Legal Reality of a Cyber Security Breach
-
Upload
surfwatch-labs -
Category
Technology
-
view
407 -
download
0
Transcript of Legal Reality of a Cyber Security Breach
![Page 1: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/1.jpg)
The Legal Reality of a Cyber Security Breach
![Page 2: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/2.jpg)
Today’s Speakers
2
Adam MeyerChief Security StrategistSurfWatch Labs
Eran KahanaSpecial CounselMaslon LLP
![Page 3: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/3.jpg)
Been Breached? Get Ready for Lawsuits
• Lawsuit alleges data breach at Trump International
• FTC can sue companies with poor information security
• Target Reaches Settlement with Banks
• Sony Settles Over Hack Attack
• Excellus Faces Breach-Related Lawsuit
• Ashley Madison Breach Triggers Lawsuits
• OPM Sued Again… This Time by a Judge
• Neiman Marcus ruling just made it easier to sue companies that get hacked
3
![Page 4: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/4.jpg)
Become Defendable in the Court Room
4
• Due diligence – what is reasonable care?
• Point-in-time checks are only good at that point in time!
“We believed we were doing things ahead of the industry.
We thought we were well-positioned.”
- Frank Blake, Chairman of Home Depot
![Page 5: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/5.jpg)
Cybercriminals are Targeting Your Information So Plan Accordingly
• What information of yours is valuable to a cybercriminal?
• What cyber defenses are in place to reduce risk?
• What checks are in place to ensure processes and tools are doing the job?
5
![Page 6: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/6.jpg)
Burying Your Head in the Sand is Not a Viable Defense
6
Common Responses that Fail in Defense Strategy• We didn’t know
• We don’t have the resources to address it
• We outsource our cybersecurity
![Page 7: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/7.jpg)
Your Information is Actively Being Sold on the Dark Web
7
![Page 8: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/8.jpg)
Cybersecurity is NOT an IT Problem; It’s a Business Problem
8
• Cyber attacks are #1 source of IP theft (Merrill Lynch)
• 86% of executives list major cyber concerns around M&A activity (Global Capital Confidence Barometer survey)
• Cybersecurity should be measured just like financials, sales, etc.
• Cyber threats must be tied to impact on business operations (IT, security, legal, fraud, risk management)
![Page 9: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/9.jpg)
Cybersecurity Accountability Rests with the C-Suite
9
“… boards that choose to ignore, or minimize, the importance of
cybersecurity oversight responsibility, do so at their own peril.”
- Luis A. Aguilar, SEC Commissioner
![Page 10: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/10.jpg)
The Same Old Cybersecurity Approach Puts You at Risk
10
• A point in time risk assessment is only useful AT THAT POINT IN TIME
• Cyber threats are dynamic
• Continuous outward-looking visibility and understanding is key to know what’s coming your way
• Business units must be tied in to properly manage cyber risk
![Page 11: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/11.jpg)
11
![Page 12: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/12.jpg)
SurfWatch Labs: Your All-in-One Threat Intelligence Solution
12
We Do the Heavy Lifting So You Can Run Your Business• Combination of Analytics, Products and
Human Experts Guide You to Make the Most Effective Security Decisions
• Tie Your Relevant, Critical Risks to the Impact on Your Business Operations (IT, Security, Legal, Fraud, Risk Management)
• Ensure Continuous Risk Monitoring of Traditional and Dark Web Threats to Your Business
• Receive Prioritized Threat Mitigation Best Practice Recommendations
![Page 13: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/13.jpg)
Q&A and Additional SurfWatch Labs Resources
Solution Information:
• SurfWatch Cyber Advisor info.surfwatchlabs.com/SurfWatch-Cyber-Advisor-Datasheet
• SurfWatch Cyber Advisor with Dark Webinfo.surfwatchlabs.com/dark-web-service-brochure
Sample Dark Web Intelligence Report:info.surfwatchlabs.com/dark-web-report
Request a Demonstration:info.surfwatchlabs.com/request-demo
Learn how to Tie Threat Intelligence to Your Business Risk
13
![Page 14: Legal Reality of a Cyber Security Breach](https://reader036.fdocuments.in/reader036/viewer/2022081513/587ad7641a28ab542b8b4769/html5/thumbnails/14.jpg)
Thank You!
www.surfwatchlabs.comFollow us at: