Download presentation
Presentation is loading. Please wait.
Published byDamian Hodge Modified over 8 years ago
1
CyberLaw
2
Assignment Review
3
Cyber LawCyberLaw 6/23/2016 CyberLaw 3 Securing an Organization This Chat: CyberLaw and Compliance –Forensics –Privacy –Intellectual property protection –Due diligence –E-Discovery –Compliance
4
Cyber LawCyberLaw 6/23/2016 CyberLaw 4 Forensics Science of showing the unseen Based in scientific principles Use when presentation on court likely Forensic Examiner is an expert witness –By virtue of education, training, experience, and procedures
5
Cyber LawCyberLaw 6/23/2016 CyberLaw 5 Forensics Starts with forensic duplication of subject's hard drive –Write blocker prevents accidental updates –Forensic image exact and complete copy Analyze a copy of hard drive Discover deleted or concealed evidence Discover evidence in system files –Expensive
6
Cyber LawCyberLaw 6/23/2016 CyberLaw 6 Chain of Custody Essential to present evidence in court Demonstrates no tampering with evidence Log of every person accessing evidence and why Created at beginning of incident/seizure
7
Cyber LawCyberLaw 6/23/2016 CyberLaw 7 Forensics used to: In criminal cases by law enforcement to prosecute In HR cases in organizations to show HR action appropriate In Incident Response to hacking to determine loss and attack vector In E-Discovery to determine facts
8
Cyber LawCyberLaw 6/23/2016 CyberLaw 8 Law and the Individual We are subject to civil and criminal law We do have rights –Privacy –To be informed Data breach laws, some states
9
Cyber LawCyberLaw 6/23/2016 CyberLaw 9 Law and the Business Also have individual rights Additional responsibilities in case
10
Cyber LawCyberLaw 6/23/2016 CyberLaw 10 Intellectual Property Rights The creator (usually) has rights in the event of: –Copyright –Trademark/Service Mark –Patent –Trade Secrets
11
Cyber LawCyberLaw 6/23/2016 CyberLaw 11 Due diligence Obligation to perform as a reasonable person would under similar circumstances Corporate officers also have added fiduciary responsibility Professionals (InfoSEC) have a higher standard –Some buying “malpractice” insurance
12
Cyber LawCyberLaw Civil Law Allows for one person to sue another for wrong doing If one party has information that the other needs, they are bound to provide – and pay costs of production Process called Discovery 6/23/2016 CyberLaw 12
13
Cyber LawCyberLaw 6/23/2016 CyberLaw 13 E-Discovery Discovery is process of getting information from another Most information now has origins in electronic form E-Discovery is now big business If you are sued you have a duty to protect information
14
Cyber LawCyberLaw 6/23/2016 CyberLaw 14 Compliance Requirements We all have them –US –PCI-DSS –EU Field in administrative law
15
Cyber LawCyberLaw 6/23/2016 CyberLaw 15 US HIPAA GLB Sarbanes-Oxley Privacy Act FERPA FERC Common Law
16
PCI-DSS No legislation needed Credit Card Industry Applies to all merchants and card processors Sets minimum standards Always a good springboard for discussion 6/23/2016 Cyber LawCyberLaw 16
17
Cyber LawCyberLaw 6/23/2016 CyberLaw 17 EU PCI-DSS of course Strong privacy requirements US has safe harbor agreement w/ EU so US companies can do business in EU –Applies high privacy protection standard to company but not EU auditing –ICO
18
Data Breach Disclosure Required by 46 states All slightly different –What is a breach –What remediation is needed Major driver behind increase in incident responders 6/23/2016 Cyber LawCyberLaw 18
19
Cyber LawCyberLaw 6/23/2016 CyberLaw 19 Standards Frameworks –ISO-27001 –NIST –CoBIT –ITIL –SANS 20 Critical Controls
20
Cyber LawCyberLaw 6/23/2016 CyberLaw 20 Question for you What did you find most interesting in the reading so far?
21
Cyber LawCyberLaw 6/23/2016 CyberLaw 21 Questions ?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.