Cybersecurity – Three Perspectives

Slides:



Advertisements
Similar presentations
Travelers CyberRisk for Insurance Companies
Advertisements

Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Overview of Cybercrime
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
AUGUST 25, 2015 Cyber Insurance:
Cyber Security Nevada Businesses Overview June, 2014.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Cyber Summit 2016 Data Bytes and Frights Presented by: President and CEO Peter J. Elliott, CPCU.
Being there When you need us Thats our policy. Cyber Awareness – what can be done?
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
The Privacy Symposium: Transferring Risk of a Privacy Event Paul Paray & Scott Ernst August 20, 2008.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
Protecting Your Assets By Preventing Identity Theft
Cyber Liability Insurance for an unsecure world
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
Information Security – Current Challenges
Financial Institutions – Cyber Risk
E&O Risk Management: Meeting the Challenge of Change
Healthcare Cybersecurity: State of Industry
Information Assets, Security and Cyber Threats
Gift Card Risk Mitigation – Presentation A
Managing a Cyber Event Steven P. Gibson President
Public Facilities and Cyber Security
Financial Institutions and Cyber Insurance
Business At the Speed of Cyber
Responding to Intrusions
Reducing Cost and Risk During an Investigation
Data Compromises: A Tax Practitioners “Nightmare”
Cyber Risk Management Through Vendor Contracts
Cyber Insurance Overview
Chapter 3: IRS and FTC Data Security Rules
Cyber Game Plan: a tabletop exercise in defending a ransomware attack
Today’s Risk. Today’s Solutions. Cyber security and
CYBER CRIME Matthew Purchase.
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Security in the Mortgage Industry
Cyber Issues Facing Medical Practice Managers
Internet Security Threat Status
Cyber Trends and Market Update
The State of Cybersecurity and
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
Securing the Threats of Tomorrow, Today.
CRITICAL INFRASTRUCTURE CYBERSECURITY
Vinny Sakore Vinny Sakore is the Chief Technology Officer for NetDiligence®, a Cyber Risk Management company. Former HIPAA Security Officer for Verizon.
Neil Kirton and Zoë Newman
Forensic and Investigative Accounting
Business Compromise and Cyber Threat
Vinny Sakore Vinny Sakore is the Chief Technology Officer for NetDiligence®, a Cyber Risk Management company. Former HIPAA Security Officer for Verizon.
Cyber Security: What the Head & Board Need to Know
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Texas Assisted Living Association 2019 Conference
Figuring out CyberSecurity Return On Investment
SECURITY IN THE DIGITAL AGE
Sam elkholy Director, systems engineering
Anatomy of a Common Cyber Attack
Presentation transcript:

Cybersecurity – Three Perspectives by Nicholas A. Klinefeldt, Faegre Baker Daniels Paul H. Luehr, Faegre Baker Daniels Nicholas Gerhart, FBL Financial Group, Inc. Drake University Law School and ACC, Iowa Chapter 5th Annual Corporate Counsel Forum, Des Moines, IA

Threat Landscape: Data Breach Costs U.S. average cost of a data breach ($4 M globally) $6.5 M 29% Increase since 2013, in global cost of a breach U.S. average cost for each exposed record ($158 globally) $221 Source: 2016 Cost of Data Breach Study: Global Analysis, Sponsored by IBM, Conducted by Ponemon Institute LLC (June 2016)

Threat Landscape: Data Breach Costs 66% 34% Indirect Costs: Staff hours Lost Goodwill Customer “Churn” Direct Costs: Outside Counsel Outside Experts ID Theft Insurance Notification Costs Source: 2016 Cost of Data Breach Study: Global Analysis, Sponsored by IBM, Conducted by Ponemon Institute LLC (June 2016)

Global Data Breach Cost – Per Capita, by Industry Threat Landscape: Data Breach Costs Global Data Breach Cost – Per Capita, by Industry Source: Ponemon Institute, “2016 Cost of Data Breach Study: Global Analysis,” Sponsored by IBM (June 2016)

