the exception
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │15
THE RESPONSE CLOCK HAS
ACCELERATED
• Today, companies face a new and pressing reality:
− Privacy advocates/activists
» Learning of breaches and threatening to go public if the
company does not disclose
» Generally unsympathetic to pleas that the company
needs more time to formulate its response
− Insurance plans may require prompt notice
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │16
DATA SECURITY CLASS ACTIONS
ARE ON THE RISE
• Plaintiffs’ lawyers are looking to cash in on the increase in
data security breaches at retailers, banks and other
institutions.
• Their tool of choice: large-scale class actions based around
theories of alleged damage to consumers’ privacy.
• While relatively few cases have been filed so far, the number
will undoubtedly grow.
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │17
THE FTC AND PLAINTIFF
LAWYERS NEED A HOOK
• The company failed to install or implement adequate
security protections.
− Were there internal or consultant recommendations that were ignored?
• The company “misled” customers about the level of its security.
• The company’s procedures or policies were lacking or not followed.
− Security policies
− Vendor policies
• C-suite and/or board was not adequately kept apprised of
security procedures.
• The company took too long to provide notice of a data breach or to
respond to an attack
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │18
KEY TAKEAWAY
The goal of every company today should be to
eliminate as many of these hooks as possible
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │19
STEPS EVERY COMPANY
SHOULD BE TAKING TODAY
• Privacy audit and implementation
• Risk assessment
• Establish a rapid response team
• Testing
• Privacy by design
• Evaluate insurance coverage
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │20
PRIVACY AUDITS
• Typically performed by a law firm and/or external consultant
− External advisers see issues that are hidden to
companies
» View each issue from a “what if” lawsuit perspective
− “Good fact” in the event of a litigation
− External advisers have the benefit of seeing best
practices at other companies
− Provides regulators with comfort
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │21
PRIVACY AUDITS
• Key Steps:
− Where is data coming into the company?
− How is data used and what controls are in place?
− How are security decisions made and implemented?
− Do internal and external privacy policies align with actual practice?
» Very often they do not
− What is the company saying about its security practices?
− What is the company disclosing in its public filings?
− How are company executives and board members kept informed?
− How mature is the privacy program?
− What sort of training/retraining is provided?
• Critical Step: Need to act on audit recommendations
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │22
RISK ASSESSMENT
• What types of personal information could be compromised?
• Is there a risk of confidential information being compromised?
• What is the potential for lost business?
• Is there a potential for regulatory scrutiny?
• Is there a potential for fines and penalties?
• What is the potential for damage to reputation/loss
of trust/media publicity?
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │23
ESTABLISHING A RAPID RESPONSE TEAM
• Critical in a world where you may lose control of
the response timing
• Key stakeholders will bring unique and important perspectives
− IT, legal, security, PR/communications, HR, risk management,
corporate management, government relations
• Scrambling to figure out the team once an incident occurs is
inefficient and dramatically increases the risk of a misstep
• Create a playbook of how incidents will be handled
• Understand the data breach notification requirements
• Understand SEC disclosure obligations
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │24
TESTING
• Critical to test your incident response plan at least
semi-annually
− Consider different scenarios
• Consider creating a report of areas to improve
− But assess the risks of creating such a report
• Assess roles and responsibilities
− Did people leave?
− Was there any internal restructuring?
− Were new systems implemented?
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │25
TESTING
• Update process documents
• Review third-party vendor contacts
» PR
» Forensics
» Notification
» Legal
− Are these still the right contacts?
• Any changes to law
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │26
PRIVACY BY DESIGN
• Area of focus for the FTC
» Companies should maintain comprehensive data management procedures
throughout the life cycle of their products and services
• Now a critical area for risk mitigation
• Key ideas:
− Proactive not reactive
− Privacy embedded into the design process
