SlideShare una empresa de Scribd logo
1 de 54
A Brave New World 
of Cyber Security 
and Data Breach 
Jim Brashear 
General Counsel 
Zix Corporation 
Dallas 
Chad Pinson 
Managing Director & Head of Office 
Stroz Friedberg 
Dallas
Cyber Risks Top Business Concerns 
2 8/20/2014 
EisnerAmper, Concerns About Risks Confronting Boards 2014 
“Reputation, 
cybersecurity 
and social 
media are 
largely 
intertwined 
and the 
associated 
risk has 
captured the 
attention of 
most boards”
Cyber Risk 
Slide 3 
Threat 
Risk 
Vulnerability Consequence
Threat Landscape 
4
KKeeyy DDaattaa SSeeccuurriittyy RRiisskkss 
•Loss or theft of device 
•Social engineering 
•Insiders 
•Malware 
•Hacking 
•Data Interception
Lost and Stolen Portable Devices
Phishing and 
Social Engineering
Insiders
Rogue Cloud 
Data 
Data 
Data 
Data 
Data 
Data 
Even if you don’t authorize cloud data storage 
It’s happening
Types 
of 
Attacks
Zero Day Exploits
SQL Injections
Data in Transmission
Data Intercepts Happen 
Even if you don’t see them
Reasonable Expectation of Privacy?
Who are Targets? 
• Individuals 
• Governments 
• Universities 
• Businesses 
• Outside directors 
• Services providers 
– Professionals 
– Outsourcers 
– Board portal
 TWargheto In daursetri eTsargets? 
Slide 17
Hacking Law Firms 
• ALAS: Hacker threats are not hypothetical 
• Law firms are soft targets 
– Treasure trove of confidential client information 
– Consultants, vendors, business partners and 
employees may have relatively weak data 
security
What Are Hackers After? 
• Proprietary Information 
Slide 19 
– Cybercriminals: corporate 
trade secrets 
– Nation-state hackers: 
military and defense 
intellectual property, 
designs and plans 
• Personal Financial Data 
• Political change 
• Embarrassment 
• Information Freedom
Cyber Attack Impacts 
• Loss of IP, confidential information 
• Privacy data breach 
• Business disruption 
• Forensics, containment, recovery, 
remediation 
• Regulatory investigation 
• Violations, Increased compliance 
costs 
• Contract breaches 
• Consumer lawsuits 
• Adverse publicity, brand damage 
• Loss of customer trust 
• Revenue impact 
• Share price decline 
• Shareholder derivative suits 
• Fines 
• Impact on insurance
Privacy ≠ Cybersecurity 
Privacy Cybersecurity
Twice Victimized by Databreach? 
Slide 23
Litigation 
• Consumer class action lawsuits 
• Statutory personal rights 
• Tort law negligence 
• “Reasonable care” 
• Contract breach 
• Failure to use reasonable care to protect 
data under NDA or confidentiality covenants 
• First Circuit: Bank failed to provide 
commercially reasonable data security 
• Patco Contruction Co., Inc. v. People’s 
United Bank 
• IP Enforcement 
• Trade secret law requires reasonable care 
to protect confidentiality
D&O Liability for Cyber Incidents 
“[B]oards that choose to ignore, or minimize, the 
importance of cybersecurity responsibility do so 
at their own peril.” 
~ SEC Commissioner Luis A. Aguilar, June 10, 2014 
 Shareholder derivative actions 
• Breach of duty of care and duty of oversight 
• Derived from good faith obligation in duty of loyalty 
 Business judgment rule may not protect directors who 
fail to act on cybersecurity 
– “Technically speaking, it has no role where directors have 
either abdicated their functions, or absent a conscious decision, 
failed to act.” Aronson v. Lewis (Del. 1984) 
 D&O insurance may not apply 
– Exclusion for liability resulting from a privacy breach
Federal Enforcement 
Slide 26 
Case in Point 
 Wyndham Worldwide Corp. 
– FTC alleges privacy policy 
misrepresented security 
measures 
 Deceptive practice 
– FTC alleges failures to 
maintain “reasonable and 
appropriate data security” 
 Unfair practice 
 Increased FTC enforcement 
 Overlapping jurisdiction with other agencies
State Data Breach Enforcement 
 47 U.S. States now have databreach 
notification laws 
 State AGs are actively enforcing them 
– State AGs also empowered to enforce HIPAA
Texas Privacy Laws 
 Texas has some of the strictest privacy laws 
in the country 
– Data breach notification statute encompasses non-residents 
– Texas medical privacy laws are stricter than HIPAA 
 Texas privacy laws protect: 
– Sensitive Personal Information (SPI) 
– Protected Health Information (PHI) 
 A business may be simultaneously subject to: 
– Texas Identity Theft Enforcement and Protection Act 
– Texas Medical Records Privacy Act 
– HIPAA and HITECH 
– Other privacy laws
Two Principal Texas Privacy Statutes 
Identity Theft Enforcement and Protection Act 
Applies to virtually all businesses operating in Texas 
Business and Commerce Code Chapter 521 
http://www.statutes.legis.state.tx.us/Docs/BC/htm/BC.521.htm 
Medical Records Privacy Act 
Broader than HIPAA 
Health & Safety Code Chapter 181 
