SlideShare uma empresa Scribd logo
1 de 47
Baixar para ler offline
DavidWillson, Esq.
CISSP
Titan Info Security Group
“A Risk Management and Cyber Security
Law and Consulting Firm”
Cybersecurity and Liability: Are you informed?
Agenda
 Suffering a Breach is a foregone conclusion, but how bad is it really?
 Why we are still optimistic
 Emperor has no clothes
 The Problem and the Perfect Storm
 Computers – IT – Cyber Security - Risk
Agenda cont.
 What you can do
 Now, before the breach
 When the breach is discovered
 After the breach
 TheAssessment
 The Policy
 TheTraining
Bottom Line
Do an assessment
Write the policies
Train employees
Know when to ask for help
(e.g. collaborate with someone to help you assess the risk to
your business, your customers, etc. Collaborate with a cyber
security expert)
Recent Data Breaches
How were they breached?
 Target:Target breach also started with a hacked vendor — a heating and air
conditioning company in Pennsylvania that was relieved of remote-access credentials
after someone inside the company opened a virus-laden email attachment. (PoS)
 Home Depot: IT told to minimize costs and system downtime at the expense of
improving security. crooks initially broke in using credentials stolen from a third-party
vendor. (facing at least 44 civil suits) (PoS)
 Sears/Kmart: (PoS)
How were they breached? cont.
 Chick-fil-A: (PoS) Detected by a credit card association who notified financial
institutions that payment card systems had been breached. Breach occurred between
Dec. 2013 and Sept 2014. See the connections, and length of time?
 JP Morgan: 76 million households and 8 million small businesses. Root cause –
employee’s computer. Georgetown law professor: "JP Morgan spends crazy amounts
of money on IT security and yet they can still be hacked," he said. "There’s really no
way you can be connected to the Internet and keep things safe."
 US Postal Service: 800,000 employee records.Also the Pentagon, NOAA, OPM, the
White House and more.
How were they breached? cont.
 White House:The breach was reported to the Govt via an ally. Like many breaches, it was
not discovered internally but reported by an outside third-party.
 Sony:Well, depending on who you believe, it was either North Korea who was mad because
their dictator’s head explodes in a movie that was supposed to be released over Christmas, or,
it was former employees who were terminated, or a combination, or maybe something or
someone much more nefarious?
*These are just a few of the many breaches that are known. On average most breaches were
discovered months after they were initiated, if you can even trust those statistics. Consider the
Shady RAT report from McAfee in 2012.They discovered hackers had been in 70 large
companies and nation government computers for 5 years, since 2006, before anyone detected
them!
The Art of Deception
 Can we really trust the results of investigations that say XXX was
responsible for the breach?
 Think about it: if you are going to commit a crime, isn’t making it look
like someone else is responsible a great ruse?
 So, who really created and released Stuxnet?Who really attacked
Estonia? Did North Korea hack Sony?
* Can we really know?
SURVEY
Would you believe me if I said, 80% of companies in the US have been or will be
breached?
Statement made by the Director of the FBI!
SURVEY
 Does anyone believe there is an 80% chance that their company will suffer a breach
in the next year?
 50% chance?
 30%?
SURVEY
 Does anyone believe there is an 30% chance another company will be breached?
 50% chance?
 80%?
SURVEY
When surveyed in my classes, most
believe their neighbor will be breached
but not their company?
Why?
Optimism
www.bizmarkblog.com
Optimism Bias
blogs.ucl.ac.uk
Optimism Bias
www.nature.com
The Perfect Storm
IT Security
• InformationTechnology: “the technology involving the development,
maintenance, and use of computer systems, software, and networks for
