63
1 The Institute of Internal Auditors Detroit Chapter Presents

The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

1

The Institute of Internal Auditors

Detroit Chapter

Presents

Page 2: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Best Practices to Prepare for and

Respond to Data Security Incidents

Randy Gainer, Partner,

CISSP, Seattle

Page 3: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

If You Have Questions…If you have questions during the webcast:

– If necessary,exit Full Screen Viewby pressing the Esc key

– Submit questionsthrough the“Ask a Question” button

– Questions will be answered after the presentation

portion is concluded

Page 4: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Earning CPE Credit

In order to receive CPE credit for this webcast, participants must:

Attend the webcast on individual computers (one person per computer)

Answer polling questions asked throughout the webcast

When answering polling questions, select your answer

and the click “Vote” button (next to the “Ask a Question”

button) to submit / save your answer.

CPE certificates will be sent to the e-mail address on

your BrightTALK account within two weeks of this

webinar.

Page 5: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

A) Member Detroit ChapterB) Member – Central Region District 2 (Fort Wayne, Toledo, Michiana, W.

Mich., Lansing)C) Member of other chapter (not Michigan) D) Member – Other DistrictE) Non-member

Please tell us your member status

Page 6: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Thieves are targeting your data

6

Some examples . . . .

Page 7: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

A retail breach

• Attackers obtained a contractor’s password used for

remote access to a retailer’s network.

• The attackers moved to the card data environment

(CDE), inserted RAM-scraper malware, and collected

and exfiltrated 250,000 card datasets.

• The retailer removed the malware, hardened its

network, deployed a unified threat management system

on the CDE.

7

Page 8: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Retail breach, part 2

• The same attackers, temporarily locked out of the a

CDE, penetrated the corporate network.

• They installed key logger software on a manager’s

desktop and captured his credentials for logging-in to

the CDE.

• They used the company’s update functionality to

distribute and again insert RAM-scraping malware.

• And stole another 250,000 card datasets.

8

Page 9: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Credit union breach

• Thieves downloaded malware onto a teller’s computer

• Stole the teller’s credentials

• Used the credentials to add account holders to existing

accounts and to create new accounts

• Made illusory electronic fund transfers into the accounts

• Sent mules with IDs for the new account holders to

withdraw the funds

• Cost the credit union $510,119 in uninsured expenses.

9

Page 10: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Card processor breach

• Attackers installed sniffer software on a card

processor’s servers.

• File fragments suggest the attackers first installed

sniffer software five years earlier.

• The processor was Level 1 PCI DSS QSA-certified

throughout the period.

10

Page 11: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Data Thieves Everywhere

• In 2006, Lockheed learned that its network’s and those

of other contractors working on F-35 program had been

repeatedly breached.

• The networks of all of the contractors had been

infiltrated, compromised, and monitored.

• Thieves stole several terabytes of information on the

jets inner workings.

• The thieves took details about the fighters mechanical

design and how well it held up under the stresses of

flight and aerial combat.

11

Page 12: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

12

Polling Question 1

Page 13: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

13

Polling Question 2

Page 14: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Data Thieves Everywhere

• The result:

• U.S. costs:• $337 billion

• Chinese costs:• A lot less

14

Photos courtesy of Gregory Fowler,Special Agent in Charge, FBI, Portland, OR

Page 15: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Data Thieves Everywhere

• By 2007, the Chinese had stolen the designs for

many other advanced weapon systems:

– Black Hawk helicopters

– Global Hawk surveillance drones

– Patriot missile systems

– GE jet engines

– Aegis missile defense system

– C-17 Globemaster aircraft

– RC-135 reconnaissance aircraft

15

Page 16: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Data Thieves Everywhere

• Within two years after U.S. forensic firms

identify new tactics, techniques, and

procedures (TTPs) being used by state-

sponsored attackers, other criminals are

using the same TTPs.

16

Page 17: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Data Thieves Everywhere

• In 2013, thieves using RAM scraper malware

stole 40 million card datasets from Target and

70 million customer names and email

addresses.

• Thieves using the same type of malware stole

56 million card datasets from Home Depot.

• In 2014, attackers gained potential access to

more than 120 million healthcare and personnel

records from health insurers and OPM.

17

Page 18: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Data Thieves Everywhere

• Charles Berlin, Director, NSA

National Security Operations

Center:

– “The mission of the

Department of Defense …

[is] to protect America. I have been on the

ramparts pouring boiling oil on the attackers

for years. At the present time, we’re unable

to defend America.”

18

Page 19: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

The Current Status of Data Security

19

Page 20: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

DoJ counter-measures

20

Page 21: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

DoJ counter-measures

21

*$3 million reward

*

Page 22: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

DoJ has jailed some criminals

• The U.S. Department of Justice has indicted and

prosecuted both U.S.-based and foreign hackers. E.g.,

‒ Albert Gonzalez, a ring-leader in the Hannaford

breach and many others, is currently serving a 20-

year sentence.