− Visibility and transparency within the organization
− Privacy and security as part of the corporate culture
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │27
EVALUATE INSURANCE COVERAGE
CRITICAL AREAS OF
CYBER INSURANCE
− Network security liability (third
party)
− Privacy liability (third party)
− Professional liability (third party)
− Notification costs
− Regulatory defense
− Data loss/recreation
− Business Interruption
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │28
Skadden, Arps, Slate, Meagher & Flom LLP & Affiliates
Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │29
Devon Kerr Senior Consultant
© Copyright 2010
 Introductions
 Overview
 Building an investigation-ready environment
 During an intrusion
 Post-incident activities
 Q&A
Introduction Slide
30
© Copyright 2010
All information is derived from MANDIANT
observations in non-classified
environments
Some information has been sanitized to
protect our clients’ interests
Important note
31
© Copyright 2010
DEVON KERR
 Former IT operations (10+
years)
 Lead investigator and
forensic analyst
 Develop internal training for
Mandiant consultants
 More than15 investigations
this year
32
Introductions
© Copyright 2010
 Build an investigation-ready environment:
− Logging and monitoring
− Fundamental security controls
− Important procedures
Preparing for a breach
33
© Copyright 2010
 Before the breach…
− Centralize logs and alerts into a unified dashboard
 Consolidation reduces effort and increases efficiency
 Collect logs for user logins of all kinds
 Increase the amount of logs retained
 Make sure you can actually get the logs out of the system
− Implement application whitelisting on all critical
systems
 Ensures that only approved software will run
 Easiest and cheapest way to slow down an attacker
 Good for detecting attackers if you centralize these logs, too!
Investigation readiness
34
© Copyright 2010
 Before the breach…(continued)
− Know where your data is
 Intellectual property, financial data, competitive business data
(sales, marketing, business logic)
 Know the role of critical systems
− Identify Internet points of presence
 Egress points for user Internet access
 VPN devices
 Direct connections to service providers and partners
 DMZs
− Patch operating system and third party software
 Critical vulnerabilities should be patched within 2 days
Investigation readiness
35
© Copyright 2010
 Before the breach…(continued)
− Harden the environment
 Block network traffic leaving your environment that doesn’t
have a known business purpose
 Strengthen systems administration by using dedicated
management systems
 Identify all users with admin-level privileges and revoke those
rights
 Domain administrators shouldn’t use privileged accounts for
regular computer and network activities – only administration
 Implement a second factor of authentication, like a token, for
remote access (VPN)
Investigation readiness
36
© Copyright 2010
 Facilitating the investigation
− Respond to requests quickly
 Identifying the function of a system
 Identifying all systems which may contain a specific type of
data (PII, finacial records, etc)
 Be able to search logs on-demand
 Ex: search all log sources for an IP address
 Be able to share logs with investigators
 Ex: provide a copy of all VPN logs
During an incident
37
© Copyright 2010
 Remediating
− Work with investigators to develop a remediation plan
that includes short-term tactical and longer-term
strategic objectives
 Block malicious IP addresses
 Sinkhole malicious domain names
 Take infected systems offline and rebuild
 Perform an enterprise password reset
 …
During an incident
38
© Copyright 2010
 When the smoke clears
− Determine notification requirements based on incident
type, jurisdiction, and industry
− Develop a coordinated message for the public
 Understand that the public may include clients, regulatory
bodies, and shareholders
− Conduct a lessons learned exercise
− Develop metrics
 Time from incident to detection, detection to investigation,
detection to remediation, etc
 Review metrics after each incident
Post-incident activities
39
© Copyright 2010
Q&A
40
© Copyright 2010
Devon Kerr Senior Consultant
© Copyright 2010
Q&A
© Copyright 2010
This webcast and all future Ethisphere webcasts are
available complimentary and on demand for BELA
members. BELA members are also offered complimentary
registration to Ethisphere’s Global Ethics Summit and
other Summits around the world.
For more information on BELA contact:
Laara van Loben Sels
Senior Director, Engagement Services
laara.vanlobensels@ethisphere.com
480.397.2663
Business Ethics Leadership
Alliance (BELA)
© Copyright 2010
October 30, 2014
Cyber-Security, IP Theft and Data Breaches:
Practical Steps to Protect Corporate Assets
Internally and with Third Parties
All upcoming Ethisphere events can be found
at:
http://ethisphere.com/events/
PLEASE JOIN US FOR
© Copyright 2010
THANK YOU

