SlideShare a Scribd company logo
1 of 37
Download to read offline
SESSION ID:
#RSAC
Andrea Hoy, CISSP,
CISM, MBA
DATA BREACH LITIGATION
HOW TO AVOID IT AND BE BETTER
PREPARED
CXO-R05
Founder and Virtual CISO
A. Hoy & Associates
Ronald I. Raether, Jr.
Partner
Troutman Sanders
March 3, 2016
#RSAC
Agenda
I. Background: Where are the Data Breaches occurring?
II. How to Be Better Prepared for When Your Company Data is
Breached
A. Incident Response Plan – Must Haves
B. Components of Data Breach Litigation for the CXO
C. Top Ten Suggestions For Effective Management of Complex
Business Litigation and Class Actions
III. How to Avoid It: Lessons Learned & Best Practices
A. Top 10 Steps for Data Litigation Preparedness
#RSAC
Cyberattacks and Breaches
Cybercrime has cost
the global economy
annually:
Reported Breaches
in 2015 for 2014:
Cyberattacks in
the United
States in 2013:
Records
Breached in
2014
Every second
32
Every minute
1,947
Every day
2,803,036
Every hour
116,793
Data records were lost or stolen with the following frequency:
$1.5 million
2,122 Global (781 US)
$575 billion
1,023,108,267
#RSAC
$6.5 million
9.1%
Financial
8.1%
Governent /
Military
Avg. Total Cost of a
Data Breach
$217
Avg. Total Cost/lost or
Stolen record
40.0%
Business
35.5%
Healthcare
Data Breaches by Industry
Source: 2015Ponemon and IBM Report
7.4%
Education
(Retail / Utilities
Travel / Hospitality
Transportation / Others)
#RSAC
Source: Verizon 2014 DBIR
Major Types of Data Breaches by Industry
Travel and Hospitality
91% up from 75 % POS
Financial Services
75% Web App attacks,
DOS, card skimming
Public Sector
98% from 4 types
Healthcare*
46% Physical theft & loss
Energy/Utilities
38% Web App attacks
31% Crimeware
Retail
31% POS 33% DOS
Manufacturing
54% CyberEspionage
And DOS
Professional Services
37% DOS
Source: Verizon 2014 Data Breach IR
#RSAC
Major Types of Data Breaches by Industry
6
Don’t Forget Data Breach can be Physical!
Physical Loss and Theft
Public sector, followed by Healthcare and Financial
55% Internal workplace
22% Employee owned vehicles
Laptops, tablets, smartphones
So minor shifts between 2014 and 2015 reports
Considerations: Security Awareness Learning and Education,
Privileged Access Management
#RSAC
Lawsuits: 2014
Reported Breaches in
2014 (2015):
12.5%
Breaches - Retail
60%
Lawsuits – Retail
Lawsuits associated with Data Breaches
BUT
BUT
110
1,367 (781)
#RSAC
Incident Response – Being Prepared
1. Incident Response Plan
 Address various types of Data Breach
 Provide critical steps for reasonable investigation of each type
 Execute and do table top tests quarterly/annually
 Development and IR Team Members/Contact information
 Critical Emergency Contact List
 Identify regulated Notifications
 Appropriate law enforcement
 Affected parties – individuals and third parties
 Federal Reserve Bank (FRB) / Federal Trade Commission (FTC) / States Attorney
General(s)
 Suspicious Activity Report (SAR)
8
#RSAC
Incident Response – Being Prepared
2. Third Party/Vendor Service Provider Incident Response
3. Keep an incident timeline and document efforts taken
 Who Reported the Breach
 How it was Discovered
 When and By Whom (may differ from who reported)
 Incident Response Team meeting(s)
 Actions taken to contain/control the breach or threat/vulnerability
allowing the breach
 Additional Third Party / Forensic / Investigative assistance
 Regulatory notification
9
#RSAC
Incident Response – Being Prepared
4. Critical Emergency Contacts List
 Incident Response Team
 Data Breach Coach
 Forensics expert/ Investigative expert
 Public Relations Coach
5. Educate on where to store the IR Plan
6. Don’t Forget to include a Sample Breach Notification
7. Timeline for Notification(s)
But what are the legal ramifications of giving Notice...
10
#RSAC
Is Notice Required?
Take a Breath.
Breach - Did you indeed have a breach as defined in the law?
PII - Does the compromised information fit the definition of
“personally identifiable information” as defined by the law?
Notify - Considering the above, is there a duty to notify?
Plan - Did you have and follow your IR Plan?
#RSAC
Notice is Required: Now What?
“Sixty-three percent of respondents said notification letters
they received offered no direction on the steps the
consumer should take to protect their personal information.
As a result, 31 percent said they terminated their
relationship with the organization. Fifty-seven percent said