‒ Four Russians and a Ukrainian were indicted for their

roles in 14 different breaches in which 170.5 million

payment card datasets were stolen. U.S. v.

Drinkman, et al., Second Superseding Indictment, Cr.

No. 09-626 (D. N.J. Dec. 17, 2013).

22

Page 23: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What can you do?

• To detect and reduce the impact of

security incidents?

• To respond appropriately if your

organization experiences a security

incident?

23

Page 24: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Become “compromise–ready”

• Deploy prevention and detection tools;

• Use threat intelligence services;

• Train managers and employees;

• Conduct risk assessments focused on

identifying and protecting sensitive data;

24

Page 25: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Become “compromise–ready” (cont’d)

• Manage the security of vendors;

• Understand regulators’ “hot buttons”;

• Develop, update, and practice incident

response plans;

• Use commercial DDoS protection to

defend against DDoS attacks; and

• Evaluate your cyber liability insurance.

25

Page 26: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Deploy prevention and detection tools

Deploy an intrusion detection system (IDS)

and an intrusion prevention system (IPS)

that aggregate logs to a Security Information

and Event Management (SIEM) tool that

sends real-time alerts.

26

Page 27: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Deploy prevention and detection tools

• Ensure that servers that store sensitive

data have logging enabled.

• Collect logs elsewhere than only on the

server, and retain the logs for at least a

year, preferably longer.

27

Page 28: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Deploy prevention and detection tools

Use multi-factor authentication for remote

access and for administrator access to key

servers.

28

Insight Enterprise Intelligence tool. Used with permission.

Page 29: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Deploy prevention and detection tools

Deploy data loss prevention software on the

network and on USB ports to help prevent

insider data thefts.

29

Page 30: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Deploy prevention and detection tools

These tools will enable you to

– Detect incidents sooner;

– Contain them more quickly; and

– Help a forensic investigator better determine

what occurred before the attack was

stopped.

30

Page 31: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Use threat intelligence

Utilize threat intelligence and endpoint

protection that use reputational searching

– to identify artifacts of malware that anti-virus

tools cannot identify, and

– to monitor how executables and binaries

behave on computers.

Examples include FireEye, Cylance “Protect,” CrowdStrike

Falcon, SNORT, FireAmp, Black Ice Defender, TripWire,

White Hat’s Sentinel, and Bit9/Carbon Black.

31

Page 32: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Use threat intelligence

32

Ponemon Institute, Advanced Threats in Retail Companies: A Study of North America & EMEA, 7 (May 2015)

Page 33: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Use threat intelligence

33

Ponemon Institute, Advanced Threats in Retail Companies, 11.

Page 34: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Train managers and employees

• Regularly discuss cybersecurity at Board

and senior management meetings; and

• Regularly provide employee cybersecurity

awareness and training.

34

Page 35: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Train managers and employees

Train (or hire) staff to provide continuous

network security monitoring

– to respond to alerts from IDS/IPS, analytics,

and endpoint protection tools; and

– to prevent exfiltration of data at one of the

points on the “kill chain” when malware is

found on the network.

35

Page 36: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Train managers and employees

• Initial Training at Time of Hiring

– Spotting security problems

– Avoiding inadvertent disclosures through mistaken

emails, faxes, and paper records mishandling

– Reporting procedures

– Supervisors trained to handle reports

• Regular and Continued Training

– Formal online training vs. in person

– Staff meetings

– Newsletters

– PhishMe or other anti-phishing training

36

Page 37: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Train managers and employees

37

Hi, Sir/Madam,

For the company's network security, we have upgraded the Citrix Virtual Workplace System. Please login to the Citrix Virtual Workplace System to activate your Account.

You should install the Citrix Secure Input IE ActiveX Control before you type in your password.

Citrix Login: https://poccitrix.[companyname].com/vpn/index.html

For more information, please contact me.

Best regards,

[Actual name]

[Correct title] Systems Administration

Phone: [correct phone number]

Email: [correct email address]

Local Address: [correct address]

[Company name]

[Company address]

Page 38: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Train managers and employees

38

Proofpoint, The Human Factor 2015, 10

Page 39: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Train managers and employees

39

(Advanced Persistent Threats, i.e., sophisticated network attacks)

Source: Dept. of Homeland Security

Page 40: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Conduct risk assessments

Use security firms to conduct

• Periodic, credentialed vulnerability scans and

correct vulnerabilities discovered;

• Penetration tests on

– Internet-facing applications that contain

sensitive data or provide access to internal

networks, and

– Internally-accessible applications that

contain sensitive data.