More Related Content

What's hot

Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
Resilient Systems
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Citrin Cooperman
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
centralohioissa
 
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
Citrin Cooperman
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
Shawn Tuma
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
Fletcher Media
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
Dan Michaluk
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure compliance
EquiGov Institute
 
30 Minute Release11i Security
30 Minute Release11i Security30 Minute Release11i Security
30 Minute Release11i Security
SecureDBA
 
How to manage a data breach
How to manage a data breachHow to manage a data breach
How to manage a data breach
Dan Michaluk
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
centralohioissa
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Ulf Mattsson
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Shawn Tuma
 
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasGet the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Shawn Tuma
 
HEMISPHERE SMB Case Study
HEMISPHERE SMB Case StudyHEMISPHERE SMB Case Study
HEMISPHERE SMB Case Study
Carter Schoenberg
 
Big 4 W's of Big Threat Hunting
Big 4 W's of Big Threat HuntingBig 4 W's of Big Threat Hunting
Big 4 W's of Big Threat Hunting
Eguardian Global Services
 
CIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry PerspectivesCIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry Perspectives
CloudIDSummit
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber Attack
Shawn Tuma
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the Breach
Financial Poise
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 

What's hot (20)

Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
 
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
Cybersecurity Disrupters and Cybersecurity Insurance in the COVID-19 Era – Is...
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
 
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
 
Cas cyber prez
Cas cyber prezCas cyber prez
Cas cyber prez
 
Data protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure complianceData protection: Steps Organisations can take to ensure compliance
Data protection: Steps Organisations can take to ensure compliance
 
30 Minute Release11i Security
30 Minute Release11i Security30 Minute Release11i Security
30 Minute Release11i Security
 
How to manage a data breach
How to manage a data breachHow to manage a data breach
How to manage a data breach
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
 
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las VegasGet the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
 
HEMISPHERE SMB Case Study
HEMISPHERE SMB Case StudyHEMISPHERE SMB Case Study
HEMISPHERE SMB Case Study
 
Big 4 W's of Big Threat Hunting
Big 4 W's of Big Threat HuntingBig 4 W's of Big Threat Hunting
Big 4 W's of Big Threat Hunting
 
CIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry PerspectivesCIS13: FCCX and IDESG: An Industry Perspectives
CIS13: FCCX and IDESG: An Industry Perspectives
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber Attack
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the Breach
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 

Similar to Corporate Cyber Attacks: Managing Risk to Avoid Reputation Harm

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
Meg Weber
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Shawn Tuma
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
Shawn Tuma
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015
Wynyard Group
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
David Doughty
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
Evan Francen
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Shawn Tuma
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Shawn Tuma
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
Next Dimension Inc.
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Shawn Tuma
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
This account is closed
 
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
Jesse Wilkins
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
James Fisher
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security Cluster
Peter Jones
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
SurfWatch Labs
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
Yasser Mohammed
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
William McBorrough
 

Similar to Corporate Cyber Attacks: Managing Risk to Avoid Reputation Harm (20)

2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security Cluster
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 

More from Ethisphere

Compliance Strategy and Performance
Compliance Strategy and PerformanceCompliance Strategy and Performance
Compliance Strategy and Performance
Ethisphere
 
Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor Webinar
Ethisphere
 
Corruption In China: Recovery-Led Investigations
Corruption In China: Recovery-Led InvestigationsCorruption In China: Recovery-Led Investigations
Corruption In China: Recovery-Led Investigations
Ethisphere
 
Key Steps to Creating a Strong Compliance Culture Through Effective Leadership
Key Steps to Creating a Strong Compliance Culture Through Effective LeadershipKey Steps to Creating a Strong Compliance Culture Through Effective Leadership
Key Steps to Creating a Strong Compliance Culture Through Effective Leadership
Ethisphere
 
