SlideShare une entreprise Scribd logo
1  sur  50
Télécharger pour lire hors ligne
Cybersecurity	
  Brief:	
  Understanding	
  
Risk,	
  Legal	
  Framework,	
  &	
  Insurance	
  
About	
  SecureDocs	
  
•  SecureDocs	
  is	
  a	
  virtual	
  data	
  room	
  for	
  sharing	
  and	
  storing	
  sensi5ve	
  documents	
  
both	
  internally	
  and	
  with	
  outside	
  par5es.	
  	
  
Company	
  Basics:	
  
•  Virtual	
  data	
  room	
  used	
  by	
  companies	
  from	
  fundraising	
  to	
  exit	
  
	
  
•  Developed	
  by	
  the	
  team	
  that	
  created	
  and	
  launched	
  GoToMyPC	
  and	
  GoToMeeKng	
  	
  
	
  
•  Web-­‐based	
  business	
  soNware	
  for	
  financial	
  and	
  legal	
  professionals	
  
•  DisKnguished	
  through	
  it’s	
  ease-­‐of-­‐use,	
  industry-­‐leading	
  security,	
  and	
  flat-­‐fee	
  
pricing	
  	
  
About	
  Roberta	
  D.	
  Anderson	
  
Roberta	
  is	
  a	
  partner	
  in	
  the	
  PiSsburgh	
  office	
  of	
  
K&L	
  Gates	
  LLP.	
  	
  A	
  member	
  of	
  the	
  firm’s	
  
Insurance	
  Coverage	
  and	
  Cybersecurity	
  pracKce	
  
groups,	
  Roberta	
  concentrates	
  her	
  pracKce	
  in	
  
insurance	
  coverage	
  liKgaKon	
  and	
  counseling	
  and	
  
emerging	
  cybersecurity	
  and	
  data	
  privacy-­‐related	
  
issues.	
  	
  
Agenda	
  
–  The	
  Spectrum	
  of	
  Cyber	
  Risk	
  
–  Prac5cal	
  Risk	
  and	
  Exposure	
  
–  Legal	
  and	
  Regulatory	
  Framework	
  	
  
–  What	
  to	
  do	
  Before	
  an	
  Incident?	
  
–  Poten5al	
  Coverage	
  Under	
  “Legacy”	
  Policies	
  	
  
–  Limita5ons	
  of	
  “Legacy”	
  Insurance	
  Policies	
  
–  Technology	
  Errors	
  &	
  Omissions	
  Coverage	
  
–  CuMng	
  Edge	
  “Cyber”	
  Products	
  
–  How	
  To	
  Enhance	
  “Off-­‐The-­‐Shelf”	
  Cyber	
  Insurance	
  Forms	
  Through	
  
Nego5a5on	
  
–  A	
  Word	
  About	
  Vendor	
  Contracts	
  	
  
–  Audience	
  Q&A	
  
THE	
  SPECTRUM	
  OF	
  
CYBER	
  RISK	
  
The	
  Spectrum	
  of	
  Cyber	
  Risk	
  
–  Malicious	
  aXacks	
  (Advanced	
  Persistent	
  Threats,	
  spear	
  phishing/
social	
  engineering,	
  viruses,	
  worms,	
  Trojans,	
  DDoS	
  aXacks)	
  
–  Data	
  breach	
  	
  
–  Unauthorized	
  access	
  (hacker	
  aXacks,	
  spyware)	
  	
  
–  Inadequate	
  security	
  and	
  system	
  glitches	
  
–  Employee	
  mobility	
  and	
  disgruntled	
  employees	
  
–  Lost	
  or	
  stolen	
  portable	
  devices	
  	
  
–  Inadequate	
  security	
  and	
  systems:	
  	
  first	
  party	
  and	
  third-­‐party	
  vendors	
  
–  Carelessness	
  of	
  an	
  employees	
  and	
  vendors	
  	
  
“[T]here	
  are	
  only	
  two	
  types	
  of	
  companies:	
  those	
  that	
  have	
  been	
  
hacked	
  and	
  those	
  that	
  will	
  be.	
  And	
  even	
  they	
  are	
  converging	
  into	
  one	
  
category:	
  companies	
  that	
  have	
  been	
  hacked	
  and	
  will	
  be	
  hacked	
  
again.”	
  -­‐	
  	
  Robert	
  S.	
  Mueller,	
  III	
  
Director,	
  FBI	
  
LEGAL	
  AND	
  REGULATORY	
  
FRAMEWORK	
  	
  
–  State Privacy Laws
–  http://www.ncsl.org/research/telecommunications-and-
information-technology/security-breach-notification-laws.aspx
–  Federal Privacy Laws
–  Gramm-Leach-Billey Act
–  HIPAA/HITECH
–  Federal Trade Commission (FTC v. Wyndham Worldwide Corp.)
–  FACTA/Red Flags Rule
–  Foreign Privacy Laws
–  PCI Data Security Standards (PCI DSS)
Legal	
  and	
  Regulatory	
  Framework	
  
Five Tips to Consider When Any Public Company Might be The Next Target,
http://www.klgates.com/five-tips-to-consider-when-any-public-company-might-be-the-next-target-02-11-2014
Legal	
  and	
  Regulatory	
  Framework	
  
“appropriate	
  disclosures	
  may	
  include:	
  .	
  .	
  .	
  [a]	
  [d]escripIon	
  of	
  
relevant	
  insurance	
  coverage.”	
  
