Rise in cyber attacks at US companies “This threat to our country’s economic and national security, and to companies’ bottom line, is real and it is growing.”

Slides:



Advertisements
Similar presentations
Data Breach Risks Overview Heather Pixton www2.idexpertscorp.com
Advertisements

David A. Brown Chief Information Security Officer State of Ohio
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Information Security Policies Larry Conrad September 29, 2009.
Greg Shaw How do we turn private sector preparedness into an investment rather than a cost of doing.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Vendor Risk: Effective Management is Essential
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Overview of Cybercrime
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Dallas Bar Association Securities Section Meeting Are You Prepared for Anonymous? Securities Lawyers Need to Address Cybersecurity Risk Byron Egan, Steve.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Gallagher Healthcare Insurance Services Emerging Liability Issues for Healthcare Executives Medical Professional Liability Symposium Medical Professional.
AUGUST 25, 2015 Cyber Insurance:
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Cyber Security Nevada Businesses Overview June, 2014.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
New A.M. Best Cyber Questionnaire
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Financial Times Matheson is ranked in the FT’s top 10 European law firms Matheson has also been commended by the FT for corporate law,
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Business Continuity Planning 101
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
UNCLASSIFIED Homeland Security 2016 TRB Annual Meeting Cyber Risk Management CAPT Verne Gifford (CG-5PC) 1.
Risk Management Dr. Clive Vlieland-Boddy. Managements Responsibilities Strategy – Hopefully sustainable! Control – Hopefully maximising profits! Risk.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
Information Security Program
Hot Topics in the Financial Industry: Cybersecurity
New A.M. Best Cyber Questionnaire
Information Security – Current Challenges
Team 1 – Incident Response
Managing a Cyber Event Steven P. Gibson President
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
Securing Information Systems
I have many checklists: how do I get started with cyber security?
CYBER CRIME Matthew Purchase.
Andy Hall – Cyber & Tech INSURANCE Specialist
General Counsel and Chief Privacy Officer
The State of Cybersecurity and
John Carlson Senior Director, BITS
Cyber Risk & Cyber Insurance - Overview
Strategic threat assessment
Cyber Security: What the Head & Board Need to Know
Texas Assisted Living Association 2019 Conference
Anatomy of a Common Cyber Attack
Presentation transcript:

Rise in cyber attacks at US companies “This threat to our country’s economic and national security, and to companies’ bottom line, is real and it is growing.” Jay Rockefeller Senator & Commerce Committee Chairman in letter to Chairman of SEC April 9, 2013 Sources: techland.time.com/2013/09/26/major-u-s-data-providers-hit-by-cyber-attacks/

Magnitude of the Threat Cybercrimes are widespread, systemic and insidious Annual cost is approximately $100 billion per year Double-digit year-over-year growth in incidents 90% of U.S. companies surveyed had detected computer security breaches * 74% acknowledged financial losses as a result *Source: 2011 Computer Security Institute survey 2

Verizon 2014 Data Breach Investigations Report (April 23, 2014) Nearly 200 breaches of payment systems used by retailers, hotels and restaurants Cyber education and “hygiene” critical in protecting payment systems 3

Business Consequences Harm to business, “franchise” risk, company valuation, stock price, etc. Long-term financial and business damage Theft of valuable intellectual property and business plans Theft of customer data and funds Disruption of critical operations and corporate web sites Headline and reputational harm 4

Potential costs 5  Financial losses for company  Average cost of $500,000 and 24 days to identify and resolve an attack 1  Cyber crime cost companies $300bn - $1trillion total in  Financial losses for shareholders  ~5% drop in share price for public companies 2  Brand reputation  Value of brand can decline 17-31%, depending on nature and industry 3  Your reputation Sources: 1: 2013 Cost of Cyber Crime Study: United States, Ponemon Institute, October 2013, 2: “Anatomy of data breaches and their impact on market value,” Electronic International Interdisciplinary Conference : Poneman Institute, Reputation Impact of Data Breach, October

Legal Consequences Governmental investigations and sanctions (SEC, DOJ, State Attorneys General, FTC, etc.) Consumer litigation Class action lawsuits Shareholder derivative demands Special Board/Litigation Committees and potential claims against the corporation 6

Push for government regulation 7  Cyber Intelligence Sharing & Protection Act  To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes.  Passed House of Representatives in April; Senate will not vote but is drafting competing legislation  White House Executive Order – Improving Critical Infrastructure Cybersecurity (February 12, 2013)  Establish top-to-bottom review of federal government’s efforts to defend our nation’s information and infrastructure  In conjunction, SEC Division of Corporation Finance issued guidance instructing companies to disclose cyber attacks or risks associated with breaches if such attacks or breaches are likely to be material to investors

Proactive Response Plan Detailed, step-by-step Incident Response Plan Analysis of insurance policies to determine coverage Legal counsel and key service providers “on speed dial” Crisis communication strategy and trained spokespeople Government affairs/communications with regulators Readiness exercises that simulate an actual attack Business continuity planning Security audits of key vendors Litigation and regulatory preparedness 8

 Detailed, step-by-step Incident Response Plan  Adequate insurance coverage (consider Cyber policy)  Legal counsel and other service providers “on speed dial”  Crisis communication and Litigation strategies  Government affairs/communications with regulators  Readiness exercises that simulate an actual attack  Business continuity planning  Security audits of key vendors Cybersecurity Strategic Planning Checklist 9

Privacy and security guidelines for boards 10 Establish ‘tone from the top’ through top-level policies Review roles and responsibilities; ensure risk/accountability shared throughout organization Ensure regular information flows to executives and board, including cyber incidents and breaches Review annual IT budgets for privacy and security, separate from CIO’s budget Conduct annual reviews of enterprise security program, review findings, ensure gaps and deficiencies are addressed Evaluate adequacy of security around board materials and communication Source: Governance of Enterprise Security: How Boards & Senior Executives are Managing Cyber Risks, CyLab 2012 Report – Carnegie Mellon University

Technology in the boardroom In-person at Time of Meeting Courier Delivery Unsecure Mobile App / PDF Reader Secure Internal Portal Secure Board Portal PDF-Based Portal Cloud File Sharing Services Key concerns  Privacy  Limited administrator control  Hacking and other security vulnerabilities  Purchase of additional secure container technology

Board portal technology brings a new standard of cyber security  Control access to data  Data encrypted in transit and on all devices  Does not track Director’s electronic footprint  Regular, repeated third-party audits and penetration testing  Local redundancy, data back-up and recovery

13  Ensure that privacy and security requirements for vendors are based upon key aspects of your organization's security program  Carefully review internal and vendor notification procedures in the event of breach or security incident Important vendor requirements