Building on the Foundation of Ethics and Compliance to Achieve Sustainability
Building on the Foundation of Ethics and Compliance to Achieve SustainabilityBuilding on the Foundation of Ethics and Compliance to Achieve Sustainability
Building on the Foundation of Ethics and Compliance to Achieve Sustainability
Ethisphere
 
Special Challenges of Doing Business in Russia
Special Challenges of Doing Business in RussiaSpecial Challenges of Doing Business in Russia
Special Challenges of Doing Business in Russia
Ethisphere
 
Russian Sanctions: What the U.S. and OFAC Directives Mean for Global Companies
Russian Sanctions: What the U.S. and OFAC Directives Mean for Global CompaniesRussian Sanctions: What the U.S. and OFAC Directives Mean for Global Companies
Russian Sanctions: What the U.S. and OFAC Directives Mean for Global Companies
Ethisphere
 
Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...
Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...
Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...
Ethisphere
 
Reputation Risk: Why Companies Need to Care
Reputation Risk: Why Companies Need to CareReputation Risk: Why Companies Need to Care
Reputation Risk: Why Companies Need to Care
Ethisphere
 
Doing Business in Mexico: Compliance Implications of the Pact for Mexico
Doing Business in Mexico: Compliance Implications of the Pact for MexicoDoing Business in Mexico: Compliance Implications of the Pact for Mexico
Doing Business in Mexico: Compliance Implications of the Pact for Mexico
Ethisphere
 
Optimizing Compliance Programs in Organizations: A Top Down Approach
Optimizing Compliance Programs in Organizations: A Top Down ApproachOptimizing Compliance Programs in Organizations: A Top Down Approach
Optimizing Compliance Programs in Organizations: A Top Down Approach
Ethisphere
 
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Ethisphere
 
Anti-Corruption Update: Naughty or Nice? When Giving Gifts Will Get You a Lum...
Anti-Corruption Update: Naughty or Nice? When Giving Gifts Will Get You a Lum...Anti-Corruption Update: Naughty or Nice? When Giving Gifts Will Get You a Lum...
Anti-Corruption Update: Naughty or Nice? When Giving Gifts Will Get You a Lum...
Ethisphere
 
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
Ethisphere
 
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Ethisphere
 
Essential Elements of Global Compliance Programs
Essential Elements of Global Compliance ProgramsEssential Elements of Global Compliance Programs
Essential Elements of Global Compliance Programs
Ethisphere
 
Cybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data ThreatsCybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data Threats
Ethisphere
 
Anti-Corruption and Third Parties: Mitigating the Risks
Anti-Corruption and Third Parties: Mitigating the RisksAnti-Corruption and Third Parties: Mitigating the Risks
Anti-Corruption and Third Parties: Mitigating the Risks
Ethisphere
 
Conflict Minerals: The First Year and What's to Come
Conflict Minerals: The First Year and What's to ComeConflict Minerals: The First Year and What's to Come
Conflict Minerals: The First Year and What's to Come
Ethisphere
 
Conflict Minerals Update: Making Sense of the Appellate Court Decision and SE...
Conflict Minerals Update: Making Sense of the Appellate Court Decision and SE...Conflict Minerals Update: Making Sense of the Appellate Court Decision and SE...
Conflict Minerals Update: Making Sense of the Appellate Court Decision and SE...
Ethisphere
 

More from Ethisphere (20)

Compliance Strategy and Performance
Compliance Strategy and PerformanceCompliance Strategy and Performance
Compliance Strategy and Performance
 
Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor Webinar
 
Corruption In China: Recovery-Led Investigations
Corruption In China: Recovery-Led InvestigationsCorruption In China: Recovery-Led Investigations
Corruption In China: Recovery-Led Investigations
 
Key Steps to Creating a Strong Compliance Culture Through Effective Leadership
Key Steps to Creating a Strong Compliance Culture Through Effective LeadershipKey Steps to Creating a Strong Compliance Culture Through Effective Leadership
Key Steps to Creating a Strong Compliance Culture Through Effective Leadership
 