§  SEC Guidance -- “[A]ppropriate disclosures may include”:
§  “Discussion of aspects of the registrant’s business or operations that give rise
to material cybersecurity risks and the potential costs and consequences”;
§  “To the extent the registrant outsources functions that have material
cybersecurity risks, description of those functions and how the registrant
addresses those risks”;
§  “Description of cyber incidents experienced by the registrant that are
individually, or in the aggregate, material, including a description of the costs
and other consequences”;
§  “Risks related to cyber incidents that may remain undetected for an extended
perid”; and
§  “Description of relevant insurance coverage.”
Legal	
  and	
  Regulatory	
  Framework	
  
–  NIST Cybersecurity Framework -- provides a common taxonomy and
mechanism for organizations to:
–  Describe their current cybersecurity posture;
–  Describe their target state for cybersecurity;
–  Identify and prioritize opportunities for improvement within the context of
a continuous and repeatable process;
–  Assess progress toward the target state;
–  Communicate among internal and external stakeholders about
cybersecurity risk.
–  The Framework is voluntary (for now)
Legal	
  and	
  Regulatory	
  Framework	
  
–  NIST Cybersecurity Framework
NIST Unveils Cybersecurity Framework, http://www.klgates.com/nist-unveils-cybersecurity-framework-02-17-2014/
Legal	
  and	
  Regulatory	
  Framework	
  
PRACTICAL	
  RISK	
  AND	
  
EXPOSURE	
  
•  Breach Notification Costs/Identity Monitoring
•  Computer Forensics/PR Consulting
•  Loss of Customers/Revenue
•  Damaged Reputation/Brand
•  Regulatory Actions/Fines/Penalties/Consumer
Redress
•  Lawsuits & Defense Costs
•  Loss of “Crown Jewels”
•  Business Interruption & Supply Chain Disruption
•  Drop in Stock Price/Loss of Market Share
•  Potential D&O Suits (Target)
PracKcal	
  Risk	
  and	
  Exposure	
  
WHAT	
  TO	
  DO	
  BEFORE	
  AN	
  
INCIDENT?	
  
16
“[T]here are only two types of
companies: those that have been
hacked and those that will be. And
even they are converging into one
category: companies that have
been hacked and will be hacked
again.”
Robert	
  S.	
  Mueller,	
  III,	
  Director,	
  Federal	
  Bureau	
  of	
  InvesKgaKon,	
  RSA	
  Cyber	
  
Security	
  Conference	
  San	
  Francisco,	
  CA	
  (Mar.	
  1,	
  2012)	
  
POTENTIAL	
  COVERAGE	
  	
  
UNDER	
  “LEGACY”	
  POLICIES	
  	
  
–  Directors’ and Officers’ (D&O)
–  Errors and Omissions (E&O)/Professional Liability
–  Employment Practices Liability (EPL)
–  Fiduciary Liability
–  Crime
–  Retail Ventures, Inc. v. National Union Fire Ins. of Pittsburgh, Pa., 691 F.3d 821 (6th
Cir. 2012) (DSW covered for expenses for customer communications, public
relations, lawsuits, regulatory defense costs, and fines imposed by Visa and
Mastercard under the computer fraud rider of its blanket crime policy)
–  Property?
–  Commercial General Liablity (CGL)?
PotenKal	
  Coverage	
  Under	
  
“Legacy”	
  Policies	
  	
  
–  Coverage B provides coverage for damages because of “personal
and advertising injury”
–  “Personal and Advertising Injury” is defined in part as injury
arising out of “[o]ral or written publication,
in any manner, of material that violates a person’s
right of privacy”
–  What is a “Person’s Right of Privacy”?
–  What is a “Publication”?
PotenKal	
  Coverage	
  Under	
  
“Legacy”	
  Policies	
  	
  
LIMITATIONS	
  OF	
  “LEGACY”	
  
INSURANCE	
  POLICIES	
  
klgates.com
ISO states that “when this endorsement is
attached, it will result in a reduction of
coverage due to the deletion of an
exception with respect to damages
because of bodily injury arising out of loss
of, loss of use of, damage to, corruption of,
inability to access, or inability to manipulate
electronic data.”
–  Zurich American Insurance Co. v. Sony Corp. of America et al.
TECHNOLOGY	
  ERRORS	
  &	
  
