SlideShare a Scribd company logo
babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA I TENNESSEE
Data Breach Response Planning:
Laying the Right Foundation
September 16, 2015
Presented by
Paige M. Boshell
and
Amy S. Leopard
© 2015 Bradley Arant Boult Cummings LLP
Attorneys from our Privacy and
Information Security Team
Paige M. Boshell Amy S. Leopard
• Co-Team Leader, Privacy &
Information Security Team
• Chair, AHLA Health Information and
Technology Practice Group
• Vice Chair, HIMSS Legal Task Force
• Partner, Nashville Office
• Co-Team Leader, Privacy
& Information Security
Team
• Partner, Birmingham
Office
2
© 2015 Bradley Arant Boult Cummings LLP
Cybersecurity Planning
Data Breach Plan (incident response)
Cybersecurity Program
FTC Enforcement of “Unfair” Security
Practices
FFIEC Cybersecurity Assessment Tool
(financial institutions)
Healthcare Enforcement
HIPAA Security Breach Risk Assessment
Agenda
3
© 2015 Bradley Arant Boult Cummings LLP
National Institute of Standards and Technology
(“NIST”) Cybersecurity Framework
– Defined rubric and methodology for evaluating and addressing
risk
– Technology – neutral
– Relies on existing requirements, best practices and industry
standards
– “Voluntary” for certain government contractors
– Widespread impact – downstream chain, court and regulatory
interpretations of reasonable or industry standard security
practices and programs, applicability to variety of businesses
Cybersecurity Planning
4
© 2015 Bradley Arant Boult Cummings LLP
Information Sharing and Analysis Centers (ISAC):
- ISACs are trusted entities established by Critical Infrastructure Key
Resource (CI/KR) owners and operators to provide comprehensive
sector analysis, which is shared within the sector, with other sectors,
and with government.
- Services provided by ISACs include risk mitigation, incident response,
alert and information sharing. The goal is to provide users with
accurate, actionable, and relevant information.
- Member benefits vary across the ISACs and can include: access to a
24/7 security operations center; briefings; white papers; threat calls;
webinars; and anonymous CIKR Owner/Operator reporting.
Cybersecurity Planning
5
© 2015 Bradley Arant Boult Cummings LLP
Cybersecurity Planning
FS-ISAC: industry forum for collaboration on critical
security threats facing the global financial services
sector
– Global cyber and physical threat intelligence analysis and
sharing (anonymous information sharing)
– Early warning of attacks
– Collaboration in response
– Coordination of assessment
NH – ISAC: healthcare and public health critical
infrastructure resilience
Expert guidance on avoiding and mitigating attacks
6
© 2015 Bradley Arant Boult Cummings LLP
Before
Cyber
Attack
ID mission critical data and assets: “Crown Jewels”
Actionable Incident Response Plan before intrusion,
Test and update contingency plans
Align organizational policies (e.g. HR) with Incident Response Plan
Obtain authorization, technology and services to permit lawful network
monitoring and address incidents
Ensure legal counsel is familiar with technology and cyber incident
management to reduce incident response time
Engage with law enforcement, outside counsel, PR Firms, cybersecurity
firms
Establish relationships with cyber information sharing organizations for
best practices (ISACs)
U.S. DOJ: Cyber Incident Best Practices
(April 2015)
7
© 2015 Bradley Arant Boult Cummings LLP
During A
Cyber Attack
After
Recovering
Continue monitoring for anomalous activity to document intruder expelled
Who controls your network?
Conduct Post-Incident review for deficiencies in Incident Response Plan
Update and revise security policies or controls
“Review documentation periodically, and update as needed, in response to environmental or
operational changes affecting the security of ePHI.” HIPAA 164.316(b)(2)(iii)
Make initial assessment of scope and nature of incident
Implement measures to minimize continuing damage
Record and preserve data related to incident (image network, audit logs, records of attacks)
Notify management, law enforcement, victims, DHS
HIPAA = > Individuals, HHS/OCR, Media,
DO NOT: use compromised systems to communicate OR
Hack back
Cyber Incident Best Practices (US DOJ: April 2015)
8
© 2015 Bradley Arant Boult Cummings LLP
FTC enforcement authority – Wyndham
2015 WL 4998121 (3d Cir. 8.24.15)
Deceptive:
– Not implementing stated privacy policies
– Misrepresenting extent to which privacy and security of information collected,
used, maintained is protected
Unfair:
– Alleged failure to implement reasonable and appropriate security measures
– Elements:
