SlideShare a Scribd company logo
Cyber-Readiness in the 
Securities and Brokerage 
Industry 
September 24, 2014 
Scott K.G. Kozak & Jeffrey Schultz 
© 2014 Armstrong Teasdale 
LLP 
© 2014 Armstrong Teasdale 
LLP
Current Events 
 2013 
• Target 
− 40 million+ customers affected 
 2014 
• Home Depot 
− Breach in April 2014, discovered in August 2014 
− 50 million + affected ; class action filed 9/10/14 in Eastern District of Missouri 
− Offered customers and employees free credit monitoring, fraud protection and identity 
protection services for 1 year 
• Benjamin F. Edwards & Co 
− Discovered 3 days after breach took place 
− Firm offered customers and employees free credit monitoring, fraud protection and 
identity protection services for 1 year 
• BAE Systems reported hedge fund customer lost millions due to “lag time” malware 
installed through “spearfishing” email 
© 2014 Armstrong Teasdale 
LLP
Privacy and Information Security 
 Privacy: 
• The right to be left alone 
• The right of an individual to be protected 
against intrusion into her personal life or affairs 
 Information/Data Security: 
• Defending information from unauthorized access, use, 
disclosure, disruption, modification, perusal, 
inspection, recording, or destruction 
© 2014 Armstrong Teasdale 
LLP
Internet vs. Privacy: 
“a helpful Venn diagram” 
The 
Internet Privacy 
By David Hoffman, available at http://bit.ly/bqU5vU 
© 2014 Armstrong Teasdale 
LLP
Who is the Top Information Security 
Threat? 
Hackers? 
© 2014 Armstrong Teasdale 
LLP 
Spies? 
Cyber 
terrorists?
INFORMATION SECURITY ENEMY #1 
© 2014 Armstrong Teasdale 
LLP
Evolving Expectations of Privacy? 
Zuckerberg’s Law 
“I would expect that next year, people will share twice 
as much information as they share this year, and the 
next year, they will be sharing twice as much as they 
did the year before.” 
© 2014 Armstrong Teasdale 
LLP
Social Engineering: an 
Increasingly Common Threat 
 Significant majority of external intrusions contain 
social engineering element 
 Phishing attacks becoming increasingly 
sophisticated. 
 Use of email/web based attacks 
 Personalized emails: information gleaned from 
Facebook or Linked In 
 Fake Internal Company Emails 
© 2014 Armstrong Teasdale 
LLP
Common Problems 
 Lack of Employee Training 
• Employees unaware of potential problems 
 No Security Culture 
• Employees aren’t thinking about security implications 
 Ineffective Internal Controls 
• Too much access to information 
© 2014 Armstrong Teasdale 
LLP
Overview of Privacy Law 
 Fundamentally different legal/regulatory schemes in 
different jurisdictions: 
United States 
• No comprehensive “law” 
• Patchwork of sector-specific 
(e.g. HIPAA) and jurisdiction-specific 
regulations 
© 2014 Armstrong Teasdale 
LLP 
Europe 
• Comprehensive data protection 
scheme 
• Strict privacy protection 
• “Privacy as a human right”
Some Important Privacy and Data 
Security Laws in the U.S. 
 Fair Credit Reporting Act (FCRA) 
 Health Insurance Portability and Accountability Act 
(HIPAA) 
 Computer Fraud and Abuse Act (CFAA) 
 Stored Communications Act 
 Gramm-Leach-Bliley Act (GLBA) 
 Children’s Online Privacy Protection Act (COPPA) 
 Section 5 of the Federal Trade Commission Act 
 State Data Theft, Breach Notification, and Other 
Privacy Laws 
© 2014 Armstrong Teasdale 
LLP
Cybersecurity Focus in Securities 
Industry 
“Cybersecurity [has] become a top concern … mounting 
evidence that the constant threat of cyber-attack is real, 
lasting and cannot be ignored” – Commissioner Aguilar 
2012 Survey: 89% identify cyber-crime as potential 
systemic risk, with 53% reporting a cyber-attack in 
previous year 
© 2014 Armstrong Teasdale 
LLP
SEC Regulatory Approach 
 October 2011 – Division of Corporate Finance 
• Guidance on disclosure obligations 
• Requires disclosure of material information regarding 
cybersecurity risks and cyber incidents 
 Proposed Rule – Regulation Systems, Compliance and 
Integrity 
• Aims to require covered entities to test automated systems, 
continuity and disaster recovery plans and notify SEC of 
intrusions 
• SEC professed goal as of March 2014 is to make 
significant progress in 2014 
© 2014 Armstrong Teasdale 
LLP
SEC Regulatory Approach 
 Regulation S-ID (http://www.sec.gov/rules/final/2013/34-69359.pdf) 
• Requires certain regulated financial institutions to adopt 
and implement identity theft programs 
• SEC expects institutions to know “Identity Theft Red Flags” 
and incorporate into policies 
− http://www.sec.gov/info/smallbus/secg/identity-theft-red-flag-secg. 
© 2014 Armstrong Teasdale 
LLP 
htm 