they lost trust and confidence in the organization.”
PONEMON INSTITUTE FOR ID EXPERTS, THE CONSUMER’S REPORT CARD ON DATA BREACH NOTIFICATION, SURVEY OF 1,795
U.S. ADULTS, APRIL 2008.
#RSAC
Event Response: Best Practices
Accuracy & Speed
Media Management
Transparency
Accountability
Be Thorough
Contacting Regulators
Using Third-Party Firms/Partners
#RSAC
Best Practices: Contacting Regulators
Consider reaching out to regulators, such as State Attorney
Generals, before issuing a breach notice in order to
Keep them well-informed;
Avoid misunderstandings;
Avoid unnecessary points of conflict; and
Request their review of the notice.
Certain states publish notice online (e.g., New Hampshire,
Washington)
#RSAC
Privacy Policy
Incident Response Plan
Security Policies and Procedures
Content
Practice
Security Awareness Learning and Education (S.A.L.E.)
Business Continuity Plan
Third Party/Vendor Management Plan
Best Practices: Documents & Regulators
#RSAC
Top Ten Suggestions For Effective Management
of Complex Business Litigation and Class Actions
1. Complex Litigation Needs to be Treated Differently –
Select Appropriate Counsel
2. Avoid Side Issues – Preservation of Documents and Evidence
3. Control Costs and Budget Appropriately
4. Pay Attention to Changes In Law
5. Learn About Forum, Judge and Adversary
6. Participate Appropriately in Joint Defense Groups
7. Properly Assess the Risks of Litigation
8. Encourage Strategic Aggressiveness
9. Win the War, Not Just the Battles
10. Prepare to Win – If Appropriate, Settle Strategically
#RSAC
Lifecycle of Lawsuit
Discovery
Complaint
Early
Dismissal
Class
Certification
Summary
Judgment
Trial
Settlement
#RSAC
What Is In The Complaint?
You had unreasonable information
security controls
You took too long to notify me
You breached your promise to
provide reasonable security
I would not have paid the stated
price (or done business with you)
had I known you had bad data
security
#RSAC
Opening Move – Alleged Harm
Standing Viable Claim
Unauthorized transaction
(occurred)
YES YES (but not if reimbursed)
Unauthorized transaction
(future)
VARIES NO
Time and Money spent
resolving fraud
YES YES (but not if reimbursed)
Time and Money spent
protecting against future harm
VARIES VARIES
Value of information NO NO
Overpayment VARIES VARIES
#RSAC
Shifting Blame and Liability
Payment Networks Liability Shift
EMV (EuroPay, MasterCard, Visa)
“Magstripe” to “Chip and PIN” or “Chip and Signature”
October 2015
Exception auto fuel dispensers - June 2017
Why? Card related financial fraud
Bigger issue – shift of liability for this type of data breach
Affects banks, credit unions, financial institutions, merchants issuing
credit/debit/payment cards
22
#RSAC
Lack of reasonable controls
No Information Security Plan (ISP)
ISPs inconsistent with practices
Bad documents
No witness
Why Are Cases Settling
#RSAC
The basic building blocks of any data governance plan are rooted in law and
industry standards, best practices
HIPAA
GLBA, FFIEC
CyberSecurity
Assessment
PCI DSS
ISO 27001, NIST CyberSecurity Framework,
Top 20 CSC and other industry standards
International (i.e. EUPD), state laws and
regulations
Governance, Risk and Compliance (GRC)
But We Have To…
#RSAC
Governance, Risk and Compliance (GRC)
GOVERNANCE is based on Administrative, Technical & Physical
Safeguards
What Your Company is EXPECTED to understand:
Data they collect
Where the Data is kept
How it is being used, and
With Whom is it Shared
Obligations to keep such information secure AND ensure employees,
third parties, and contractors are educated to do the same
Obligations to mitigate harms and respond appropriately to all
security incidents
Functions are about MORE than RISK avoidance; its about creating a
culture of privacy COMPLIANCE
#RSAC
Data Classification & Data Mapping
You cannot govern what you do not understand
Define the data in external terms
Personally identifiable information ("PII")
Protected health information ("PHI")
("HIPAA")
Nonpublic personal information ("NPI")
("GLBA")
Define the data according to internal standard
High, medium and low risk
Level I, II & III
Confidential, Public & Proprietary
You cannot safeguard what you cannot locate
Map existing locations where PII/NPI/PHI is
stored
Technical locations: databases, servers and systems
Physical locations: office, floor and office buildings
Don’t forget the "cloud"
Map of existing data flows
Internal: between locations
External: from internal locations to external