http://www.statutes.legis.state.tx.us/Docs/HS/htm/HS.181.htm
Duty to Protect Personal Information 
Business and Commerce Code §521.052 
Business must use reasonable procedures to protect 
from unlawful use or disclosure any sensitive personal 
information collected or maintained in its regular course 
of business
AT THE SEC: A QUIET EVOLUTION 
July 1998: OIE Formed 
January 2010: Renewed Focus on IT 
Infrastructure 
October 2011: SEC Cybersecurity 
Guidance 
January 2014: Jarcho Speech/FINRA 
Sweep Announcement 
March 2014: SEC Cybersecurity 
Roundtable 
April 15: OCIE Risk Alert
SEC Focus on Cyber Risk 
Slide 32 32
Cyber Risk Disclosure 
 SEC Disclosure Guidance 
– 2011 CF Disclosure Guidance: Topic No. 2 Cybersecurity 
– Directs public companies to review, on an ongoing basis, 
the adequacy of their disclosure relating to cyber security 
risks and cyber incidents 
 6 disclosure areas 
– Risk Factors 
– Management's Discussion and Analysis (MD&A) 
– Business Description 
– Legal Proceedings 
– Financial Statement Disclosure 
– Disclosure Controls and Procedures
Board Oversight of Cyber Risk 
• Where does the board and management responsibility reside? 
• Adequate board expertise? 
• Who reports on cybersecurity and privacy to the board?
Cyber Risk Assessment Quandry 
Too Little Information 
Too Much Information
Proactive Risk Assessments 
Slide 36 
NOT CHECK-THE-BOX
New ABA Resolution 
“The American Bar Association encourages 
all private and public sector organizations 
to develop, implement, and maintain 
an appropriate cybersecurity program that 
complies with applicable ethical and legal 
obligations and is tailored to the nature and 
scope of the organization and the data and 
systems to be protected.”
Have a Data Breach Response Plan 
Slide 38
Multi-disciplinary Approach to Incident Response 
In-House 
Counsel 
Incident 
Response 
In-House 
IT 
CPO, CSO 
Compliance 
Business 
Unit 
Client and 
Media 
Relations 
Human 
Resources 
OUTSIDE 
INCIDENT 
RESPONSE 
EXPERTS 
OUTSIDE 
COUNSEL
Slide 40 
Technical Incident 
Response Team 
Employees 
From relevant c-levels 
of a 
company’s org 
chart 
Information 
technology, 
investor relations, 
public relations, 
legal etc. 
Independent 
Outside Experts 
Engage experts to 
conduct 
independent 
investigation of 
the attack 
Tasks include data 
preservation, 
malware analysis, 
digital forensic 
analysis, reversed 
engineering 
Invest in Resources
Test the Plan 
 Educate 
 Awareness 
 Test
NIST Cyber Risk Framework
NIST Framework 
• Initiated by Executive Order 13636 
• Voluntary 
• Designed primarily for US critical infrastructure 
owners and operators 
• Applicability to companies of all sizes 
• Does not create new standards 
• Leverages existing cybersecurity practices 
• Recommends a proactive cyber risk 
management process to assess risks and 
capabilities, and establish goals and a plan
NIST Framework
NIST Framework 
Slide 45
New COSO Integrated Framework 
Expands 
emphasis 
on risk 
assessment
Key Recommendations 
 Make cyber risk awareness part of company culture 
 Recurring cyber security and privacy law training for 
employees and contractors 
 Adopt enterprise-wide cyber risk oversight framework 
 Identify and retain outside consultants before crisis need 
arises 
 Assess regulatory and contractual requirements 
 Written policies and procedures to protect Sensitive 
Personal Information and Protected Health Information 
 Written data breach response procedures 
 Monitor and audit privacy and data security procedures 
 Revise privacy notices to reflect amended state laws and 
changes in company technology and practices 
 Annual cyber risk insurance coverage analysis
Cyber Security Ethics 
Slide 48
Ethics: Competence 
Rule 1.1 
A lawyer shall provide competent 
representation to a client 
A lawyer should keep abreast of 
the risks associated with 
technology
Ethics: Client Property 
Rule 1.15 
Client property should be 
appropriately safeguarded 
 A lawyer should hold property of 
others with the care required of 
a professional fiduciary 
Information 
is property
Ethics: Client Confidences 
Texas Rule 1.05 
Lawyer shall not knowingly reveal 
confidential information of a client or 
former client 
 Unless the client 
“consents after consultation”
Ethics: Client Confidences 
New Model Rule 1.6 
A lawyer shall make reasonable 
efforts to prevent the inadvertent 
disclosure of, or unauthorized access 
to, information relating to the 
representation of a client
Ethics: Proactive Confidentiality 
Comments to Model Rule 1.6 
17. When transmitting a communication, 
lawyer must take reasonable 
precautions to prevent the 
information from coming into the 
hands of unintended recipients
Securing cyberspace 
starts with YOU 
National Cybersecurity Awareness Campaign