• Security program reviews.40

Page 41: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Manage vendors’ security

41

Source: U.S. Senate Committee on Commerce

Page 42: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Understand regulators’ “hot buttons”

Including:

– Failure to encrypt sensitive data;

– Failure to deploy data loss prevention software;

– Failure to manage vendor security;

– Failure to conduct periodic risk assessments or to

correct vulnerabilities discovered in assessments;

– Failure to prevent SQL injection attacks;

– Failure to change default configurations or passwords;

– Absence of appropriate policies;

– Insufficient employee training or awareness; and

– Insufficient dedicated security roles.

42

Page 43: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Practice incident response plans

Review your incident response plan and

conduct tabletop exercises with the team

that will respond to an incident, including

your

– Forensic investigator;

– Counsel; and

– Crisis management firm.

43

Page 44: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Use DDoS protection

Use commercial DDoS protection to defend

against DDoS attacks, such as

– Akamai’s Intelligent Platform or

Prolexic,

– Arbor Networks’ Peakflow Threat

Management System, or

– Radware’s DefensePro and Attack

Mitigation Service.

44

Page 45: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Evaluate your cyber liability coverage

Does it cover

– Incident response costs (incurred with consent

of the insurer in response to an incident that triggers

notification obligations, e.g., legal, call center, mail

center costs);

– Computer forensic costs (associated with

confirming the breach and identifying affected data

subjects);

– Credit or Identity Protection Costs

– Crisis Management

45

Page 46: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Evaluate your cyber liability coverage

– Hacker Damage (costs to repair or replace your

data, computer systems, or programs);

– Business Interruption (e.g., costs caused by an

attacker that DDOS’s your website);

– Cyber Extortion (e.g., money paid and expenses

incurred as a result of your receipt, of an illegal

threat to destroy or encrypt your data);

– Defense costs/settlement expenses; and

– Regulatory fines.

46

Page 47: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Evaluate your cyber liability coverage

47

Direct costs: forensics, legal, notification, credit monitoring;Indirect costs: employee time, decreased brand value, reputation harm, lost customers.

Source: Ponemon Institute, 2015 Cost of Data Breach Study: United States

Page 48: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Evaluate your cyber liability coverage

48

Source: Ponemon Institute, 2015 Cost of Data Breach Study: United States

Page 49: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Evaluate your cyber liability coverage

Other issues:– Scope of duty to defend and choice of counsel

– Allocation of defense costs

– Sublimits for covered costs

49

Page 50: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What you will have to do to respond

Handling the Long-Term

Consequences

Managing the Short-Term

Crisis

Evaluation of the Security

Incident

Discovery of a Security Incident

Theft, loss, or Unauthorized Disclosure of Personally Identifiable Non-Public Information or Third Party Corporate

Information that is in the care, custody or control of the Insured Organization, or a third party for whom the Insured

Organization is legally liable

Forensic Investigation and

Legal Review

Notification and Credit Monitoring

Class-Action Lawsuits

Regulatory Fines, Penalties, and

Consumer Redress

Public Relations

Reputational Damage

Income Loss

Page 51: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What you will have to do to respond

• Notification issues:– Is it a “breach”?

– Should you notify your broker or insurer?

– Should you retain counsel?

– Should you hire a forensics company?

– Should you notify regulatory agencies?

– Should you hire a crisis management firm?

– Should you offer credit monitoring?

51

Page 52: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

52

Polling Question 3

Page 53: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

53

Polling Question 4

Page 54: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What you will have to do to respond

• More issues:– Can you meet 30-day and 45-day state deadlines?

– Should you notify affected individuals or the data

owner?

– Should you notify state consumer agencies or

Attorneys General?

– Should you notify credit reporting agencies?

– Should you notify local police departments, the

Secret Service, or the FBI?

54

Page 55: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What you will have to do to respond

• State law requirements:– 47 states, D.C., & U.S.

territories

– Laws vary between jurisdictions

– Varying levels of enforcement by state attorneys general

– Limited precedent

• What does “access” mean?

• What is a reasonable notice time?

55

Page 56: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What you will have to do to respond

• How are state data breach notification laws

triggered?

– Access to or acquisition of specific types of

information by an unauthorized person of

• Name plus

– Social Security number

– Driver's license number

– Credit card number

– Bank account Information

– Online account and password (some states)

– Risk of Harm

– Computerized records vs. information on paper

56

Page 57: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What you will have to do to respond

Guiding principles for responding to an incident:

– Let the forensics drive the decision-making;

– Be guarded, consistent, and honest in

communications;

– Mitigate harm

• E.g., use a claims program; and

– Don’t try to win members back in breach

notification communications.