• Practice causes or is likely to cause substantial injury to consumers
• Consumers are not reasonably able to avoid injury
• Injury is not outweighed by countervailing consumer benefit, competition
– Fair notice: That a company’s conduct could fall within statute, not FTC’s
interpretation of cybersecurity practices.
• FTC has published data security guidance and data security complaints
– MUST keep abreast of FTC guidance and complaints
9
Section 5 of the FTC Act: “Unfair and Deceptive” Acts or Practices
© 2015 Bradley Arant Boult Cummings LLP
What is Fair Notice under Wyndham?
Issue Card Systems Solutions (FTC 2006)1 Wyndham
Risk Assessment and
Network Monitoring
Did not adequately assess the vulnerability of
its web application and computer network to
commonly known or reasonably foreseeable
attacks; did not implement simple, low-cost and
readily available defenses to such attacks, CSS
at ¶ 6(2)-(3).
Failed to monitor network for the malware used in a
previous intrusion, Compl. at ¶ 24(i), reused by hackers
later to access the system again, id. at ¶ 34.
Security Monitoring
and Management
Generally
Failed to employ sufficient measures to detect
unauthorized access to personal information or
to conduct security investigations, CSS at ¶ 6(6).
Failed to employ reasonable measures to detect and
prevent unauthorized access to computer network or to
conduct security investigations, Compl. at ¶ 24(h).
Password
Management
Failed to use strong passwords to prevent a
hacker from gaining control over computers on
its computer network and access to personal
information stored on the network, CSS at ¶
6(4).
Did not employ common methods to require user IDs and
passwords difficult for hackers to guess. (e.g., allowed
remote access to a hotel’s property management system
that used default/factory setting passwords) Compl. at ¶
24(f).
Maintenance of PI
Created unnecessary risks to personal
information by storing it in a vulnerable format
for up to 30 days, CSS at ¶ 6(1).
Allowed software to store payment card information in
clear readable text, Compl. At ¶ 24(b).
Network Risk
Management
Did not use readily available security measures
to limit access between computers on its
network and between those computers and the
Internet, CSS at ¶ 6(5).
Did not use readily available security measures, such as
firewalls, to limit access between and among hotels’
property management systems, the Wyndham network,
and the Internet, Compl. at ¶ 24(a).
1 No. C-4168 (FTC 2006)
10
© 2015 Bradley Arant Boult Cummings LLP
10 FTC Lessons Learned from >50
Enforcement Actions
1. Start with Security.
2. Control access to data sensibly.
3. Require secure passwords and
authentication.
4. Store sensitive personal information
securely and protect it during transmission.
5. Segment your network and monitor who’s
trying to get in and out.
6. Secure remote access to your network.
7. Control access to data sensibly.
8. Make sure your service providers implement
reasonable security measures.
9. Put procedures in place to keep your security
current and address vulnerabilities that may
arise.
10. Secure paper, physical media, and devices.
Source: FTC Lessons Learned from FTC Enforcement Actions business.ftc.gov
11
© 2015 Bradley Arant Boult Cummings LLP
FFIEC Cybersecurity Assessment Tool
FFIEC Cybersecurity Assessment Tool: intended
to help financial institutions evaluate their own
ISP and risk profile
– Inherent Risk Profile
– Cybersecurity Maturity
12
© 2015 Bradley Arant Boult Cummings LLP
FFIEC Cybersecurity Assessment Tool:
Inherent Risk Profile
Inherent Risk Profile - level of risk posed by the
following:
– Technologies and Connection Types
– Delivery Channels
– Online/Mobile Products and Technology Services
– Organizational Characteristics
– External Threats
13
© 2015 Bradley Arant Boult Cummings LLP
Risk Levels – For each of the categories above, there is a risk
level that the institution can choose based on descriptions
provided in the Tool. For instance, in reviewing External Threats,
institutions are given five risk levels to choose from, which are
defined for each category. The table below illustrates the various
risk levels.
FFIEC Cybersecurity Assessment Tool:
Inherent Risk Profile
14
Category:
External Threats
Risk Levels
Least Minimal Moderate Significant Most
Attempted cyber No attempted Few attempts Several attempts monthly Significant number of attempts Substantial number
attacks attacks or monthly (101-500);phishing monthly (501-100,000);spear of attempts
reconnaissance. (<100); may campaigns targeting phishing campaigns targeting monthly (>
have had employees or customers at high net worth customers and 100,000);