locations
Map of existing applications
Internal: what functions and what data
External (including cloud): what functions and what
data
#1 Step of any GRC Program
#RSAC
Administrative Safeguards
Drafting policies (the "why")
Drafting procedures (the "how")
Educate on policies and procedures
Regularly scheduled training sessions
Assessments
Evaluation of competency
Awareness program (there is a difference)
Programs with Documented Plans
Incident Response Plan with Data Breach Response
Business Continuity Plan
Security Awareness and Learning/Training Plan
#RSAC
Boundary Routers Firewalls Proxy Servers VPN SIEM
NIDS/NIPS RADIUS NAC Gateway AntiVirus/Malware Spam Blockers
Application Proxy Web Service Security Integrity/Validation
Content Filter Data Encryption Identity Management
HIDS/HIPS Host AntiVirus/Malware Anti-Spyware
Patch Management Server Certificates
Cardkey Entry Locks Laptop Locks Credentials/ID Badges RFID
Biometrics Surveillance Cameras Freon (Fire Retardant)
Desk & Office Keys Security Guards Perimeter Fences
Host (Platform Layer)
Perimeter (Network Layer)
Physical Security
Software (Application Layer)
Personnel (User Layer)
UserIDs/Passwords, PKI, S.A.L.E.
Multifactor-Authentication, Tokens
Chip and PIN (EMV), Need to Know
Defense In Depth
#RSAC
Tensions in Data Governance
Security
vs.
Privacy
Obligation to provide security for personal
information and other confidential material
Rules for processing Personal Information
(and analogs outside the EU)
Quick response to attacks and changing
strategies
Requirements to obtain user consent and
register applications/processing
Need to retain log and traffic data for
analysis
Restrictions on data retention
Need to consolidate data for analysis Export limitations on "personal data,"
banking information and "state secrets"
IT Operational Business Needs
Obligation to keep systems available/operational SLAs
Customer experience Time to market Expense Concerns
Technology needs Retain everything
Competitive pressures Internal Deadlines for Project Implementations
#RSAC
Finding a balance between:
Technology
Operations
Data use and needs
Security
Authority
Accountability
Privacy
Data Governance
#RSAC
Who Decides?
Business
IT
CISO
CEO
How is the risk captured?
Reserve
Cyber Insurance
Resolution of Competing Interests
#RSAC
Reconsider Skills and Role of CISO
#RSAC
Project Management
Initial Risk Assessment
Identification of NPI/PII/PHI
Identify external access to data onsite
Identify encryption utilized
Identify remote access requirements
CyberSecurity Insurance Assessment
Third party contracts
Incident Response Plan execution
Process
Timing of decisions
Threat timeline
Results
Documentation
Compliance:
Documentation of the CISO Process
#RSAC
Food For Thought....
Many of the factors we suggest based on practice, are supported
by statistics, for decreasing the data breach financial impact.
(Business Continuity Mgmt.)
Source: 2015 Ponemon Data Breach Research
#RSAC
So To Be Better Prepared for
Data Breach Litigation…. Top 10 Steps
1. Educate your users on Security and Privacy Responsibilities
Signed User Agreements
Signed Contractor 3rd Party User Agreements
2. Involve your Business Continuity team
3. Identify and have an exercised Incident Response Team
4. Appoint / Hire a CISO who has responsibilities
5. Exercise consistent Data Classification and then Encrypt Sensitive information
Don’t forget Laptops, Tablets, and Mobile Device Encryption
6. Execute signed 3rd Party Agreement Services in advance
a. IR team
b. Data Breach Coach
c. Crisis Mgmt PR team
7. Reporting and Handling of Lost or Stolen Devices
8. Invest in a CyberSecurity Policy..or two
9. Educate the Board prior to the Event and Involve them after
10. Remember tips on Notification
#RSAC
Questions on Data Breach Litigation and
Being Prepared?
Ronald I. Raether, Jr.
Ronald.Raether@troutmansanders.com
(949) 622-2722
Andrea C.Hoy CISSP, CISM, MBA
ahoy (at) securIT.us or ahoy (at) ISSA.org
(949) 606-5333 office
#RSAC
Ron Raether is a partner in the Cybersecurity, Information Governance and Privacy, and
Financial Services Litigation practices at Troutman Sanders. Ron is known as the
interpreter between the business and information technology, guiding both parties to the
best result. In this role, Ron has assisted companies in navigating federal and state
privacy laws for almost twenty years. Ron's experience with technology-related issues,
