SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Complacency in the Face of Evolving Cybersecurity Norms is
Hazardous (Part 1)
Ethan S. Burger
and
Thomas W. Welch, Legaltech News
March 21, 2016
Image by Yuri Samoilov
The following is part one of a two-part series.
Summary
Given the constantly evolving legal requirements and changing technology, the business
executives and board of directors members are often reluctant to adopt policies that require a
high-level of corporate-wide commitment. Expenditures on cybersecurity may not have concrete
and identifiable benefits nor generate revenues. Corporate inertia with respect to implementing
rigorous cyberdefense is understandable.
There are very large number of unknowns. Corporate decision-makers often receive a great
amount of contradictory advice. The C-suite needs to think and act strategically. Cybersecurity
challenges will not go away if ignored. The threat demands action and policies consistent with
the corporation’s profile and its sector's norms.
Failing to take such action means greater regulatory and litigation risk, irrespective of whether
the cybersecurity posture adopted will be effective in defending against cyberattacks.
Non­compliance with cybersecurity norms are likely to damage the corporation’s reputation in
the marketplace and with customers, suppliers, and other business partners. The corporation
needs well thought out policies that include plans to respond to cyberattacks and to recover from
them.
These policies should be responsive to regulatory requirements and not have negative
consequences should the company become a defendant in a lawsuit. It should not be overlooked
that victims of cyberattacks may have claims against persons other than the attacker, who is
unlikely to be apprehended or even identified.
The private sector’s rather limited experience with cyberattacks, may lead to some corporations
overly relying on information and recommendations supplied by persons who are likely to
promote their agenda rather than be concerned with what its best for the corporation, especially
in the case of small and medium enterprises.
Introduction
In 2015, global losses due to cybercrime have probably exceeded $400 billion. Admitted
cyberattacks have been directed against retailers (Home Depot and Target), financial and
insurance institutions (Anthem, Bank of
America, J.P. Morgan, and Wells Fargo), governmental bodies (FBI, IRS, and the FBI), hospitals
(Boston Children’s Hospital and Hollywood Presbyterian Medical Center), and infrastructure,
including vital communications, energy distribution, and transportation networks.
There is a general consensus in both the private and public sectors that the cybersecurity problem
is acute and getting worse. The many publicized reports and warnings are just the tip of the
proverbial iceberg, however, as many companies are reluctant to acknowledge their exposures.
Nonetheless, many businesses do not seem to be aware of the risks, or the potential consequences
for not taking basic precautions. Inaction increases their exposure to liability for harm caused to
third-parties and susceptibility to government-imposed sanctions for failing to observe legal
norms or generally-accepted practices.
Those carrying out cyberattacks vary in motivations and capabilities. Managers must prepare
their organizations for what seems to be the inevitable and diverse types of cyberattacks. For
institutional and other reasons, many enterprises have not responded in a systematic manner to
the threat.
Comprehensive, viable approaches must be developed to deal with a wide range of potential
threats. Executives and board of directors members may have been understandably reluctant to
adopt comprehensive defensive measures against cyber-attacks, but they must – and right now.
This article explores some practical and legal issues that corporations are likely to encounter in
this rapidly changing environment.
Cyberattacks and their Motivations
Cyberattacks are very difficult to defend against; in particular: denial of service (DoS); and,
distributed denial of service (DDoS) attacks. Cyberattacks can be used as a weapon to degrade,
disrupt, steal data used for the commission of financial crimes including espionage, identity theft,
and of greatest concern seizing control of their target’s computer and IT systems. They may also
have political motivations.
The goal of a DoS attack is to flood a website so that it is not able to accept legitimate traffic. A
DDoS attack is more complex. While the objective to some extent it similar, here the incoming
traffic is sent from many different sources making it more difficult for the target website to
identify and block incoming traffic.
DDoS involves sending a huge volume of incoming contacts to the website, often the hundreds
of thousands, so that it is impossible to defend against the attacks. In DDoS attacks it is not
possible to identify and block the large number of attackers since they have different IP
