MANAGING CYBERSECURITY INVESTIGATIONS Tara Swaminatha, Of Counsel, - - PowerPoint PPT Presentation

managing cybersecurity investigations
SMART_READER_LITE
LIVE PREVIEW

MANAGING CYBERSECURITY INVESTIGATIONS Tara Swaminatha, Of Counsel, - - PowerPoint PPT Presentation

MANAGING CYBERSECURITY INVESTIGATIONS Tara Swaminatha, Of Counsel, Washington, DC Sam Millar, Partner, London May 12, 2016 If you cannot hear us speaking, please make sure you have called into the teleconference number on your invite


slide-1
SLIDE 1

www.dlapiper.com May 12, 2016

May 12, 2016

MANAGING CYBERSECURITY INVESTIGATIONS

Tara Swaminatha, Of Counsel, Washington, DC Sam Millar, Partner, London

If you cannot hear us speaking, please make sure you have called into the teleconference number on your invite information.

  • US participants: 1 800 893 0176
  • Outside the US: 212 231 2928
  • The audio portion is available via conference call. It is not broadcast through your computer.

*This webinar is offered for informational purposes only, and the content should not be construed as legal advice on any matter.

slide-2
SLIDE 2

www.dlapiper.com 1 May 12, 2016

Speakers

Tara Swaminatha

Of Counsel, Washington, DC

Sam Millar

Partner, London

slide-3
SLIDE 3

www.dlapiper.com 2 May 12, 2016

 Contact inside and outside counsel early (ideally before a breach)  In the wake of a suspected or actual breach, using counsel (properly) allows you to keep things under wraps until you have a chance to get facts straight – As you triage internally, keep your internal discussions and documents confidential – Better to take a minute and sort out game plan before saying anything  *Privilege is not automatic simply by using counsel  Fact-specific inquiry  Requires adherence to protocol

If you have a breach, call counsel yesterday

slide-4
SLIDE 4

www.dlapiper.com 3 May 12, 2016

 Purpose  Roles and responsibilities  Escalation procedures  Types of incidents  Incident-specific response procedures  Communications plan  Contact information (consider alternative methods of communication)

Incident response (IR) policy – important elements

slide-5
SLIDE 5

www.dlapiper.com 4 May 12, 2016

 Response plan “cheat sheets” organized by role  Proper training for team members  Vendors engaged through counsel  Privileged protocol established  Pre-existing relationships with law enforcement  Tabletop/security drill  Continually revise and adapt plans and protocol

Other important elements of strong IR plan (improves efficacy of investigations)

slide-6
SLIDE 6

www.dlapiper.com 5 May 12, 2016

` ``

Phase 1 Phase 2 Phase 3 Phase 4

Role Role

Role

Role Role Role

slide-7
SLIDE 7

www.dlapiper.com 6 May 12, 2016

Security incident triage guidelines

slide-8
SLIDE 8

www.dlapiper.com 7 May 12, 2016

Roles & Responsibilities Matrix

slide-9
SLIDE 9

www.dlapiper.com 8 May 12, 2016

Chain of custody

slide-10
SLIDE 10

www.dlapiper.com 9 May 12, 2016

 Assemble an incident response team (IRT)  Contact inside and outside counsel to establish a “privileged” reporting and communication channel  Coordinate with legal counsel to bring in cybersecurity experts and forensic examiners  Stop additional data loss  Secure evidence  Preserve computer logs  Document the breach  Define legal obligations  Contact law enforcement (possibly)

Data breach incident response quick start guide

 Conduct interviews of personnel involved  Reissue or force security access changes  Do not probe computers and affected systems  Do not turn off computers and affected systems  Do not image or copy data, or connect storage devices/media, to affected systems  Do not run antivirus programs or utilities  Do not reconnect affected systems

slide-11
SLIDE 11

www.dlapiper.com 10 May 12, 2016

 Confidential discussions or documents (“privileged communications”)  Write and distribute documents within organization with reduced likelihood of disclosure  Forensic exam analysis kept confidential  Tradeoffs in a risk analysis  Purpose of attorney-client privilege