Building on the Foundation of Ethics and Compliance to Achieve Sustainability
Building on the Foundation of Ethics and Compliance to Achieve SustainabilityBuilding on the Foundation of Ethics and Compliance to Achieve Sustainability
Building on the Foundation of Ethics and Compliance to Achieve Sustainability
 
Special Challenges of Doing Business in Russia
Special Challenges of Doing Business in RussiaSpecial Challenges of Doing Business in Russia
Special Challenges of Doing Business in Russia
 
Russian Sanctions: What the U.S. and OFAC Directives Mean for Global Companies
Russian Sanctions: What the U.S. and OFAC Directives Mean for Global CompaniesRussian Sanctions: What the U.S. and OFAC Directives Mean for Global Companies
Russian Sanctions: What the U.S. and OFAC Directives Mean for Global Companies
 
Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...
Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...
Risk Containment: Tailoring Contract Provisions with Third Parties to Minimiz...
 
Reputation Risk: Why Companies Need to Care
Reputation Risk: Why Companies Need to CareReputation Risk: Why Companies Need to Care
Reputation Risk: Why Companies Need to Care
 
Doing Business in Mexico: Compliance Implications of the Pact for Mexico
Doing Business in Mexico: Compliance Implications of the Pact for MexicoDoing Business in Mexico: Compliance Implications of the Pact for Mexico
Doing Business in Mexico: Compliance Implications of the Pact for Mexico
 
Optimizing Compliance Programs in Organizations: A Top Down Approach
Optimizing Compliance Programs in Organizations: A Top Down ApproachOptimizing Compliance Programs in Organizations: A Top Down Approach
Optimizing Compliance Programs in Organizations: A Top Down Approach
 
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
Hotline Confidential: Is Your Company Using Best Practices for Whistleblower ...
 
Anti-Corruption Update: Naughty or Nice? When Giving Gifts Will Get You a Lum...
Anti-Corruption Update: Naughty or Nice? When Giving Gifts Will Get You a Lum...Anti-Corruption Update: Naughty or Nice? When Giving Gifts Will Get You a Lum...
Anti-Corruption Update: Naughty or Nice? When Giving Gifts Will Get You a Lum...
 
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
Whistleblower Best Practices: What Do Compliance and Business Leaders Need to...
 
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
Best Practices in Anti-Corruption Diligence on M&A Targets, Joint Venture Par...
 
Essential Elements of Global Compliance Programs
Essential Elements of Global Compliance ProgramsEssential Elements of Global Compliance Programs
Essential Elements of Global Compliance Programs
 
Cybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data ThreatsCybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data Threats
 
Anti-Corruption and Third Parties: Mitigating the Risks
Anti-Corruption and Third Parties: Mitigating the RisksAnti-Corruption and Third Parties: Mitigating the Risks
Anti-Corruption and Third Parties: Mitigating the Risks
 
Conflict Minerals: The First Year and What's to Come
Conflict Minerals: The First Year and What's to ComeConflict Minerals: The First Year and What's to Come
Conflict Minerals: The First Year and What's to Come
 
Conflict Minerals Update: Making Sense of the Appellate Court Decision and SE...
Conflict Minerals Update: Making Sense of the Appellate Court Decision and SE...Conflict Minerals Update: Making Sense of the Appellate Court Decision and SE...
Conflict Minerals Update: Making Sense of the Appellate Court Decision and SE...
 

Recently uploaded

Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
SalesTown
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
Any kyc Account
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
Aleksey Savkin
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
thesiliconleaders
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
Stephen Cashman
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
jeffkluth1
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 

Recently uploaded (20)

Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
How to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM SoftwareHow to Implement a Real Estate CRM Software
How to Implement a Real Estate CRM Software
 
Easily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYCEasily Verify Compliance and Security with Binance KYC
Easily Verify Compliance and Security with Binance KYC
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
 
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
The Heart of Leadership_ How Emotional Intelligence Drives Business Success B...
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Part 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 SlowdownPart 2 Deep Dive: Navigating the 2024 Slowdown
Part 2 Deep Dive: Navigating the 2024 Slowdown
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 