generic the institution or third employees at the institutionor persistentattempts
phishing parties supporting critical third parties supporting critical to attack senior
campaigns by activities; may have activities; Institution
specifically
management
employees experienced an attempted
is named in threat reports;
may and/or network
and Distributed Denial of have experienced multiple administrators;
customers. Service (DDoS) attack within
the last year.
DDoS attacks within the last
year.
frequently targeted
for DDoS attacks.
© 2015 Bradley Arant Boult Cummings LLP 15
FFIEC Cybersecurity Assessment Tool:
Cybersecurity Maturity
© 2015 Bradley Arant Boult Cummings LLP
CULTURE
Baseline Management holds employees accountable for complying with the information
security program. (FFIEC Information Security Booklet, page 7)
Evolving The institution has formal standards of conduct that hold all employees
accountable for complying with cybersecurity policies and procedures.
Cyber risks are actively discussed at business unit meetings.
Employees have a clear understanding of how to identify and escalate potential
cybersecurity issues.
Intermediate Management ensures performance plans are tied to compliance with
cybersecurity policies and standards in order to hold employees accountable.
The risk culture requires formal consideration of cyber risks in all business
decisions.
Cyber risk reporting is presented and discussed at the independent risk
management meetings.
Advanced Management ensures continuous improvement of cyber risk cultural
awareness.
Innovative The institution leads efforts to promote cybersecurity culture across the sector
and to other sectors that they depend upon.
16
Domain 1: Cyber Risk Management and Oversight Training and Culture Culture
FFIEC Cybersecurity Assessment Tool:
Cybersecurity Maturity
© 2015 Bradley Arant Boult Cummings LLP 17
FFIEC Cybersecurity Assessment Tool:
Cybersecurity Maturity
Baseline – Characterized by minimum expectations required by law and regulations or
recommended in supervisory guidance. This level includes compliance-driven objectives.
Management has reviewed the evaluated guidance.
© 2015 Bradley Arant Boult Cummings LLP 18
FFIEC Cybersecurity Assessment Tool: Mapping
Inherent Risk Against Cybersecurity Maturity
© 2015 Bradley Arant Boult Cummings LLP 19
FFIEC Cybersecurity Assessment Tool:
Evolving Process
© 2015 Bradley Arant Boult Cummings LLP
FFIEC Cybersecurity Assessment Tool:
Board (and Management) Oversight
Risk Management Oversight
– What is the process for ensuring ongoing and
routine discussions by the board and senior
management about cyber threats and
vulnerabilities?
– How is accountability determined for
managing cyber risks across our enterprise?
Does this include management’s
accountability for business decisions that may
introduce new cyber risks?
– What is the process for ensuring ongoing
employee awareness and effective response to
cyber risks?
Cyber Security Controls
– What is our process for classifying data and
determining appropriate controls based on
risk?
– What is our process for ensuring that risks
identified through our detective controls are
remediated?
Cyber Incident Management and
Resilience
– In the event of a cyber attack, how will we
respond internally and with customers, third
parties, regulators, and law enforcement?
– How are cyber incident scenarios
incorporated in our business continuity and
disaster recovery plans? Have these plans
been tested?
Source: Federal Financial Institutions Examination Council (FFIEC)
20
© 2015 Bradley Arant Boult Cummings LLP
“Recurring Issues” in Healthcare Enforcement
1. Risk Analysis
2. Vendor (Business Associate)
Agreements
3. Failure to Manage Identified Risk,
e.g. Encrypt
4. Lack of Transmission Security
5. Lack of Appropriate Auditing
6. No Patching of Software
7. Insider Threat
8. Improper Disposal
9. Insufficient Data Backup and
Contingency Planning
• Many have RA+, NY/Columbia $4.8M, St.
Elizabeth: document sharing application
to store PHI without analyzing risk $250K
• Almost 1000 cloud providers/hospital
• Concentra $1.7M – stolen unencrypted
laptop
• Anchorage Community Mental Health –
Malware from unpatched vulnerabilities
$150K
• Cornell Prescription Rx $125K
Source: US HHS Office for Civil Rights (OCR), 9/2015
Resolution Agreements often involve allegations of widespread noncompliance, lack of any risk analysis.
21
© 2015 Bradley Arant Boult Cummings LLP
Questions?
Paige M. Boshell
205.521.8639
pboshell@babc.com
www.babc.com/paige-m-boshell
Amy S. Leopard
615.252.2309
aleopard@babc.com
www.babc.com/amy-s-leopard
22

