BreachExchange mailing list archives
No More Narrow Focus: Is 2016 the Year of Cyber-Risk?
From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Tue, 12 Jan 2016 19:25:35 -0700
http://www.law.com/sites/articles/2016/01/11/no-more-narrow-focus-is-2016-the-year-of-cyber-risk/?slreturn=20160012120000 As 2015 came to a close , cybersecurity topped the news. Terrorist attacks in Paris and California fueled the debate over whether law enforcement ought to be given access to encrypted communication. Data breaches also continued to impact companies and government agencies throughout the year. Cybersecurity promises to remain a major risk for all organizations in 2016. “We’ll likely see continued massive data breaches, unfortunately, as companies, governments, and other organizations holding data continue to lag behind hackers and identity thieves in both technologies and good practices,” Joe ‘Chip’ Pitts III, a lecturer at Stanford Law School and former chief legal officer at Nokia, says to Legaltech News about his predictions for 2016. Yet despite all the talk of “how quickly things are changing” in the cybersecurity arena for companies, “things really aren’t moving that fast,” says Matthew F. Prewitt, an attorney at Schiff Hardin. “The more talk about how things are going to change, the more things stay the same.” Pitts agrees, saying, “Boards of directors and C-suites have been taking greater cognizance of these issues, but understanding the nature of the risk remains deficient, as do the required cybersecurity measures to manage the risk.” The Business Case Breaches are impacting many companies. Some 31 percent of in-house counsel said in 2015 that either their current or former company has experienced a data breach, according to a study from the Association of Corporate Counsel (ACC). However, what is emerging on cybersecurity is how businesses are moving away from the “very narrow focus” on personal privacy and data breaches, which are “headline grabbing,” to broader issues such as the impact on the protection of business assets and intellectual property, Prewitt says. But what will be the impact if a company loses a plan for the launch of a flagship product two years before a launch? It may be “much harder” to bounce back from that kind of cyber theft, Prewitt says. There is also a concern that business operations can be disrupted after cyber attacks, and there can also be a significant loss of revenue. On the federal level, despite a challenge from Wyndham Worldwide Corp. that the Federal Trade Commission (FTC) did not have the authority to go after companies which did not sufficiently protect consumer information, the U.S. Court of Appeals for the Third Circuit sided with the FTC and validated the commission’s enforcement authority (more on this case can be found on page 36). Another noteworthy case in 2015 was a ruling from the 7th Circuit involving a large data breach at Neiman Marcus. Remijas et al. v. The Neiman Marcus Group addressed the issue of standing and whether customers impacted by the data breach are likely to be injured despite that they did not yet experience identity theft or other kinds of fraud. But there is an “‘objectively reasonable likelihood’ that such an injury will occur,” Judge Diane Wood wrote in the appellate ruling. That decision could make it “likely to see a lot more litigation in the future,” says Allison J. Bender, an attorney at Hogan Lovells who formerly worked at the Department of Homeland Security. Looking at the state level, there could be some cases related to cybersecurity coming from appeals courts in states, if cases are brought regarding negligence and the fiduciary duties of company boards. Prewitt says the issue could be seen in such states as Delaware, California, Massachusetts and New York. In the meantime, Prewitt advises general counsel to expect “in the future your company’s current level of cybersecurity is going to be second-guessed by persons you cannot currently anticipate by issues you don’t expect.” That means regulators or plaintiffs can challenge companies on cybersecurity issues. Therefore, responsible companies need to evaluate, investigate and make diligent efforts to understand what they should be doing on cybersecurity, Prewitt adds. Into the Future However, there may be some new wrinkles in 2016. Billions of more products will be able to communicate among each other as part of the Internet of Things “with the net result of burgeoning cybersecurity risks from this new segment,” Pitts says. In addition, because of the increasing popularity of the cloud, even small companies are likely using the cloud now for systems such as human resources or accounting “one way or another,” says Michael R. Overly, an attorney with Foley & Lardner. “It’s incredibly hard to avoid it.” But be forewarned: in contracts cloud providers “are not going to assume much in the way of responsibility” if there is a breach, he adds. Looking ahead, doxing, which is the hacking of computers followed by the publishing of documents in order to embarrass the target, “is on the rise,” Pitts says. Previous examples took place at Sony and Ashley Madison, and there were additional instances involving celebrities who stored sensitive photos, and even CIA Director John Brennan, according to Prewitt. “We can expect it to increase further in the U.S. during [2016],” Pitts says, pointing out that the risk is higher especially because it is a Presidential election year. There also is likely to be more pressure on tech companies to provide “back doors” so law enforcement officers can unravel encrypted communications. “We’re seeing stepped-up support at the moment for private and government hacking and computer network and product backdoors in government bills and laws, but as the immediate aftermath of the Paris and San Bernardino attacks fades more reasoned and deliberate approaches will again assert themselves,” Pitts says. He warns that “adding vulnerabilities and backdoors to technology networks and products threatens to expose all of us to greater hacking, identity theft, privacy violations and other tangible as well as intangible harms on the misguided theory that allowing government access will somehow fail to also allow access by terrorists and cyber-criminals and prevent determined terrorists from communicating securely with each other as they plan attacks.” Course of Action When it comes to the NIST Cybersecurity Framework—which was released 2014—Bender says it is “likely to continue to have major influence on how companies are assessing and organizing their cybersecurity.” She describes it as being a “very flexible” framework which draws on existing standards and best practices. But critics argue the NIST framework is of limited value. Prewitt points out the NIST framework is “vague by design.” A new version of the framework may be proposed in the near future. In fact, in December the NIST published a request in the Federal Register for feedback on how the framework “is being used to improve cybersecurity risk management, how best practices for using the framework are being shared, the relative value of different parts of the framework, the possible need for an update of the framework, and options for the long-term governance of the framework.” As for now, Bender recommends companies respond appropriately to cyber-risks by: - Spending time assessing a company’s current cybersecurity program and involve a counsel to have attorney-client privilege; - If there is a data breach, make sure the first call is to an attorney; - Adequately invest time and resources to be “responsible cybersecurity citizens”; and - Have drills and policies in place proactively before a data breach takes place. Companies need to continue to be proactive in 2016 and prepare for whatever cyberattacks that are directed at them. Otherwise, they are more legally and technologically vulnerable than their well-prepared peers.
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) Need access to data breach details or alerts when new breaches happen? Risk Based Security's Cyber Risk Analytics portal, fueled by the RBS breach research team, provides detailed information on how data breaches occur and which vendors to trust. Contact us today for a demo.
Current thread:
- No More Narrow Focus: Is 2016 the Year of Cyber-Risk? Audrey McNeil (Jan 13)