Neil Kirton and Zoë Newman

Slides:



Advertisements
Similar presentations
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Advertisements

Freshfields Bruckhaus Deringer LLP Global investigations What to advise your board Marius Berenbrok Edward Braham Matthew Herman Melissa Thomas 29 February.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
CORPORATE COMPLIANCE OVERVIEW David Meisels OSB Corporate Counsel Roundtable April 26, 2012.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Network security policy: best practices
Are you ready for a recall? Medical Device Regulatory, Reimbursement and Compliance Congress March 28, 2007 Willie R. Bryant, Jr. Consultant Stericycle,
Internal Auditing and Outsourcing
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
Kpmg. The Fourth Asian Roundtable on Corporate Governance Shareholder Rights and the Equitable Treatment of Shareholders Deepankar Sanwalka KPMG “Tools.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Why are Small and Mid-Size Companies Easy Targets for Hackers, and What can You do to Protect Yourself? 2/11/2015 Asher Dahan.
Fraud in corporate environment - results of the survey 31 May 2005.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Making Business Continuity Child’s Play Solutions Ltd Business Continuity Management Contact details: Contact : Mick O’Regan Mobile :
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Implementing and Auditing Ethics Programs
Looking forwards and sideways FMA’s view of the regulatory landscape Sue Brown, Head Primary Regulatory Operations Eriksens Actuarial: The Real Risk Management.
H UMAN R ESOURCES M ANAGEMENT Beki Webster Director, HR, Intelligence Systems Division Northrop Grumman Information Systems July 31, 2009.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
Developing Plans and Procedures
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
Strategic Approaches to Improving Ethical Behavior
Supplier Forum 2007 Corporate Security 14/11/2007.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
A PM’s Guide to Surviving A Data Breach. Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
Yes. You’re in the right room.. Hi! I’m David (Hi David!)
Tax Administration Diagnostic Assessment Tool MODULE 11 “POA 9: ACCOUNTABILITY AND TRANSPARENCY”
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
New EU General Data Protection Regulation Conference 2016 Managing a Data Breach Prevention-Detection-Mitigation By Gerard Joyce Dun Laoghaire Feb 24 th.
CMG Events 2016 Cybersecurity Briefing 24 February 2016 John Magee William Fry.
0 Due Diligence Monitoring and Auditing of Third Party Vendors October 28, 2008 Pharmaceutical Regulatory and Compliance Congress and Best Practices Forum.
Investigations: Strategies and Recommendations (Hints and Tips) Leah Lane, CFE Director, Global Investigations, Texas Instruments, Inc.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Cyber Risk Management and Insurance
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
RISK MANAGEMENT AND CRISIS RESPONSE WORKSHOP Lawrence E. Ritchie November 25, 2014.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Cyber Insurance Risk Transfer Alternatives
Law Firm Data Security: What In-house Counsel Need to Know
Business Briefing Security Service Providers
Hot Topics in the Financial Industry: Cybersecurity
Fusion Center ITS security and Privacy Operations Joe Thomas
ENTERPRISE RISK MANAGEMENT IN THE CASE OF THE FINANCIAL SERVICE SECTOR
Responding to a Data Breach 360° of IT Compliance
Responding to Intrusions
What is an anonymous reporting hotline?
Cyber Game Plan: a tabletop exercise in defending a ransomware attack
Data Privacy: Essentials for Payroll
8 Building Blocks of National Cyber Strategies
Rogers Enterprise Security Solutions
The State of Cybersecurity and
( Compromise).
Cyber Security: What the Head & Board Need to Know
Microsoft Data Insights Summit
What is an anonymous reporting hotline?
Introduction to Digital Forensics
PAYROLL DISASTER RECOVERY PLAN
Anatomy of a Common Cyber Attack
Presentation transcript:

Neil Kirton and Zoë Newman The GC on the Front Line: Corporate Counsel’s Role in Surviving a Company Crisis GLL Global GC Congress Neil Kirton and Zoë Newman September 2018

Agenda Introductions Crisis response Managing an effective investigation Managing outcomes Conclusions

1 Introductions

Introductions Neil Kirton Zoë Newman Managing Director, Business Intelligence and Investigations Managing Director, Business Intelligence and Investigations

Overview Managing a crisis Crises come in all shapes and sizes GCs are often at the centre of a response Companies face high incidences of Fraud, Cyber and Security threats % of respondents encountering an issue in the past year; 2017/18 Kroll Global Fraud & Risk Report

2 Crisis response

Crisis response A crisis unfolds – case study

Crisis response What happened next CEO contacts Head of IT to investigate and they determine that there is likely a security incident as the attached documents were genuine Contacts GC to initiate crisis response GC forms crisis committee; contacts insurers and external advisors Legal PR Incident response investigators Negotiators

Crisis response Immediate agenda for the GC Building crisis management team – internal and external members Business continuity Use of email / compromised systems Recovery of data / availability of backups Bug sweep Technical Surveillance Counter Measures Internal and external communications Insider lists / price sensitive information Internal stakeholders Partners and customers Individuals / Employees Resourcing the incident response – internal vs. external resources Follow-the-sun resourcing?

Crisis response Initial questions to consider Do you have an incident response plan? Which internal stakeholders are involved – who really needs to know? IT/CISO/CIO Data Protection Officer / GC C-suite / shareholders HR / Finance / Operations Which external advisors should be notified External Counsel PR Investigators Do you have insurance? At what point do you involve: law enforcement, regulators, other stakeholders (employees, customers, data subjects)? Budgeting - who pays? Who needs support / managing ? Who could cause problems? What is the role of the GC?

Managing an effective investigation 3 Managing an effective investigation

Managing an effective investigation Conducting the investigation – case study Internal investigation Rule out internal collusion - review of user activities, permissions and communications Identify digital vulnerabilities/compromise Implement cyber resilience strategy External investigation of potential suspect Client identified possible suspect. Subsequent investigation found no evidence to forensically link the suspect to the attack Taking offensive actions Investigation into attacker’s IT infrastructure and recovery of data Cluttering and takedown exercise and monitoring of attacker’s online activities Data review To better understand the extent of the issue and inform notification strategy External communications and regulatory action

Managing an effective investigation Conducting the investigation – issues for the GC Managing/supporting crisis management team Business continuity Insider wrongdoing? Necessary/appropriate actions with HR Remediation steps Engagement with authorities/law enforcement Internal and external communications When and who to notify Data review Speed, accuracy, costs Challenges (multiple pages docs, foreign languages, data types, unusual formats) Legal commercially sensitive information / legal challenges Personal information

Managing an effective investigation Conducting the investigation – questions to consider Who is responsible for the incident? Has the issue been resolved / contained? Can you recover losses? How far do you go?

4 Managing outcomes

GC GC Managing outcomes External communications and regulatory action – case study GC Employees Press Contracted parties Subscribers Suppliers Customers GC

Managing outcomes Managing the tail – issues for the GC Litigation Police action Witness statements Trial and prosecution Notification process Systems and remediation exercises Policies and procedures Training Billing discussions with insurers

Managing outcomes Managing the tail – questions to consider Lessons learned? Are we safe going forward? Do we need to allocate more budget? Are we happy with our external crisis team and/or insurance cover?