Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.

Slides:



Advertisements
Similar presentations
Freshfields Bruckhaus Deringer LLP Global investigations What to advise your board Marius Berenbrok Edward Braham Matthew Herman Melissa Thomas 29 February.
Advertisements

Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
BNSF Ethics and Compliance Program Roger Nober Executive Vice President Law and Secretary July 13, 2011.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
IT Security Challenges In Higher Education Steve Schuster Cornell University.
SOX & ISO Protect your data and be ready to be audited!!!
Risk Assessment Frameworks
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
Corporate Ethics Compliance *
Building a Compliance Risk Monitoring Program HCCA Compliance Institute New OrleansApril 19, 2005 Lois Dehls Cornell, Esq. Assistant Vice President, Deputy.
Competency Models Impact on Talent Management
National Association of College and University Attorneys 1 November 11, 2009 NACUA Fall 2009 Workshop November 2009.
Information Technology Audit
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
Risk Management Report to Audit Committee 26 September 2006 Lee Harris Assistant Chief Executive.
0 How To Pursue and Win the Complex Claim RIMS 2012 – Philadelphia, PA Wednesday, April 18, 2012 Ty Childress, Partner, Jones Day Los Angeles, CA
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Internal Investigations: A primer Bob Cooper May 30, 2007.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
DOJ Perspectives on Effective Compliance and Investigations Maxwell Carr-Howard Husch Blackwell, LLP October 8, 2012.
Nutter McClennen & Fish LLP World Trade Center West 155 Seaport Boulevard Boston, Massachusetts Telephone Massachusetts.
Influencing the ethical context of your organisation Speaker: June Smith, Partner Company: The Argyle Partnership Lawyers Date: 22 November 2006.
Cyber Security Management Lesson Introduction ●Understand organizational context for cyber security ●Understand the people, process and technology dimensions.
Placing Information Security within an Organization
© 2015 Kilpatrick Townsend November 5-6, 2015 Tribal In-House Counsel Association Inaugural Conference Keynote Address Venus McGhee Prince.
New A.M. Best Cyber Questionnaire
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
COUNCIL MEETING Expanding Knowledge & Understanding of the Ethics & Compliance Program Across Executive Leadership Practical Strategies for Success.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Is Vendor Management The New Risk Management? Douglas DeGrote.
SOLGM Wanaka Retreat Health and Safety at Work Act 2015 Ready? 4 February 2016 Samantha Turner Partner DDI: Mob:
New EU General Data Protection Regulation Conference 2016 Managing a Data Breach Prevention-Detection-Mitigation By Gerard Joyce Dun Laoghaire Feb 24 th.
1 Compliance vs. the Law Department: How to Work Together Michael Dusseau Senior Director, Compliance North America Schering-Plough David Ralston, Esq.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Avoiding Legal Landmines Forging a Partnership Between IT and Legal.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
And the Impact on CAEs Patty Miller, CIA, QIAL, CPA, CRMA, CISA PKMiller Risk Consulting, LLC March 17, 2016.
Cyber Risks: Protecting confidential data against unauthorized access Vik Bansal Deloitte & Touche LLP John Reidhead State of Utah March 17, 2016.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
DOL Fiduciary Rule: Answering Advisors' Top Questions Jason Berkowitz Vice President and Counsel, Regulatory Affairs September 7, 2016.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Board Role In Recognizing, Identifying and Mitigating Risk Constance B
Cybersecurity as a Business Differentiator
Law Firm Data Security: What In-house Counsel Need to Know
Information Security Program
New A.M. Best Cyber Questionnaire
CPA Gilberto Rivera, VP Compliance and Operational Risk
THE DENTAL PLAN.
Information Security: Risk Management or Business Enablement?
The State of Cybersecurity and
ITP Maturity Model Survey 2018
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
Cyber Security Culture
What Directors Need to Know
The Secure Contingency Plan
University of Maryland Robert H. Smith School of Business
Anatomy of a Common Cyber Attack
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

Legal Jeopardy: Whose Risk Is It?

SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo Executive Vice President, Global Customer Service and Chief Privacy Officer at Monster Worldwide Michael C. Miller Executive Vice President, General Counsel and Secretary at Monster Worldwide 2

If You Think Cybersecurity Risk Is Not a Significant Issue for Your Company… THINK AGAIN. 3

What industries had the most confirmed, publicly disclosed breaches in 2014? – Public agencies (303) – Financial services (277) – Manufacturing (235) – Accommodation (223) – Retail (164) – Professional Organization (146) – Healthcare (141) 4

What are the security improvement priorities of companies that have experienced a breach? 1.Endpoint Security 2.Employee training 3.Expanded use of encryption 4.Adding manual procedures and security controls 5.Implementing Data Loss Prevention solution 5

OGC Must Play a Key Role in Managing Cyber Risk, from Risk Assessment through Incident Response 6

Name the top reasons that the general counsel's office must be involved in managing cyber risk? – To identify key business risks relating to specific types of sensitive data – PII, PHI, IP (including trade secrets) – To determine what constitutes a "defensible” security control – OGC has a deep understanding of how risk might be affected by an evolving business strategy – OGC has knowledge of third-party relationships and insider risks – To protect the ability to assert a/c privilege and work product protection over cyber risk management activities – To serve as the primary conduit between the incident response team and the executives/board 7

Name the top challenges with establishing OGC’s role in managing cyber risk? – Cyber security still largely viewed as “an IT problem” that should be managed by CIO/CISO – Legal slows down decision-making in an area that requires agility and rapid response – Lawyers lack the technical background to understand risk and mitigation options – Lawyers consulted only on compliance and regulatory issues rather than as advisor on business risk 8

What are the top factors that will reduce the cost of a breach? – Strong security posture – Incident Response Plan in place – Business Continuity Management involvement – Have a CISO 9

OGC’s Role in Educating the Executive Team and Board of Directors 10

What are the key questions counsel should seek to answer through a risk assessment? – What are the critical assets that are most important to protect? – What are the biggest threats to those assets? – What would the legal and business impact be if those assets were compromised? – What are the most effective ways to improve our risk posture? 11

What are the primary ways counsel can contribute to the risk assessment process? – Identifying critical data assets – Anticipating and defining regulatory and compliance obligations – Determining what constitutes a "defensible" security control – Understanding the broader threat environment – Deep understanding of how risk might be affected by an evolving business strategy 12

Name the best arguments for DEFEATING the assertion of privilege protection over a risk assessment. – Assessment not conducted "in anticipation of litigation" – Recommendations in risk assessment report are business advisory not legal advice – Legal may be involved but is not truly directing RA efforts 13

What are the biggest problems with having CISO report to CIO? – Conflict of interest between primary role of CIO (availability and integrity) and CISO (security) – Lack of focus on security in favor of responsibilities viewed as more "important" to the business – Lack of segregated and protected security budget may lead to shift of resources over course of year 14

What should be the board’s role in overseeing cyber risk management? – Must have an accurate and up to date view on the company’s cyber risk profile – Should understand how cybersecurity budget is allocated – Should understand the company’s incident response protocol and determine the point at which the board should be informed of an incident – Board should regularly assess the effectiveness of the company’s cyber risk governance structure 15

What are the top reasons that the GC should direct the IR process? – To help anticipate and manage potential legal/regulatory issues arising from an incident – To protect the ability to assert a/c privilege and work product protection over IR activities – To control internal and external communications in a risk-averse manner – To serve as the primary conduit between the IR team and the execs/board 16

What are the top reasons that the GC should NOT direct the IR process? – Too slow to make decisions – Don't understand the technical aspects of an incident – Not comfortable with the uncertainty and evolving understanding of the facts – Too quick to jump to conclusions 17

What do you fear most in the event of a breach? – Federal agencies (FTC, SEC, DOJ) – State Ags – PCI Council – Civil lawsuits – Reputation damage/customer churn 18

What should you do when you go back to your offices this week? 19

Conclusion Take your CIO/CISO to lunch and talk about the “defensibility” of your company’s cyber risk posture. Review your company’s incident response plan and make sure you are comfortable with counsel’s formal role in the process. Make sure you have ready-access to outside counsel and/or other experts who can help in the event of a cyber incident Check your insurance coverage Ask your executives and board if they are comfortable with the degree of visibility they have into cyber risk issues 20