Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr,...

37
Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC Amy Stanphill, Eisenhower Medical Center Theodore Kobus, III, Baker Hostetler David Lewison, AmWINS Brokerage Group On The Cutting Edge! 28 th Annual Blue Ribbon Conference – May 4-8, 2014

Transcript of Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr,...

Page 1: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Cyber Security: Pre & Post BreachOliver Brew, Liberty International UnderwritersJohn Mullen, Sr, Lewis, Brisbois, Bisgaard & SmithCharles Beard, PwCAmy Stanphill, Eisenhower Medical Center Theodore Kobus, III, Baker HostetlerDavid Lewison, AmWINS Brokerage Group

On The Cutting Edge!

28th Annual Blue Ribbon Conference – May 4-8, 2014

Page 2: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Agenda

• Eisenhower Medical Center case study (45 mins)

• Short break (5 mins)

• Cyber security issues, pre-breach planning, issues and trends (70 minutes)

– Questions at end of each section

– 2 CE credits

Page 3: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Eisenhower Medical Center

• Case Study:– Incident Facts

– Claims and Coverage

– Incident Consequences

– Lessons Learned

– Recommendations

Page 4: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Eisenhower Medical Center

• Coachella Valley not-for-profit hospital

• High quality, compassionate care for over 40 years and accredited teaching hospital

• Main Campus in 130 acres within Rancho Mirage:– 476-bed hospital, Annenberg Center for Health Sciences

at Eisenhower

– Barbara Sinatra Children's Center at Eisenhower

– Outpatient facilities in Palm Springs, Cathedral City, Rancho Mirage and La Quinta

– Betty Ford Center

• Philanthropy and volunteerism allow EMC to fulfill its mission

Page 5: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

• Friday, March 11, 2011– Television and computer stolen from EMC

• Monday, March 14, 2011– Discovered when employee arrived at work after weekend

Page 6: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

• Is it a breach?

• Do you involve law enforcement?

• Do you hire a forensics company?

• Do you retain counsel?

• Do you involve regulatory agencies?

• Is crisis management necessary?

• Do you offer credit monitoring?

• Do you get relief from a “law enforcement” delay?

Page 7: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

• Immediate First Steps:– Investigation

– Law enforcement

– Insurance

– Outside counsel

– Forensics

– Crisis management

Page 8: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

• Investigation:– Computer was password protected, but not encrypted

– Computer contained limited patient index information used by EMC

– Information in index file included: patient names, ages, dates of birth, the last four digits of the Social Security number, and the hospital’s medical record numbers (MRNs)

– No medical records on the computer

– No financial or insurance information on the computer

Page 9: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

• Notification – March 30, 2011:– Over half a million patients affected

– Limited personal data

– Notified in less than 3 weeks from theft

– Credit monitoring Vendor

– Mailing and Call Center Vendor

– Media

– Substitute notice

– Agency notifications

Page 10: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

Page 11: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

Page 12: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

Page 13: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

• Post-notification:– Patient inquiries and concerns

– Public relations

– State and federal agency inquiries and investigation

– Litigation

– Internal policy and procedure review

Page 14: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

• Cost of response:– Forensics

– Notification costs

– Credit monitoring

– Call center

– Crisis response

– Legal fees

– Defense costs/settlement expenses

– Regulatory fines

Page 15: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

• Insurance implications

• Communications

• Proactive measures

15

Page 16: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

EMC Case Study

•Lessons learned:– Prepare and practice a

response plan

– Respond quickly

– Bring in the right team

– Preserve evidence

– Contain and remediate

– Let the forensics drive the decision making

– Law enforcement

– Document analysis

– Involve the C-Suite• Be guarded, consistent,

and honest in communications

– Plan for likely reaction of customers, employees and key stakeholders

– Mitigate harm

Page 17: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Short Break

Page 18: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Facebook funding…

18

Page 19: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

19

Topics

• Brief history

• Scope of data

• Internal and external threats

• Regulatory issues

• Litigation trends

• Practical tips

• Future gazing

Page 20: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

A brief history

20

Then…

1998

And now… 2014

Percentage of developed world

using internet17% 77%77%

Data storage cost

$60/GB 5₵/GB5₵/GB

Number of Smart phones

0 1.5 billion1.5 billion

Page 21: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

21

Insurance history lesson

• 1997: First ‘internet liability’ policy written

• 1999: Y2K catalyst to focus on technology risk

• 1999 – 2002: Dot-com bubble - first phase growth

• 2003: CA 1386 (first notification law)

• 2005 – 2010: Breaches on the rise and increasing regulation

– 2007: TJX breach

– 2009: Heartland Payment Systems

• 2013: HIPAA final rule

• Compared to auto insurance…?