the processing and distribution of data.” Merriam-Webster
• The emperor has no clothes!
blog.etq.com
Who is Responsible for Corporate Risk?
www.caldwellpartners.com
The Castle Walls have Fallen!
www.dreamatico.com
Who are You Connected To?
You
Cloud
Provider
Customer
ManufacturerISP
Integrator
Are You Potentially Liable?
What if you are breached?
What if someone you are connected to or
provide service to is breached?
Negligence-Liability & the Target Case
 Dec. 2 ruling, Judge Paul A. Magnuson of the U.S. District Court in St.
Paul, Minnesota, refused to dismiss the litigation. He said plaintiffs can
proceed with their lawsuit on a theory of negligence.
 He further stated:“At this preliminary stage of the litigation, plaintiffs
have plausibly (pleaded) a general negligence case.”“Although the
third-party hackers' activities caused harm,Target played a key role in
allowing the harm to occur.”
Negligence-Liability & the Target Case cont.
 The ruling essentially holds thatTarget may have been
responsible for the damages the hackers caused even
though there may have been no direct contractual
relationship between the retailer and the credit card
issuers.
 Judge Magnuson concluded,“that there can be a direct
duty between the issuing banks and the retailer, and that
lets them get over this motion to dismiss hurdle.”
Negligence-Liability & the Target Case cont.
So, two significant findings that impact us
1. Plaintiffs have put forward enough evidence to
show negligence might be proven.
2. At this point in the case, a causal connection
and duty to protect might be proven between
the banks andTarget.
Negligence-Liability & the Target Case cont.
 You need to be prepared ahead of time
 Make sure you have a proper incident response plan in place, and,
 Appropriate lines of authority so there is an immediate response when a
red flag appears.
 “The more reasonable the steps [businesses] take — and document — to
protect consumer data, the more likely they are to survive a conduct-
based challenge.” (E.g. Negligence claim)
See:Business Insurance,“Target’s data breach liabilities mount as credit card issuers’suit proceeds,”
http://www.businessinsurance.com/article/20150104/NEWS07/301049970?tags=|299|75|303|335
What Can You Do to Protect Yourself?
www.youngupstarts.com
What to do before during and after the breach!
Assess
Draft
Train
Source: openlockproject.btck.co.uk
Assess
 What do you collect, process, and store?
 Categorize it
 Where does it come in from?
 Who has access to it?
 Any outside vendors?What’s their security? Cloud provider?
Policies
 Do you have written policies?
 Two goals
 Outline process and policy to inform workforce
 Provide proof of a plan
Write the Policy
www.marketingtechblog.com
Policies
Train the workforce
www.isqem.com
Training
www.sandiegopchelp.com
www.infosyssec.org
www.facebook.com
Train
Ensure employees are aware of policies
Teach them how to recognize the risks
Teach them how to react
Teach them what to say
Develop Agreements/Ask Questions
www.niutoday.info
hr2you.com.au
www.eminentwebservices.com
Final Note: the Cloud
Who holds your stuff?
What’s their security?
Who do they allow to see your stuff?
What can you do?
Do You Feel Lucky?
If not,get yourself a Plan!!
http://www.youtube.com/watch?v=u0-oinyjsk0
Don’t Be This Guy!!
http://1rico.wordpress.com/2011/02/01/
Self Risk Assessment Form
If you would like to receive my self risk assessment form please call
or email me and I will send to you. I will also make it available to
PSATEC to post so you can get it there. If you have the time and
desire, it will help you make the initial steps to assess the state of
your security.You can also use it to ask customers to provide
feedback to find out where their state of security is.
Q & A
David Willson
Attorney at Law
CISSP
Titan Info Security Group
719-648-4176
david@titaninfosecuritygroup.com
www.titaninfosecuritygroup.com

