34
Perkins Coie LLP Cybersecurity and Data Protection What you need to know and how to be prepared December 2017 Kevin R. Feldis Attorney Work Product

Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

Perkins Coie LLP

Cybersecurity and Data Protection

What you need to know and how

to be prepared

December 2017

Kevin R. Feldis

Attorney Work Product

Page 2: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

The Current Threat Environment

A Growing Risk of Cyber Attacksand Data Breaches

Page 3: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

3

Page 4: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

4

Page 5: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

5

Page 6: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

6

Internet usage increasing• 3.89 billion Internet users (50% world)

• Reaching far corners of the earth

Device usage increasing• 12 billion internet-connected devices

worldwide (21 billion by 2020)

• Average American owns 4 internet-connected devices

More diverse & data rich services offered• Medical, Financial, Personal Fitness

• Children (Facebook’s Messenger Kids)

• IoT, Smart Homes, Wearables

• Artificial Intelligence (AI)

The Internet Ecosystem andThe Ubiquity of Personal Information

Page 7: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2
Page 8: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

CloudPets“Smart” Toys

Wi Fi/Bluetooth enabled audio messages through toys

Page 9: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

CloudPets company was hacked exposing data of

800,000 customers and 2 million voice messages from

“smart” teddy bears (February 2017)

Page 10: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2
Page 11: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

Diverse Threat Actors1. Nation-state actors

• Highly resourced & sophisticated

• Target critical infrastructure, ISPs, large corporations, gov. contractors

• Propaganda & information value

• Advanced Persistent Threats *

• Examples = Las Vegas Sands, Anthem, OPM, Sony, Equifax (?)

2. Organized Crime/Other Criminals• Personal Identifiable Information, credit cards, data

• Black market for stolen data – Dark Web

• Examples = Target, Home Depot, Uber

3. Hacktivists

4. Lone Wolves

Page 12: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2
Page 14: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

The Nature of the Threat

• In Chinese intrusion cases (coming from China) handled by Mandiant, 94% of the victim companies didn't realize their networks had been breached until someone else told them.

• On average, companies' networks had been breached for 416 days before the intrusion was detected.

"Nation-states willing to spend unlimited amounts of money for technology, intelligence gathering, and bribery can overcome just about any defense."

-- Alan Paller, Director of Research, SANS Institute

Page 15: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

15

15

Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

IncreasedData Breaches

Page 16: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2
Page 17: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

• Personal Information of 57 million customers and drivers• 3 potential class action lawsuits• Attorneys General investigations in three states• LA City Attorney lawsuit• Federal Trade Commission inquiry

Page 18: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

18

Page 19: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

19

Page 20: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

20

Page 21: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

The Cyber Legal and Regulatory Landscape

21

Page 22: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

22

Increasing risk

of litigation and

regulation

Growing class of plaintiffs Consumers, shareholders, financial

institutions, third-parties

Class action lawsuits (failure to protect)

State Attorneys General Increasingly active (Uber)

Federal Trade Commission Consumer privacy protections

Trends Increased private litigation

Fewer claims dismissed for standing

More and higher settlements

Increased Enforcement

Additional Regulations

Increased Litigation & Regulatory Risk

Page 23: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

Substantive Data Security Standards

23

• State Laws

• Nearly all states have data breach regulations

• Many states: commercially reasonable measures

• Federal Laws

• FTC § 5, HIPAA, FERPA, GLBA (Gramm-Leach-Bliley Act)

• SEC guidance

• Industry standards

• PCI (payment card industry) , NERC (North American Electric

Reliability Corporation) CIP (critical infrastructure protection)

• Common law standards: Rising standard of care

• EU and International Regulations

Page 24: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

Substantive Data Security Standards

24

• Government Contracts

• Defense contractors and subcontractors

• DFARS 252.204.7012 Safeguarding Covered Defense

Information (CDI) and Cyber Incident Reporting (December 31,

2017)

• Multi-factor authentication

• Encryption

• Breach notification (w/in 72 hours through portal)

• FAR 52.204-21 Basic Safeguarding of Contractor

Information Systems that process, store or transmit

federal contract information (June 2016)

• 15 basic security controls for the systems (controls access, virus scans)

• Federal contract information = information provided or generated for the

Government under a contract to develop or deliver a product or service

• Must include in solicitations and contracts, and flow through to subs

Page 25: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

State Data Breach Laws

25

Page 26: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

26

Contractual Obligations

Contractual Provisions (Where to look)

• Confidentiality clauses

• Nondisclosure clauses

• Express security requirements

• Trade secret / proprietary information clauses

Highlights the need for assessing contract risks

and including cybersecurity provisions in contracts

Page 27: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

27

How to Protect Your Business

Page 28: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

Prevent AND Plan for Response

1. Implement a Company-wide Data Security Program• All stakeholders – IT alone can’t secure your data• High-level engagement across components and business lines• Written policies and practices • Train, test, and enforce

2. Consider What Data is Shared with Third-Parties• Conduct due diligence and risk analysis before sharing data• Contract terms and considerations/vendor risks• Encryption

3. Develop and Test your Incident Response Plan• Effective response to a data breach can reduce actual damage

and legal exposure

Page 29: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

Avoid Common Mistakes

1. Data Security Program Mistakes• Too narrow or an out-of-date information security programs expose

you to legal, contractual and regulatory risks• Failure to stress test • Failure to enforce

2. Contract and Third-party Mistakes• Failure to assess the risks of sharing information• Failure to conduct due diligence• Failure to have continued oversight/update due diligence• Failure to know the scope of access and data being shared• Failure to clearly define rights and responsibilities in contracts

3. Incident Response Plan Mistakes• Failure to include cybersecurity in your IRP• Failure to appoint responsible senior officials, identify cybersecurity

vendors, and hire legal counsel to direct the response and preserve privileges.

• Failure to routinely assess, test and update the IRP

Page 30: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

30

Page 31: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

31

Page 32: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

Immediate Steps:• Review your current Data Security Program

• Have some with experience review & update it• Get the buy-in and budgeting necessary from the top• Schedule and conduct training & stress testing

• Conduct a Cyber Compliance Review• Are you complying with industry standards, government contract

requirements (FAR, DFARS), and regulations/laws

• Develop procedures for limiting third-party risks• Determine the level or risk that is appropriate for your business

before you outsource or share any data• Develop a third-party due diligence process and follow-it

• Update your Incident Response Plan• Dust it off, have someone with cyber experience review it, update it. • Test it – table top and simulated

Page 33: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

33

Page 34: Cybersecurity and Data Protection › wp-content › uploads › K_Feldis... · you to legal, contractual and regulatory risks • Failure to stress test • Failure to enforce 2

Perkins Coie LLP | PerkinsCoie.com

Kevin FeldisPerkins Coie - Partner907-263-6955 desk907-529-1599 [email protected]

www.perkinscoie.com/KFeldis

Admitted in Alaska, Illinois and Washington DC