including data security, patent, antitrust, and licensing and contracts, helps bring a fresh
and creative perspective to novel data compliance issues. Ron has been involved in
seminal data compliance cases, assisting one of the first companies required to provide
notice of a data breach and successfully defending companies in over 50 class actions.
Ron also has represented companies in over 200 individual FCRA cases involving CRAs,
resellers, furnishers, users, and public record vendors. Ron has developed a reputation for
assisting companies not traditionally viewed as subject to the FCRA or with FCRA
compliance questions where the law remains uncertain or unresolved.
Ron not only works with companies which have experienced unauthorized access to
consumer data or have been named defendants in class actions and before regulators,
but also has advised companies in developing compliance programs to proactively
address these issues. As a thought leader, Ron speaks nationally and publishes frequently
on cutting-edge compliance issues. Ron is also a Certified Information Privacy
Professional.
Ronald I. Raether, Jr.
Partner
#RSAC
Firm Highlights
39
 “And in the most dramatic shift, Troutman Sanders, which ranked No. 53 in last
year's survey, jumped to the No. 3 spot, having handled 87 district court cases in
2014, according to the survey….” – Corporate Counsel’s 2015 Patent Litigation
Survey.
 Troutman Sanders ranked nationally in 39 practice areas in the 2016 edition of
U.S. News – Best Lawyers “Best Law Firms.”
 40 Troutman Sanders litigators have been highlighted in the most recent issues
of Chambers USA or Chambers Global.
 Clients rank Troutman Sanders in the top 5% of firms for class actions, according
to BTI Litigation Outlook 2016, and the 2015 U.S. News – Best Law Firms rates
the firm as Tier 1 in the nation for Class Action Defense.
 Troutman Sanders was mentioned in a June 24 Law360 article about 25 law firms
that general counsels recommend to their friends as reported in The BTI
Consulting Group’s 2015 Most Recommended Law Firms report.
#RSAC
www.securIT.us
Andrea C. Hoy, CISSP, CISM, MBA
Andrea Hoy, received her initiation into the infosec community when her hard work and dedication
for a safe international event earned her the role as an Asst. Venue Manager for the highly
successful LA Summer Olympic Games. Andrea’s leadership positions include McDonnell Douglas,
Rockwell, Boeing NA and Fluor. Her clients are from a diverse mix of industries that include Litton,
Pacific Life, Genentech, Molina Healthcare, Activision, WAMU (now Chase), Hamni, and East West
Banks. She’s served and been recognized as an advisor to the Pentagon and as ISO for the 5th
largest credit union as it went through its most major technology and growth past $10 billion in
assets and 600,000 in membership.
Ms. Hoy is the founder of A.Hoy & Associates, a “virtual CISO” provider as well as infosecurity consulting, GRC, incident
response, CISO Bootcamp training firm, assisting companies to establish policies and procedures to comply with NIST
CyberSecurity Framework, top 20 Critical Controls, EUPD and privacy laws here and abroad to name a few. She
represented the US as diplomat to China on eDiscovery and forensics.
Andrea is actively involved in the community serving as the International President of the Information Systems Security
Association (ISSA) the commun ity of choice for international cybersecurity professionals dedicated to advancing individual
growth, managing technology risk and protecting critical information, after elected Vice President. ISSA members represent
>10,000 security professionals worldwide with 137 chapters in 71 countries. Ms. Hoy cofounded the CISO Executive Forum
and recently chartered the Financial SIG.
She previously served on the Technical Advisory Board for RSA for 4 years, advised the International Board of Directors for
PointSec/ProtectData of Sweden, as well as Board of Advisors for Encentuate, a global identity management and
provisioning company, leading to its acquisition by IBM, and DigitalSafe in Switzerland. She has previously been in the LA
Times, Orange County Register: People in Technology to Watch”, MiCTa Radio, TechTarget and KNX News Radio. Andrea
received her MBA from Pepperdine University in Malibu, and prior to that graduated Magna Cum Laude and was entered into
the honor society of Beta Gamma Sigma, the Phi Beta Kappa of the School of Business.

