contracts Our Cybersecurity Webinar Series To help you understand - - PowerPoint PPT Presentation
contracts Our Cybersecurity Webinar Series To help you understand - - PowerPoint PPT Presentation
Data Governance & Contract Management: How you can build security into your contracts Our Cybersecurity Webinar Series To help you understand the cyber risk in your legal vendor portfolio: Week 1 Week 2 Week 3 Week 4 July July July
Our Cybersecurity Webinar Series
To help you understand the cyber risk in your legal vendor portfolio:
8
July
15
July
22
July
29
July
PRIVILEGED DATA: Understanding the cyber security challenges with your legal vendors CYBER SECURITY BENCHMARKING: What you need to know now, how to avoid risk LEGAL VENDOR CYBER RISK PROGRAM: How to deal with problems (and how to avoid them in the first place) DATA GOVERNANCE & CONTRACT MANAGEMENT: How you can build security into your contracts
Week 1 Week 2 Week 3 Week 4
Why What How
Introductions
Tyler Marion Managing Director Duff & Phelps, Legal Management Consulting Derek Mihm Senior Manager Duff & Phelps, Legal Management Consulting
4
Our Work
Contract Landscaping Contract Automation Database Oversight Data Migration Drafting & Negotiation Contract Review
In this webinar we will review:
- How to structure risk mitigation in your contracts: recommended
clause types
- An overview of a typical, proactive data security risk mitigation
workflow for contracting
- Methods to retrospectively mitigate data security risk in existing
relationships’ contracts
Today’s Webinar
Overview
STRUCTURING RISK MITIGATION IN CONTRACT LANGUAGE
- Required Precautions –
‒ Level of Security Required ‒ Restrictions on Storage ‒ Access Limitations ‒ Update Requirements
Precautionary Clauses
Proactive Language to Ensure Security Measures Exist
Incident Response Clauses
Language to Ensure Breaches are Handled Appropriately
- Breach Procedures
‒ Incident Response Plans ‒ Notification Requirements
- Timing
- Contents
‒ Indemnification/Reimbursement
INCLUDING RISK MITIGATION LANGUAGE IN YOUR CONTRACTS
Most standard information security procedures follow some form
- f the above process, with variations introduced based on the
unique needs of the organization in question.
Current Standard Infosec Model
How do you choose the right terms for your engagement?
- Employ questionnaires to
systematically identify risk covering a variety of technical and physical attack vectors
- Develop a matrix with axes
based on the sensitivity of the data and the quality of the security the vendor has in place
- Draft Security Addenda with the
least restrictive language sufficient to address the various points on the matrix
Matching your Risk to your Language
QUALITY OF SECURITY Low Medium High SENSITIVITY OF DATA Low Rider B Rider A Rider A Medium Rider D Rider C Rider A High Rider F Rider E Rider C
- Information Security Reviews
can be time consuming, but there are ways to expedite vendor onboarding:
‒ Provide the option for a vendor to voluntarily adopt the most stringent addenda ‒ Engage a third party risk assessment vendor to provide faster recommendations
Pitfalls in Procurement
Potential Solutions to Reduce Time-to-Execution
CONTRACT LANDSCAPING: How to Use AI to Mitigate Risk in Existing Relationships
Controlling for Risk in Existing Contracts
- Existing Agreements or
Rogue Contractors
- Acquired Contracts
- Changes in Scope
- What is the current state of
commercially-available contract AI?
‒ Fuzzy Text Searching ‒ Pre-Trained Data Models ‒ Bespoke Training based on User Annotation
Artificial Intelligence and Contracts
How to use Current-State AI as a Risk Identification Tool
- Clause Extraction: Find the relevant language
- Point Extraction: Examine the clause to extract discrete data
points
- Inferences: Use deductive reasoning and relationships between
fields to intuit new data points
AI “Reading” Contracts – How is it done?
The goal is to eliminate firms from a “risk list” by finding data security terms in contracts with those firms. Once all mitigated vendors are eliminated from the list, those that remain can be repapered with the appropriate security rider.
Contract Landscaping
Using AI-Generated Data to Identify Risky Relationships and Repair Them
QUESTIONS / COMMENTS
Thank You
For more information please contact:
Tyler.Marion@duffandphelps.com
Tyler Marion
M: +1 (206) 472-4934 Derek.Mihm@duffandphelps.com
Derek Mihm
M: +1 (651) 393-4060