OMISSIONS	
  COVERAGE	
  
–  Essen5al	
  for	
  	
  a	
  provider	
  of	
  e-­‐commerce-­‐related	
  solu5ons	
  
–  Covers	
  	
  
•  Errors	
  &	
  Omissions	
  in	
  the	
  Provision	
  of	
  Technology	
  Services	
  
•  Failure	
  of	
  Technology	
  Products	
  to	
  Serve	
  Their	
  Purpose	
  
–  But	
  there	
  are	
  limita5ons	
  	
  
•  Triggered	
  By	
  a	
  “Claim”	
  That	
  Alleges	
  An	
  Act	
  or	
  Omission	
  
•  May	
  Exclude	
  Security	
  Beach	
  or	
  Unauthorized	
  Access	
  to	
  Informa5on	
  
•  May	
  Not	
  Include	
  Breach	
  No5fica5on	
  Costs,	
  Which	
  is	
  Viewed	
  As	
  More	
  of	
  a	
  “First-­‐
Party”	
  Loss	
  
	
  
Technology	
  E&O	
  Coverage	
  
CUTTING	
  EDGE	
  “CYBER”	
  
PRODUCTS	
  
–  Privacy	
  And	
  Network	
  Security	
  
–  Provides	
  coverage	
  for	
  liability	
  (defense	
  and	
  indemnity)	
  arising	
  out	
  of	
  
data	
  breaches,	
  transmission	
  of	
  malicious	
  code,	
  denial	
  of	
  third-­‐party	
  
access	
  to	
  the	
  insured’s	
  network,	
  and	
  other	
  network	
  security	
  threats	
  
–  Regulatory	
  Liability	
  
–  Provides	
  coverage	
  for	
  liability	
  arising	
  out	
  of	
  administra5ve	
  or	
  
regulatory	
  proceedings,	
  fines	
  and	
  penal5es	
  
–  	
  Media	
  Liability	
  
–  Provides	
  coverage	
  for	
  liability	
  (defense	
  and	
  indemnity)	
  for	
  claims	
  
alleging	
  infringement	
  of	
  copyright	
  and	
  other	
  intellectual	
  property	
  
rights	
  and	
  misappropria5on	
  of	
  ideas	
  or	
  media	
  content	
  	
  
Specialty	
  “Cyber”	
  Policies	
  –	
  Third	
  
Party	
  
–  Informa5on	
  Asset	
  Coverage	
  	
  
–  Coverage	
  for	
  damage	
  to	
  or	
  thee	
  of	
  the	
  insured’s	
  own	
  systems	
  and	
  
hardware,	
  and	
  may	
  cover	
  the	
  cost	
  of	
  restoring	
  or	
  recrea5ng	
  stolen	
  or	
  
corrupted	
  data.	
  	
  
–  Network	
  Interrup5on	
  And	
  Extra	
  Expense	
  (and	
  CBI)	
  
–  Coverage	
  for	
  business	
  interrup5on	
  and	
  extra	
  expense	
  caused	
  by	
  
malicious	
  code	
  ,	
  DDoS	
  aXacks,	
  unauthorized	
  access	
  to,	
  or	
  thee	
  of,	
  
informa5on,	
  and	
  other	
  security	
  threats	
  to	
  networks.	
  	
  
–  Extor5on	
  
–  Coverage	
  for	
  losses	
  resul5ng	
  from	
  extor5on	
  (payments	
  of	
  an	
  
extor5onist’s	
  demand	
  to	
  prevent	
  network	
  loss	
  or	
  implementa5on	
  of	
  
a	
  threat)	
  	
  
–  Crisis	
  Management	
  	
  
Specialty	
  “Cyber”	
  Policies	
  –	
  First	
  
Party	
  
HOW	
  TO	
  ENHANCE	
  “OFF-­‐THE-­‐
SHELF”	
  CYBER	
  INSURANCE	
  
FORMS	
  	
  
THROUGH	
  NEGOTIATION	
  
klgates.com	
  
Data	
  Breach	
  Example	
  1	
  
Data	
  Breach	
  Example	
  2	
  
Data	
  Breach	
  Example	
  3	
  
Network	
  Security	
  Example	
  1	
  
Network	
  Security	
  Example	
  2	
  
Network	
  Security	
  Example	
  3	
  
TIPS	
  For	
  A	
  Successful	
  Placement	
  	
  §  Embrace a Team Approach
§  Understand the Risk Profile
§  Review Existing Coverages
§  Purchase Cyber Coverage as Needed
§  Remember the “Cyber” Misnomer
§  Spotlight the “Cloud”
§  Consider the Amount of Coverage
§  Pay attention to the Retroactive Date and ERP
§  Look at Defense and Settlement Provisions
BEWARE.
THE.
FINE.
PRINT.
49
“A well drafted policy will reduce
the likelihood that an insurer will be
able to avoid or limit insurance
coverage in the event of a claim.”
Roberta	
  D.	
  Anderson,	
  Partner,	
  K&L	
  Gates	
  LLP	
  	