More Related Content

What's hot

Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...Priyanka Aash
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentConSanFrancisco123
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionCylance
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Sounil Yu
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016Sarah Bark
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementMighty Guides, Inc.
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Lancope, Inc.
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Resilient Systems
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecuritySounil Yu
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesLiberteks
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
 
Enumerating your shadow it attack surface
Enumerating your shadow it attack surfaceEnumerating your shadow it attack surface
Enumerating your shadow it attack surfacePriyanka Aash
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...centralohioissa
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsPriyanka Aash
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecuritySounil Yu
 

What's hot (20)

Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
Evolve or Die, How to Stop Getting Slaughtered Due to Bad Vulnerability Manag...
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Making Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software DevelopmentMaking Threat Modeling Useful To Software Development
Making Threat Modeling Useful To Software Development
 
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
 
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
 
Endpoint Detection and Response for Dummies
Endpoint Detection and Response for DummiesEndpoint Detection and Response for Dummies
Endpoint Detection and Response for Dummies
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
Enumerating your shadow it attack surface
Enumerating your shadow it attack surfaceEnumerating your shadow it attack surface
Enumerating your shadow it attack surface
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
 
Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 

Viewers also liked

What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?CBT Nuggets
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard- Mark - Fullbright
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachFletcher Media
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesSeccuris Inc.
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data BreachDavid Hunt
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider ThreatLancope, Inc.
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Groupaengelbert
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanResilient Systems
 

Viewers also liked (13)

What Does a Data Breach Cost?
What Does a Data Breach Cost?What Does a Data Breach Cost?
What Does a Data Breach Cost?
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective StrategiesData Loss Prevention: Challenges, Impacts & Effective Strategies
Data Loss Prevention: Challenges, Impacts & Effective Strategies
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
 
Apakah PCI DSS
Apakah PCI DSSApakah PCI DSS
Apakah PCI DSS
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
How to Audit Your Incident Response Plan
How to Audit Your Incident Response PlanHow to Audit Your Incident Response Plan
How to Audit Your Incident Response Plan
 

Similar to DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED

Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossShawn Tuma
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Khaled El Emam
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Preventiondj1arry
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)Shawn Tuma
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataStephen Cobb
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)Shawn Tuma
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskJohn Loveland
 
Cybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to KnowCybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to KnowShawn Tuma
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Lawguest8b10a3
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...Shawn Tuma
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramMSpadea
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 

Similar to DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED (20)

Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
Cybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
 
Cybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to KnowCybersecurity & Data Protection: What the GC & CEO Need to Know
Cybersecurity & Data Protection: What the GC & CEO Need to Know
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Mass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy LawMass 201 CMR 17 Data Privacy Law
Mass 201 CMR 17 Data Privacy Law
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Implementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy ProgramImplementing And Managing A Multinational Privacy Program
Implementing And Managing A Multinational Privacy Program
 
Keep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR SuccessKeep Calm and Comply: 3 Keys to GDPR Success
Keep Calm and Comply: 3 Keys to GDPR Success
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED

  • 1. SESSION ID: #RSAC Andrea Hoy, CISSP, CISM, MBA DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED CXO-R05 Founder and Virtual CISO A. Hoy & Associates Ronald I. Raether, Jr. Partner Troutman Sanders March 3, 2016
  • 2. #RSAC Agenda I. Background: Where are the Data Breaches occurring? II. How to Be Better Prepared for When Your Company Data is Breached A. Incident Response Plan – Must Haves B. Components of Data Breach Litigation for the CXO C. Top Ten Suggestions For Effective Management of Complex Business Litigation and Class Actions III. How to Avoid It: Lessons Learned & Best Practices A. Top 10 Steps for Data Litigation Preparedness
  • 3. #RSAC Cyberattacks and Breaches Cybercrime has cost the global economy annually: Reported Breaches in 2015 for 2014: Cyberattacks in the United States in 2013: Records Breached in 2014 Every second 32 Every minute 1,947 Every day 2,803,036 Every hour 116,793 Data records were lost or stolen with the following frequency: $1.5 million 2,122 Global (781 US) $575 billion 1,023,108,267
  • 4. #RSAC $6.5 million 9.1% Financial 8.1% Governent / Military Avg. Total Cost of a Data Breach $217 Avg. Total Cost/lost or Stolen record 40.0% Business 35.5% Healthcare Data Breaches by Industry Source: 2015Ponemon and IBM Report 7.4% Education (Retail / Utilities Travel / Hospitality Transportation / Others)
  • 5. #RSAC Source: Verizon 2014 DBIR Major Types of Data Breaches by Industry Travel and Hospitality 91% up from 75 % POS Financial Services 75% Web App attacks, DOS, card skimming Public Sector 98% from 4 types Healthcare* 46% Physical theft & loss Energy/Utilities 38% Web App attacks 31% Crimeware Retail 31% POS 33% DOS Manufacturing 54% CyberEspionage And DOS Professional Services 37% DOS Source: Verizon 2014 Data Breach IR
  • 6. #RSAC Major Types of Data Breaches by Industry 6 Don’t Forget Data Breach can be Physical! Physical Loss and Theft Public sector, followed by Healthcare and Financial 55% Internal workplace 22% Employee owned vehicles Laptops, tablets, smartphones So minor shifts between 2014 and 2015 reports Considerations: Security Awareness Learning and Education, Privileged Access Management
  • 7. #RSAC Lawsuits: 2014 Reported Breaches in 2014 (2015): 12.5% Breaches - Retail 60% Lawsuits – Retail Lawsuits associated with Data Breaches BUT BUT 110 1,367 (781)
  • 8. #RSAC Incident Response – Being Prepared 1. Incident Response Plan  Address various types of Data Breach  Provide critical steps for reasonable investigation of each type  Execute and do table top tests quarterly/annually  Development and IR Team Members/Contact information  Critical Emergency Contact List  Identify regulated Notifications  Appropriate law enforcement  Affected parties – individuals and third parties  Federal Reserve Bank (FRB) / Federal Trade Commission (FTC) / States Attorney General(s)  Suspicious Activity Report (SAR) 8
  • 9. #RSAC Incident Response – Being Prepared 2. Third Party/Vendor Service Provider Incident Response 3. Keep an incident timeline and document efforts taken  Who Reported the Breach  How it was Discovered  When and By Whom (may differ from who reported)  Incident Response Team meeting(s)  Actions taken to contain/control the breach or threat/vulnerability allowing the breach  Additional Third Party / Forensic / Investigative assistance  Regulatory notification 9
  • 10. #RSAC Incident Response – Being Prepared 4. Critical Emergency Contacts List  Incident Response Team  Data Breach Coach  Forensics expert/ Investigative expert  Public Relations Coach 5. Educate on where to store the IR Plan 6. Don’t Forget to include a Sample Breach Notification 7. Timeline for Notification(s) But what are the legal ramifications of giving Notice... 10
  • 11. #RSAC Is Notice Required? Take a Breath. Breach - Did you indeed have a breach as defined in the law? PII - Does the compromised information fit the definition of “personally identifiable information” as defined by the law? Notify - Considering the above, is there a duty to notify? Plan - Did you have and follow your IR Plan?
  • 12. #RSAC Notice is Required: Now What? “Sixty-three percent of respondents said notification letters they received offered no direction on the steps the consumer should take to protect their personal information. As a result, 31 percent said they terminated their relationship with the organization. Fifty-seven percent said they lost trust and confidence in the organization.” PONEMON INSTITUTE FOR ID EXPERTS, THE CONSUMER’S REPORT CARD ON DATA BREACH NOTIFICATION, SURVEY OF 1,795 U.S. ADULTS, APRIL 2008.
  • 13. #RSAC Event Response: Best Practices Accuracy & Speed Media Management Transparency Accountability Be Thorough Contacting Regulators Using Third-Party Firms/Partners
  • 14. #RSAC Best Practices: Contacting Regulators Consider reaching out to regulators, such as State Attorney Generals, before issuing a breach notice in order to Keep them well-informed; Avoid misunderstandings; Avoid unnecessary points of conflict; and Request their review of the notice. Certain states publish notice online (e.g., New Hampshire, Washington)
  • 15. #RSAC Privacy Policy Incident Response Plan Security Policies and Procedures Content Practice Security Awareness Learning and Education (S.A.L.E.) Business Continuity Plan Third Party/Vendor Management Plan Best Practices: Documents & Regulators
  • 16. #RSAC Top Ten Suggestions For Effective Management of Complex Business Litigation and Class Actions 1. Complex Litigation Needs to be Treated Differently – Select Appropriate Counsel 2. Avoid Side Issues – Preservation of Documents and Evidence 3. Control Costs and Budget Appropriately 4. Pay Attention to Changes In Law 5. Learn About Forum, Judge and Adversary 6. Participate Appropriately in Joint Defense Groups 7. Properly Assess the Risks of Litigation 8. Encourage Strategic Aggressiveness 9. Win the War, Not Just the Battles 10. Prepare to Win – If Appropriate, Settle Strategically