More Related Content

What's hot

The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
Kroll
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
saurnou
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
Sean Graham
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
Dan Michaluk
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity Requirements
Kyle Brown
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
lgcdcpas
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
Fletcher Media
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
HB Litigation Conferences
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
padler01
 
New York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsNew York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulations
Brunswick Group
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Don Grauel
 
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
Barry Caplin
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
David Sweigert
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure Sector
CBIZ, Inc.
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
Glenn E. Davis
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
IISPEastMids
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
Rohan Sehgal
 

What's hot (20)

The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
How to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity RequirementsHow to Approach the NYDFS Proposed Cybersecurity Requirements
How to Approach the NYDFS Proposed Cybersecurity Requirements
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
New York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulationsNew York DFS proposed cybersecurity regulations
New York DFS proposed cybersecurity regulations
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
Ncma saguaro cyber security 2016 law &amp; regulations asis phoenix dely fina...
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
 
What Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure SectorWhat Financial Institution Cyber Regs Tell the Infrastructure Sector
What Financial Institution Cyber Regs Tell the Infrastructure Sector
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
Cyber Insurance Temp
Cyber  Insurance  TempCyber  Insurance  Temp
Cyber Insurance Temp
 

Similar to Data breach-response-planning-laying-the-right-foundation

The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
Global Knowledge Training
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
TraintechTde
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
Sarah Cirelli
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
Skoda Minotti
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
Taiye Lambo
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
Michael C. Keeling, Esq.
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
Mark Bennett
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
Marc Crudgington, MBA
 
MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2
Chris Baldwin
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
Ethos Media S.A.
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15
MassEHealth
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
Ulf Mattsson
 
Data Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident SimulationData Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident Simulation
Bradley Arant Boult Cummings LLP
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
Ken M. Shaurette
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
American Chamber of Commerce in Bahrain
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
IFG Network marcus evans
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
Precisely
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
Matt Moneypenny
 

Similar to Data breach-response-planning-laying-the-right-foundation (20)

The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2MUSE 2015 Product Showcase v2
MUSE 2015 Product Showcase v2
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
Data Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident SimulationData Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident Simulation
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
 

More from Bradley Arant Boult Cummings LLP

Data Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar RecordingData Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar Recording
Bradley Arant Boult Cummings LLP
 
Constructing the Best Coverage for You - It Pays To Be Covered Webinar Series...
Constructing the Best Coverage for You - It Pays To Be Covered Webinar Series...Constructing the Best Coverage for You - It Pays To Be Covered Webinar Series...
Constructing the Best Coverage for You - It Pays To Be Covered Webinar Series...
Bradley Arant Boult Cummings LLP
 
Mind the Gap Between D&O and E&O Insurance Policies
Mind the Gap Between D&O and E&O Insurance PoliciesMind the Gap Between D&O and E&O Insurance Policies
Mind the Gap Between D&O and E&O Insurance Policies
Bradley Arant Boult Cummings LLP
 
Hot Topics in Data Breach Litigation
Hot Topics in Data Breach LitigationHot Topics in Data Breach Litigation
Hot Topics in Data Breach Litigation
Bradley Arant Boult Cummings LLP
 
Mind the Gap with Between Occurrence and Claims-Made Policies
Mind the Gap with Between Occurrence and Claims-Made PoliciesMind the Gap with Between Occurrence and Claims-Made Policies
Mind the Gap with Between Occurrence and Claims-Made Policies
Bradley Arant Boult Cummings LLP
 
Cognitive Neuroscience Model Neural Software Patent Examination
Cognitive Neuroscience Model Neural Software Patent ExaminationCognitive Neuroscience Model Neural Software Patent Examination
Cognitive Neuroscience Model Neural Software Patent Examination
Bradley Arant Boult Cummings LLP
 
Fill the Gap with the Subcontractor Exception to Your Work Exclusion
Fill the Gap with the Subcontractor Exception  to Your Work ExclusionFill the Gap with the Subcontractor Exception  to Your Work Exclusion
Fill the Gap with the Subcontractor Exception to Your Work Exclusion
Bradley Arant Boult Cummings LLP
 
Independent Contractor or Employee? Avoiding Worker Misclassification Confusion
Independent Contractor or Employee? Avoiding Worker Misclassification ConfusionIndependent Contractor or Employee? Avoiding Worker Misclassification Confusion
Independent Contractor or Employee? Avoiding Worker Misclassification Confusion
Bradley Arant Boult Cummings LLP
 
Understanding CIPs, Builder’s Risk, and Inland Marine Insurance Policies
Understanding CIPs, Builder’s Risk, and Inland Marine Insurance PoliciesUnderstanding CIPs, Builder’s Risk, and Inland Marine Insurance Policies
Understanding CIPs, Builder’s Risk, and Inland Marine Insurance Policies
Bradley Arant Boult Cummings LLP
 
Insurance Provisions in Commercial Contracts
Insurance Provisions in Commercial ContractsInsurance Provisions in Commercial Contracts
Insurance Provisions in Commercial Contracts
Bradley Arant Boult Cummings LLP
 