  (June	
  25,	
  2014)	
  
A	
  WORD	
  ABOUT	
  VENDOR	
  
CONTRACTS	
  	
  

Contenu connexe

Tendances

10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance Hubbard Insurance Group
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Financial Poise
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRCharlie Pownall
 
GDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and CommunicationsGDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and CommunicationsCharlie Pownall
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyTechSoup Canada
 
Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsPatton Boggs LLP
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Lawtravismd
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsShawn Tuma
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossShawn Tuma
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Don Grauel
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your InformationAIIM International
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Kroll
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 

Tendances (20)

10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
S719a
S719aS719a
S719a
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
 
GDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and CommunicationsGDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and Communications
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government Contracts
 
MA Privacy Law
MA Privacy LawMA Privacy Law
MA Privacy Law
 
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially LitigatorsCybersecurity Issues All Lawyers Should Know -- Especially Litigators
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
A Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for BusinessesA Guide to Disaster Preparedness for Businesses
A Guide to Disaster Preparedness for Businesses
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 

En vedette

Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaNew Horizons Bulgaria
 
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...North Texas Chapter of the ISSA
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Creating Risk Profile Graphs
Creating  Risk  Profile  GraphsCreating  Risk  Profile  Graphs
Creating Risk Profile Graphspuspaltamuli
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
IT Passport Examination.
IT Passport Examination.IT Passport Examination.
IT Passport Examination.Gol D Roger
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
What Is An Architectural Framework
What Is An Architectural FrameworkWhat Is An Architectural Framework
What Is An Architectural FrameworkJerald Burget
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security FundamentalsJames W. De Rienzo
 
Fundamentals of electrical and electronics engineering
Fundamentals of electrical and electronics engineeringFundamentals of electrical and electronics engineering
Fundamentals of electrical and electronics engineeringHomework Guru
 
Digital image processing and interpretation
Digital image processing and interpretationDigital image processing and interpretation
Digital image processing and interpretationP.K. Mani
 
How to measure and manage legal risk
How to measure and manage legal riskHow to measure and manage legal risk
How to measure and manage legal riskBerkman Solutions
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentationalygale
 
Enterprise Risk Management Erm
Enterprise Risk Management ErmEnterprise Risk Management Erm
Enterprise Risk Management ErmNexus Aid
 
How to select and create an effective visual for your business presentation
How to select and create an effective visual for your business presentationHow to select and create an effective visual for your business presentation
How to select and create an effective visual for your business presentationDave Paradi
 
The State of Financial Presentations 2014 Survey Results
The State of Financial Presentations 2014 Survey ResultsThe State of Financial Presentations 2014 Survey Results
The State of Financial Presentations 2014 Survey ResultsDave Paradi
 

En vedette (20)

Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...
NTXISSACSC3 - Fundamentals Matter - A Brief Introduction to Risk Analysis for...
 
Fce 552 part6-3
Fce 552 part6-3Fce 552 part6-3
Fce 552 part6-3
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Creating Risk Profile Graphs
Creating  Risk  Profile  GraphsCreating  Risk  Profile  Graphs
Creating Risk Profile Graphs
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
IT Passport Examination.
IT Passport Examination.IT Passport Examination.
IT Passport Examination.
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
What Is An Architectural Framework
What Is An Architectural FrameworkWhat Is An Architectural Framework
What Is An Architectural Framework
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security Fundamentals
 
Fundamentals of electrical and electronics engineering
Fundamentals of electrical and electronics engineeringFundamentals of electrical and electronics engineering
Fundamentals of electrical and electronics engineering
 
Legal Risk - New Thinking
Legal Risk - New ThinkingLegal Risk - New Thinking
Legal Risk - New Thinking
 
Digital image processing and interpretation
Digital image processing and interpretationDigital image processing and interpretation
Digital image processing and interpretation
 
How to measure and manage legal risk
How to measure and manage legal riskHow to measure and manage legal risk
How to measure and manage legal risk
 
Information Security: Fundamental
Information Security: FundamentalInformation Security: Fundamental
Information Security: Fundamental
 
Risk Management ERM Presentation
Risk Management ERM PresentationRisk Management ERM Presentation
Risk Management ERM Presentation
 
Enterprise Risk Management Erm
Enterprise Risk Management ErmEnterprise Risk Management Erm
Enterprise Risk Management Erm
 
How to select and create an effective visual for your business presentation
How to select and create an effective visual for your business presentationHow to select and create an effective visual for your business presentation
How to select and create an effective visual for your business presentation
 
Aptitude test
Aptitude testAptitude test
Aptitude test
 
The State of Financial Presentations 2014 Survey Results
The State of Financial Presentations 2014 Survey ResultsThe State of Financial Presentations 2014 Survey Results
The State of Financial Presentations 2014 Survey Results
 

Similaire à Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance

Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"OCTF Industry Engagement
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationEthos Media S.A.
 