addresses.
Often these attacks are from victims of prior successful attacks. The victims of a DDoS attack
include both the end targeted system and all systems maliciously used and controlled by the
hacker in the distributed attack. Generally, the attacker identifies and infects other vulnerable
systems using malware which can be instructed to attack a particular website.
There remains a paucity of reliable data in this area for management and boards of directors to
make decisions relating to cybersecurity. The data at present is fairly incomplete.
The most dangerous form of cyberattack are attacks against the organizations’ supervisory
control and data acquisition (SCADA) networks. SCADA are the computers and applications
that perform vital functions in providing essential services and commodities. In certain respects,
successful cyberattacks can cause damage traditionally caused only by kinetic weapons.
Like many others, federal experts believe that small and medium businesses (SMEs), particularly
those that possess a large number of records that include valuable information provided by
others, might be priority targets for criminals. SMEs represent attractive targets since they
frequently lack the necessary hardware and software (“tools”), personnel, practices, and
procedures for self-defense. The data obtained from such attacks may be precursors for
subsequent cyberattacks.
Ironically, SMEs often believe their risk of cyberattacks is low, even though they are more
vulnerable to cybertargets than larger entities. This may lead small and medium enterprises to
underestimate the cyberthreats they faced. Their defense posture may be limited given the
expenses involved.
Governmental Action and Inaction
Increasingly, government entities have made efforts to reach out to all types and sizes of
businesses. The government wants businesses to better understand the nature of the threats they
face, and actions they might take to reduce their vulnerability and the relevant rules they are
expected to observe.
At present, there seems to be divergences between the law as written and as carried out. The U.S.
National
Institute for Standards and Technology’s Framework for Improving Critical Infrastructure
Cybersecurity (Framework) clearly states that it is to serve only as “guidance” for the private
sector; yet the U.S. Securities and Exchange Commission, and U.S. Federal Trade Commission
in certain circumstances, has acted as if the Framework constitutes binding, official standards,
which if not followed can result in the imposition of sanctions. (See Federal Trade Commission
v. Wyndham Worldwide Corporation, where the FTC alleged that, at least since April 2008,
Wyndham engaged in unfair cybersecurity practices that, "taken together, unreasonably and
unnecessarily exposed consumers' personal data to unauthorized access and theft.")
State regulators, insurers and courts may soon act similarly. Consequently, enterprises may have
to identify deeper pockets for money to cover protective or remedial measures, or a portion of
their losses or expenses needed to comply with governmental dictates.
Of course, the government’s credibility on this topic is questionable given that they have
incurred a large number of significant cyberattacks. Certain agencies, such as the FDA, who
themselves have been hacked multiple times, (and continue to be attacked almost daily) have
only recently promulgated new standards for medical devices.
Exposure From Cyberbreaches and the Release of Personal or Confidential Information
As a result of breaches of cyberdefense, criminals and others frequently obtain personal data of
individuals held by certain companies. These cases have triggered a wave of litigation against
entities that released others’ private or confidential information; note that other countries’
requirements, such as those of the European Union, may be more demanding that the rules in the
U.S.
Often, it is difficult to predict the size of the damages that persons whose identities have been
compromised or entities whose intellectual property has been disseminated will be entitled to
compensation. The amount of money a company might be liable to third parties is very case
specific and unpredictable.
A victimized business should never be a complacent victim. Even if liability cannot be
established on the merits, in courts or in arbitral bodies, the defendant in any case may have
reasons to resolve a dispute for reputational or other reasons—such as the fear of losing business.
Part two of this article will explore the effectiveness of cyberinsurance and how to increase
cybersecurity.
Ethan S. Burger is a Washington-based attorney and academic, who is a senior fellow for
cybersecurity law at Kogod's Cybersecurity Governance Center.
Thomas Welch is an attorney, managing director of the American International Regulatory
Coherence Institute and a former associate director with the U.S. Food and Drug Administration.