Mais conteúdo relacionado

Mais procurados

BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskRob Ragan
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyRamiro Cid
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesPraetorian
 
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...Casey Ellis
 
Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies David Strom
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceStatewide Insurance Brokers
 
Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Sarah K Miller
 
120822 mobile learning (uhi)
120822 mobile learning (uhi)120822 mobile learning (uhi)
120822 mobile learning (uhi)JISC Legal
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorSandra (Sandy) Dunn
 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium PartnersDAVID BERGH
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkJahangirnagar University
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About itAleksandr Yampolskiy
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringAhmed Musaad
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudGoutama Bachtiar
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 

Mais procurados (20)

BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Internet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacyInternet of things, big data & mobility vs privacy
Internet of things, big data & mobility vs privacy
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
KEYNOTE ComfyconAU 2020: disclose.io Vulnerability disclosure and Safe Harbor...
 
Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies Marcus Ranum on Bad Idea Zombies
Marcus Ranum on Bad Idea Zombies
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4
 
120822 mobile learning (uhi)
120822 mobile learning (uhi)120822 mobile learning (uhi)
120822 mobile learning (uhi)
 
ISC Presentation
ISC PresentationISC Presentation
ISC Presentation
 
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating WarriorBanning Whining, Avoiding Cyber Wolves, and Creating Warrior
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium Partners
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Muso Publishing
Muso PublishingMuso Publishing
Muso Publishing
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 

Destaque (20)

Toan cao cap a2
Toan cao cap a2Toan cao cap a2
Toan cao cap a2
 
Giao trinh ngon_ngu_lap_trinh_c_1847
Giao trinh ngon_ngu_lap_trinh_c_1847Giao trinh ngon_ngu_lap_trinh_c_1847
Giao trinh ngon_ngu_lap_trinh_c_1847
 
Bag akhir
Bag akhirBag akhir
Bag akhir
 
Toan a2 bai tap
Toan a2   bai tapToan a2   bai tap
Toan a2 bai tap
 
Triet hoc mac lenin
Triet hoc mac leninTriet hoc mac lenin
Triet hoc mac lenin
 
Tin hoc can ban bai giang
Tin hoc can ban   bai giangTin hoc can ban   bai giang
Tin hoc can ban bai giang
 
4 tu truong
4 tu truong4 tu truong
4 tu truong
 
Chuong 02 bieu thuc
Chuong 02 bieu thucChuong 02 bieu thuc
Chuong 02 bieu thuc
 
Triet hoc mac lenin
Triet hoc mac leninTriet hoc mac lenin
Triet hoc mac lenin
 
Vat ly dai cuong a1 bai giang
Vat ly dai cuong a1   bai giangVat ly dai cuong a1   bai giang
Vat ly dai cuong a1 bai giang
 
Giao trinh toan roi rac
Giao trinh toan roi racGiao trinh toan roi rac
Giao trinh toan roi rac
 
Expo Campus (Politeknik Negeri Malang) tahun 2015
Expo Campus (Politeknik Negeri Malang) tahun 2015Expo Campus (Politeknik Negeri Malang) tahun 2015
Expo Campus (Politeknik Negeri Malang) tahun 2015
 
Toan t1
Toan t1Toan t1
Toan t1
 
C++ for beginners......masters 2007
C++ for beginners......masters 2007C++ for beginners......masters 2007
C++ for beginners......masters 2007
 
Giao trinh bai tap c va c++
Giao trinh bai tap c va c++Giao trinh bai tap c va c++
Giao trinh bai tap c va c++
 
Dinh huong phat trien cua eximbank
Dinh huong phat trien cua eximbankDinh huong phat trien cua eximbank
Dinh huong phat trien cua eximbank
 
Toan t1 chuong 5-tich_phan_motbien_4
Toan t1   chuong 5-tich_phan_motbien_4Toan t1   chuong 5-tich_phan_motbien_4
Toan t1 chuong 5-tich_phan_motbien_4
 
Huongdangiai bt chuoi
Huongdangiai bt chuoiHuongdangiai bt chuoi
Huongdangiai bt chuoi
 
Bai tap va bai giai chuoi so chuoi ha mpdf
Bai tap va bai giai chuoi so chuoi ha mpdfBai tap va bai giai chuoi so chuoi ha mpdf
Bai tap va bai giai chuoi so chuoi ha mpdf
 
