february 20, 2013 - privacy lawyer & attorney · where appropriate or required, craft formal...

21
February 20, 2013

Upload: dodat

Post on 09-Apr-2018

216 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

February 20, 2013

Page 2: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Our Practice H&W’s Cybersecurity Risk Management and

Investigations Team Interdisciplinary practice

○ Privacy, Data Security, Investigations, Homeland Security, Litigation and SEC

Representing clients across multiple industry sectors○ Including financial services, health care, energy,

technology and retail The Centre for Information Policy Leadership

at Hunton & Williams www.huntonprivacyblog.com

@hunton_privacy

2

Page 3: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Analyzing the Threat Landscape: The First Step in a Risk-based Approach

• Nation states• Criminals• Insiders• Hacktivists• Terrorists

Threat actors• Cyber/Technical• Insiders• Physical

Threat vectors

• R&D and IP• Business data• PII• Sabotage

The Target: Your company

© PwC • PwC Contribution to the Implementation of the Cybersecurity Executive Order

Page 4: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Threat Targets

Threat targets Financial institutions, energy sector, news

media, payment card industry, technology, health care, retailers

Also government agencies at all levels (U.S. and abroad)

High-profile attacks led to action in D.C. and Brussels

4

Page 5: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

U.S. Government Efforts to Date

Legislative efforts have failed to date EO drafting began in September 2012 Final EO was issued on 2/12/13 Congress has now stepped up its efforts

5

Page 6: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

The Executive Order

Three primary objectives Improves cybersecurity information-sharing

between government and business Directs NIST to create a Cybersecurity

Framework Directs DHS to identify the critical

infrastructure at greatest risk Implications

6

Page 7: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Opportunities for Both Private and Public Sectors

The EO sets broad guidelines for Homeland Security, Commerce and other agencies to adapt detailed cybersecurity procedures to stakeholders’ needs, and establishes coordination efforts

Calls for use of risk-based rather than compliance-based approach to cybersecurity

Emphasis on voluntary information-sharing and public-private consultation to identify and mitigate risk to critical infrastructure Significant voice for private sector

Implementation and impact will be influenced or supported by possible 2013 legislation, including proposed Cyber Intelligence-Sharing and Protection Act

© PwC • PwC Contribution to the Implementation of the Cybersecurity Executive Order

Page 8: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Specific Opportunities from the EO Building a Cybersecurity Framework (Section 7)

Consistent standards across industries improve certainty of processes and procedures for infrastructure owners/operators

Consultative process—including public review, input from across USG—improves likelihood of developing effective approaches to mitigating cyber risk.

Identifying and Incentivizing Critical Infrastructure (Sections 8 and 9) Help shape the “voluntary critical infrastructure security

program” including establishment of incentives for participation

DoD and GSA will recommend ways to incorporate cybersecurity requirements in federal procurements / contracting by mid-July

© PwC • PwC Contribution to the Implementation of the Cybersecurity Executive Order

Page 9: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Specific Opportunities from the EO (continued) Expanding cybersecurity information-

sharing (Section 4) Focused on US government providing

information to critical infrastructure Clearly identify the type of information

needed to protect critical functions, data Participate in setting rules and procedures

for information-sharing, including best use of private-sector employees who can be embedded in federal agencies

© PwC • PwC Contribution to the Implementation of the Cybersecurity Executive Order

Page 10: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Impact of Congress Legislative activity might pick up on key themes from

2012 FISMA reform Education and building the workforce R&D

Some elements of the EO are ripe for legislative reference Risk assessment, controls, and improvements in the Framework,

per Sec. 7 Identification and designation as a critical infrastructure

owner/operator, under Sec. 9 Need for regulatory or other authorities identified pursuant to

Sec. 10 Cyber Information-Sharing and Protection Act of 2013

(CISPA) Reintroduced February 14 Addresses a significant concern of businesses: liability limitation

© PwC • PwC Contribution to the Implementation of the Cybersecurity Executive Order

Page 11: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

EU Regulatory Efforts On Feb. 7, 2013, EC issued a draft

Directive on cybersecurity Broad set of companies will need to adopt

strict network security standards Requirements to report security incidents

to regulators and, in some cases, the public Regulators authorized to request security audits

and issue binding instructions Member States will impose sanctions for

non-compliance

11

Page 12: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Identifying an Attack Watch for aberrant activity

Financial losses System shutdowns Customer complaints Notice from payment card brands Results of scans for malware and vulnerabilities

Cyber threat notifications from law enforcement Determine the nature and scope of the attack