Corporate Cyber Attacks: Managing Risk to Avoid Reputation Harm

  • 1. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │1 GOOD. SMART.BUSINESS. PROFIT. TM
  • 2. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │2 CORPORATE CYBERATTACKS: MANAGING RISK TO AVOID REPUTATIONAL HARM September 18, 2014
  • 3. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │3 Chelsie Chmela Events Manager Chelsie.Chmela@ethisphere.com We encourage you to engage during the Q&A portion of today’s webcast by using the “Submit Question” button located within your West LegalEdcenter experience or the Chat Box in ReadyTalk HOST QUESTIONS MATERIALS Included in your registration: • Event recording and deck: West LegalEdcenter provides on-demand event access for 180 days or until the end of your subscription, if sooner. Ethisphere will provide the recording and presentation deck following the live event to ReadyTalk attendees. 3
  • 4. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │4 Stuart Levi Partner Skadden, Arps, Slate Meagher & Flom LLP & Affliates Devon Kerr Senior Consultant Mandiant SPEAKING TODAY
  • 5. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │5 Beijing Boston Brussels Chicago Frankfurt Hong Kong Houston London Los Angeles Moscow Munich New York Palo Alto Paris São Paulo Shanghai Singapore Sydney Tokyo Toronto Washington, D.C. Wilmington Privacy and Cybersecurity 2014: The Current State of Affairs •Presented by •Stuart Levi
  • 6. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │6 PRIVACY V. CYBERSECURITY • Privacy policy compliance • Big data mining • Privacy regulations • Internet of things • Do not track • Location data • Global enforcement Privacy
  • 7. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │7 PRIVACY V. CYBERSECURITY • Data breaches • Non-data cyber theft • Denial of service attacks • Compliance with security policies • NIST guidelines Cybersecurity
  • 8. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │8 PRIVACY V. CYBERSECURITY Government Spying • Snowden revelations • Access to records through public companies • Government monitoring • Global implications
  • 9. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │9 PRIVACY V. CYBERSECURITY PRIVACY CYBERSECURITY Government spying Data Breaches Increased demands for privacy regulation
  • 10. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │10 THE REALITY COMPANIES FACE TODAY • Data breaches and cyberattacks are increasingly common. • More companies are considered “targets of choice.” • A large segment of the security community has adopted an “assume you’ve been breached” mentality. • Attacks are from: − Hackers looking to profit − State-sponsored organizations − Hackers looking to wreak havoc
  • 11. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │11 THE REALITY COMPANIES FACE TODAY • Attacks are not limited to personal information: − Theft of intellectual property − Theft of business information − Denial of service attacks • No industry is immune from attack. • Rapid detection has become as important as threat prevention. − Each day the threat is not detected, the level of damage and harm increases • Locating the source of the harm is becoming more difficult
  • 12. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │12 THE REALITY COMPANIES FACE TODAY • Informative statistics from the Verizon 2013 Data Breach Investigations Report: − 78% of intrusions were rated as “low difficulty” − 69% discovered by external parties − 66% took multiple months to discover − 75% are considered opportunistic attacks − 80% involved authentication based attacks • Each statistic presents a potential liability risk.
  • 13. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │13 KEY LEGAL THREATS TODAY • FTC enforcement activity − “Misleading” consumers by “promising” industry-standard or robust security − Inadequate security protection • Shareholder litigation − For any cybersecurity loss (not just data breaches) » Denial of service » Loss of intellectual property or confidential information • Data breach class actions
  • 14. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │14 THE RESPONSE CLOCK HAS ACCELERATED HISTORICAL PRACTICE COMPANIES OFTEN DELAYED NOTICE UNTIL FULL FORENSIC ANALYSIS WAS DONE » Provided time to formulate a response and manage PR, communications and legal » Companies often hopeful that forensics analysis would reveal notice was not required » Sometimes delay was required by law enforcement, but this was the exception
  • 15. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │15 THE RESPONSE CLOCK HAS ACCELERATED • Today, companies face a new and pressing reality: − Privacy advocates/activists » Learning of breaches and threatening to go public if the company does not disclose » Generally unsympathetic to pleas that the company needs more time to formulate its response − Insurance plans may require prompt notice