Toan t1 ton duc thang - chuong 6
Toan t1   ton duc thang - chuong 6Toan t1   ton duc thang - chuong 6
Toan t1 ton duc thang - chuong 6
 

Semelhante a Cybersecurity and liability your david willson

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteDave Steer
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Cybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveCybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveBrown Smith Wallace
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20Marc S. Sokol
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach SecurityMetrics
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 

Semelhante a Cybersecurity and liability your david willson (20)

Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Cybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveCybersecurity: How to be Proactive
Cybersecurity: How to be Proactive
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
2015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 202015 LOMA Conference - Third party risk management - Session 20
2015 LOMA Conference - Third party risk management - Session 20
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 

Último

589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理Fir La
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理Airst S
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理Airst S
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理Airst S
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxadvabhayjha2627
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理Fir La
 

Último (20)

Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
一比一原版(IC毕业证书)帝国理工学院毕业证如何办理
 

Cybersecurity and liability your david willson

  • 1. DavidWillson, Esq. CISSP Titan Info Security Group “A Risk Management and Cyber Security Law and Consulting Firm” Cybersecurity and Liability: Are you informed?
  • 2. Agenda  Suffering a Breach is a foregone conclusion, but how bad is it really?  Why we are still optimistic  Emperor has no clothes  The Problem and the Perfect Storm  Computers – IT – Cyber Security - Risk
  • 3. Agenda cont.  What you can do  Now, before the breach  When the breach is discovered  After the breach  TheAssessment  The Policy  TheTraining
  • 4. Bottom Line Do an assessment Write the policies Train employees Know when to ask for help (e.g. collaborate with someone to help you assess the risk to your business, your customers, etc. Collaborate with a cyber security expert)
  • 6. How were they breached?  Target:Target breach also started with a hacked vendor — a heating and air conditioning company in Pennsylvania that was relieved of remote-access credentials after someone inside the company opened a virus-laden email attachment. (PoS)  Home Depot: IT told to minimize costs and system downtime at the expense of improving security. crooks initially broke in using credentials stolen from a third-party vendor. (facing at least 44 civil suits) (PoS)  Sears/Kmart: (PoS)
  • 7. How were they breached? cont.  Chick-fil-A: (PoS) Detected by a credit card association who notified financial institutions that payment card systems had been breached. Breach occurred between Dec. 2013 and Sept 2014. See the connections, and length of time?  JP Morgan: 76 million households and 8 million small businesses. Root cause – employee’s computer. Georgetown law professor: "JP Morgan spends crazy amounts of money on IT security and yet they can still be hacked," he said. "There’s really no way you can be connected to the Internet and keep things safe."  US Postal Service: 800,000 employee records.Also the Pentagon, NOAA, OPM, the White House and more.
  • 8. How were they breached? cont.  White House:The breach was reported to the Govt via an ally. Like many breaches, it was not discovered internally but reported by an outside third-party.  Sony:Well, depending on who you believe, it was either North Korea who was mad because their dictator’s head explodes in a movie that was supposed to be released over Christmas, or, it was former employees who were terminated, or a combination, or maybe something or someone much more nefarious? *These are just a few of the many breaches that are known. On average most breaches were discovered months after they were initiated, if you can even trust those statistics. Consider the Shady RAT report from McAfee in 2012.They discovered hackers had been in 70 large companies and nation government computers for 5 years, since 2006, before anyone detected them!