Page 22: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Data breach history

22

*Only Depicting Events with losses >30K Records

Total Cyber Events and Records Breached* (2004 – 2013)

450m!

Number of events Record count

Page 23: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Range of industries impacted

23

Cyber Events By Industry (2009 – 2014) *US Companies only

Healthcare

Financial services

Education

Government

Page 24: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

What information is at risk?

•Personally identifiable information (PII)– email addresses, zip codes, phone numbers?

•Protected Health Information (PHI)

•Payment Card Industry (PCI) information

Page 25: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Threat landscape

• Internal threats: employee risk (malicious / inadvertent)

• External threats

• Regulatory regime

• Litigation on the increase

Page 26: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Internal threats

• Employee SNAFUs – 65% of data breaches due to lost paper files and devices*

• Malicious intent

• Poor practices

*Society of Corporate Compliance and Ethics (SCCE) and the Health Care Compliance Association (HCCA) survey Nov 2013

Page 27: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Hacking: the glamorous threat

• Hacktivism - Anonymous

• Organized financial crime

• “Just because I can”

• State sponsored…?

27

Page 28: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Why the concern?

• Costs: Breach response

• Reputation: 76% of potential victims will close account with an organization if a breach occurs– 65% would publicly expose a company for failure to

safeguard information

• Litigation: 53% would be willing to sue

Source: Unisys Security Index, Lieberman Researcher Group & Newspoll

Page 29: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

State Regulations: notice

•46+ states require notice to customers– Required time to notice: most expedient manner

possible (no later than 45 days in FL, OH, and WI)

• Affirmative state laws (e.g. NV, MA)

• Issues: competing definitions of “Breach”and other terms

Page 30: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Other regulations

• HIPAA / HITECH is 2009 expansion of Health Insurance Portability and Accountability Act (HIPAA)– Notice within 60 days when PHI is breached

– Requires notice to Secretary of HHS (within 60 days if breach involves 500 or more)

– Allows State AGs to bring civil actions for HIPAA violations including failure to notice

• PCI DSS – contractually driven obligations from card brands

Page 31: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Litigation trends

Injury and Standing

•Tri-West, Starbucks, Hannaford

Injury and Standing

•FTC v Wyndham

•Curry v AvMed

Page 32: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Prevention and preparation

“We’ve spent over 12 years building our reputation, brand, and trust with our customers. It’s painful to see us take so many steps back due to a single incident.”

-Zappos CEO Tony Hsieh

“Everyone has a plan… until they get punched in the face”

- Mike Tyson

Page 33: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Safeguard controls

•People: proper security budget and vigilance

•Processes: ISO27002, HITECH ready; employee education and training; written management processes; breach response plan

•Technology: firewalls; intrusion detection software; hardened and patched servers (tested); encryption of PII

Page 34: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Practical issues on data risk

•Education and culture

•Handheld devices - BYOD

•Data hygiene (e.g passwords)

•Effective encryption

Page 35: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

Practical issues on data risk

• Mock breaches – aka “tabletop exercises”

• Limit online access to data storage servers

• Destruction of hard drives to remove all PII

Page 36: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Proprietary and Confidential

The future

• $5Bn market before 2020*

• Continued expansion of buyers

• Market consolidation:– Specialists

– Everyone else offering add-on

• IT risk integrated as part of enterprise risk management

• Network risk only increasing

*Advisen Research

*Advisen research

Page 37: Cyber Security: Pre & Post Breach Oliver Brew, Liberty International Underwriters John Mullen, Sr, Lewis, Brisbois, Bisgaard & Smith Charles Beard, PwC.

Thank You!

Oliver Brew, [email protected] Mullen, Sr, [email protected] Charles Beard, [email protected] Amy Stanphill, [email protected] Kobus, III, [email protected] David Lewison, [email protected]

Questions?

28th Annual Blue Ribbon Conference – May 4-8, 2014