 Regulation S-P (http://www.sec.gov/rules/final/34-42974.htm) 
• Privacy of consumer financial information 
• Notice to customers of privacy policy and practices 
− Consumer knowledge and “opt-out” option
SEC Actions 
March 2014 – SEC Roundtable 
• Integrity of Market Systems 
• Customer Data Protection 
• Disclosure of Material Information 
April 2014 – OCIE Cybersecurity Initiative 
• Designed to assess cybersecurity preparedness 
• Method to collect information of industry experience 
• Examinations to be conducted of more than 50 broker-dealers 
© 2014 Armstrong Teasdale 
LLP 
and registered investment advisors
OCIE Cybersecurity Governance 
 Focus Areas 
• Identification of Risks 
• Policies and Procedures 
• Documentation 
• Third-Party Exposure 
• Detection 
© 2014 Armstrong Teasdale 
LLP
Identification of Risks 
System Access 
• What can account holders do? 
− Fund Transfers, Beneficiary Changes, Emailed action 
requests 
• What can employees do? 
− Remote access, Client account management 
Third Party Management 
• Hardware and Software 
• Storage and Backup 
© 2014 Armstrong Teasdale 
LLP
Policies and Procedures 
Network & Information Security 
 Risk management process standard? 
 What is the source or model of this standard? 
 What practices and controls are utilized by the firm? 
© 2014 Armstrong Teasdale 
LLP
Policies and Procedures 
Access 
• Employees 
− Training 
− Security protocols (passwords, 2-step verification) and User 
privileges (escalation control) 
• Customers 
− Remote access security (2-step verification, key fob) 
− Verification of email requests 
− Limitations (Transfers, Beneficiary changes, Account holder) 
• Third Parties 
− Financial management applications (Mint, Personal Capital, 
etc.) 
− Periodic access restriction requiring verification 
© 2014 Armstrong Teasdale 
LLP
Policies and Procedures 
IT Assets 
 Software 
• Loss prevention software 
• Internet protection software (DoS) 
• Malware / Virus protection and detection 
 Encryption 
• Types of data encrypted 
• Methods of encryption 
• Devices (iPhone, iPad, laptops, open internet portals) 
© 2014 Armstrong Teasdale 
LLP
Policies and Procedures 
IT Assets 
 Architecture 
• Environment 
− Segregation of application and testing 
• “Locked” basic configuration 
− Baseline access and data organization 
• Maintenance (patching, upgrades) 
• Backup System 
 Quality Control 
• Periodic testing and compliance assessments 
• Penetration and Vulnerability scans 
− Who and How Often (Internal IT, Third Party Vendors) 
© 2014 Armstrong Teasdale 
LLP
Documentation 
 Security/Hacking guarantees and policy 
• What security is offered to customers 
• What information is provided to customers in the event of a breach 
 Written data destruction policy 
• Lawful destruction limits potential for large-scale data breach 
 Incoming/Departing employee policy 
• Employees are security threat – not just outsiders 
 Cybersecurity incident response policy 
• Update schedule 
• Response guidelines 
 Training for vendors and authorized partners 
• Clear identification of expectations and requirements 
© 2014 Armstrong Teasdale 
LLP
Documentation 
Reporting 
 Customer 
 Law Enforcement 
 Treasury Financial Crimes Enforcement Network 
(FinCEN) 
• Suspicious Activity Report 
− http://www.fincen.gov/news_room/rp/sar_guidance.html 
 SEC/FINRA 
 State Securities Commissioner 
 Public Interest Group 
© 2014 Armstrong Teasdale 
LLP
Documentation 
Records, Records, Records 
 Number of experienced events 
• SEC Focus: After January 1, 2013 
 Significance of event(s) 
• Repeated incidents or sources (10+) 
• Amount of losses ($5K+) 
• What was accessed 
• How was Firm service compromised 
© 2014 Armstrong Teasdale 
LLP
Third Party Exposure 
Risk Assessment 
• Who conducts 
• Assessment standards 
− Questionnaire 
− Minimum security requirements 
− Independent audits and security verification 
• Contractual provisions and requirements 
• Segregation of network resources 
− Universal access or firewalled 
• Remote maintenance policy 
© 2014 Armstrong Teasdale 
LLP
Detection 
 Who is responsible for oversight 
• Specific responsibility assignments 
• Organizational chain for detection + reporting 
 Baseline development 
• Standard expectations 
− Access timing (market-based, geographical base) 
− Outside access (remote vs. office) 
−Weekday/Weekend/After Hours 
© 2014 Armstrong Teasdale 
LLP
Detection 
 Establish thresholds 
• “Incident Alert” threshold 
− Internal / Satellite 
− Identification of anomalies 
 Monitoring 
• Software 
− Unauthorized access 
− Unauthorized software 