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...Quarles & Brady
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfBilal Ahmad
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsResilient Systems
 

Similaire à Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance (20)

Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"CRI Extract from "Cyber Lessons from the Front lines"
CRI Extract from "Cyber Lessons from the Front lines"
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Infocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar PresentationInfocom security 2016 - Cromar Presentation
Infocom security 2016 - Cromar Presentation
 
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
Business Law Training: Market Turmoil in D&O Insurance and Is Your Company Pr...
 
#7 Insurance
#7 Insurance#7 Insurance
#7 Insurance
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
sunflower_cissp_layout.pdf
sunflower_cissp_layout.pdfsunflower_cissp_layout.pdf
sunflower_cissp_layout.pdf
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 

Plus de SecureDocs

Tech M&A Webinar: Unlocking Key Factors that Influence Valuation
Tech M&A Webinar: Unlocking Key Factors that Influence ValuationTech M&A Webinar: Unlocking Key Factors that Influence Valuation
Tech M&A Webinar: Unlocking Key Factors that Influence ValuationSecureDocs
 
Start with the Exit in Mind
Start with the Exit in MindStart with the Exit in Mind
Start with the Exit in MindSecureDocs
 
Trends in Tech M&A
Trends in Tech M&ATrends in Tech M&A
Trends in Tech M&ASecureDocs
 
Choosing an M&A Advisor: A Guide for Investors, Boards, and Management
Choosing an M&A Advisor: A Guide for Investors, Boards, and ManagementChoosing an M&A Advisor: A Guide for Investors, Boards, and Management
Choosing an M&A Advisor: A Guide for Investors, Boards, and ManagementSecureDocs
 
NDAs: A Logistical and Legal Nightmare!
NDAs: A Logistical and Legal Nightmare!NDAs: A Logistical and Legal Nightmare!
NDAs: A Logistical and Legal Nightmare!SecureDocs
 
Is Your Company's Buyer in Asia? Webinar Slides April 2016
Is Your Company's Buyer in Asia? Webinar Slides April 2016Is Your Company's Buyer in Asia? Webinar Slides April 2016
Is Your Company's Buyer in Asia? Webinar Slides April 2016SecureDocs
 
Raising Capital from Life Science Investors
Raising Capital from Life Science Investors Raising Capital from Life Science Investors
Raising Capital from Life Science Investors SecureDocs
 
Keys to Successful M&A: Transparency, Security, and Process
 Keys to Successful M&A: Transparency, Security, and Process Keys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and ProcessSecureDocs
 
Financial Basics for Startups: How to Think Like a CFO
Financial Basics for Startups: How to Think Like a CFOFinancial Basics for Startups: How to Think Like a CFO
Financial Basics for Startups: How to Think Like a CFOSecureDocs
 
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...SecureDocs
 
When Should an Early-Stage Company Hire a CFO?
When Should an Early-Stage Company Hire a CFO?When Should an Early-Stage Company Hire a CFO?
When Should an Early-Stage Company Hire a CFO?SecureDocs
 
Optimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data RoomsOptimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data RoomsSecureDocs
 
Funding for Life Sciences: SBIR and STTR Grant Basics
Funding for Life Sciences: SBIR and STTR Grant BasicsFunding for Life Sciences: SBIR and STTR Grant Basics
Funding for Life Sciences: SBIR and STTR Grant BasicsSecureDocs
 
Technology M&A: Deal Preparation and Management
Technology M&A: Deal Preparation and ManagementTechnology M&A: Deal Preparation and Management
Technology M&A: Deal Preparation and ManagementSecureDocs
 
The Art of the Deal- Webinar
The Art of the Deal- WebinarThe Art of the Deal- Webinar
The Art of the Deal- WebinarSecureDocs
 
Alternative Funding for Life Science Companies- Webinar Slides
Alternative Funding for Life Science Companies- Webinar SlidesAlternative Funding for Life Science Companies- Webinar Slides
Alternative Funding for Life Science Companies- Webinar SlidesSecureDocs
 
The Power Of The Paperless Office
The Power Of The Paperless OfficeThe Power Of The Paperless Office
The Power Of The Paperless OfficeSecureDocs
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsSecureDocs
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesSecureDocs
 
Keys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and ProcessKeys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and ProcessSecureDocs
 

Plus de SecureDocs (20)