Fill the Gap Between You and Your Property Rights: Emerging Issues in Title I...
Fill the Gap Between You and Your Property Rights: Emerging Issues in Title I...Fill the Gap Between You and Your Property Rights: Emerging Issues in Title I...
Fill the Gap Between You and Your Property Rights: Emerging Issues in Title I...
Bradley Arant Boult Cummings LLP
 
Obtaining Title Insurance on Construction Loans: Avoiding Pitfalls Regarding ...
Obtaining Title Insurance on Construction Loans: Avoiding Pitfalls Regarding ...Obtaining Title Insurance on Construction Loans: Avoiding Pitfalls Regarding ...
Obtaining Title Insurance on Construction Loans: Avoiding Pitfalls Regarding ...
Bradley Arant Boult Cummings LLP
 
A Look Behind The Compliance Headlines
A Look Behind The Compliance HeadlinesA Look Behind The Compliance Headlines
A Look Behind The Compliance Headlines
Bradley Arant Boult Cummings LLP
 
Statutory class actions developments and strategies
Statutory class actions developments and strategiesStatutory class actions developments and strategies
Statutory class actions developments and strategies
Bradley Arant Boult Cummings LLP
 
Finding the earliest and least expensive exit
Finding the earliest and least expensive exitFinding the earliest and least expensive exit
Finding the earliest and least expensive exit
Bradley Arant Boult Cummings LLP
 

More from Bradley Arant Boult Cummings LLP (15)

Data Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar RecordingData Breach: Hot Topics in Information Security Trends Webinar Recording
Data Breach: Hot Topics in Information Security Trends Webinar Recording
 
Constructing the Best Coverage for You - It Pays To Be Covered Webinar Series...
Constructing the Best Coverage for You - It Pays To Be Covered Webinar Series...Constructing the Best Coverage for You - It Pays To Be Covered Webinar Series...
Constructing the Best Coverage for You - It Pays To Be Covered Webinar Series...
 
Mind the Gap Between D&O and E&O Insurance Policies
Mind the Gap Between D&O and E&O Insurance PoliciesMind the Gap Between D&O and E&O Insurance Policies
Mind the Gap Between D&O and E&O Insurance Policies
 
Hot Topics in Data Breach Litigation
Hot Topics in Data Breach LitigationHot Topics in Data Breach Litigation
Hot Topics in Data Breach Litigation
 
Mind the Gap with Between Occurrence and Claims-Made Policies
Mind the Gap with Between Occurrence and Claims-Made PoliciesMind the Gap with Between Occurrence and Claims-Made Policies
Mind the Gap with Between Occurrence and Claims-Made Policies
 
Cognitive Neuroscience Model Neural Software Patent Examination
Cognitive Neuroscience Model Neural Software Patent ExaminationCognitive Neuroscience Model Neural Software Patent Examination
Cognitive Neuroscience Model Neural Software Patent Examination
 
Fill the Gap with the Subcontractor Exception to Your Work Exclusion
Fill the Gap with the Subcontractor Exception  to Your Work ExclusionFill the Gap with the Subcontractor Exception  to Your Work Exclusion
Fill the Gap with the Subcontractor Exception to Your Work Exclusion
 
Independent Contractor or Employee? Avoiding Worker Misclassification Confusion
Independent Contractor or Employee? Avoiding Worker Misclassification ConfusionIndependent Contractor or Employee? Avoiding Worker Misclassification Confusion
Independent Contractor or Employee? Avoiding Worker Misclassification Confusion
 
Understanding CIPs, Builder’s Risk, and Inland Marine Insurance Policies
Understanding CIPs, Builder’s Risk, and Inland Marine Insurance PoliciesUnderstanding CIPs, Builder’s Risk, and Inland Marine Insurance Policies
Understanding CIPs, Builder’s Risk, and Inland Marine Insurance Policies
 
Insurance Provisions in Commercial Contracts
Insurance Provisions in Commercial ContractsInsurance Provisions in Commercial Contracts
Insurance Provisions in Commercial Contracts
 
Fill the Gap Between You and Your Property Rights: Emerging Issues in Title I...
Fill the Gap Between You and Your Property Rights: Emerging Issues in Title I...Fill the Gap Between You and Your Property Rights: Emerging Issues in Title I...
Fill the Gap Between You and Your Property Rights: Emerging Issues in Title I...
 
Obtaining Title Insurance on Construction Loans: Avoiding Pitfalls Regarding ...
Obtaining Title Insurance on Construction Loans: Avoiding Pitfalls Regarding ...Obtaining Title Insurance on Construction Loans: Avoiding Pitfalls Regarding ...
Obtaining Title Insurance on Construction Loans: Avoiding Pitfalls Regarding ...
 