• Hardware 
− Unauthorized connections or devices 
© 2014 Armstrong Teasdale 
LLP
Industry Snapshot 
Identification of Risks 
 85% used multiple electronic devices to access client information 
 42% did not use any authentication procedures for client 
instructions received via email or electronic messaging 
• Only 41.1% required dual-factor authentication 
 Only 41.5% had a policy on accessing client information or 
communications from a non-business device 
 Only 38% had policy for detecting unauthorized activity on 
networks or devices 
© 2014 Armstrong Teasdale 
LLP
Industry Overview 
Vendors and Third Parties 
 37% did not conduct risk assessments 
 40% of those that conducted risk assessments did so only 
on an annual basis 
 23% had no confidentiality agreements with third-party 
providers and servicers 
• BUT -- 76% use on-line or remote backup of electronic files 
© 2014 Armstrong Teasdale 
LLP
Industry Overview 
Polices and Procedures 
 Only 44.6% had cybersecurity policies, procedures or 
training programs 
 23.1% had no policies whatsoever 
© 2014 Armstrong Teasdale 
LLP
Industry Overview 
Policies and Procedures 
 Only 47.4% had data storage device destruction 
policies 
 Only 39.2% had loss of electronic device policies 
(e.g., laptop, smartphone) 
© 2014 Armstrong Teasdale 
LLP
OCIE Examination Process 
 Factors favoring examination 
• Statutory directive 
• Entity risk profile 
• Tip, complaint or referral 
• Review of specific risk area 
 Examination 
• Announced or unannounced 
• Initial interview – “critical … determine[s] tone and focus of examination” 
• Tour – analysis of workflow and control environment 
• Cooperation, including provision of persons with knowledge, is key 
• Follow-up may include telephone interviews 
© 2014 Armstrong Teasdale 
LLP 
http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
OCIE Examination Process 
 Third Party Providers 
• OCIE will request relevant information from examinee or from 
agents/custodians 
 Clients & Customers 
• OCIE will “routinely contact” to gather and/or verify information 
 Exit Interview 
• Last day of site visit 
• Entity afforded opportunity to discuss issues raised by exam staff 
− Includes actions entity has taken or plans to take to address 
issues 
© 2014 Armstrong Teasdale 
LLP 
http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
OCIE Examination Process 
 Examination Conclusion 
• SEC Section 4E – completion due on later of two dates 
− 180 days after completion of on-site portion of exam; or 
− 180 days after all records requested are examined or inspected 
• 180-day extension available for “complex examinations” 
 Exam Results 
• Deficiency Letter 
− Entity to respond timely, addressing all identified issues 
• Referral to Division of Enforcement 
− Direct referral without exit exam may be made in “exigent circumstances” 
• Referral to SRO, State regulatory agency or law enforcement 
© 2014 Armstrong Teasdale 
LLP 
http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
Challenge: Decision Makers’ Lack of 
Familiarity with the Technology 
“If I'm applying the First Amendment, I have to apply it to a world where 
there's an Internet, and there's Facebook, and there are movies like ... The 
Social Network, which I couldn't even understand .” 
© 2014 Armstrong Teasdale 
LLP 
—Justice Stephen Breyer 
Justice Roberts: “I thought, you know, you push a button; it goes right to the 
other thing.” 
Justice Scalia: “You mean it doesn't go right to the other thing?” 
—Justice John Roberts to Justice 
Antonin Scalia Regarding How a 
Text-Messaging Service Works
To Do List 
 Identify/Organize Persons with Knowledge 
• Cybersecurity Committee and/or Response Team 
 Audit Cybersecurity Status 
• Review internal and external Policies 
• Review access, verification and recovery 
 Third Party Vendors 
• Review contracts and policies 
 Quality Control and Assessment 
• Update records … or get started 
 Insurance 
• Mind the gap 
© 2014 Armstrong Teasdale 
LLP
Be Proactive 
© 2014 Armstrong Teasdale 
LLP
How Can We Help? 
 Securities Regulatory & Litigation Group 
• Former MO Securities Commissioner 
• Former federal prosecutor 
• Experienced securities litigators 
 Data Security and Privacy Group 
• CIPP|US and Ethical Hacker Certified 
• International and Domestic experience 
© 2014 Armstrong Teasdale 
LLP
Questions? 
Scott K.G. Kozak 
Partner, Litigation 
314.259.4714 
skozak@ArmstrongTeasdale.com 
Jeffrey Schultz 
Partner, Litigation 
314.259.4732 
jschultz@ArmstrongTeasdale.com 
CLE Webinar Confirmation Code: KS0912 
© 2014 Armstrong Teasdale 
LLP