  • 18. #RSAC What Is In The Complaint? You had unreasonable information security controls You took too long to notify me You breached your promise to provide reasonable security I would not have paid the stated price (or done business with you) had I known you had bad data security
  • 19. #RSAC Opening Move – Alleged Harm Standing Viable Claim Unauthorized transaction (occurred) YES YES (but not if reimbursed) Unauthorized transaction (future) VARIES NO Time and Money spent resolving fraud YES YES (but not if reimbursed) Time and Money spent protecting against future harm VARIES VARIES Value of information NO NO Overpayment VARIES VARIES
  • 20. #RSAC Shifting Blame and Liability Payment Networks Liability Shift EMV (EuroPay, MasterCard, Visa) “Magstripe” to “Chip and PIN” or “Chip and Signature” October 2015 Exception auto fuel dispensers - June 2017 Why? Card related financial fraud Bigger issue – shift of liability for this type of data breach Affects banks, credit unions, financial institutions, merchants issuing credit/debit/payment cards 22
  • 21. #RSAC Lack of reasonable controls No Information Security Plan (ISP) ISPs inconsistent with practices Bad documents No witness Why Are Cases Settling
  • 22. #RSAC The basic building blocks of any data governance plan are rooted in law and industry standards, best practices HIPAA GLBA, FFIEC CyberSecurity Assessment PCI DSS ISO 27001, NIST CyberSecurity Framework, Top 20 CSC and other industry standards International (i.e. EUPD), state laws and regulations Governance, Risk and Compliance (GRC) But We Have To…
  • 23. #RSAC Governance, Risk and Compliance (GRC) GOVERNANCE is based on Administrative, Technical & Physical Safeguards What Your Company is EXPECTED to understand: Data they collect Where the Data is kept How it is being used, and With Whom is it Shared Obligations to keep such information secure AND ensure employees, third parties, and contractors are educated to do the same Obligations to mitigate harms and respond appropriately to all security incidents Functions are about MORE than RISK avoidance; its about creating a culture of privacy COMPLIANCE
  • 24. #RSAC Data Classification & Data Mapping You cannot govern what you do not understand Define the data in external terms Personally identifiable information ("PII") Protected health information ("PHI") ("HIPAA") Nonpublic personal information ("NPI") ("GLBA") Define the data according to internal standard High, medium and low risk Level I, II & III Confidential, Public & Proprietary You cannot safeguard what you cannot locate Map existing locations where PII/NPI/PHI is stored Technical locations: databases, servers and systems Physical locations: office, floor and office buildings Don’t forget the "cloud" Map of existing data flows Internal: between locations External: from internal locations to external locations Map of existing applications Internal: what functions and what data External (including cloud): what functions and what data #1 Step of any GRC Program
  • 25. #RSAC Administrative Safeguards Drafting policies (the "why") Drafting procedures (the "how") Educate on policies and procedures Regularly scheduled training sessions Assessments Evaluation of competency Awareness program (there is a difference) Programs with Documented Plans Incident Response Plan with Data Breach Response Business Continuity Plan Security Awareness and Learning/Training Plan
  • 26. #RSAC Boundary Routers Firewalls Proxy Servers VPN SIEM NIDS/NIPS RADIUS NAC Gateway AntiVirus/Malware Spam Blockers Application Proxy Web Service Security Integrity/Validation Content Filter Data Encryption Identity Management HIDS/HIPS Host AntiVirus/Malware Anti-Spyware Patch Management Server Certificates Cardkey Entry Locks Laptop Locks Credentials/ID Badges RFID Biometrics Surveillance Cameras Freon (Fire Retardant) Desk & Office Keys Security Guards Perimeter Fences Host (Platform Layer) Perimeter (Network Layer) Physical Security Software (Application Layer) Personnel (User Layer) UserIDs/Passwords, PKI, S.A.L.E. Multifactor-Authentication, Tokens Chip and PIN (EMV), Need to Know Defense In Depth
  • 27. #RSAC Tensions in Data Governance Security vs. Privacy Obligation to provide security for personal information and other confidential material Rules for processing Personal Information (and analogs outside the EU) Quick response to attacks and changing strategies Requirements to obtain user consent and register applications/processing Need to retain log and traffic data for analysis Restrictions on data retention Need to consolidate data for analysis Export limitations on "personal data," banking information and "state secrets" IT Operational Business Needs Obligation to keep systems available/operational SLAs Customer experience Time to market Expense Concerns Technology needs Retain everything Competitive pressures Internal Deadlines for Project Implementations
  • 28. #RSAC Finding a balance between: Technology Operations Data use and needs Security Authority Accountability Privacy Data Governance
  • 29. #RSAC Who Decides? Business IT CISO CEO How is the risk captured? Reserve Cyber Insurance Resolution of Competing Interests
  • 31. #RSAC Project Management Initial Risk Assessment Identification of NPI/PII/PHI Identify external access to data onsite Identify encryption utilized Identify remote access requirements CyberSecurity Insurance Assessment Third party contracts Incident Response Plan execution Process Timing of decisions Threat timeline Results Documentation Compliance: Documentation of the CISO Process
  • 32. #RSAC Food For Thought.... Many of the factors we suggest based on practice, are supported by statistics, for decreasing the data breach financial impact. (Business Continuity Mgmt.) Source: 2015 Ponemon Data Breach Research
