Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact...

36
Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015

Transcript of Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact...

Page 1: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Protecting Your Company From A Cyber Breach

Proactive Steps to Minimize Breach Risks & ImpactOctober 30, 2015

Page 2: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Presented By

© 2015 Fredrikson & Byron, P.A.

Rebecca Perry, CIPP US/GJordan [email protected]

Ann LaddFredrikson & Byron [email protected]

Sten-Erik HoidalFredrikson & Byron [email protected]

Page 3: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Overview- Elements of a Cyber Security Program

© 2015 Fredrikson & Byron, P.A.

– Identify– Protect (policies, vendors, training,

practices, insurance) – Detect– Respond– Recover

Page 4: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Identify

© 2015 Fredrikson & Byron, P.A.

• Assets• Business Environment• Laws/Regulations/Contractual Obligations• Use Good Information Governance

Page 5: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Locate your data.Delete what you don’t need.Improve policies and training.

© 2015 Fredrikson & Byron, P.A.

Page 6: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

What’s Your Biggest Exposure?

# 3 Paper

# 1 Employee Negligence

# 2 Hacking

Page 7: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Third party outsourcing of data 34 %

Migration to new mobile platforms 56 %

Temporary worker or contractor errors 59 %

Not knowing where sensitive or confidential data is 64 %

What Keeps CIOs Up at Night?

N=1587, Source: Ponemon Research, May 2014

Page 8: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

BUSINESSPROCESSE

SBUSINESS

PROCESSES

RECORDSINVENTORY

WHAT

WHERE

BUSINESSPROCESSES

RETENTION

SENSITIVITY

The Cornerstone

https://www.ftc.gov/system/files/documents/plain-language/bus69-protecting-personal-information-guide-business_0.pdf

Page 9: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Accident/Incident RecordsAdvertising Records Benefit RecordsBudget RecordsContracts & AgreementsCredit ApprovalsCustomer OrdersCustomer Payment RecordsEmployee Medical FilesEngineering RecordsMarketing RecordsResearch & DevelopmentSales Receipts

Engage The Business

Page 10: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

101010001110010100110 1 1 0 1 0 0 1 0 0 1 0 1 10 1 0 0 1 1 01 0 0 1 1 0 11 0 00 1 0 0 1

Understand Business Practices

Page 11: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

BUSINESS NEEDS

DOL

OSHA

SEC

GLBA

HIPAA

PCI

State Privacy

Laws

REQUIREMEN

TSCorporate

Sensitive

Customer Data

Intellectual

Property

PII

Bio Metric

Patient Health

Info.

Personal Financial

Sensitive EU

SENSITIVIT

Y

Identify Requirements

Page 12: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Benefit Enrollment & Participation

Distribution Centers HR - Benefits

HR – Canada HR – Compensation Store Operations HR - Regional

Health Information

Beneficiary #FMLADates of ServicePatient NamePatient Address

National ID Card #Partial Social Security #Social Security #

GovernmentID’s

Employment IDEmployment StatusHandicapped StatusMedical Conditions

Employee Information

AgeNameEmail AddressMarriage StatusPhysical AddressTelephone #

Personal Information

Insurance InformationRetirement Account

Financial Information

Corp - Legal ActionsEU - Health Status

Other

Applications3rd Party, Cognos , Microsoft Outlook, Microsoft SharePoint, PDF

Box Warehouse, Department File Cabinet, Secure File Cabinet

CDDVD, Laptops, Shared Drives

Email

Paper

Unstructured

Archive, Desktop Hard Drive, Email Inbox, Laptops, Printed Hard Copies, Shared Drives

Best Practice Retention: 6 Years after superseded 29 USC 1027

Page 13: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Reporting Findings & Risks to Senior Management

Page 14: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

60,995Data Points

122Area

Representatives

17Subject Matter Experts

110Departments

5Countries

Case Study

45 Days

Page 15: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Lack of Critical Policy Awareness

59%Awar

e

41%Not

Aware

Information Se-curity Policy

Only 44% Trained

69%Aware

31%Not

Aware

Records Retention Policy37%

Never Dispose of Records

Page 16: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

3,128VERSIONS ACROSS MEDIA[Paper, Email, File Shares, Applications]

Redundancy Creates Risk

1,302DEPARTMENT

VERSIONS

274UNIQUE

RECORD TYPES

47% TAGGED WITH PERSONAL INFORMATION

Page 17: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

6% Forward to Personal Email

20% Save to Flash Drives or DVDs84% Save to Laptops or Tablets

18% Save to Cloud Storage

Page 18: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Over Retention Is a Substantial Cause of Risk to Sensitive

Information

71% Re-tained Longer

Shorter

InLine

NoBP

Current RetentionCompared to Best Practice

48% Tagged with Sensitive Information

Page 19: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Email

20% ANNUAL GROWTH RATE

CENTRAL ARCHIVE RETAINED INDEFINITELY

USERS CREATING PERSONAL ARCHIVES

Forward to Personal E...