Más contenido relacionado

La actualidad más candente

Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board informationAprio
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityHackerOne
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...Michael Noel
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Gohsuke Takama
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...Dan Michaluk
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)James Neo
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesKroll
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationPECB
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resourceDan Michaluk
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 

La actualidad más candente (20)

Aprio cybersecurity and board information
Aprio cybersecurity and board informationAprio cybersecurity and board information
Aprio cybersecurity and board information
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...Cyber security for the regulator and regulated  - Ontario Regulatory Authorit...
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best PracticesSEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the RetaliationCybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
 
Building Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe HarborBuilding Cyber Resilience: No Safe Harbor
Building Cyber Resilience: No Safe Harbor
 
The internet as a corporate security resource
The internet as a corporate security resourceThe internet as a corporate security resource
The internet as a corporate security resource
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 

Destacado

Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security BreachAlienVault
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threatsdnomura
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachFletcher Media
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?Edge Pereira
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security BreachSeculert
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
Bank Director List of Worries
Bank Director List of WorriesBank Director List of Worries
Bank Director List of WorriesBank Director
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionRamón Gómez de Olea y Bustinza
 
Cyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education CourseCyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education CourseScott Diehl
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossShawn Tuma
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsWynyard Group
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 

Destacado (20)

Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Bank Director List of Worries
Bank Director List of WorriesBank Director List of Worries
Bank Director List of Worries
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Websense
WebsenseWebsense
Websense
 
Cyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education CourseCyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education Course
 
10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview10 Rules for Vendors - an Overview
10 Rules for Vendors - an Overview
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 

Similar a A Brave New World of Cyber Security and Data Breach

ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Amy Purcell
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...Financial Poise
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? SecurityScorecard
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessStephen Cobb
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 

Similar a A Brave New World of Cyber Security and Data Breach (20)

ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013Cyber-Security: A Shared Responsibility -- November 2013
Cyber-Security: A Shared Responsibility -- November 2013
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
CYBER SECURITY and DATA PRIVACY 2022_How to Build and Implement your Company'...
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 
GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready? GDPR Enforcement is here. Are you ready?
GDPR Enforcement is here. Are you ready?
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
HIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good BusinessHIPAA, Privacy, Security, and Good Business
HIPAA, Privacy, Security, and Good Business
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 

Último

昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsAbdul-Hakim Shabazz
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeBlayneRush1
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxmarielouisetulaytay
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 

Último (20)

昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 ShopsVanderburgh County Sheriff says he will Not Raid Delta 8 Shops
Vanderburgh County Sheriff says he will Not Raid Delta 8 Shops
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis LeeAlexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
Alexis O'Connell lexileeyogi Bond revocation for drug arrest Alexis Lee
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptxSports Writing for PISAYyyyyyyyyyyyyyy.pptx
Sports Writing for PISAYyyyyyyyyyyyyyy.pptx
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 