More Related Content

What's hot

Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
PT Bank Syariah Mandiri
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigmpparam02
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
Nawanan Theera-Ampornpunt
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
Ivo Depoorter
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Nicholas Van Exan
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
PECB
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Securitysappingtonkr
 
Ethical privacy and security issues
Ethical privacy and security issuesEthical privacy and security issues
Ethical privacy and security issues
Marcelo Augusto A. Cosgayon
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
The University of Texas (UTRGV)
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
Jim Brashear
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
Jonathon Coulter
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
IBM Business Insight
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
Andris Soroka
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
saurnou
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
automatskicorporation
 
Need for cybersecurity
Need for cybersecurityNeed for cybersecurity
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
EnergySec
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Chris Hails
 

What's hot (20)

Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Working Remotely Vpn Paradigm
Working Remotely   Vpn ParadigmWorking Remotely   Vpn Paradigm
Working Remotely Vpn Paradigm
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security02 Legal, Ethical, and Professional Issues in Information Security
02 Legal, Ethical, and Professional Issues in Information Security
 
Ethical privacy and security issues
Ethical privacy and security issuesEthical privacy and security issues
Ethical privacy and security issues
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
Need for cybersecurity
Need for cybersecurityNeed for cybersecurity
Need for cybersecurity
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 

Similar to Cyber Readiness in the Securities and Brokerage Industries Featuring Armstrong Teasdale Attorneys: Jeff Schultz Scott Kozak

Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
eeaches
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power point
bradleyl2
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist, LLC
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
Evan Francen
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
Vijay Dalmia
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
SecureCurve
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
Resilient Systems
 
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovCyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
Eric Vanderburg
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Eric Vanderburg
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
Adrian Dumitrescu
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
"Everything as a Service" Contracts - Presentation
"Everything as a Service" Contracts  - Presentation "Everything as a Service" Contracts  - Presentation
"Everything as a Service" Contracts - Presentation
MorningstarLaw
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
kCura_Relativity
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
Shawn Tuma
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
duffeeandeitzen
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
David Doughty
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
Information Technology Society Nepal
 

Similar to Cyber Readiness in the Securities and Brokerage Industries Featuring Armstrong Teasdale Attorneys: Jeff Schultz Scott Kozak (20)

Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power point
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
AdvisorAssist Are Your RIA's Clients Protected from Cyber Threats?
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnovCyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
CyberSecurity: Protecting Law Firms - Vanderburg - JurInnov
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
"Everything as a Service" Contracts - Presentation
"Everything as a Service" Contracts  - Presentation "Everything as a Service" Contracts  - Presentation
"Everything as a Service" Contracts - Presentation
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 

More from Armstrong Teasdale

How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry TuckerHow to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
Armstrong Teasdale
 
Don't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan NelsonDon't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Armstrong Teasdale
 
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale
 
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale
 
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Armstrong Teasdale
 
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Armstrong Teasdale
 
Multijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downeyMultijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downey
Armstrong Teasdale
 
BUCKLE UP! How the NLRB is Changing the Rules of the Road
BUCKLE UP!  How the NLRB is Changing the Rules of the RoadBUCKLE UP!  How the NLRB is Changing the Rules of the Road
BUCKLE UP! How the NLRB is Changing the Rules of the Road
Armstrong Teasdale
 
China 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth EnvironmentChina 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth Environment
Armstrong Teasdale
 
Employment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas CityEmployment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas City
Armstrong Teasdale
 
Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web
Armstrong Teasdale
 
Employment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. LouisEmployment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. Louis
Armstrong Teasdale
 
2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas City2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas City
Armstrong Teasdale
 
