250 likes | 260 Views
Learn about the widespread and difficult-to-detect nature of cyber threats and how to protect your business from them. Understand the different categories and methods of cyber attacks and discover the key consequences of a hack. Explore pre-breach preparation and incident response strategies to minimize and respond effectively to a cyber attack. Gain insights on a global approach to cyber risk management and the importance of a comprehensive information security plan. Attend the Texas Assisted Living Association 2019 Conference to stay updated and ready for the evolving cyber threats.
E N D
The Cyber Threat • Cyber attacks are widespread, systemic and difficult to detect. • Companies in regulatedindustries or which have proprietary technology, sensitive customer data, or intellectual property are most at risk.
Who’s Doing the Hacking? • Outsiders • Financially motivated cybercriminals • “Hacktivists” • Hackers for hire • Nation-state-supported actors • The malicious insider
Categories of Attack • Theft of Trade Secrets/Economic Espionage • Theft of Consumer and Financial Data • Data Destruction/ Disruption of Operations • Website Defacements
Methods of Attack • Exploitation of Network Vulnerabilities • Mismanaged computer systems • “Zero-day” vulnerabilities • Social Engineering • Physical Devices • DDoS Attacks • Misuse of Permissions
Healthcare is a Sizable Portion of All Breaches Health care, with 16 percent reaches, continued to be particularly vulnerable to physical breaches, although malware and hacking breaches are starting to increase as the sector’s transition to electronic medical records progresses. The most vunerable information in health care was medical information, such as patient records, and Social Security Numbers. Source: California State AG Data Breach Report 2016
Key Consequences of a Hack • Governmental Inquiries • OCR • States Attorney General • DOJ/SEC/FTC/FDA . . . • Litigation • Class Actions/Consumer Litigation • Negligence and negligent omission • Invasion of privacy • Breach of contract • Shareholder Derivative Demands • Breach of fiduciary duties • Loss of Competitive Advantage/Reputational Harm • Costs of Responding to an Attack
How to Minimize and Respond to a Cyber Attack Pre-Breach Preparation Incident Response Framework
A Global Approach to Cyber Risk • Develop and implement a comprehensive information security plan. • Can’t do piecemeal – coordinate to avoid weak points. • Must address internal and external threats, both human and technical. • Plan must be customized to organization’s business operations. • Once implemented, plan should be reviewed and updated regularly. • There should be clear lines of communication and authority for cyber security within the organization.
Cyber Risk Assessment • Identify internal and external threats. • Review computer network and identify/assess vulnerabilities. For example: • Are software patches applied in a timely fashion? • Is the network adequately segmented? • Are access controls sufficient? • Is data encrypted where necessary? • Are network logs appropriately detailed and maintained? • Is the network topology map up to date? • Review vendor relationships (esp. data storage vendors). For example: • Do they have cyber risk protocols? • Do my clients require me to have cyber risk protocols?
Anatomy of a Modern Cyber AttackCredit: CyberSecurity Insights , Eija Paajanen, 5/22/2017
Duty to Warn – State • Data Breach – State Notification Laws • 48 states require private entities to notify individuals of security breaches of information involving “personally identifiable information PLUS • Laws specify notification requirements including: • Recipients • Content • Timing • Form • Identity theft prevention and mitigation services
Duty to Warn – Federal • Federal Breach Notification Laws • HIPAA/HITECH Breach Notification Requirements • FTC Health Breach Notification Rule
Duty to Disclose Cyber Risks – SEC • Generally, SEC requires companies to report “material” events or risks to shareholders. • Materiality depends on what a reasonable investor would consider important to an investment decision. • “Registrants should disclose the risk of cyber incidents if these issues are among the most significant factors that make an investment in the company speculative or risky.” (SEC Disclosure Guidance Topic No. 2 (Oct. 13, 2011).
Healthcare Leads Data Breach Costs Source: Ponemon Institute 2017 Cost of Data Breach Study: United States
Final Thoughts • Cyber security is a business risk, not an “IT problem.” • It must be managed and mitigated like any other risk. • Think in terms of compliance. • This is a long-term process.
Edward P. Jones Chief Compliance Officer Third Rock, Incorporated ed.jones@thirdrock.com Ana E. Cowan Deborah C. Hiser Senior Counsels Husch Blackwell LLP Ana.Cowan@huschblackwell.com Deborah.Hiser@huschblackwell.com Thomas Brown