  • 16. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │16 DATA SECURITY CLASS ACTIONS ARE ON THE RISE • Plaintiffs’ lawyers are looking to cash in on the increase in data security breaches at retailers, banks and other institutions. • Their tool of choice: large-scale class actions based around theories of alleged damage to consumers’ privacy. • While relatively few cases have been filed so far, the number will undoubtedly grow.
  • 17. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │17 THE FTC AND PLAINTIFF LAWYERS NEED A HOOK • The company failed to install or implement adequate security protections. − Were there internal or consultant recommendations that were ignored? • The company “misled” customers about the level of its security. • The company’s procedures or policies were lacking or not followed. − Security policies − Vendor policies • C-suite and/or board was not adequately kept apprised of security procedures. • The company took too long to provide notice of a data breach or to respond to an attack
  • 18. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │18 KEY TAKEAWAY The goal of every company today should be to eliminate as many of these hooks as possible
  • 19. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │19 STEPS EVERY COMPANY SHOULD BE TAKING TODAY • Privacy audit and implementation • Risk assessment • Establish a rapid response team • Testing • Privacy by design • Evaluate insurance coverage
  • 20. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │20 PRIVACY AUDITS • Typically performed by a law firm and/or external consultant − External advisers see issues that are hidden to companies » View each issue from a “what if” lawsuit perspective − “Good fact” in the event of a litigation − External advisers have the benefit of seeing best practices at other companies − Provides regulators with comfort
  • 21. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │21 PRIVACY AUDITS • Key Steps: − Where is data coming into the company? − How is data used and what controls are in place? − How are security decisions made and implemented? − Do internal and external privacy policies align with actual practice? » Very often they do not − What is the company saying about its security practices? − What is the company disclosing in its public filings? − How are company executives and board members kept informed? − How mature is the privacy program? − What sort of training/retraining is provided? • Critical Step: Need to act on audit recommendations
  • 22. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │22 RISK ASSESSMENT • What types of personal information could be compromised? • Is there a risk of confidential information being compromised? • What is the potential for lost business? • Is there a potential for regulatory scrutiny? • Is there a potential for fines and penalties? • What is the potential for damage to reputation/loss of trust/media publicity?
  • 23. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │23 ESTABLISHING A RAPID RESPONSE TEAM • Critical in a world where you may lose control of the response timing • Key stakeholders will bring unique and important perspectives − IT, legal, security, PR/communications, HR, risk management, corporate management, government relations • Scrambling to figure out the team once an incident occurs is inefficient and dramatically increases the risk of a misstep • Create a playbook of how incidents will be handled • Understand the data breach notification requirements • Understand SEC disclosure obligations
  • 24. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │24 TESTING • Critical to test your incident response plan at least semi-annually − Consider different scenarios • Consider creating a report of areas to improve − But assess the risks of creating such a report • Assess roles and responsibilities − Did people leave? − Was there any internal restructuring? − Were new systems implemented?
  • 25. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │25 TESTING • Update process documents • Review third-party vendor contacts » PR » Forensics » Notification » Legal − Are these still the right contacts? • Any changes to law
  • 26. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │26 PRIVACY BY DESIGN • Area of focus for the FTC » Companies should maintain comprehensive data management procedures throughout the life cycle of their products and services • Now a critical area for risk mitigation • Key ideas: − Proactive not reactive − Privacy embedded into the design process − Visibility and transparency within the organization − Privacy and security as part of the corporate culture
  • 27. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │27 EVALUATE INSURANCE COVERAGE CRITICAL AREAS OF CYBER INSURANCE − Network security liability (third party) − Privacy liability (third party) − Professional liability (third party) − Notification costs − Regulatory defense − Data loss/recreation − Business Interruption