2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. Louis2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. Louis
Armstrong Teasdale
 
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F..."The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
Armstrong Teasdale
 
Fundamental Intellectual Property Strategies
Fundamental Intellectual Property StrategiesFundamental Intellectual Property Strategies
Fundamental Intellectual Property Strategies
Armstrong Teasdale
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationArmstrong Teasdale
 
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Armstrong Teasdale
 
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared EmployersSuper Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Armstrong Teasdale
 
How to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance ProcessHow to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance ProcessArmstrong Teasdale
 

More from Armstrong Teasdale (20)

How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry TuckerHow to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
How to Avoid TROUBLE: Legal Ethics for In House Counsel Featuring Larry Tucker
 
Don't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan NelsonDon't be SORRY for Data Breach Missteps Featuring: Dan Nelson
Don't be SORRY for Data Breach Missteps Featuring: Dan Nelson
 
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
Armstrong Teasdale Kansas City Employment & Labor Seminar Featuring: Dan O'To...
 
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
Armstrong Teasdale Employment & Labor Seminar Featuring: Dan O'Toole, J.P. Ha...
 
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
Drop the Phone & Drive: Limits on Lawyer Communications with Non-Lawyers Feat...
 
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
Challenging the Validity of a Patent Before the PTAB Featuring Scott Eidson &...
 
Multijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downeyMultijurisdictional practice issues for traveling lawyers ethics michael_downey
Multijurisdictional practice issues for traveling lawyers ethics michael_downey
 
BUCKLE UP! How the NLRB is Changing the Rules of the Road
BUCKLE UP!  How the NLRB is Changing the Rules of the RoadBUCKLE UP!  How the NLRB is Changing the Rules of the Road
BUCKLE UP! How the NLRB is Changing the Rules of the Road
 
China 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth EnvironmentChina 2014: Law Changes and Opportunities in 7% GDP Growth Environment
China 2014: Law Changes and Opportunities in 7% GDP Growth Environment
 
Employment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas CityEmployment & Labor Seminar Presentation 2014 - Kansas City
Employment & Labor Seminar Presentation 2014 - Kansas City
 
Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web Avoiding Legal Road Hazards While Traveling the Interactive Web
Avoiding Legal Road Hazards While Traveling the Interactive Web
 
Employment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. LouisEmployment & Labor Seminar Presentation 2014 - St. Louis
Employment & Labor Seminar Presentation 2014 - St. Louis
 
2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas City2014 Missouri Legislative Preview -Kansas City
2014 Missouri Legislative Preview -Kansas City
 
2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. Louis2014 Missouri Legislative Preview-St. Louis
2014 Missouri Legislative Preview-St. Louis
 
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F..."The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
"The Importance of Being Earnest" How to Dodge Legal Pitfalls that Confront F...
 
Fundamental Intellectual Property Strategies
Fundamental Intellectual Property StrategiesFundamental Intellectual Property Strategies
Fundamental Intellectual Property Strategies
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities Presentation
 
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
Sense and Sensibility: The Pros and Cons of New Alternatives To Patent Litiga...
 
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared EmployersSuper Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
Super Sized Strikes: Nonunion Strikes Can Burn Unprepared Employers
 
How to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance ProcessHow to Guide Your Employee During the Clearance Process
How to Guide Your Employee During the Clearance Process
 

Recently uploaded

Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
BRELGOSIMAT
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
bhavenpr
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
o6ov5dqmf
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
johncavitthouston
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
BridgeWest.eu
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
Knowyourright
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Gabe Whitley
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
akbarrasyid3
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
9ib5wiwt
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
FernandoSimesBlanco1
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
nehatalele22st
 

Recently uploaded (20)

Notes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.docNotes-on-Prescription-Obligations-and-Contracts.doc
Notes-on-Prescription-Obligations-and-Contracts.doc
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdfXYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
XYZ-v.-state-of-Maharashtra-Bombay-HC-Writ-Petition-6340-2023.pdf
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
一比一原版麻省理工学院毕业证(MIT毕业证)成绩单如何办理
 
Roles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John CavittRoles of a Bankruptcy Lawyer John Cavitt
Roles of a Bankruptcy Lawyer John Cavitt
 
How to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the NetherlandsHow to Obtain Permanent Residency in the Netherlands
How to Obtain Permanent Residency in the Netherlands
 
Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....Car Accident Injury Do I Have a Case....
Car Accident Injury Do I Have a Case....
 
Abdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal CourtAbdul Hakim Shabazz Deposition Hearing in Federal Court
Abdul Hakim Shabazz Deposition Hearing in Federal Court
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (28 Mei 2024).pdf
 
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
原版仿制(aut毕业证书)新西兰奥克兰理工大学毕业证文凭毕业证雅思成绩单原版一模一样
 
VAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act PresentationVAWA - Violence Against Women Act Presentation
VAWA - Violence Against Women Act Presentation
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
The Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptxThe Reserve Bank of India Act, 1934.pptx
The Reserve Bank of India Act, 1934.pptx
 

Cyber Readiness in the Securities and Brokerage Industries Featuring Armstrong Teasdale Attorneys: Jeff Schultz Scott Kozak

  • 1. Cyber-Readiness in the Securities and Brokerage Industry September 24, 2014 Scott K.G. Kozak & Jeffrey Schultz © 2014 Armstrong Teasdale LLP © 2014 Armstrong Teasdale LLP
  • 2. Current Events  2013 • Target − 40 million+ customers affected  2014 • Home Depot − Breach in April 2014, discovered in August 2014 − 50 million + affected ; class action filed 9/10/14 in Eastern District of Missouri − Offered customers and employees free credit monitoring, fraud protection and identity protection services for 1 year • Benjamin F. Edwards & Co − Discovered 3 days after breach took place − Firm offered customers and employees free credit monitoring, fraud protection and identity protection services for 1 year • BAE Systems reported hedge fund customer lost millions due to “lag time” malware installed through “spearfishing” email © 2014 Armstrong Teasdale LLP
  • 3. Privacy and Information Security  Privacy: • The right to be left alone • The right of an individual to be protected against intrusion into her personal life or affairs  Information/Data Security: • Defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction © 2014 Armstrong Teasdale LLP
  • 4. Internet vs. Privacy: “a helpful Venn diagram” The Internet Privacy By David Hoffman, available at http://bit.ly/bqU5vU © 2014 Armstrong Teasdale LLP
  • 5. Who is the Top Information Security Threat? Hackers? © 2014 Armstrong Teasdale LLP Spies? Cyber terrorists?
  • 6. INFORMATION SECURITY ENEMY #1 © 2014 Armstrong Teasdale LLP
  • 7. Evolving Expectations of Privacy? Zuckerberg’s Law “I would expect that next year, people will share twice as much information as they share this year, and the next year, they will be sharing twice as much as they did the year before.” © 2014 Armstrong Teasdale LLP
  • 8. Social Engineering: an Increasingly Common Threat  Significant majority of external intrusions contain social engineering element  Phishing attacks becoming increasingly sophisticated.  Use of email/web based attacks  Personalized emails: information gleaned from Facebook or Linked In  Fake Internal Company Emails © 2014 Armstrong Teasdale LLP
  • 9. Common Problems  Lack of Employee Training • Employees unaware of potential problems  No Security Culture • Employees aren’t thinking about security implications  Ineffective Internal Controls • Too much access to information © 2014 Armstrong Teasdale LLP
  • 10. Overview of Privacy Law  Fundamentally different legal/regulatory schemes in different jurisdictions: United States • No comprehensive “law” • Patchwork of sector-specific (e.g. HIPAA) and jurisdiction-specific regulations © 2014 Armstrong Teasdale LLP Europe • Comprehensive data protection scheme • Strict privacy protection • “Privacy as a human right”
  • 11. Some Important Privacy and Data Security Laws in the U.S.  Fair Credit Reporting Act (FCRA)  Health Insurance Portability and Accountability Act (HIPAA)  Computer Fraud and Abuse Act (CFAA)  Stored Communications Act  Gramm-Leach-Bliley Act (GLBA)  Children’s Online Privacy Protection Act (COPPA)  Section 5 of the Federal Trade Commission Act  State Data Theft, Breach Notification, and Other Privacy Laws © 2014 Armstrong Teasdale LLP
  • 12. Cybersecurity Focus in Securities Industry “Cybersecurity [has] become a top concern … mounting evidence that the constant threat of cyber-attack is real, lasting and cannot be ignored” – Commissioner Aguilar 2012 Survey: 89% identify cyber-crime as potential systemic risk, with 53% reporting a cyber-attack in previous year © 2014 Armstrong Teasdale LLP
  • 13. SEC Regulatory Approach  October 2011 – Division of Corporate Finance • Guidance on disclosure obligations • Requires disclosure of material information regarding cybersecurity risks and cyber incidents  Proposed Rule – Regulation Systems, Compliance and Integrity • Aims to require covered entities to test automated systems, continuity and disaster recovery plans and notify SEC of intrusions • SEC professed goal as of March 2014 is to make significant progress in 2014 © 2014 Armstrong Teasdale LLP
