Preparing for a Ransomware Attack
MCCA Global TEC Forum
June 19, 2017
Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington & Sutcliffe Darren Teshima, Orrick, Herrington & Sutcliffe
Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, - - PowerPoint PPT Presentation
Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington & Sutcliffe Darren Teshima, Orrick, Herrington & Sutcliffe What is ransomware? Malicious software
June 19, 2017
Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington & Sutcliffe Darren Teshima, Orrick, Herrington & Sutcliffe
June 17 Orrick | 2
software
access to systems or data
held hostage until ransom is paid
demands could result in data deletion
June 17 Orrick | 3
June 17 Orrick | 4
June 17 Orrick | 5
Blockers
June 17 Orrick | 6
Political Action (sign a petition, contact a politician Stop/Reduce Technology Use Social Activity (post to social media, write an op-ed or letter)
Source: Edelman Proprietary Study, 2014
Actions your customers take when you falter
74.8% 72.5% 80%
Temkin Group "Consumer Benchmark Survey"
and keeping it safe and secure.
HyTrust Inc., the Cloud Security Automation Company
negative impact on trust in a company.
Edelman Trust Barometer: Financial Services Industry
June 17 Orrick | 7
“The FBI does not support paying a ransom to the adversary. Paying a ransom does not guarantee the victim will regain access to their data; in fact, some individuals or organizations are never provided with decryption keys after paying a ransom. Paying a ransom emboldens the adversary to target other victims for profit, and could provide incentive for other criminals to engage in similar illicit activities for financial gain. While the FBI does not support paying a ransom, it recognizes executives, when faced with inoperability issues, will evaluate all options to protect their shareholders, employees, and customers.”
June 17 Orrick | 8
Where PHI is “encrypted as the result of a ransomware attack, a breach has
is a ‘disclosure’ not permitted under the HIPAA Privacy Rule.” Notification may not be required if the entity can demonstrate a “low probability that the PHI has been compromised,”
Must be highly diligent in their forensic analysis and risk assessment to take advantage of the notification exception:
Also consider state notification rules based on “access” to personal information, such as Connecticut, Florida, Kansas, Louisiana, and New Jersey
June 17 Orrick | 9
Prevention Efforts
needed and necessary
from common ransomware locations Business Continuity Efforts
are backing up
June 17 Orrick | 10
– End user education
receive emails or attachments that simulate malicious behavior
– Have a clearly defined, up-to-date incident response plan – Back up data regularly
– Good security hygiene – Create internal corporate policies that require end users to update patches quickly
June 17 Orrick | 11
– Maintain current antivirus and/or end point protection – Only grant permissions necessary that an end user requires to perform daily jobs
– Detect – Analysis
– Containment – Recovery
– Post-Incident Activity
June 17 Orrick | 12
June 17 Orrick | 13
June 17 Orrick | 14
June 17 Orrick | 15
16 June 17
Monica Patel
Senior Regional Counsel IBM
T 415 545 3246 E patelmo@us.ibm.com
Aravind Swaminathan
Partner Orrick, Herrington & Sutcliffe LLP
T 415 773 4286 E dteshima@orrick.com
Darren Teshima
Partner Orrick, Herrington & Sutcliffe LLP
T 206 639 9157 E aravind@Orrick.com