A Look Behind The Compliance Headlines
A Look Behind The Compliance HeadlinesA Look Behind The Compliance Headlines
A Look Behind The Compliance Headlines
 
Statutory class actions developments and strategies
Statutory class actions developments and strategiesStatutory class actions developments and strategies
Statutory class actions developments and strategies
 
Finding the earliest and least expensive exit
Finding the earliest and least expensive exitFinding the earliest and least expensive exit
Finding the earliest and least expensive exit
 

Recently uploaded

Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
EbizfilingIndia
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
SKshi
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
Parsons Behle & Latimer
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 

Recently uploaded (20)

Incometax Compliance_PF_ ESI- June 2024
Incometax  Compliance_PF_ ESI- June 2024Incometax  Compliance_PF_ ESI- June 2024
Incometax Compliance_PF_ ESI- June 2024
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
Presentation (1).pptx Human rights of LGBTQ people in India, constitutional a...
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
It's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of InterestIt's the Law: Recent Court and Administrative Decisions of Interest
It's the Law: Recent Court and Administrative Decisions of Interest
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 

Data breach-response-planning-laying-the-right-foundation

  • 1. babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA I TENNESSEE Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard
  • 2. © 2015 Bradley Arant Boult Cummings LLP Attorneys from our Privacy and Information Security Team Paige M. Boshell Amy S. Leopard • Co-Team Leader, Privacy & Information Security Team • Chair, AHLA Health Information and Technology Practice Group • Vice Chair, HIMSS Legal Task Force • Partner, Nashville Office • Co-Team Leader, Privacy & Information Security Team • Partner, Birmingham Office 2
  • 3. © 2015 Bradley Arant Boult Cummings LLP Cybersecurity Planning Data Breach Plan (incident response) Cybersecurity Program FTC Enforcement of “Unfair” Security Practices FFIEC Cybersecurity Assessment Tool (financial institutions) Healthcare Enforcement HIPAA Security Breach Risk Assessment Agenda 3
  • 4. © 2015 Bradley Arant Boult Cummings LLP National Institute of Standards and Technology (“NIST”) Cybersecurity Framework – Defined rubric and methodology for evaluating and addressing risk – Technology – neutral – Relies on existing requirements, best practices and industry standards – “Voluntary” for certain government contractors – Widespread impact – downstream chain, court and regulatory interpretations of reasonable or industry standard security practices and programs, applicability to variety of businesses Cybersecurity Planning 4
  • 5. © 2015 Bradley Arant Boult Cummings LLP Information Sharing and Analysis Centers (ISAC): - ISACs are trusted entities established by Critical Infrastructure Key Resource (CI/KR) owners and operators to provide comprehensive sector analysis, which is shared within the sector, with other sectors, and with government. - Services provided by ISACs include risk mitigation, incident response, alert and information sharing. The goal is to provide users with accurate, actionable, and relevant information. - Member benefits vary across the ISACs and can include: access to a 24/7 security operations center; briefings; white papers; threat calls; webinars; and anonymous CIKR Owner/Operator reporting. Cybersecurity Planning 5
  • 6. © 2015 Bradley Arant Boult Cummings LLP Cybersecurity Planning FS-ISAC: industry forum for collaboration on critical security threats facing the global financial services sector – Global cyber and physical threat intelligence analysis and sharing (anonymous information sharing) – Early warning of attacks – Collaboration in response – Coordination of assessment NH – ISAC: healthcare and public health critical infrastructure resilience Expert guidance on avoiding and mitigating attacks 6
  • 7. © 2015 Bradley Arant Boult Cummings LLP Before Cyber Attack ID mission critical data and assets: “Crown Jewels” Actionable Incident Response Plan before intrusion, Test and update contingency plans Align organizational policies (e.g. HR) with Incident Response Plan Obtain authorization, technology and services to permit lawful network monitoring and address incidents Ensure legal counsel is familiar with technology and cyber incident management to reduce incident response time Engage with law enforcement, outside counsel, PR Firms, cybersecurity firms Establish relationships with cyber information sharing organizations for best practices (ISACs) U.S. DOJ: Cyber Incident Best Practices (April 2015) 7
