June 12, 2014 Morristown, New Jersey Melissa J. Krasnow, Partner, Dorsey & Whitney LLP and Certified Information Privacy Professional/US

Slides:



Advertisements
Similar presentations
Tenace FRAMEWORK and NIST Cybersecurity Framework Block IDENTIFY.
Advertisements

SYSTEM OF EVALUATION AND MANAGEMENT CONTROL RESULTS-BASED BUDGETING THE CHILEAN EXPERIENCE Heidi Berner H Head of Management Control Division Budget Office,
Sarbanes-Oxley Act of 2002 UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Data Breach Risks Overview Heather Pixton www2.idexpertscorp.com
Rise in cyber attacks at US companies “This threat to our country’s economic and national security, and to companies’ bottom line, is real and it is growing.”
Recent Trends and Insurance Considerations March 2015
Security Controls – What Works
Data Security At Cornell Steve Schuster. Questions I’d like to Answer ► Why do we care about data security? ► What are our biggest challenges at Cornell?
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Information Security Governance in Higher Education Policy2004 The EDUCAUSE Policy Conference Gordon Wishon EDUCAUSE/Internet 2 Security Task Force This.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Auditing Cloud Computing: Adapting to Changes in Data Management IIA and ISACA Joint Meeting March 12, 2013 Presented by: Jay Hoffman (AEP), John Didlott.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
STRONG POLICIES AND INTERNAL CONTROLS – SAFEGUARDING YOUR RESOURCES, AND YOUR REPUTATION Maria Falvo Chief Operating Officer American Savings Foundation.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Federal Acquisition Service U.S. General Services Administration June 3, 2013 Joint Working Group on Improving Cybersecurity and Resilience through Acquisition.
The Economics of Cybersecurity Allan Friedman Research Director, Center for Technology Innovation Fellow, Governance Studies Brookings Institution
Various Stages of MiFID Implementation in Lithuania Tomas Talutis Lithuanian Securities Commission.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Seeking a National Standard for Security: Developing a Systematic Crosswalk of the Final HIPAA Security Rule, the NIST SP , NIST SP Security.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Jeff Miller Tamra Pawloski IT Procurement Summit headline news…
McNamara & Associates, Inc Violence Prevention in Healthcare.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
New A.M. Best Cyber Questionnaire
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
LATVENERGO GROUP COMPLIANCE AND FRAUD RISK MANAGEMENT Kristine Arensone Compliance officer
February,  On October 23, 2015 the Commodity Futures Trading Commission (“CFTC”)approved National Futures Association’s (“NFA”) interpretive notice.
Implementing an Information Systems Security Plan THE MONTANA OFFICE OF PUBLIC INSTRUCTION.
Final HIPAA-HITECH Rules, Cybersecurity, and Privacy Dino TsibourisMehmet Munur (614) (614)
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Insurance Summit 2016 REGULATORY UPDATE. Panel Participants Ray Farmer (Director, South Carolina Department of Insurance) Tim Morris (Hanover Stone Solutions)
JOHN M. HUFF NAIC PRESIDENT DIRECTOR, MISSOURI DEPARTMENT OF INSURANCE JUNE 16, 2016 NAIC CYBERSECURITY INITIATIVES.
10/04/2016 David LaPlante, CISO Information Security & Cybersecurity Program Planning Critical Infrastructure Cyber Security Framework.
NY DFS Cyber Regulation and the Impact on PA Mutual Insurers
Cyber Insurance Risk Transfer Alternatives
Hot Topics in the Financial Industry: Cybersecurity
New A.M. Best Cyber Questionnaire
Encrypted from CDS Office Technologies
Cybersecurity - What’s Next? June 2017
Michael Menne IT Solutions Chief Information Security Officer
Enterprise risk management
UNCITRALThird International Colloquium on Public-Private Partnerships (PPPs) October 2017, Vienna Experts for Chapter IV October 2017.
Data Privacy: Essentials for Payroll
I have many checklists: how do I get started with cyber security?
Cyber Issues Facing Medical Practice Managers
#IASACFO.
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Cybersecurity compliance for attorneys
Information Security Law Update
Cyber Security: What the Head & Board Need to Know
Presentation transcript:

June 12, 2014 Morristown, New Jersey Melissa J. Krasnow, Partner, Dorsey & Whitney LLP and Certified Information Privacy Professional/US Cybersecurity Recommendations 1 Financial Executives International’s Committee on Finance & IT (CFIT)

Cybersecurity Recommendations Divided into Four Parts I.Risk Assessment and Management II.Preparation and Plans III.Governance IV.Disclosure 2

Part I: Risk Assessment and Management A.Review Category, Type, Format and Location of Information, Assets and Systems and Eliminate Information That is Not Needed 3

Part I: Risk Assessment and Management (con’t) B.Conduct a Risk Assessment i.Social Engineering Scams ii.Network Breaches iii.Physical Breaches iv.Mobile Breaches 4

Part II: Preparation and Plans A.Review Contracts and Policies B.Security Program C.Incident Response Plan D.Cyber Liability Insurance (Source: AIG) i.Security and Privacy Liability Insurance ii.Event Management Insurance iii.Cyber Extortion Insurance iv.Network Business Interruption Insurance 5

Part II: Preparation and Plans (con’t) E.Practical Steps to Minimize Risks (con’t) i.Limit Access ii.Password Procedures iii.Firewalls, Antivirus and Other Internet Security Solutions; Patches and Updates iv.Encryption 6

Part II: Preparation and Plans (con’t) E.Practical Steps to Minimize Risks (con’t) v.Back-up vi.Destruction vii.Training and Awareness viii.Monitoring 7

Part III: Governance 8

Part IV: Disclosure A.SEC guidance B.State Breach Notification Laws and HIPAA Breach Notification C.Breach Notification Laws in Other Countries 9

Part IV: Disclosure (con’t) D.Cyber Liability Insurance and Contract and Policy Provisions E.Developments 10

Law and Guidance Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, National Institute of Standards and Technology (NIST) (February 12, 2014) framework pdf Cybersecurity in the Golden State (February 27, 2014) Mass. Regs. Code tit. 201 § et seq. Division of Corporation Finance, U.S. Securities and Exchange Commission, CF Disclosure Guidance: Topic No. 2 (October 13, 2011) topic2.htm 11

Report and Articles Verizon 2014 Data Breach Investigations Report Guidance for Managing Cybersecurity Risks, International Risk Management Institute (May 2014) risk-insurance.aspx Written Information Security Programs, Practical Law Company (May 2014) curity%20Programs%20Compliance%20with%20the%20Massach usetts%20% %29.pdf The Securities and Exchange Commission’s Guidance on Cybersecurity and Cyber Incident Disclosure, BNA Privacy & Security Law Report (October 31, 2011) 12