Mais conteúdo relacionado

Mais procurados

You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSHB Litigation Conferences
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesIISPEastMids
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudPaige Rasid
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityPaul Ferrillo
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers
 
Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Guy Pearce
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability PresentationSean Graham
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportDivya Kothari
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceStatewide Insurance Brokers
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmDavid Sweigert
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersBroadridge
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106Ted Richmond
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory ComplianceLifeline Data Centers
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 

Mais procurados (20)

You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMSCYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
CYBER LIABILITY COVEREAGE | HB EMERGING COMPLEX CLAIMS
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
employee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurityemployee-awareness-and-training-the-holy-grail-of-cybersecurity
employee-awareness-and-training-the-holy-grail-of-cybersecurity
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?
 
Cyber liaility insurance the basics
Cyber liaility insurance   the basicsCyber liaility insurance   the basics
Cyber liaility insurance the basics
 
CMW Cyber Liability Presentation
CMW Cyber Liability PresentationCMW Cyber Liability Presentation
CMW Cyber Liability Presentation
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment Report
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
 
Mitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker DealersMitigating Data Security Risks at Broker Dealers
Mitigating Data Security Risks at Broker Dealers
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Data Security and Regulatory Compliance
Data Security and Regulatory ComplianceData Security and Regulatory Compliance
Data Security and Regulatory Compliance
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 

Destaque (19)

Animacion
AnimacionAnimacion
Animacion
 
Informativo Orlando Flores
Informativo Orlando FloresInformativo Orlando Flores
Informativo Orlando Flores
 
Panchayat Minister in Chhattisgarh
Panchayat Minister in ChhattisgarhPanchayat Minister in Chhattisgarh
Panchayat Minister in Chhattisgarh
 
17
1717
17
 
Una buena excusa
Una buena excusaUna buena excusa
Una buena excusa
 
hgfthHtfsjtjutynhjuyxdt
hgfthHtfsjtjutynhjuyxdthgfthHtfsjtjutynhjuyxdt
hgfthHtfsjtjutynhjuyxdt
 
Groepsmoment professionele ontwikkeling thema 7
Groepsmoment  professionele ontwikkeling   thema 7Groepsmoment  professionele ontwikkeling   thema 7
Groepsmoment professionele ontwikkeling thema 7
 
Foodscapes
FoodscapesFoodscapes
Foodscapes
 
Transporte y logística
Transporte y logísticaTransporte y logística
Transporte y logística
 
Belén de Zaragoza
Belén de ZaragozaBelén de Zaragoza
Belén de Zaragoza
 
VM Certification
VM CertificationVM Certification
VM Certification
 
Refranes para el blog
Refranes para el blogRefranes para el blog
Refranes para el blog
 
Photographs of filming
Photographs of filmingPhotographs of filming
Photographs of filming
 
Vacaciones de montaña
Vacaciones de montañaVacaciones de montaña
Vacaciones de montaña
 
RCA - CAPA
RCA - CAPARCA - CAPA
RCA - CAPA
 
Proyecto tecnologico natalia luz livis
Proyecto  tecnologico natalia luz livisProyecto  tecnologico natalia luz livis
Proyecto tecnologico natalia luz livis
 
De compras por París
De compras por ParísDe compras por París
De compras por París
 
Eng ivory
Eng ivoryEng ivory
Eng ivory
 
Ercher x piaget entrega
Ercher x piaget entregaErcher x piaget entrega
Ercher x piaget entrega
 

Semelhante a Complacency in the Face of Evolving Cybersecurity Norms is Hazardous

For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustGrant Thornton LLP
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White PaperTodd Ruback
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paperspencerharry
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firmsJake Weaver
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docxwrite30
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskJohn Loveland
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!topseowebmaster
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 

Semelhante a Complacency in the Face of Evolving Cybersecurity Norms is Hazardous (20)

Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
Data Breach White Paper
Data Breach White PaperData Breach White Paper
Data Breach White Paper
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Provide a MEMO.docx
Provide a MEMO.docxProvide a MEMO.docx
Provide a MEMO.docx
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Retail
Retail Retail
Retail
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
 
CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!CyberSecurity Insurance - The Ugly Truth!
CyberSecurity Insurance - The Ugly Truth!
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Risky Business
Risky BusinessRisky Business
Risky Business
 

Mais de Ethan S. Burger

Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Ethan S. Burger
 
2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...Ethan S. Burger
 
2018 february - gulc symposium -- roc
2018 february  - gulc symposium -- roc2018 february  - gulc symposium -- roc
2018 february - gulc symposium -- rocEthan S. Burger
 
2016 December -- Lithuanian Hybrid War Presentation
2016 December -- Lithuanian Hybrid War Presentation2016 December -- Lithuanian Hybrid War Presentation
2016 December -- Lithuanian Hybrid War PresentationEthan S. Burger
 
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...Ethan S. Burger
 
2016 October 4 -- EHU US Presidential Election
2016 October 4 -- EHU US Presidential Election2016 October 4 -- EHU US Presidential Election
2016 October 4 -- EHU US Presidential ElectionEthan S. Burger
 
2011 -- AUSTRAC Presentation on Russian OCGs
2011 -- AUSTRAC Presentation on Russian OCGs2011 -- AUSTRAC Presentation on Russian OCGs
2011 -- AUSTRAC Presentation on Russian OCGsEthan S. Burger
 
2016 -- Ukrainian Presentation -- Final
2016 -- Ukrainian Presentation -- Final2016 -- Ukrainian Presentation -- Final
2016 -- Ukrainian Presentation -- FinalEthan S. Burger
 

Mais de Ethan S. Burger (8)

Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?
 