May require assistance from outside experts and law enforcement

Duration and sophistication of attack Attackers’ efforts at concealment Access or acquisition of data, trade secrets and other proprietary

information Restore the integrity of the system

12

Page 13: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Conduct an Investigation

Potentially significant legal ramifications Understand:

Nature of the compromise Data and systems at issue Whether communications systems are secure Whether insiders are involved

Importance of preserving privilege Retention and oversight of forensic experts Consider forensic imaging, records

retention and e-discovery obligations

13

Page 14: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Early Legal Considerations

Understand your legal obligations arising out of a cyber event Breach notification and other regulatory

obligations○ State, federal, international law○ Industry standards ○ Contractual obligations

Proactive measures Offensive litigation Hacking the hacker

○ But understand legal issues

14

Page 15: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Coordination with Regulators and Law Enforcement New obligations resulting from

enhanced information-sharing Law enforcement often has a broader

view into cyber threats Establish an early line of communication Determine the most appropriate agency

Depends on the nature of the compromise Local, federal and international law

enforcement may be necessary

15

Page 16: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Notification Process

Where appropriate or required, craft formal notification and reporting documents Must be done carefully (and quickly) Consider PR experts as well

Take proactive measures to mitigate risk Manage media response Assemble call center Develop FAQs and train agents Consider identity protection service

16

Page 17: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Risk and Dispute Management

Assess potential insurance claims Assist law enforcement with criminal

prosecution of attackers Defend against legal actions

Regulatory enforcement Class action litigation

Manage disputes with business partners and other third parties

17

Page 18: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

A Case Study of State-sponsored Cyber Espionage

Client Issue: FBI advised a US-based energy company that a Foreign State actor had compromised its network. The FBI offered to share information about the attacks with specialists who held clearances. The company hired PwC’s cleared cybercrime team to help investigate.

The threat actor used an Advanced Persistent network intrusion to compromise hundreds of systems and steal economic details related to myriad business deals.

Computer Forensics*Systems and

memory collection

*Forensic analysis and imagery

Network Forensics*Network

traffic*Firewall logs*Antivirus logs*Domain

controller logs

Malware Forensics*Malicious file

analysis*Functionality

testing

Threat Forensics* Enterprise-

wide analytics

*Attacker tradecraft

* Operational processes

*Attack’s objectives and motivations

© PwC • PwC Contribution to the Implementation of the Cybersecurity Executive Order

Page 19: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Looking Ahead: Anticipation Is the Best Mitigation Implementation of the EO should provide opportunities for

organizations to improve their cybersecurity—but the threat will remain

Successful, resilient enterprises recognize this and will seek additional, proactive measures to protect their IT systems

Using integrated threat intelligence and analysis will be one key way to stay ahead of criminals, hostile nation-states, hacktivists, and other threat actors Threat modeling to identify threat actors, motivations and threat vectors

(cyber and non-cyber) Threat-informed asset identification and valuation to understand what

corporate crown jewels are being targeted today and in the future Threat analysis that integrates open source intelligence (OSINT), and

proprietary cyber threat intelligence Strategic analysis to provide context to emerging threats and identify

future security challenges

© PwC • PwC Contribution to the Implementation of the Cybersecurity Executive Order

Page 20: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

Questions? Hunton & Williams LLP

Lisa J. SottoPartner and Head of the Privacy and Data Security Practice(212) 309-1223, [email protected]

John J. DelionadoPartner(305) 536-2752, [email protected]

Evan D. WolffPartner and Director of Homeland Security Practice(202) 955-1908, [email protected]

PwC Jack L. Johnson, Jr.

Principal, Washington Federal Practice(703) 918-1303, [email protected]

Emily StapfDirector, Forensic Services Practice(703) 868-0269, [email protected]

Neal A. PollardDirector, Forensic Services Practice(571) 217-4456, [email protected]

20

Page 21: February 20, 2013 - Privacy Lawyer & Attorney · Where appropriate or required, craft formal notification and reporting documents ... (OSINT), and proprietary cyber threat intelligence

© Hunton & Williams LLP

© 2013 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.PwC refers to the US member firm, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details.This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors.PwC US helps organizations and individuals create the value they’re looking for. We’re a member of the PwC network of firms with 169,000 people in more than 158 countries. We’re committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at www.pwc.com/us.

© 2013 Hunton & Williams LLP. Attorney advertising materials. These materials have been prepared for informational purposes only and are not legal advice. This information is not intended to create an attorney-client or similar relationship. Please do not send us confidential information. Past successes cannot be an assurance of future success. Whether you need legal services and which lawyer you select are important decisions that should not be based solely upon these materials.