  • 9. The Art of Deception  Can we really trust the results of investigations that say XXX was responsible for the breach?  Think about it: if you are going to commit a crime, isn’t making it look like someone else is responsible a great ruse?  So, who really created and released Stuxnet?Who really attacked Estonia? Did North Korea hack Sony? * Can we really know?
  • 10. SURVEY Would you believe me if I said, 80% of companies in the US have been or will be breached? Statement made by the Director of the FBI!
  • 11. SURVEY  Does anyone believe there is an 80% chance that their company will suffer a breach in the next year?  50% chance?  30%?
  • 12. SURVEY  Does anyone believe there is an 30% chance another company will be breached?  50% chance?  80%?
  • 13. SURVEY When surveyed in my classes, most believe their neighbor will be breached but not their company? Why?
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. The Perfect Storm IT Security • InformationTechnology: “the technology involving the development, maintenance, and use of computer systems, software, and networks for the processing and distribution of data.” Merriam-Webster • The emperor has no clothes!
  • 23. Who is Responsible for Corporate Risk? www.caldwellpartners.com
  • 24. The Castle Walls have Fallen! www.dreamatico.com
  • 25. Who are You Connected To? You Cloud Provider Customer ManufacturerISP Integrator
  • 26.
  • 27. Are You Potentially Liable? What if you are breached? What if someone you are connected to or provide service to is breached?
  • 28. Negligence-Liability & the Target Case  Dec. 2 ruling, Judge Paul A. Magnuson of the U.S. District Court in St. Paul, Minnesota, refused to dismiss the litigation. He said plaintiffs can proceed with their lawsuit on a theory of negligence.  He further stated:“At this preliminary stage of the litigation, plaintiffs have plausibly (pleaded) a general negligence case.”“Although the third-party hackers' activities caused harm,Target played a key role in allowing the harm to occur.”
  • 29. Negligence-Liability & the Target Case cont.  The ruling essentially holds thatTarget may have been responsible for the damages the hackers caused even though there may have been no direct contractual relationship between the retailer and the credit card issuers.  Judge Magnuson concluded,“that there can be a direct duty between the issuing banks and the retailer, and that lets them get over this motion to dismiss hurdle.”
  • 30. Negligence-Liability & the Target Case cont. So, two significant findings that impact us 1. Plaintiffs have put forward enough evidence to show negligence might be proven. 2. At this point in the case, a causal connection and duty to protect might be proven between the banks andTarget.
  • 31. Negligence-Liability & the Target Case cont.  You need to be prepared ahead of time  Make sure you have a proper incident response plan in place, and,  Appropriate lines of authority so there is an immediate response when a red flag appears.  “The more reasonable the steps [businesses] take — and document — to protect consumer data, the more likely they are to survive a conduct- based challenge.” (E.g. Negligence claim) See:Business Insurance,“Target’s data breach liabilities mount as credit card issuers’suit proceeds,” http://www.businessinsurance.com/article/20150104/NEWS07/301049970?tags=|299|75|303|335
  • 32. What Can You Do to Protect Yourself? www.youngupstarts.com
  • 33. What to do before during and after the breach! Assess Draft Train
  • 35. Assess  What do you collect, process, and store?  Categorize it  Where does it come in from?  Who has access to it?  Any outside vendors?What’s their security? Cloud provider?
  • 36. Policies  Do you have written policies?  Two goals  Outline process and policy to inform workforce  Provide proof of a plan
  • 41. Train Ensure employees are aware of policies Teach them how to recognize the risks Teach them how to react Teach them what to say
  • 43. Final Note: the Cloud Who holds your stuff? What’s their security? Who do they allow to see your stuff? What can you do?
  • 44. Do You Feel Lucky? If not,get yourself a Plan!! http://www.youtube.com/watch?v=u0-oinyjsk0
  • 45. Don’t Be This Guy!! http://1rico.wordpress.com/2011/02/01/
  • 46. Self Risk Assessment Form If you would like to receive my self risk assessment form please call or email me and I will send to you. I will also make it available to PSATEC to post so you can get it there. If you have the time and desire, it will help you make the initial steps to assess the state of your security.You can also use it to ask customers to provide feedback to find out where their state of security is.
  • 47. Q & A David Willson Attorney at Law CISSP Titan Info Security Group 719-648-4176 david@titaninfosecuritygroup.com www.titaninfosecuritygroup.com