  • 14. SEC Regulatory Approach  Regulation S-ID (http://www.sec.gov/rules/final/2013/34-69359.pdf) • Requires certain regulated financial institutions to adopt and implement identity theft programs • SEC expects institutions to know “Identity Theft Red Flags” and incorporate into policies − http://www.sec.gov/info/smallbus/secg/identity-theft-red-flag-secg. © 2014 Armstrong Teasdale LLP htm  Regulation S-P (http://www.sec.gov/rules/final/34-42974.htm) • Privacy of consumer financial information • Notice to customers of privacy policy and practices − Consumer knowledge and “opt-out” option
  • 15. SEC Actions March 2014 – SEC Roundtable • Integrity of Market Systems • Customer Data Protection • Disclosure of Material Information April 2014 – OCIE Cybersecurity Initiative • Designed to assess cybersecurity preparedness • Method to collect information of industry experience • Examinations to be conducted of more than 50 broker-dealers © 2014 Armstrong Teasdale LLP and registered investment advisors
  • 16. OCIE Cybersecurity Governance  Focus Areas • Identification of Risks • Policies and Procedures • Documentation • Third-Party Exposure • Detection © 2014 Armstrong Teasdale LLP
  • 17. Identification of Risks System Access • What can account holders do? − Fund Transfers, Beneficiary Changes, Emailed action requests • What can employees do? − Remote access, Client account management Third Party Management • Hardware and Software • Storage and Backup © 2014 Armstrong Teasdale LLP
  • 18. Policies and Procedures Network & Information Security  Risk management process standard?  What is the source or model of this standard?  What practices and controls are utilized by the firm? © 2014 Armstrong Teasdale LLP
  • 19. Policies and Procedures Access • Employees − Training − Security protocols (passwords, 2-step verification) and User privileges (escalation control) • Customers − Remote access security (2-step verification, key fob) − Verification of email requests − Limitations (Transfers, Beneficiary changes, Account holder) • Third Parties − Financial management applications (Mint, Personal Capital, etc.) − Periodic access restriction requiring verification © 2014 Armstrong Teasdale LLP
  • 20. Policies and Procedures IT Assets  Software • Loss prevention software • Internet protection software (DoS) • Malware / Virus protection and detection  Encryption • Types of data encrypted • Methods of encryption • Devices (iPhone, iPad, laptops, open internet portals) © 2014 Armstrong Teasdale LLP
  • 21. Policies and Procedures IT Assets  Architecture • Environment − Segregation of application and testing • “Locked” basic configuration − Baseline access and data organization • Maintenance (patching, upgrades) • Backup System  Quality Control • Periodic testing and compliance assessments • Penetration and Vulnerability scans − Who and How Often (Internal IT, Third Party Vendors) © 2014 Armstrong Teasdale LLP
  • 22. Documentation  Security/Hacking guarantees and policy • What security is offered to customers • What information is provided to customers in the event of a breach  Written data destruction policy • Lawful destruction limits potential for large-scale data breach  Incoming/Departing employee policy • Employees are security threat – not just outsiders  Cybersecurity incident response policy • Update schedule • Response guidelines  Training for vendors and authorized partners • Clear identification of expectations and requirements © 2014 Armstrong Teasdale LLP
  • 23. Documentation Reporting  Customer  Law Enforcement  Treasury Financial Crimes Enforcement Network (FinCEN) • Suspicious Activity Report − http://www.fincen.gov/news_room/rp/sar_guidance.html  SEC/FINRA  State Securities Commissioner  Public Interest Group © 2014 Armstrong Teasdale LLP
  • 24. Documentation Records, Records, Records  Number of experienced events • SEC Focus: After January 1, 2013  Significance of event(s) • Repeated incidents or sources (10+) • Amount of losses ($5K+) • What was accessed • How was Firm service compromised © 2014 Armstrong Teasdale LLP
  • 25. Third Party Exposure Risk Assessment • Who conducts • Assessment standards − Questionnaire − Minimum security requirements − Independent audits and security verification • Contractual provisions and requirements • Segregation of network resources − Universal access or firewalled • Remote maintenance policy © 2014 Armstrong Teasdale LLP
  • 26. Detection  Who is responsible for oversight • Specific responsibility assignments • Organizational chain for detection + reporting  Baseline development • Standard expectations − Access timing (market-based, geographical base) − Outside access (remote vs. office) −Weekday/Weekend/After Hours © 2014 Armstrong Teasdale LLP