A Brave New World of Cyber Security and Data Breach

  • 1. A Brave New World of Cyber Security and Data Breach Jim Brashear General Counsel Zix Corporation Dallas Chad Pinson Managing Director & Head of Office Stroz Friedberg Dallas
  • 2. Cyber Risks Top Business Concerns 2 8/20/2014 EisnerAmper, Concerns About Risks Confronting Boards 2014 “Reputation, cybersecurity and social media are largely intertwined and the associated risk has captured the attention of most boards”
  • 3. Cyber Risk Slide 3 Threat Risk Vulnerability Consequence
  • 5. KKeeyy DDaattaa SSeeccuurriittyy RRiisskkss •Loss or theft of device •Social engineering •Insiders •Malware •Hacking •Data Interception
  • 6. Lost and Stolen Portable Devices
  • 7. Phishing and Social Engineering
  • 9. Rogue Cloud Data Data Data Data Data Data Even if you don’t authorize cloud data storage It’s happening
  • 14. Data Intercepts Happen Even if you don’t see them
  • 16. Who are Targets? • Individuals • Governments • Universities • Businesses • Outside directors • Services providers – Professionals – Outsourcers – Board portal
  • 17.  TWargheto In daursetri eTsargets? Slide 17
  • 18. Hacking Law Firms • ALAS: Hacker threats are not hypothetical • Law firms are soft targets – Treasure trove of confidential client information – Consultants, vendors, business partners and employees may have relatively weak data security
  • 19. What Are Hackers After? • Proprietary Information Slide 19 – Cybercriminals: corporate trade secrets – Nation-state hackers: military and defense intellectual property, designs and plans • Personal Financial Data • Political change • Embarrassment • Information Freedom
  • 20.
  • 21. Cyber Attack Impacts • Loss of IP, confidential information • Privacy data breach • Business disruption • Forensics, containment, recovery, remediation • Regulatory investigation • Violations, Increased compliance costs • Contract breaches • Consumer lawsuits • Adverse publicity, brand damage • Loss of customer trust • Revenue impact • Share price decline • Shareholder derivative suits • Fines • Impact on insurance
  • 22. Privacy ≠ Cybersecurity Privacy Cybersecurity
  • 23. Twice Victimized by Databreach? Slide 23
  • 24. Litigation • Consumer class action lawsuits • Statutory personal rights • Tort law negligence • “Reasonable care” • Contract breach • Failure to use reasonable care to protect data under NDA or confidentiality covenants • First Circuit: Bank failed to provide commercially reasonable data security • Patco Contruction Co., Inc. v. People’s United Bank • IP Enforcement • Trade secret law requires reasonable care to protect confidentiality
  • 25. D&O Liability for Cyber Incidents “[B]oards that choose to ignore, or minimize, the importance of cybersecurity responsibility do so at their own peril.” ~ SEC Commissioner Luis A. Aguilar, June 10, 2014  Shareholder derivative actions • Breach of duty of care and duty of oversight • Derived from good faith obligation in duty of loyalty  Business judgment rule may not protect directors who fail to act on cybersecurity – “Technically speaking, it has no role where directors have either abdicated their functions, or absent a conscious decision, failed to act.” Aronson v. Lewis (Del. 1984)  D&O insurance may not apply – Exclusion for liability resulting from a privacy breach
  • 26. Federal Enforcement Slide 26 Case in Point  Wyndham Worldwide Corp. – FTC alleges privacy policy misrepresented security measures  Deceptive practice – FTC alleges failures to maintain “reasonable and appropriate data security”  Unfair practice  Increased FTC enforcement  Overlapping jurisdiction with other agencies
  • 27. State Data Breach Enforcement  47 U.S. States now have databreach notification laws  State AGs are actively enforcing them – State AGs also empowered to enforce HIPAA
  • 28. Texas Privacy Laws  Texas has some of the strictest privacy laws in the country – Data breach notification statute encompasses non-residents – Texas medical privacy laws are stricter than HIPAA  Texas privacy laws protect: – Sensitive Personal Information (SPI) – Protected Health Information (PHI)  A business may be simultaneously subject to: – Texas Identity Theft Enforcement and Protection Act – Texas Medical Records Privacy Act – HIPAA and HITECH – Other privacy laws
  • 29. Two Principal Texas Privacy Statutes Identity Theft Enforcement and Protection Act Applies to virtually all businesses operating in Texas Business and Commerce Code Chapter 521 http://www.statutes.legis.state.tx.us/Docs/BC/htm/BC.521.htm Medical Records Privacy Act Broader than HIPAA Health & Safety Code Chapter 181 http://www.statutes.legis.state.tx.us/Docs/HS/htm/HS.181.htm