2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...
 
2018 february - gulc symposium -- roc
2018 february  - gulc symposium -- roc2018 february  - gulc symposium -- roc
2018 february - gulc symposium -- roc
 
2016 December -- Lithuanian Hybrid War Presentation
2016 December -- Lithuanian Hybrid War Presentation2016 December -- Lithuanian Hybrid War Presentation
2016 December -- Lithuanian Hybrid War Presentation
 
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
2016 December -- US, NATO, & The Baltics -- International Security and Cyber[...
 
2016 October 4 -- EHU US Presidential Election
2016 October 4 -- EHU US Presidential Election2016 October 4 -- EHU US Presidential Election
2016 October 4 -- EHU US Presidential Election
 
2011 -- AUSTRAC Presentation on Russian OCGs
2011 -- AUSTRAC Presentation on Russian OCGs2011 -- AUSTRAC Presentation on Russian OCGs
2011 -- AUSTRAC Presentation on Russian OCGs
 
2016 -- Ukrainian Presentation -- Final
2016 -- Ukrainian Presentation -- Final2016 -- Ukrainian Presentation -- Final
2016 -- Ukrainian Presentation -- Final
 

Complacency in the Face of Evolving Cybersecurity Norms is Hazardous

  • 1. Complacency in the Face of Evolving Cybersecurity Norms is Hazardous (Part 1) Ethan S. Burger and Thomas W. Welch, Legaltech News March 21, 2016 Image by Yuri Samoilov The following is part one of a two-part series. Summary Given the constantly evolving legal requirements and changing technology, the business executives and board of directors members are often reluctant to adopt policies that require a high-level of corporate-wide commitment. Expenditures on cybersecurity may not have concrete and identifiable benefits nor generate revenues. Corporate inertia with respect to implementing rigorous cyberdefense is understandable. There are very large number of unknowns. Corporate decision-makers often receive a great amount of contradictory advice. The C-suite needs to think and act strategically. Cybersecurity
  • 2. challenges will not go away if ignored. The threat demands action and policies consistent with the corporation’s profile and its sector's norms. Failing to take such action means greater regulatory and litigation risk, irrespective of whether the cybersecurity posture adopted will be effective in defending against cyberattacks. Non­compliance with cybersecurity norms are likely to damage the corporation’s reputation in the marketplace and with customers, suppliers, and other business partners. The corporation needs well thought out policies that include plans to respond to cyberattacks and to recover from them. These policies should be responsive to regulatory requirements and not have negative consequences should the company become a defendant in a lawsuit. It should not be overlooked that victims of cyberattacks may have claims against persons other than the attacker, who is unlikely to be apprehended or even identified. The private sector’s rather limited experience with cyberattacks, may lead to some corporations overly relying on information and recommendations supplied by persons who are likely to promote their agenda rather than be concerned with what its best for the corporation, especially in the case of small and medium enterprises. Introduction In 2015, global losses due to cybercrime have probably exceeded $400 billion. Admitted cyberattacks have been directed against retailers (Home Depot and Target), financial and insurance institutions (Anthem, Bank of America, J.P. Morgan, and Wells Fargo), governmental bodies (FBI, IRS, and the FBI), hospitals (Boston Children’s Hospital and Hollywood Presbyterian Medical Center), and infrastructure, including vital communications, energy distribution, and transportation networks. There is a general consensus in both the private and public sectors that the cybersecurity problem is acute and getting worse. The many publicized reports and warnings are just the tip of the proverbial iceberg, however, as many companies are reluctant to acknowledge their exposures. Nonetheless, many businesses do not seem to be aware of the risks, or the potential consequences for not taking basic precautions. Inaction increases their exposure to liability for harm caused to third-parties and susceptibility to government-imposed sanctions for failing to observe legal norms or generally-accepted practices. Those carrying out cyberattacks vary in motivations and capabilities. Managers must prepare their organizations for what seems to be the inevitable and diverse types of cyberattacks. For institutional and other reasons, many enterprises have not responded in a systematic manner to the threat. Comprehensive, viable approaches must be developed to deal with a wide range of potential threats. Executives and board of directors members may have been understandably reluctant to adopt comprehensive defensive measures against cyber-attacks, but they must – and right now.