Threat Landscape: Threat Actors and their Motives Charge for Fraudulent Treatment Obtain Free Treatment or Purchase Prescription Drugs Wage or Tax Fraud Monetize Personal Data Steal Intellectual Property Expose Sensitive Data Destroy or Corrupt Data Disrupt Services Extortion FINANCIALLY MOTIVATED HACKERS HACKTIVISTS/TERRORISTS SECURITY RESEARCHERS NATION STATES INSIDERS

Threats - Extortion Ransomware

Ransomware Threats - Extortion Spam (up 4x) with ransomware = 40% to 66%, Demand = $200 to $10,000+ (often in Bitcoin) Largest cost = downtime Sources: IBM, Malwarebytes, Datto

Threats - Extortion WannaCry – one of the largest attacks in history Over 230,000 infections Over 150 countries Vulnerable Unpatched Windows OS Old, pirated OS Victims UK NHS Telefonica FedEx

Threats – Email Fraud

“Business Email Compromise” (BEC) Threats - Email Fraud “Business Email Compromise” (BEC) Losses $3 billion in losses by Feb. 2017 Up 1300% since Jan. 2015 Victims in 50 states and 100 countries Average = $25,000 to $90,000 Ubiquiti Networks: $46.7 million in fraud transfers

Threats: Attacks on the Internet of Things IoT DDoS Dyn DOS Example Traffic spike = 40-50x above normal Victims = Dyn, Amazon, Netflix, Twitter, et al Source = Internet of Things (IoT) DVR Video cameras Sources: Dyn, Krebs on Security

Incident Response Team Prevention: Develop an Effective IR Team Deploy an Effective IR Team Multiple representatives Led by counsel With contact sheet for: Outside counsel Forensic experts Crisis communicators Notification firms Insurance agent/broker Law enforcement In-House Counsel Outside Counsel Client & Media Relations In-House IT Incident Response Team Human Resources CPO, CSO Compliance Outside Forensics Experts Business Unit

Prevention: Insurance as part of your IR Team Insurance - Types Probably not E&O anymore Cyber Coverage Cost of investigation (using pre-approved attorneys & experts?) Cost of repairs Lost business? Timing Notify broker/agent upon suspecting a breach Notify before paying ransom

Prevention: Law Enforcement as part of your IR Team

Prevention: Law Enforcement as part of your IR Team Mandatory Reporting Personally Identifiable Information, Medical Records Financial Institutions (SAR), Investors (SEC), etc. Goals Solve crime, assist victims, seek justice NOT “take over” a victim’s business Typical Requests Raw intrusion data – hard drives, logs NOT your internal memos or reports Typical Benefits Intel back on a particular type of perpetrator PR value of letting public know that you’ve contacted the authorities

Prevention: Re-Design Corporate Governance Board Executive Management Bus Ops IT Network Architecture InfoSec Marketing Legal Finance Insurance/Risk Risk Committee Insurance Litigation Board Executive Management Bus Ops IT Network Architecture InfoSec Marketing Legal Privacy Finance Insurance/Risk Privacy & Security

Corp. Strategy Affected Prevention: Develop an Effective IR Plan Include: Initial triggers Escalation paths Crisis Management Team IR Team Info. Security Help Desk Timing expectations Regulatory drivers & PRACTICE! Threat Level Impact Response Team Threat Type Response Time   Crisis Comms Crisis Corp. - Global Global IR Extortion 2 hours Patient Health Local IR Tech Major Incident Corp. – Regional Stolen IP 24 hours  Corp. Strategy Affected Local Incident Corp. - Local Lost, encrypted 48 hours  Loss of Bus. Data laptop

Prevention: Use your Plan to Move Efficiently Average Time to Contain = 59 to 82 days Source: IBM / Ponemon Institute, “2016 Cost of Data Breach Study: Global Analysis” (June 2016) “Real World” Investigation Timeline Rebuild Drives Preservation (4 – 14 days) Forensic Analysis (21 – 28 days) Malware Analysis (10 – 21 days) Scanning (21 – 28 days) Report (10 – 21 days) 1 10 20 30 40 50 60 (days)

Questions?