Presentation is loading. Please wait.

Presentation is loading. Please wait.

Texas Assisted Living Association 2019 Conference

Similar presentations


Presentation on theme: "Texas Assisted Living Association 2019 Conference"— Presentation transcript:

1 Texas Assisted Living Association 2019 Conference

2 Cyber Threats— Are You Ready?

3 Headline News

4 The Cyber Threat Cyber attacks are widespread, systemic and difficult to detect. Companies in regulated industries or which have proprietary technology, sensitive customer data, or intellectual property are most at risk.

5 Who’s Doing the Hacking?
Outsiders Financially motivated cybercriminals “Hacktivists” Hackers for hire Nation-state-supported actors The malicious insider

6 Categories of Attack Theft of Trade Secrets/Economic Espionage
Theft of Consumer and Financial Data Data Destruction/ Disruption of Operations Website Defacements

7 Methods of Attack Exploitation of Network Vulnerabilities
Mismanaged computer systems “Zero-day” vulnerabilities Social Engineering Physical Devices DDoS Attacks Misuse of Permissions

8 Healthcare is a Sizable Portion of All Breaches
Health care, with 16 percent reaches, continued to be particularly vulnerable to physical breaches, although malware and hacking breaches are starting to increase as the sector’s transition to electronic medical records progresses. The most vunerable information in health care was medical information, such as patient records, and Social Security Numbers. Source: California State AG Data Breach Report 2016

9

10 Key Consequences of a Hack
Governmental Inquiries OCR States Attorney General DOJ/SEC/FTC/FDA . . . Litigation Class Actions/Consumer Litigation Negligence and negligent omission Invasion of privacy Breach of contract Shareholder Derivative Demands Breach of fiduciary duties Loss of Competitive Advantage/Reputational Harm Costs of Responding to an Attack

11 How to Minimize and Respond to a Cyber Attack
Pre-Breach Preparation Incident Response Framework

12 A Global Approach to Cyber Risk
Develop and implement a comprehensive information security plan. Can’t do piecemeal – coordinate to avoid weak points. Must address internal and external threats, both human and technical. Plan must be customized to organization’s business operations. Once implemented, plan should be reviewed and updated regularly. There should be clear lines of communication and authority for cyber security within the organization.

13 Cyber Risk Assessment Identify internal and external threats.
Review computer network and identify/assess vulnerabilities. For example: Are software patches applied in a timely fashion? Is the network adequately segmented? Are access controls sufficient? Is data encrypted where necessary? Are network logs appropriately detailed and maintained? Is the network topology map up to date? Review vendor relationships (esp. data storage vendors). For example: Do they have cyber risk protocols? Do my clients require me to have cyber risk protocols?

14 Anatomy of a Modern Cyber Attack Credit: CyberSecurity Insights , Eija Paajanen, 5/22/2017

15 A Closer Look at the Mechanics: The Target Attack
Reconnaissance Phishing Control Exfiltration A Closer Look at the Mechanics: The Target Attack

16 Cybersecurity: Phishing

17 Attack!! What Now?

18 The Clock Starts Ticking …
Record the date and time Alert Team Contain the breach Engage legal counsel WHAT TO DO IN THE FIRST 24 HOURS Document everything Activate Response Plan Bring in Forensic Team Contact Law Enforcement

19

20 Duty to Warn – State Data Breach – State Notification Laws
48 states require private entities to notify individuals of security breaches of information involving “personally identifiable information PLUS Laws specify notification requirements including: Recipients Content Timing Form Identity theft prevention and mitigation services

21 Duty to Warn – Federal Federal Breach Notification Laws
HIPAA/HITECH Breach Notification Requirements FTC Health Breach Notification Rule

22 Duty to Disclose Cyber Risks – SEC
Generally, SEC requires companies to report “material” events or risks to shareholders. Materiality depends on what a reasonable investor would consider important to an investment decision. “Registrants should disclose the risk of cyber incidents if these issues are among the most significant factors that make an investment in the company speculative or risky.” (SEC Disclosure Guidance Topic No. 2 (Oct. 13, 2011).

23 Healthcare Leads Data Breach Costs
Source: Ponemon Institute 2017 Cost of Data Breach Study: United States

24 Final Thoughts Cyber security is a business risk, not an “IT problem.”
It must be managed and mitigated like any other risk. Think in terms of compliance. This is a long-term process.

25 Edward P. Jones Ana E. Cowan Deborah C. Hiser Thomas Brown
Chief Compliance Officer Third Rock, Incorporated Ana E. Cowan Deborah C. Hiser Senior Counsels Husch Blackwell LLP Thomas Brown


Download ppt "Texas Assisted Living Association 2019 Conference"

Similar presentations


Ads by Google