  • 28. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │28 Skadden, Arps, Slate, Meagher & Flom LLP & Affiliates
  • 29. Skadden, Arps, Slate, Meagher & Flom LLPCyberattacks 2014 – How to Prepare Today and Respond Tomorrow │29 Devon Kerr Senior Consultant
  • 30. © Copyright 2010  Introductions  Overview  Building an investigation-ready environment  During an intrusion  Post-incident activities  Q&A Introduction Slide 30
  • 31. © Copyright 2010 All information is derived from MANDIANT observations in non-classified environments Some information has been sanitized to protect our clients’ interests Important note 31
  • 32. © Copyright 2010 DEVON KERR  Former IT operations (10+ years)  Lead investigator and forensic analyst  Develop internal training for Mandiant consultants  More than15 investigations this year 32 Introductions
  • 33. © Copyright 2010  Build an investigation-ready environment: − Logging and monitoring − Fundamental security controls − Important procedures Preparing for a breach 33
  • 34. © Copyright 2010  Before the breach… − Centralize logs and alerts into a unified dashboard  Consolidation reduces effort and increases efficiency  Collect logs for user logins of all kinds  Increase the amount of logs retained  Make sure you can actually get the logs out of the system − Implement application whitelisting on all critical systems  Ensures that only approved software will run  Easiest and cheapest way to slow down an attacker  Good for detecting attackers if you centralize these logs, too! Investigation readiness 34
  • 35. © Copyright 2010  Before the breach…(continued) − Know where your data is  Intellectual property, financial data, competitive business data (sales, marketing, business logic)  Know the role of critical systems − Identify Internet points of presence  Egress points for user Internet access  VPN devices  Direct connections to service providers and partners  DMZs − Patch operating system and third party software  Critical vulnerabilities should be patched within 2 days Investigation readiness 35
  • 36. © Copyright 2010  Before the breach…(continued) − Harden the environment  Block network traffic leaving your environment that doesn’t have a known business purpose  Strengthen systems administration by using dedicated management systems  Identify all users with admin-level privileges and revoke those rights  Domain administrators shouldn’t use privileged accounts for regular computer and network activities – only administration  Implement a second factor of authentication, like a token, for remote access (VPN) Investigation readiness 36
  • 37. © Copyright 2010  Facilitating the investigation − Respond to requests quickly  Identifying the function of a system  Identifying all systems which may contain a specific type of data (PII, finacial records, etc)  Be able to search logs on-demand  Ex: search all log sources for an IP address  Be able to share logs with investigators  Ex: provide a copy of all VPN logs During an incident 37
  • 38. © Copyright 2010  Remediating − Work with investigators to develop a remediation plan that includes short-term tactical and longer-term strategic objectives  Block malicious IP addresses  Sinkhole malicious domain names  Take infected systems offline and rebuild  Perform an enterprise password reset  … During an incident 38
  • 39. © Copyright 2010  When the smoke clears − Determine notification requirements based on incident type, jurisdiction, and industry − Develop a coordinated message for the public  Understand that the public may include clients, regulatory bodies, and shareholders − Conduct a lessons learned exercise − Develop metrics  Time from incident to detection, detection to investigation, detection to remediation, etc  Review metrics after each incident Post-incident activities 39
  • 41. © Copyright 2010 Devon Kerr Senior Consultant
  • 43. © Copyright 2010 This webcast and all future Ethisphere webcasts are available complimentary and on demand for BELA members. BELA members are also offered complimentary registration to Ethisphere’s Global Ethics Summit and other Summits around the world. For more information on BELA contact: Laara van Loben Sels Senior Director, Engagement Services laara.vanlobensels@ethisphere.com 480.397.2663 Business Ethics Leadership Alliance (BELA)
  • 44. © Copyright 2010 October 30, 2014 Cyber-Security, IP Theft and Data Breaches: Practical Steps to Protect Corporate Assets Internally and with Third Parties All upcoming Ethisphere events can be found at: http://ethisphere.com/events/ PLEASE JOIN US FOR

Editor's Notes

  1. If you work in a classified environment, you may recognize some of the information we present today. MANDIANT observed everything we’ll talk about in non-classified environments, and we’ve changed some of it to protect our clients.