Tech M&A Webinar: Unlocking Key Factors that Influence Valuation
Tech M&A Webinar: Unlocking Key Factors that Influence ValuationTech M&A Webinar: Unlocking Key Factors that Influence Valuation
Tech M&A Webinar: Unlocking Key Factors that Influence Valuation
 
Start with the Exit in Mind
Start with the Exit in MindStart with the Exit in Mind
Start with the Exit in Mind
 
Trends in Tech M&A
Trends in Tech M&ATrends in Tech M&A
Trends in Tech M&A
 
Choosing an M&A Advisor: A Guide for Investors, Boards, and Management
Choosing an M&A Advisor: A Guide for Investors, Boards, and ManagementChoosing an M&A Advisor: A Guide for Investors, Boards, and Management
Choosing an M&A Advisor: A Guide for Investors, Boards, and Management
 
NDAs: A Logistical and Legal Nightmare!
NDAs: A Logistical and Legal Nightmare!NDAs: A Logistical and Legal Nightmare!
NDAs: A Logistical and Legal Nightmare!
 
Is Your Company's Buyer in Asia? Webinar Slides April 2016
Is Your Company's Buyer in Asia? Webinar Slides April 2016Is Your Company's Buyer in Asia? Webinar Slides April 2016
Is Your Company's Buyer in Asia? Webinar Slides April 2016
 
Raising Capital from Life Science Investors
Raising Capital from Life Science Investors Raising Capital from Life Science Investors
Raising Capital from Life Science Investors
 
Keys to Successful M&A: Transparency, Security, and Process
 Keys to Successful M&A: Transparency, Security, and Process Keys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and Process
 
Financial Basics for Startups: How to Think Like a CFO
Financial Basics for Startups: How to Think Like a CFOFinancial Basics for Startups: How to Think Like a CFO
Financial Basics for Startups: How to Think Like a CFO
 
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...
When your Business can Benefit from a Corporate Lawyer- and Tips to Save Mone...
 
When Should an Early-Stage Company Hire a CFO?
When Should an Early-Stage Company Hire a CFO?When Should an Early-Stage Company Hire a CFO?
When Should an Early-Stage Company Hire a CFO?
 
Optimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data RoomsOptimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
Optimal File Sharing and Storage: Dropbox V. Virtual Data Rooms
 
Funding for Life Sciences: SBIR and STTR Grant Basics
Funding for Life Sciences: SBIR and STTR Grant BasicsFunding for Life Sciences: SBIR and STTR Grant Basics
Funding for Life Sciences: SBIR and STTR Grant Basics
 
Technology M&A: Deal Preparation and Management
Technology M&A: Deal Preparation and ManagementTechnology M&A: Deal Preparation and Management
Technology M&A: Deal Preparation and Management
 
The Art of the Deal- Webinar
The Art of the Deal- WebinarThe Art of the Deal- Webinar
The Art of the Deal- Webinar
 
Alternative Funding for Life Science Companies- Webinar Slides
Alternative Funding for Life Science Companies- Webinar SlidesAlternative Funding for Life Science Companies- Webinar Slides
Alternative Funding for Life Science Companies- Webinar Slides
 
The Power Of The Paperless Office
The Power Of The Paperless OfficeThe Power Of The Paperless Office
The Power Of The Paperless Office
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 
How To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life SciencesHow To Secure Funding & Protect Intellectual Property For Life Sciences
How To Secure Funding & Protect Intellectual Property For Life Sciences
 
Keys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and ProcessKeys to Successful M&A: Transparency, Security, and Process
Keys to Successful M&A: Transparency, Security, and Process
 

Dernier

The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 

Dernier (20)

