Risk Management for Law Firm Executive Management.

Slides:



Advertisements
Similar presentations
ETHICS AS CULTURE KEY ELEMENTS Stage One (primary) – Key Elements of a Culture of Ethics Appoint an ethics program manager to oversee your ethics-related.
Advertisements

Welcome! Internal Auditing CHAPTER 1. Definition Internal auditing is an independent, objective, assurance and consulting activity designed to add value.
Tax Risk Management Keeping Up with the Ever-Changing World of Corporate Tax March 27, 2007 Tax Services Bryan Slone March 27, 2007.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Developing a Records & Information Retention & Disposition Program:
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Internal Control. COSO’s Framework Committee of Sponsoring Organizations 1992 issued a white paper on internal control Since this time, this framework.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Steps to Compliance: Risk Assessment PRESENTED BY.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
Corporate Ethics Compliance *
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 3 Internal Controls.
Chapter 4 Internal Controls McGraw-Hill/Irwin
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
SEC835 Database and Web application security Information Security Architecture.
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Chapter 3 Internal Controls.
HIPAA PRIVACY AND SECURITY AWARENESS.
Chapter Three IT Risks and Controls.
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Security considerations for mobile devices in GoRTT
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Copyright © 2007 Pearson Education Canada 1 Chapter 1: The Demand for Auditing and Assurance Services.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Scott Charney Cybercrime and Risk Management PwC.
Copyright © 2007 Pearson Education Canada 7-1 Chapter 7: Audit Planning and Documentation.
Computer Security By Duncan Hall.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Chapter 8 Auditing in an E-commerce Environment
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Security – 2015’s Biggest Threat to Client Confidentiality A Panel Discussion Joseph Abrenio, VP of Cyber Advisory Services & General Counsel Delta Risk.
Developing an Audit Program By Rodney Kocot President Systems Control and Security Incorporated Copyright © 2005 Rodney Kocot.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Business Continuity Planning 101
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
What is ISO Certification? Information is a valuable asset that can make or break your business. When properly managed it allows you to operate.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Law Firm Data Security: What In-house Counsel Need to Know
Protecting PHI & PII 12/30/2017 6:45 AM
Information Security Program
Michael Romeu-Lugo MBA, CISA March 27, 2017
Data Minimization Framework
Microsoft 365 Get help with regulatory compliance
Chapter 3: IRS and FTC Data Security Rules
Data Privacy and Breaches
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Presentation transcript:

Risk Management for Law Firm Executive Management

Dave Cunningham Chief Information Officer - Winston & Strawn LLP Jeffrey Lolley Head of Global Information Security - Hogan Lovells Lindsay Philiben Counsel in Attorneys’ Liability Assurance Society - ALAS Dan Sheeran Chief Financial Officer - Duane Morris LLP Introductions

 Confidentiality o Information security o Sovereign hacking o Closed vs. open document management environment o Intrusion detection/prevention o Data on mobile devices, including laptops  Integrity / compliance o Regulatory compliance o Electronic client files (beyond records management) o Internal, global e-discovery o Copyright compliance o Jurisdictional considerations  Availability o IT continuity o High availability applications Risks

 Right to Audit  Client RFPs, Outside Counsel Guidelines, and Audits  Compliance requirements  Business Associate / Vendor Compliance  Example of Canadian firms targeted and breached  BYOD considerations  Insurance needs analysis Pressures

We All Know About the Headlines… 5 January 30, 2013 Hackers in China Attacked The Times for Last 4 Months NICOLE PERLROTH SAN FRANCISCO — For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees. After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and security experts have expelled the attackers and kept them from breaking back in. February 1, 2013 Twitter Hacked: Data for 250,000 Users May Be Stolen NICOLE PERLROTH Twitter announced late Friday that it had been breached and that data for 250,000 Twitter users was vulnerable. The company said in a blog post that it detected unusual access patterns earlier this week and found that user information — usernames, addresses and encrypted passwords — for 250,000 users may have been accessed in what it described as a “sophisticated attack.” February 1, 2013 A Cybersecurity Blanket: New Executive Order Means a Broad Review for Lawyers, Clients TODD RUGER The federal government’s new push to bolster cybersecurity will create an array of legal questions and potential pitfalls for companies in the coming months.

Many Specific to Legal 6

And They Have Lead To Client mandated security requirements integrated into Outside Counsel Guidelines (OCG’s) ABA Rule 1.6 (c) HIPAA & Various State Regulations EU Data Protection Directive Presidential Executive Order on Cybersecurity 7

Risk Program

Governance at Hogan Lovells 1.Understand the strategic implications and outcomes of initiatives being pursued in the protection of information and assets 2.Appreciate the significance of information security for all major stakeholders and represent their interests 3.Be an advocate for broad support of information security initiatives and projects Information Security Governance Committee The primary function of the Information Security Governance Committee is to make decisions related to protecting stakeholder information and securing the enterprise that enables the delivery of services to those stakeholders. The committee will also provide strategic direction and oversight over the information security function at Hogan Lovells.

What is Risk Management You need a process…whatever it is Decisions need to follow that process It’s about making informed decisions

Risk management process (ISO 27002/5) Must have a consistent and repeatable process for assessment and decision making relative to security risk in order to: –Ensure compliance with all applicable laws –Protect information and assets –Protect the brand New Projects Assessments Regulatory Constraints Someone must analyze and quantify risks Input should be gathered from all impacted stakeholders and presented as part of the decision process Actions with limited fiscal or business process impact are made outside of governance All impacting decisions are inclusive of governance All open and accepted risks are tracked and reported regularly Step 1: Identify Risks Step 2: Analyze & Quantify Step 3: Determine Action Step 4: Track & Report Yearly re-analysis and quantification

How You Make the Decision Risk was identified and rated Controls were applied Risk was re-evaluated Decision was made

Policy Structure Defines the firms commitment to Information Security and management processes Outlines policies covering the entire firm Outlines policies covering an local country or office Provides technical guidelines for configuring products to meet policies The goal of the structure of Information Security Policies for Hogan Lovells is to provide a hierarchical set of policy documents that allow for both overarching policies that cover the entire firm and policies unique to operating locations. Policy Statement Global Security Operating Standards Local Security Operating Standards Configuration Guidelines

Identifying and Managing Policies? Publish Policy Need Identified Develop/Refine Policy Educate Review & Evaluate Policies must be evaluated on a yearly basis to insure a continued need and determine if defined controls are adequate. Refinement must be made if necessary. Impacted parties must be educated on both the existence and need for a new policy. Policy development must incorporate all stakeholders and have buy-in at the highest levels of the company. A need must exist before any policy is created. Policies must be published in a consistent manor and readily available to stakeholders

Example Policy Issues Texting as a Client Record Security of Personal Devices Unique Passwords Retention / Destruction of Paper and Electronic Records 15

Certifications/Best Practices/Regulations ISO HIPAA EU DPD It’s a process, not a one-time activity! Use assessments to drive your program!

As a table group, discuss the question “What to do when a PC is lost?” Talk about developing roles, processes, communications, and timing to react appropriately. (10 minutes) A few tables will be asked to share their comments Audience Exercise

Q & A