57

Page 58: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What you will have to do to respond

Be prepared to answer questions regulators may ask:

58

1. Describe your network

environment.

2. Do you have a network

diagram?

3. What data do you process or

store?

4. What logs do you maintain?

5. Are you preserving the

environment, including RAM?

6. Do you have critical third-

party vendors?

7. What IT resources do you

have?

8. Do you have a WISP and

incident response plan?

9. How did you detect the

intrusion?

10. What have you done so far?

Page 59: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What you will have to do to respond

More questions regulators may ask:

59

11. Why did it take so long to

notify members?

12. Are you offering credit

monitoring? If so, for how

many years?

13. What steps did you take to

investigate?

14. Did you exclude anyone from

notification?

15. How are you notifying people

for whom you don’t have

addresses?

16. Did you involve law

enforcement?

17. Why did you have former

members’ information?

18. If a vendor caused the

breach:

– What does the vendor

agreement require?

– Has the vendor

experienced other

breaches?

– Do you audit the vendor?

Page 60: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What you may have to do to respond

– Negligence

– Implied-in-fact contract

– Unjust enrichment

– Breach of fiduciary duty

– Invasion of privacy

– State consumer fraud

statutes

– State notification statutes

– Federal statutory claims

(statutory damages)

60

Defend against class action claims:

Page 61: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What you may have to do to respond

Litigate a motion to dismiss class action claims. There is a split regarding how courts apply the holding of Clapper v. Amnesty Int’l USA, 133 S. Ct. 1138 (2013): • Courts accepting defendants’ standing arguments and dismissing lawsuits:

– In re: SuperValu, Inc., Customer Data Sec. Breach Litig., 2016 WL 81792 (D. Minn. 2016)

– Maglio v. Advocate Health and Hospitals Corp., 40 N.E. 3d 746 (Ill. App. 2015)

– Green v. eBay, 2015 WL 2066531 (E.D. La. 2015)

– In re: Horizon Healthcare Servs., Inc. Data Breach Litig., 2015 WL 1472483 (D. N.J. 2015)

– Peters v. St. Joseph Servs. Corp., 74 F. Supp. 3d 847 (S.D. Tex. 2015)

– Storm v. Paytime, Inc., 90 F. Supp. 3d 359 (M.D. Pa. 2015)

– Galaria v. Nationwide Mut. Ins. Co., 998 F. Supp. 2d 646 (S.D. Ohio 2014)

– Strautins v. Trustwave Holdings, Inc., 27 F. Supp. 3d 871 (N.D. Ill. 2014)

– In re Barnes & Noble Pin Pad Litig., 2013 WL 4759588 (N.D. Ill. 2013)

– Polanco v. Omnicell Inc., 988 F. Supp. 2d 451 (D.N.J. 2013)

• Courts rejecting defendants’ standing arguments and letting lawsuits proceed:– Remijas v. Neiman Marcus Group, Inc., 794 F.3d 688 (7th Cir. 2015)

– In re: Target Corp. Data Sec. Breach Litig., 66 F. Supp. 3d 1154 (D. Minn. 2014)

– Moyer v. Michaels Stores, Inc., 2014 WL 3511500 (N.D. Ill. July 14, 2014)

– In re: Adobe Sys., Inc. Privacy Litig., 66 F. Supp. 3d 1197 (N.D. Cal. 2014)

– In re: Sony Gaming Networks & Customer Data Sec. Breach Litig., 996 F. Supp. 2d 942 (S.D. Cal. 2014)

61

Page 62: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

What you may have to do to respond

• Defeat claims against officers and board members:

– In Davis v. Steinhafel, Target shareholders allege Target’s officers and directors are personally liable for

• Failing to implement internal controls to protect customers’ personal and financial information; and

– Breaching their duties of loyalty and good faith by failing to institute adequate internal controls, imprudently managing the company, failing to supervise employees, and wasting assets.

62

Page 63: The Institute of Internal Auditors Detroit Chapter …...Data Thieves Everywhere • In 2013, thieves using RAM scraper malware stole 40 million card datasets from Target and 70 million

Atlanta

Chicago

Cincinnati

Cleveland

Columbus

Costa Mesa

Denver

Houston

Los Angeles

New York

Orlando

Philadelphia

Seattle

Washington, DC

www.bakerlaw.com

These materials have been prepared by Baker & Hostetler LLP for informational purposes only and are not legal advice. The information is not intended to create, and receipt of it does not constitute, a lawyer-client relationship.

Readers should not act upon this information without seeking professional counsel. You should consult a lawyer for individual advice regarding your own situation. ©2014 Baker & Hostetler LLP. All Rights Reserved.

Randy Gainer, Partner, CISSP

Seattle

[email protected]

206.332.1381

Questions?