  • 8. © 2015 Bradley Arant Boult Cummings LLP During A Cyber Attack After Recovering Continue monitoring for anomalous activity to document intruder expelled Who controls your network? Conduct Post-Incident review for deficiencies in Incident Response Plan Update and revise security policies or controls “Review documentation periodically, and update as needed, in response to environmental or operational changes affecting the security of ePHI.” HIPAA 164.316(b)(2)(iii) Make initial assessment of scope and nature of incident Implement measures to minimize continuing damage Record and preserve data related to incident (image network, audit logs, records of attacks) Notify management, law enforcement, victims, DHS HIPAA = > Individuals, HHS/OCR, Media, DO NOT: use compromised systems to communicate OR Hack back Cyber Incident Best Practices (US DOJ: April 2015) 8
  • 9. © 2015 Bradley Arant Boult Cummings LLP FTC enforcement authority – Wyndham 2015 WL 4998121 (3d Cir. 8.24.15) Deceptive: – Not implementing stated privacy policies – Misrepresenting extent to which privacy and security of information collected, used, maintained is protected Unfair: – Alleged failure to implement reasonable and appropriate security measures – Elements: • Practice causes or is likely to cause substantial injury to consumers • Consumers are not reasonably able to avoid injury • Injury is not outweighed by countervailing consumer benefit, competition – Fair notice: That a company’s conduct could fall within statute, not FTC’s interpretation of cybersecurity practices. • FTC has published data security guidance and data security complaints – MUST keep abreast of FTC guidance and complaints 9 Section 5 of the FTC Act: “Unfair and Deceptive” Acts or Practices
  • 10. © 2015 Bradley Arant Boult Cummings LLP What is Fair Notice under Wyndham? Issue Card Systems Solutions (FTC 2006)1 Wyndham Risk Assessment and Network Monitoring Did not adequately assess the vulnerability of its web application and computer network to commonly known or reasonably foreseeable attacks; did not implement simple, low-cost and readily available defenses to such attacks, CSS at ¶ 6(2)-(3). Failed to monitor network for the malware used in a previous intrusion, Compl. at ¶ 24(i), reused by hackers later to access the system again, id. at ¶ 34. Security Monitoring and Management Generally Failed to employ sufficient measures to detect unauthorized access to personal information or to conduct security investigations, CSS at ¶ 6(6). Failed to employ reasonable measures to detect and prevent unauthorized access to computer network or to conduct security investigations, Compl. at ¶ 24(h). Password Management Failed to use strong passwords to prevent a hacker from gaining control over computers on its computer network and access to personal information stored on the network, CSS at ¶ 6(4). Did not employ common methods to require user IDs and passwords difficult for hackers to guess. (e.g., allowed remote access to a hotel’s property management system that used default/factory setting passwords) Compl. at ¶ 24(f). Maintenance of PI Created unnecessary risks to personal information by storing it in a vulnerable format for up to 30 days, CSS at ¶ 6(1). Allowed software to store payment card information in clear readable text, Compl. At ¶ 24(b). Network Risk Management Did not use readily available security measures to limit access between computers on its network and between those computers and the Internet, CSS at ¶ 6(5). Did not use readily available security measures, such as firewalls, to limit access between and among hotels’ property management systems, the Wyndham network, and the Internet, Compl. at ¶ 24(a). 1 No. C-4168 (FTC 2006) 10
  • 11. © 2015 Bradley Arant Boult Cummings LLP 10 FTC Lessons Learned from >50 Enforcement Actions 1. Start with Security. 2. Control access to data sensibly. 3. Require secure passwords and authentication. 4. Store sensitive personal information securely and protect it during transmission. 5. Segment your network and monitor who’s trying to get in and out. 6. Secure remote access to your network. 7. Control access to data sensibly. 8. Make sure your service providers implement reasonable security measures. 9. Put procedures in place to keep your security current and address vulnerabilities that may arise. 10. Secure paper, physical media, and devices. Source: FTC Lessons Learned from FTC Enforcement Actions business.ftc.gov 11
  • 12. © 2015 Bradley Arant Boult Cummings LLP FFIEC Cybersecurity Assessment Tool FFIEC Cybersecurity Assessment Tool: intended to help financial institutions evaluate their own ISP and risk profile – Inherent Risk Profile – Cybersecurity Maturity 12
  • 13. © 2015 Bradley Arant Boult Cummings LLP FFIEC Cybersecurity Assessment Tool: Inherent Risk Profile Inherent Risk Profile - level of risk posed by the following: – Technologies and Connection Types – Delivery Channels – Online/Mobile Products and Technology Services – Organizational Characteristics – External Threats 13