The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 

Cybersecurity Brief: Understanding Risk, Legal Framework, & Insurance

  • 1. Cybersecurity  Brief:  Understanding   Risk,  Legal  Framework,  &  Insurance  
  • 2. About  SecureDocs   •  SecureDocs  is  a  virtual  data  room  for  sharing  and  storing  sensi5ve  documents   both  internally  and  with  outside  par5es.     Company  Basics:   •  Virtual  data  room  used  by  companies  from  fundraising  to  exit     •  Developed  by  the  team  that  created  and  launched  GoToMyPC  and  GoToMeeKng       •  Web-­‐based  business  soNware  for  financial  and  legal  professionals   •  DisKnguished  through  it’s  ease-­‐of-­‐use,  industry-­‐leading  security,  and  flat-­‐fee   pricing    
  • 3. About  Roberta  D.  Anderson   Roberta  is  a  partner  in  the  PiSsburgh  office  of   K&L  Gates  LLP.    A  member  of  the  firm’s   Insurance  Coverage  and  Cybersecurity  pracKce   groups,  Roberta  concentrates  her  pracKce  in   insurance  coverage  liKgaKon  and  counseling  and   emerging  cybersecurity  and  data  privacy-­‐related   issues.    
  • 4. Agenda   –  The  Spectrum  of  Cyber  Risk   –  Prac5cal  Risk  and  Exposure   –  Legal  and  Regulatory  Framework     –  What  to  do  Before  an  Incident?   –  Poten5al  Coverage  Under  “Legacy”  Policies     –  Limita5ons  of  “Legacy”  Insurance  Policies   –  Technology  Errors  &  Omissions  Coverage   –  CuMng  Edge  “Cyber”  Products   –  How  To  Enhance  “Off-­‐The-­‐Shelf”  Cyber  Insurance  Forms  Through   Nego5a5on   –  A  Word  About  Vendor  Contracts     –  Audience  Q&A  
  • 5. THE  SPECTRUM  OF   CYBER  RISK  
  • 6. The  Spectrum  of  Cyber  Risk   –  Malicious  aXacks  (Advanced  Persistent  Threats,  spear  phishing/ social  engineering,  viruses,  worms,  Trojans,  DDoS  aXacks)   –  Data  breach     –  Unauthorized  access  (hacker  aXacks,  spyware)     –  Inadequate  security  and  system  glitches   –  Employee  mobility  and  disgruntled  employees   –  Lost  or  stolen  portable  devices     –  Inadequate  security  and  systems:    first  party  and  third-­‐party  vendors   –  Carelessness  of  an  employees  and  vendors     “[T]here  are  only  two  types  of  companies:  those  that  have  been   hacked  and  those  that  will  be.  And  even  they  are  converging  into  one   category:  companies  that  have  been  hacked  and  will  be  hacked   again.”  -­‐    Robert  S.  Mueller,  III   Director,  FBI  
  • 7. LEGAL  AND  REGULATORY   FRAMEWORK    
  • 8. –  State Privacy Laws –  http://www.ncsl.org/research/telecommunications-and- information-technology/security-breach-notification-laws.aspx –  Federal Privacy Laws –  Gramm-Leach-Billey Act –  HIPAA/HITECH –  Federal Trade Commission (FTC v. Wyndham Worldwide Corp.) –  FACTA/Red Flags Rule –  Foreign Privacy Laws –  PCI Data Security Standards (PCI DSS) Legal  and  Regulatory  Framework  
  • 9. Five Tips to Consider When Any Public Company Might be The Next Target, http://www.klgates.com/five-tips-to-consider-when-any-public-company-might-be-the-next-target-02-11-2014 Legal  and  Regulatory  Framework   “appropriate  disclosures  may  include:  .  .  .  [a]  [d]escripIon  of   relevant  insurance  coverage.”   §  SEC Guidance -- “[A]ppropriate disclosures may include”: §  “Discussion of aspects of the registrant’s business or operations that give rise to material cybersecurity risks and the potential costs and consequences”; §  “To the extent the registrant outsources functions that have material cybersecurity risks, description of those functions and how the registrant addresses those risks”; §  “Description of cyber incidents experienced by the registrant that are individually, or in the aggregate, material, including a description of the costs and other consequences”; §  “Risks related to cyber incidents that may remain undetected for an extended perid”; and §  “Description of relevant insurance coverage.”
  • 10. Legal  and  Regulatory  Framework  
  • 11. –  NIST Cybersecurity Framework -- provides a common taxonomy and mechanism for organizations to: –  Describe their current cybersecurity posture; –  Describe their target state for cybersecurity; –  Identify and prioritize opportunities for improvement within the context of a continuous and repeatable process; –  Assess progress toward the target state; –  Communicate among internal and external stakeholders about cybersecurity risk. –  The Framework is voluntary (for now) Legal  and  Regulatory  Framework  
  • 12. –  NIST Cybersecurity Framework NIST Unveils Cybersecurity Framework, http://www.klgates.com/nist-unveils-cybersecurity-framework-02-17-2014/ Legal  and  Regulatory  Framework  
  • 13. PRACTICAL  RISK  AND   EXPOSURE  