  • 33. #RSAC So To Be Better Prepared for Data Breach Litigation…. Top 10 Steps 1. Educate your users on Security and Privacy Responsibilities Signed User Agreements Signed Contractor 3rd Party User Agreements 2. Involve your Business Continuity team 3. Identify and have an exercised Incident Response Team 4. Appoint / Hire a CISO who has responsibilities 5. Exercise consistent Data Classification and then Encrypt Sensitive information Don’t forget Laptops, Tablets, and Mobile Device Encryption 6. Execute signed 3rd Party Agreement Services in advance a. IR team b. Data Breach Coach c. Crisis Mgmt PR team 7. Reporting and Handling of Lost or Stolen Devices 8. Invest in a CyberSecurity Policy..or two 9. Educate the Board prior to the Event and Involve them after 10. Remember tips on Notification
  • 34. #RSAC Questions on Data Breach Litigation and Being Prepared? Ronald I. Raether, Jr. Ronald.Raether@troutmansanders.com (949) 622-2722 Andrea C.Hoy CISSP, CISM, MBA ahoy (at) securIT.us or ahoy (at) ISSA.org (949) 606-5333 office
  • 35. #RSAC Ron Raether is a partner in the Cybersecurity, Information Governance and Privacy, and Financial Services Litigation practices at Troutman Sanders. Ron is known as the interpreter between the business and information technology, guiding both parties to the best result. In this role, Ron has assisted companies in navigating federal and state privacy laws for almost twenty years. Ron's experience with technology-related issues, including data security, patent, antitrust, and licensing and contracts, helps bring a fresh and creative perspective to novel data compliance issues. Ron has been involved in seminal data compliance cases, assisting one of the first companies required to provide notice of a data breach and successfully defending companies in over 50 class actions. Ron also has represented companies in over 200 individual FCRA cases involving CRAs, resellers, furnishers, users, and public record vendors. Ron has developed a reputation for assisting companies not traditionally viewed as subject to the FCRA or with FCRA compliance questions where the law remains uncertain or unresolved. Ron not only works with companies which have experienced unauthorized access to consumer data or have been named defendants in class actions and before regulators, but also has advised companies in developing compliance programs to proactively address these issues. As a thought leader, Ron speaks nationally and publishes frequently on cutting-edge compliance issues. Ron is also a Certified Information Privacy Professional. Ronald I. Raether, Jr. Partner
  • 36. #RSAC Firm Highlights 39  “And in the most dramatic shift, Troutman Sanders, which ranked No. 53 in last year's survey, jumped to the No. 3 spot, having handled 87 district court cases in 2014, according to the survey….” – Corporate Counsel’s 2015 Patent Litigation Survey.  Troutman Sanders ranked nationally in 39 practice areas in the 2016 edition of U.S. News – Best Lawyers “Best Law Firms.”  40 Troutman Sanders litigators have been highlighted in the most recent issues of Chambers USA or Chambers Global.  Clients rank Troutman Sanders in the top 5% of firms for class actions, according to BTI Litigation Outlook 2016, and the 2015 U.S. News – Best Law Firms rates the firm as Tier 1 in the nation for Class Action Defense.  Troutman Sanders was mentioned in a June 24 Law360 article about 25 law firms that general counsels recommend to their friends as reported in The BTI Consulting Group’s 2015 Most Recommended Law Firms report.
  • 37. #RSAC www.securIT.us Andrea C. Hoy, CISSP, CISM, MBA Andrea Hoy, received her initiation into the infosec community when her hard work and dedication for a safe international event earned her the role as an Asst. Venue Manager for the highly successful LA Summer Olympic Games. Andrea’s leadership positions include McDonnell Douglas, Rockwell, Boeing NA and Fluor. Her clients are from a diverse mix of industries that include Litton, Pacific Life, Genentech, Molina Healthcare, Activision, WAMU (now Chase), Hamni, and East West Banks. She’s served and been recognized as an advisor to the Pentagon and as ISO for the 5th largest credit union as it went through its most major technology and growth past $10 billion in assets and 600,000 in membership. Ms. Hoy is the founder of A.Hoy & Associates, a “virtual CISO” provider as well as infosecurity consulting, GRC, incident response, CISO Bootcamp training firm, assisting companies to establish policies and procedures to comply with NIST CyberSecurity Framework, top 20 Critical Controls, EUPD and privacy laws here and abroad to name a few. She represented the US as diplomat to China on eDiscovery and forensics. Andrea is actively involved in the community serving as the International President of the Information Systems Security Association (ISSA) the commun ity of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information, after elected Vice President. ISSA members represent >10,000 security professionals worldwide with 137 chapters in 71 countries. Ms. Hoy cofounded the CISO Executive Forum and recently chartered the Financial SIG. She previously served on the Technical Advisory Board for RSA for 4 years, advised the International Board of Directors for PointSec/ProtectData of Sweden, as well as Board of Advisors for Encentuate, a global identity management and provisioning company, leading to its acquisition by IBM, and DigitalSafe in Switzerland. She has previously been in the LA Times, Orange County Register: People in Technology to Watch”, MiCTa Radio, TechTarget and KNX News Radio. Andrea received her MBA from Pepperdine University in Malibu, and prior to that graduated Magna Cum Laude and was entered into the honor society of Beta Gamma Sigma, the Phi Beta Kappa of the School of Business.