Cinthia Granados Motley, Member, Dykema

Slides:



Advertisements
Similar presentations
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Advertisements

Security for Today’s Threat Landscape Kat Pelak 1.
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
Recent Trends and Insurance Considerations March 2015
Cyber Security AMSC FM Training Symposium Alex Roosma, 1st Lt, USAF
Web server security Dr Jim Briggs WEBP security1.
THE WHY AND HOW OF DATA SECURITY YOUR ROLE IN DATA STEWARDSHIP DEPARTMENT OF MEDICINE IT SERVICES.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.
The Significance and Evolution of End User Privacy Julie Earp College of Management North Carolina State University WISE 2010 Sponsored by TRUST June 21-24,
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Phishing: Trends and Countermeasures Blaine Wilson.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Internal Audit Considerations for Cybersecurity Risks Posed by Vendors October th, 2015 Chicago IIA Chapter’s 2 nd Annual IIA Chicago IT Hacking.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Tuesday March 15, 2016 Session 19-D Technology Forum David Finkelstein, CIO RiverSpring Health.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
Information Governance: How it Impacts Law Firms Kyle Tidwell Associate Director of Legal Projects, Robert Half Legal 1.
MANAGING RISK DAVE MILLIER, CEO, UZADO INC.. WHAT IS RISK? Risk is the potential of gaining or losing something of value (Wikipedia) A situation involving.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Law Firm Data Security: What In-house Counsel Need to Know
Risk Outlook James Dipple-Johnstone Paul Hastings Dr Debra Malpass
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Cyber Issues for Design Professionals
Gone Phishing: Understanding Social Engineering Attacks
E&O Risk Management: Meeting the Challenge of Change
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Module 3 (Ground Rules and Rules of Engagement)
Data Compromises: A Tax Practitioners “Nightmare”
Recommending a Security Strategy
Securing the Law Firm Myth vs. Reality vs. Practicality:
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Technology Solutions Security Update
Jon Peppler, Menlo Security Channels
Information Security: Risk Management or Business Enablement?
Cybersecurity Awareness
Stealing Credentials.
4 ways to stay safe online 1. Avoid viruses and phishing scams
David Axtell Todd Martin Stinson Leonard Street, LLP
Data Privacy and Breaches
Cyber Security in the Mortgage Industry
Cyber Issues Facing Medical Practice Managers
Threat Landscape for Data Security
GSBS IT Resources and Security
Curating an Effective Security Culture
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
David J. Carter, CISO Commonwealth Office of Technology
Information Security Awareness
Ransomware and Data breaches in public libraries
Many dark web constructs. The most notorious/popular is Tor/Onion.
Anatomy of a Large Scale Attack
Business Compromise and Cyber Threat
Tom Murphy Chief Information Security Officer
Information Security – Sep 18
The Secure Contingency Plan
How to Protect Your Legal Business from a Data Breach? Thingsyoushouldknow ! Legal Support World.
Anatomy of a Common Cyber Attack
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
MicroToken Exchange Data Security Solutions
Presentation transcript:

Cybersecurity in Professional Services Firms: Navigating the Post-Paradise World Cinthia Granados Motley, Member, Dykema Steven Grossman, Vice President of Strategy, Bay Dynamics Paul Poh, Managing Partner, Tixzy Michelle W. Cohen, Partner, Patterson Belknap Webb &Tyler LLP

History of Law Firm Data Breaches Chinese hackers penetrate law firm network for more than one year and steal thousands of emails Law firm targeted by spear phishing emails that are linked to Chinese server “Anonymous” attacks, steals and publicly discloses 2.6 gigabytes of emails from firm that represented soldier who pled guilty in connection with killing of Iraqi civilians “Watering Hole” attack infects law firm website with malware transferred to visitors of web site Hackers infect law firm network with “ransomware” that encrypted firm files until ransom was paid Weil Gotshal and Cravath acknowledge “data incidents” Panama Papers “leaked” (11.5 million documents) from Mossack Fonseca Ransomware attack on DLA Piper Paradise Papers “leaked” (13.4 million documents) from a variety of sources, including Appleby 2008 2011 2012 2015 2016 2017

Law Firms Are Attractive Targets Hold sensitive, confidential client data Mergers and acquisitions Financial information Trade secrets Contract negotiations PHI, PII and other protected information Aggregate valuable information from multiple sources in one place – improves hackers’ ROI Law firms, as service providers, are targets of ransomware attacks Viewed as lagging behind the corporate world in data security

Clients Care Clients request security audits or other verification of security practices Inspection of penetration test results Vulnerability testing by third parties Prohibition or preapproval of cloud services Two-factor authentication Breach notification requirements Indemnification for client breach costs/expenses

Panel Discussion