  • 14. © 2015 Bradley Arant Boult Cummings LLP Risk Levels – For each of the categories above, there is a risk level that the institution can choose based on descriptions provided in the Tool. For instance, in reviewing External Threats, institutions are given five risk levels to choose from, which are defined for each category. The table below illustrates the various risk levels. FFIEC Cybersecurity Assessment Tool: Inherent Risk Profile 14 Category: External Threats Risk Levels Least Minimal Moderate Significant Most Attempted cyber No attempted Few attempts Several attempts monthly Significant number of attempts Substantial number attacks attacks or monthly (101-500);phishing monthly (501-100,000);spear of attempts reconnaissance. (<100); may campaigns targeting phishing campaigns targeting monthly (> have had employees or customers at high net worth customers and 100,000); generic the institution or third employees at the institutionor persistentattempts phishing parties supporting critical third parties supporting critical to attack senior campaigns by activities; may have activities; Institution specifically management employees experienced an attempted is named in threat reports; may and/or network and Distributed Denial of have experienced multiple administrators; customers. Service (DDoS) attack within the last year. DDoS attacks within the last year. frequently targeted for DDoS attacks.
  • 15. © 2015 Bradley Arant Boult Cummings LLP 15 FFIEC Cybersecurity Assessment Tool: Cybersecurity Maturity
  • 16. © 2015 Bradley Arant Boult Cummings LLP CULTURE Baseline Management holds employees accountable for complying with the information security program. (FFIEC Information Security Booklet, page 7) Evolving The institution has formal standards of conduct that hold all employees accountable for complying with cybersecurity policies and procedures. Cyber risks are actively discussed at business unit meetings. Employees have a clear understanding of how to identify and escalate potential cybersecurity issues. Intermediate Management ensures performance plans are tied to compliance with cybersecurity policies and standards in order to hold employees accountable. The risk culture requires formal consideration of cyber risks in all business decisions. Cyber risk reporting is presented and discussed at the independent risk management meetings. Advanced Management ensures continuous improvement of cyber risk cultural awareness. Innovative The institution leads efforts to promote cybersecurity culture across the sector and to other sectors that they depend upon. 16 Domain 1: Cyber Risk Management and Oversight Training and Culture Culture FFIEC Cybersecurity Assessment Tool: Cybersecurity Maturity
  • 17. © 2015 Bradley Arant Boult Cummings LLP 17 FFIEC Cybersecurity Assessment Tool: Cybersecurity Maturity Baseline – Characterized by minimum expectations required by law and regulations or recommended in supervisory guidance. This level includes compliance-driven objectives. Management has reviewed the evaluated guidance.
  • 18. © 2015 Bradley Arant Boult Cummings LLP 18 FFIEC Cybersecurity Assessment Tool: Mapping Inherent Risk Against Cybersecurity Maturity
  • 19. © 2015 Bradley Arant Boult Cummings LLP 19 FFIEC Cybersecurity Assessment Tool: Evolving Process
  • 20. © 2015 Bradley Arant Boult Cummings LLP FFIEC Cybersecurity Assessment Tool: Board (and Management) Oversight Risk Management Oversight – What is the process for ensuring ongoing and routine discussions by the board and senior management about cyber threats and vulnerabilities? – How is accountability determined for managing cyber risks across our enterprise? Does this include management’s accountability for business decisions that may introduce new cyber risks? – What is the process for ensuring ongoing employee awareness and effective response to cyber risks? Cyber Security Controls – What is our process for classifying data and determining appropriate controls based on risk? – What is our process for ensuring that risks identified through our detective controls are remediated? Cyber Incident Management and Resilience – In the event of a cyber attack, how will we respond internally and with customers, third parties, regulators, and law enforcement? – How are cyber incident scenarios incorporated in our business continuity and disaster recovery plans? Have these plans been tested? Source: Federal Financial Institutions Examination Council (FFIEC) 20
  • 21. © 2015 Bradley Arant Boult Cummings LLP “Recurring Issues” in Healthcare Enforcement 1. Risk Analysis 2. Vendor (Business Associate) Agreements 3. Failure to Manage Identified Risk, e.g. Encrypt 4. Lack of Transmission Security 5. Lack of Appropriate Auditing 6. No Patching of Software 7. Insider Threat 8. Improper Disposal 9. Insufficient Data Backup and Contingency Planning • Many have RA+, NY/Columbia $4.8M, St. Elizabeth: document sharing application to store PHI without analyzing risk $250K • Almost 1000 cloud providers/hospital • Concentra $1.7M – stolen unencrypted laptop • Anchorage Community Mental Health – Malware from unpatched vulnerabilities $150K • Cornell Prescription Rx $125K Source: US HHS Office for Civil Rights (OCR), 9/2015 Resolution Agreements often involve allegations of widespread noncompliance, lack of any risk analysis. 21
  • 22. © 2015 Bradley Arant Boult Cummings LLP Questions? Paige M. Boshell 205.521.8639 pboshell@babc.com www.babc.com/paige-m-boshell Amy S. Leopard 615.252.2309 aleopard@babc.com www.babc.com/amy-s-leopard 22