  • 30. Duty to Protect Personal Information Business and Commerce Code §521.052 Business must use reasonable procedures to protect from unlawful use or disclosure any sensitive personal information collected or maintained in its regular course of business
  • 31. AT THE SEC: A QUIET EVOLUTION July 1998: OIE Formed January 2010: Renewed Focus on IT Infrastructure October 2011: SEC Cybersecurity Guidance January 2014: Jarcho Speech/FINRA Sweep Announcement March 2014: SEC Cybersecurity Roundtable April 15: OCIE Risk Alert
  • 32. SEC Focus on Cyber Risk Slide 32 32
  • 33. Cyber Risk Disclosure  SEC Disclosure Guidance – 2011 CF Disclosure Guidance: Topic No. 2 Cybersecurity – Directs public companies to review, on an ongoing basis, the adequacy of their disclosure relating to cyber security risks and cyber incidents  6 disclosure areas – Risk Factors – Management's Discussion and Analysis (MD&A) – Business Description – Legal Proceedings – Financial Statement Disclosure – Disclosure Controls and Procedures
  • 34. Board Oversight of Cyber Risk • Where does the board and management responsibility reside? • Adequate board expertise? • Who reports on cybersecurity and privacy to the board?
  • 35. Cyber Risk Assessment Quandry Too Little Information Too Much Information
  • 36. Proactive Risk Assessments Slide 36 NOT CHECK-THE-BOX
  • 37. New ABA Resolution “The American Bar Association encourages all private and public sector organizations to develop, implement, and maintain an appropriate cybersecurity program that complies with applicable ethical and legal obligations and is tailored to the nature and scope of the organization and the data and systems to be protected.”
  • 38. Have a Data Breach Response Plan Slide 38
  • 39. Multi-disciplinary Approach to Incident Response In-House Counsel Incident Response In-House IT CPO, CSO Compliance Business Unit Client and Media Relations Human Resources OUTSIDE INCIDENT RESPONSE EXPERTS OUTSIDE COUNSEL
  • 40. Slide 40 Technical Incident Response Team Employees From relevant c-levels of a company’s org chart Information technology, investor relations, public relations, legal etc. Independent Outside Experts Engage experts to conduct independent investigation of the attack Tasks include data preservation, malware analysis, digital forensic analysis, reversed engineering Invest in Resources
  • 41. Test the Plan  Educate  Awareness  Test
  • 42. NIST Cyber Risk Framework
  • 43. NIST Framework • Initiated by Executive Order 13636 • Voluntary • Designed primarily for US critical infrastructure owners and operators • Applicability to companies of all sizes • Does not create new standards • Leverages existing cybersecurity practices • Recommends a proactive cyber risk management process to assess risks and capabilities, and establish goals and a plan
  • 46. New COSO Integrated Framework Expands emphasis on risk assessment
  • 47. Key Recommendations  Make cyber risk awareness part of company culture  Recurring cyber security and privacy law training for employees and contractors  Adopt enterprise-wide cyber risk oversight framework  Identify and retain outside consultants before crisis need arises  Assess regulatory and contractual requirements  Written policies and procedures to protect Sensitive Personal Information and Protected Health Information  Written data breach response procedures  Monitor and audit privacy and data security procedures  Revise privacy notices to reflect amended state laws and changes in company technology and practices  Annual cyber risk insurance coverage analysis
  • 49. Ethics: Competence Rule 1.1 A lawyer shall provide competent representation to a client A lawyer should keep abreast of the risks associated with technology
  • 50. Ethics: Client Property Rule 1.15 Client property should be appropriately safeguarded  A lawyer should hold property of others with the care required of a professional fiduciary Information is property
  • 51. Ethics: Client Confidences Texas Rule 1.05 Lawyer shall not knowingly reveal confidential information of a client or former client  Unless the client “consents after consultation”
  • 52. Ethics: Client Confidences New Model Rule 1.6 A lawyer shall make reasonable efforts to prevent the inadvertent disclosure of, or unauthorized access to, information relating to the representation of a client
  • 53. Ethics: Proactive Confidentiality Comments to Model Rule 1.6 17. When transmitting a communication, lawyer must take reasonable precautions to prevent the information from coming into the hands of unintended recipients
  • 54. Securing cyberspace starts with YOU National Cybersecurity Awareness Campaign