Importance of attorney-client privilege and confidentiality (in USA)

slide-12
SLIDE 12

www.dlapiper.com 11 May 12, 2016

 External team engaged through counsel – PR/communications experts – Forensic cybersecurity experts  Internal team – IT – Legal – HR – PR/communications – Customer relations – Risk management – Operations (physical breaches) – Finance (company financial information lost)

Discuss confidentiality procedures

slide-13
SLIDE 13

www.dlapiper.com 12 May 12, 2016

 Recent launch of two UK government schemes to help companies choose a cybersecurity incident response supplier – CESG/CPNI CIR and CREST CSIR. Recognized set of professional qualifications and best practice standards  Technical expertise to carry out sophisticated security incident investigations quickly and effectively  Expert forensic ability  Consider which elements of the investigation will be outsourced and which will be dealt with in-house  Consider location of investigation e.g., does the business require a forensic vendor with international reach and ability to deploy teams globally?

Choosing a forensic partner/vendor

slide-14
SLIDE 14

www.dlapiper.com 13 May 12, 2016

 Strong security culture – whistleblowing  Businesses should have a robust set of policies and procedures to manage cyber security risks. Having such policies is not enough – companies need to ensure that they are implemented correctly by monitoring compliance  Regular training on cybersecurity issues linked to these policies is also important  Screening: pre-employment and at regular intervals for employees and contractors to help manage "insider threat"  Physical/digital security – strong link  Portable devices – ban? encryption?

Critical protections/lessons learned

slide-15
SLIDE 15

www.dlapiper.com 14 May 12, 2016

 Clear accountability for cybersecurity risk within the business  Contract management to incorporate security controls  User privileges  Anti-virus software/malware detection  Audit: security audits to include insider threat audit  Incident management planning

Critical protections/lessons learned (continued)

slide-16
SLIDE 16

www.dlapiper.com 15 May 12, 2016

 The FCA has identified cybercrime as a priority in its 2016-2017 Business Plan  EY's Global Information Security Survey 2015 indicates that the threats people are most concerned about are phishing and malware  The Panama Papers leak highlights the risk of cybersecurity/data breaches for law firms  Increased coordination and information sharing between the police and the NCA in responding to and managing cybersecurity threats  CPNI, GCHQ, BIS and the Cabinet Office have published an updated '10 Steps to Cyber Security' – practical steps businesses can take to improve the security of their networks and the information carried on them  Increased reporting

Cybersecurity trends in the EU

slide-17
SLIDE 17

www.dlapiper.com 16 May 12, 2016

 Key provisions include: – Harmonization: single set of rules, directly applicable in all EU member states – Enforcement: power for regulators to levy heavy financial sanctions of up to 4% of the annual worldwide turnover of the organization. This significantly increases the risk associated with privacy non-compliance – Offshore processing: application of EU regulatory framework to companies established outside the EU if they target EU citizens – Governance: increased responsibility and accountability on organizations to manage how they control and process personal data – One-stop-shop: ability to nominate a single national data protection authority as the lead regulator for all compliance issues in the EU, where the organization has multiple points of presence across the EU

EU General Data Protection Regulation

slide-18
SLIDE 18

www.dlapiper.com 17 May 12, 2016

– Consent: adoption of a more active consent based model to support lawful processing of personal data – Right to be forgotten: a statutory “right to be forgotten” which will allow individuals the right to require a controller to delete data files relating to them if there are not legitimate grounds for retaining it

EU General Data Protection Regulation (continued)

slide-19
SLIDE 19

www.dlapiper.com 18 May 12, 2016

Questions?

Tara Swaminatha

Of Counsel, Washington, DC tara.swaminatha@dlapiper.com +1 202 799 4323

Sam Millar

Partner, London sam.millar@dlapiper.com +44 (0)20 7153 7714

  • Contact us to learn more
slide-20
SLIDE 20

www.dlapiper.com 19 May 12, 2016