  • 27. Detection  Establish thresholds • “Incident Alert” threshold − Internal / Satellite − Identification of anomalies  Monitoring • Software − Unauthorized access − Unauthorized software • Hardware − Unauthorized connections or devices © 2014 Armstrong Teasdale LLP
  • 28. Industry Snapshot Identification of Risks  85% used multiple electronic devices to access client information  42% did not use any authentication procedures for client instructions received via email or electronic messaging • Only 41.1% required dual-factor authentication  Only 41.5% had a policy on accessing client information or communications from a non-business device  Only 38% had policy for detecting unauthorized activity on networks or devices © 2014 Armstrong Teasdale LLP
  • 29. Industry Overview Vendors and Third Parties  37% did not conduct risk assessments  40% of those that conducted risk assessments did so only on an annual basis  23% had no confidentiality agreements with third-party providers and servicers • BUT -- 76% use on-line or remote backup of electronic files © 2014 Armstrong Teasdale LLP
  • 30. Industry Overview Polices and Procedures  Only 44.6% had cybersecurity policies, procedures or training programs  23.1% had no policies whatsoever © 2014 Armstrong Teasdale LLP
  • 31. Industry Overview Policies and Procedures  Only 47.4% had data storage device destruction policies  Only 39.2% had loss of electronic device policies (e.g., laptop, smartphone) © 2014 Armstrong Teasdale LLP
  • 32. OCIE Examination Process  Factors favoring examination • Statutory directive • Entity risk profile • Tip, complaint or referral • Review of specific risk area  Examination • Announced or unannounced • Initial interview – “critical … determine[s] tone and focus of examination” • Tour – analysis of workflow and control environment • Cooperation, including provision of persons with knowledge, is key • Follow-up may include telephone interviews © 2014 Armstrong Teasdale LLP http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
  • 33. OCIE Examination Process  Third Party Providers • OCIE will request relevant information from examinee or from agents/custodians  Clients & Customers • OCIE will “routinely contact” to gather and/or verify information  Exit Interview • Last day of site visit • Entity afforded opportunity to discuss issues raised by exam staff − Includes actions entity has taken or plans to take to address issues © 2014 Armstrong Teasdale LLP http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
  • 34. OCIE Examination Process  Examination Conclusion • SEC Section 4E – completion due on later of two dates − 180 days after completion of on-site portion of exam; or − 180 days after all records requested are examined or inspected • 180-day extension available for “complex examinations”  Exam Results • Deficiency Letter − Entity to respond timely, addressing all identified issues • Referral to Division of Enforcement − Direct referral without exit exam may be made in “exigent circumstances” • Referral to SRO, State regulatory agency or law enforcement © 2014 Armstrong Teasdale LLP http://www.sec.gov/about/offices/ocie/ocie_exambrochure.pdf
  • 35. Challenge: Decision Makers’ Lack of Familiarity with the Technology “If I'm applying the First Amendment, I have to apply it to a world where there's an Internet, and there's Facebook, and there are movies like ... The Social Network, which I couldn't even understand .” © 2014 Armstrong Teasdale LLP —Justice Stephen Breyer Justice Roberts: “I thought, you know, you push a button; it goes right to the other thing.” Justice Scalia: “You mean it doesn't go right to the other thing?” —Justice John Roberts to Justice Antonin Scalia Regarding How a Text-Messaging Service Works
  • 36. To Do List  Identify/Organize Persons with Knowledge • Cybersecurity Committee and/or Response Team  Audit Cybersecurity Status • Review internal and external Policies • Review access, verification and recovery  Third Party Vendors • Review contracts and policies  Quality Control and Assessment • Update records … or get started  Insurance • Mind the gap © 2014 Armstrong Teasdale LLP
  • 37. Be Proactive © 2014 Armstrong Teasdale LLP
  • 38. How Can We Help?  Securities Regulatory & Litigation Group • Former MO Securities Commissioner • Former federal prosecutor • Experienced securities litigators  Data Security and Privacy Group • CIPP|US and Ethical Hacker Certified • International and Domestic experience © 2014 Armstrong Teasdale LLP
  • 39. Questions? Scott K.G. Kozak Partner, Litigation 314.259.4714 skozak@ArmstrongTeasdale.com Jeffrey Schultz Partner, Litigation 314.259.4732 jschultz@ArmstrongTeasdale.com CLE Webinar Confirmation Code: KS0912 © 2014 Armstrong Teasdale LLP