Flash Drives

Content Management ...

Printed Hard Copies

Archive (PST, NSF)

Shared Drives

7%

17%

26%

62%

62%

68%

EMAIL STORAGE LOCATIONS

Page 20: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Electronic Information on File Shares

20,000 GIGABYTES

50% ANNUAL GROWTH RATE

ACTIVE ENVIRONMENT

PII ON SHARED DRIVES (2+ ELEMENTS IDENTIFIED) 59 AREAS

206 RECORD TYPE PROFILES

[Word Documents, Power Points, PDFs, Excel Spreadsheets, Images, etc.]

0.5 Less Than

3 Years Old

0.33 to

5 Years Old

0.2Older Than

5 Years

50% of Information on File Shareswas Created in Last 3 Years

Page 21: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Protect

© 2015 Fredrikson & Byron, P.A.

• Technical • Physical• Administrative -Training, Vendor

Management, Policies, Insurance

Page 22: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Technical and Physical Security “Quick Hits”

• Secure shredding• Wiping equipment

• Encryption• Patching• Good passwords

© 20__ Fredrikson & Byron, P.A.

http://www.sans.org/critical-security-controlshttp://www.sifma.org/issues/operations-and-technology/cybersecurity/guidance-for-small-firms/

Page 23: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Awareness and Training

© 2015 Fredrikson & Byron, P.A.

Example topics• Reasons, Risks, What is protected, and Why• Overview of internal policies• Highlight important areas of concern depending on your

needs:– Physical security (space, documents, devices)– Passwords and good log-in practices– Internet tips/avoiding phishing and other scams– Sending protected information (email practices, etc.)– Storing protected information-special security– Incident response – what to do if you suspect a problem

Page 24: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Some examples- training doesn’t have to be boring.

© 2015 Fredrikson & Byron, P.A.

Can you guess this guys’ password?

Page 25: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Vendor Management—

© 2015 Fredrikson & Byron, P.A.

• Diligence- see example questions• Contractual protections

– Require safeguards- consider third party certifications– Control downstream transfers (sub contractors, hosts)– Timely reports of /defined controls on response to incidents– Termination rights– Indemnification/Insurance – Disaster recovery/contingencies

• Audit Rights

Page 26: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Protect – Ensure The Right Policies Are In Place

© 2015 Fredrikson & Byron, P.A.

• Overall Security and Privacy Policy – High Level

• Acceptable Use

• BYOD / Mobile Device / Lost Device

• Security Practices

Page 27: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Detect – Review Data Breach Detection Capabilities

© 2015 Fredrikson & Byron, P.A.

• Data loss prevention technologies

• IT Security Consultant/intrusion testing

• Understand baseline IT security operations

• Monitoring of information systems, device usage, and personnel

Page 28: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Respond

© 2015 Fredrikson & Byron, P.A.

Page 29: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Respond – Prepare in Advance!

© 2015 Fredrikson & Byron, P.A.

Page 30: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Respond – Develop, Practice, and Follow A Data Breach Response Plan

© 2015 Fredrikson & Byron, P.A.

• Written document(s) outlining the company’s strategy for evaluating and responding to potential data breaches.

• Customized to the company’s processes, structure, and goals.

• Tailored to the types of PII or sensitive information the company has access to.

Page 31: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Respond – Key Components For A Data Breach Response Plan

© 2015 Fredrikson & Byron, P.A.

1. Identify response team and outline roles and responsibilities.

2. List strategic partners and explain process for determining whether they need to be involved.

3. Diagram system, data flow, and infrastructure.

Page 32: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Respond – Key Components (cont.)

© 2015 Fredrikson & Byron, P.A.

4. Outline strategy for identifying a breach, ascertaining its scope, and containing the breach.

5. Explain process for analyzing legal implications of breach.

6. Outline how notice will be provided to potentially injured parties (if necessary).

Page 33: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Respond – Response Plan (cont.)

© 2015 Fredrikson & Byron, P.A.

7. Develop and outline an internal communications strategy.

8. Develop and outline and external communications strategy.

9. Describe process for deciding whether to provide assistance (e.g., credit or fraud monitoring) to injured parties.

Page 34: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Respond – Other Considerations

© 2015 Fredrikson & Byron, P.A.

• Provide to insurer for feedback.

• Train, train, train….

• Follow it!

Page 35: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Recover

© 2015 Fredrikson & Byron, P.A.

• Self Assessment – Review and analyze the company’s response to determine areas for improvement. Revise incident response plan accordingly.

• Recovery Planning – Develop a strategy to get the company’s systems back on line in the event of a breach.

Page 36: Protecting Your Company From A Cyber Breach Proactive Steps to Minimize Breach Risks & Impact October 30, 2015.

Questions?

© 2015 Fredrikson & Byron, P.A.