  • 3. This article explores some practical and legal issues that corporations are likely to encounter in this rapidly changing environment. Cyberattacks and their Motivations Cyberattacks are very difficult to defend against; in particular: denial of service (DoS); and, distributed denial of service (DDoS) attacks. Cyberattacks can be used as a weapon to degrade, disrupt, steal data used for the commission of financial crimes including espionage, identity theft, and of greatest concern seizing control of their target’s computer and IT systems. They may also have political motivations. The goal of a DoS attack is to flood a website so that it is not able to accept legitimate traffic. A DDoS attack is more complex. While the objective to some extent it similar, here the incoming traffic is sent from many different sources making it more difficult for the target website to identify and block incoming traffic. DDoS involves sending a huge volume of incoming contacts to the website, often the hundreds of thousands, so that it is impossible to defend against the attacks. In DDoS attacks it is not possible to identify and block the large number of attackers since they have different IP addresses. Often these attacks are from victims of prior successful attacks. The victims of a DDoS attack include both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack. Generally, the attacker identifies and infects other vulnerable systems using malware which can be instructed to attack a particular website. There remains a paucity of reliable data in this area for management and boards of directors to make decisions relating to cybersecurity. The data at present is fairly incomplete. The most dangerous form of cyberattack are attacks against the organizations’ supervisory control and data acquisition (SCADA) networks. SCADA are the computers and applications that perform vital functions in providing essential services and commodities. In certain respects, successful cyberattacks can cause damage traditionally caused only by kinetic weapons. Like many others, federal experts believe that small and medium businesses (SMEs), particularly those that possess a large number of records that include valuable information provided by others, might be priority targets for criminals. SMEs represent attractive targets since they frequently lack the necessary hardware and software (“tools”), personnel, practices, and procedures for self-defense. The data obtained from such attacks may be precursors for subsequent cyberattacks. Ironically, SMEs often believe their risk of cyberattacks is low, even though they are more vulnerable to cybertargets than larger entities. This may lead small and medium enterprises to underestimate the cyberthreats they faced. Their defense posture may be limited given the expenses involved.
  • 4. Governmental Action and Inaction Increasingly, government entities have made efforts to reach out to all types and sizes of businesses. The government wants businesses to better understand the nature of the threats they face, and actions they might take to reduce their vulnerability and the relevant rules they are expected to observe. At present, there seems to be divergences between the law as written and as carried out. The U.S. National Institute for Standards and Technology’s Framework for Improving Critical Infrastructure Cybersecurity (Framework) clearly states that it is to serve only as “guidance” for the private sector; yet the U.S. Securities and Exchange Commission, and U.S. Federal Trade Commission in certain circumstances, has acted as if the Framework constitutes binding, official standards, which if not followed can result in the imposition of sanctions. (See Federal Trade Commission v. Wyndham Worldwide Corporation, where the FTC alleged that, at least since April 2008, Wyndham engaged in unfair cybersecurity practices that, "taken together, unreasonably and unnecessarily exposed consumers' personal data to unauthorized access and theft.") State regulators, insurers and courts may soon act similarly. Consequently, enterprises may have to identify deeper pockets for money to cover protective or remedial measures, or a portion of their losses or expenses needed to comply with governmental dictates. Of course, the government’s credibility on this topic is questionable given that they have incurred a large number of significant cyberattacks. Certain agencies, such as the FDA, who themselves have been hacked multiple times, (and continue to be attacked almost daily) have only recently promulgated new standards for medical devices. Exposure From Cyberbreaches and the Release of Personal or Confidential Information As a result of breaches of cyberdefense, criminals and others frequently obtain personal data of individuals held by certain companies. These cases have triggered a wave of litigation against entities that released others’ private or confidential information; note that other countries’ requirements, such as those of the European Union, may be more demanding that the rules in the U.S. Often, it is difficult to predict the size of the damages that persons whose identities have been compromised or entities whose intellectual property has been disseminated will be entitled to compensation. The amount of money a company might be liable to third parties is very case specific and unpredictable. A victimized business should never be a complacent victim. Even if liability cannot be established on the merits, in courts or in arbitral bodies, the defendant in any case may have reasons to resolve a dispute for reputational or other reasons—such as the fear of losing business. Part two of this article will explore the effectiveness of cyberinsurance and how to increase cybersecurity.
  • 5. Ethan S. Burger is a Washington-based attorney and academic, who is a senior fellow for cybersecurity law at Kogod's Cybersecurity Governance Center. Thomas Welch is an attorney, managing director of the American International Regulatory Coherence Institute and a former associate director with the U.S. Food and Drug Administration.