  • 14. •  Breach Notification Costs/Identity Monitoring •  Computer Forensics/PR Consulting •  Loss of Customers/Revenue •  Damaged Reputation/Brand •  Regulatory Actions/Fines/Penalties/Consumer Redress •  Lawsuits & Defense Costs •  Loss of “Crown Jewels” •  Business Interruption & Supply Chain Disruption •  Drop in Stock Price/Loss of Market Share •  Potential D&O Suits (Target) PracKcal  Risk  and  Exposure  
  • 15. WHAT  TO  DO  BEFORE  AN   INCIDENT?  
  • 16. 16 “[T]here are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.” Robert  S.  Mueller,  III,  Director,  Federal  Bureau  of  InvesKgaKon,  RSA  Cyber   Security  Conference  San  Francisco,  CA  (Mar.  1,  2012)  
  • 17. POTENTIAL  COVERAGE     UNDER  “LEGACY”  POLICIES    
  • 18. –  Directors’ and Officers’ (D&O) –  Errors and Omissions (E&O)/Professional Liability –  Employment Practices Liability (EPL) –  Fiduciary Liability –  Crime –  Retail Ventures, Inc. v. National Union Fire Ins. of Pittsburgh, Pa., 691 F.3d 821 (6th Cir. 2012) (DSW covered for expenses for customer communications, public relations, lawsuits, regulatory defense costs, and fines imposed by Visa and Mastercard under the computer fraud rider of its blanket crime policy) –  Property? –  Commercial General Liablity (CGL)? PotenKal  Coverage  Under   “Legacy”  Policies    
  • 19. –  Coverage B provides coverage for damages because of “personal and advertising injury” –  “Personal and Advertising Injury” is defined in part as injury arising out of “[o]ral or written publication, in any manner, of material that violates a person’s right of privacy” –  What is a “Person’s Right of Privacy”? –  What is a “Publication”? PotenKal  Coverage  Under   “Legacy”  Policies    
  • 20. LIMITATIONS  OF  “LEGACY”   INSURANCE  POLICIES  
  • 21.
  • 23. ISO states that “when this endorsement is attached, it will result in a reduction of coverage due to the deletion of an exception with respect to damages because of bodily injury arising out of loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data.”
  • 24.
  • 25.
  • 26.
  • 27. –  Zurich American Insurance Co. v. Sony Corp. of America et al.
  • 28. TECHNOLOGY  ERRORS  &   OMISSIONS  COVERAGE  
  • 29. –  Essen5al  for    a  provider  of  e-­‐commerce-­‐related  solu5ons   –  Covers     •  Errors  &  Omissions  in  the  Provision  of  Technology  Services   •  Failure  of  Technology  Products  to  Serve  Their  Purpose   –  But  there  are  limita5ons     •  Triggered  By  a  “Claim”  That  Alleges  An  Act  or  Omission   •  May  Exclude  Security  Beach  or  Unauthorized  Access  to  Informa5on   •  May  Not  Include  Breach  No5fica5on  Costs,  Which  is  Viewed  As  More  of  a  “First-­‐ Party”  Loss     Technology  E&O  Coverage  
  • 31. –  Privacy  And  Network  Security   –  Provides  coverage  for  liability  (defense  and  indemnity)  arising  out  of   data  breaches,  transmission  of  malicious  code,  denial  of  third-­‐party   access  to  the  insured’s  network,  and  other  network  security  threats   –  Regulatory  Liability   –  Provides  coverage  for  liability  arising  out  of  administra5ve  or   regulatory  proceedings,  fines  and  penal5es   –   Media  Liability   –  Provides  coverage  for  liability  (defense  and  indemnity)  for  claims   alleging  infringement  of  copyright  and  other  intellectual  property   rights  and  misappropria5on  of  ideas  or  media  content     Specialty  “Cyber”  Policies  –  Third   Party  
  • 32. –  Informa5on  Asset  Coverage     –  Coverage  for  damage  to  or  thee  of  the  insured’s  own  systems  and   hardware,  and  may  cover  the  cost  of  restoring  or  recrea5ng  stolen  or   corrupted  data.     –  Network  Interrup5on  And  Extra  Expense  (and  CBI)   –  Coverage  for  business  interrup5on  and  extra  expense  caused  by   malicious  code  ,  DDoS  aXacks,  unauthorized  access  to,  or  thee  of,   informa5on,  and  other  security  threats  to  networks.     –  Extor5on   –  Coverage  for  losses  resul5ng  from  extor5on  (payments  of  an   extor5onist’s  demand  to  prevent  network  loss  or  implementa5on  of   a  threat)     –  Crisis  Management     Specialty  “Cyber”  Policies  –  First   Party  
  • 33. HOW  TO  ENHANCE  “OFF-­‐THE-­‐ SHELF”  CYBER  INSURANCE   FORMS     THROUGH  NEGOTIATION  
  • 36.
  • 38.
  • 40.
  • 42.
  • 44.
  • 46.
  • 47. TIPS  For  A  Successful  Placement    §  Embrace a Team Approach §  Understand the Risk Profile §  Review Existing Coverages §  Purchase Cyber Coverage as Needed §  Remember the “Cyber” Misnomer §  Spotlight the “Cloud” §  Consider the Amount of Coverage §  Pay attention to the Retroactive Date and ERP §  Look at Defense and Settlement Provisions
  • 49. 49 “A well drafted policy will reduce the likelihood that an insurer will be able to avoid or limit insurance coverage in the event of a claim.” Roberta  D.  Anderson,  Partner,  K&L  Gates  LLP    (June  25,  2014)  
  • 50. A  WORD  ABOUT  VENDOR   CONTRACTS