12
Data Security Concerns: Law Departments and Service Providers Panel Discussion

Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

Data Security Concerns: Law Departments and Service Providers

Panel Discussion

Page 2: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

August 18, 2014

Thank you for being here today!

Moderator:

Joseph Abrenio VP Advisory Services & General Counsel DeltaRisk

Panelists:

Brett Tarr Caesars Entertainment

Mike Russell Liberty Mutual Insurance

Page 3: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

• The Why is obvious… practical implications

• Audits – a false sense of security?

• Risk Assessments

• HIPPA & PCI

• Cloud Environments

• Q&A - takeaways

LEGAL DEPARTMENT CONCERNS “What’s keeping the GC up at night?”

We’ve all heard the horror stories; what should we be doing to avoid one of our own?

Page 4: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

Evolution of Cyber Threat

• We are using the Internet more

and more for everything

– Fileservers, information collaboration

• Adversaries are getting more

capable, but at a faster rate

• Corporate Risk Comprehension

does not increase as quickly

Document Malware

3rd Party SW Exploits

OS Exploits

Worms

Virus

Paper Typewriters

Phones Mainframes

Desktops

VoIP Virtualization

Cloud / Mobile

> 1940 Today

Technology & Complexity

Threat

Corporate Understanding of Risk

Stuxnet

Conficker

Target

TJ Maxx Countrywide

Sony RSA

Heartland Ameriprise

DoD Intrusions

Morris

APT

Cyber Crime

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

AOL

The Problem Is this GAP!

Page 5: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

The Rising Costs of Cyber Crime

US $

Time

2001 – 61M

2005 – 86M

2009 – 560M

2008 – 265M

KPMG

DOJ

2014 - 445B

McAfee

2011 – 250B (avg)

2000 – 265M

1999 – 123M

1998 – 136M

1997 – 100M

FBI

• Statistics are inconsistent • Highly variable methods of calculating

costs • Trend is Apparent

Page 6: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

Effective Security Operations Programs

• Building an effective security program requires an

executive agent to commit to two areas:

Strategy Operations

• Organize people, process and technology to meet threats

• Conduct monitoring, detection, analysis, and response activities

• Find and address vulnerabilities

• Meet compliance and regulatory requirements and standards

• Perform audit functions

• Develop organization-wide security strategy or framework

• Define relevant, current and emergent threats to business

• Understand current security operations and process maturity

• Define and implement needed levels of information asset protection

• Educate and inform executive / board level decision making

Page 7: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

The NIST Framework - Intent

• Framework for Improving Critical Infrastructure

Cybersecurity

– Despite the name, applicable to any organization or

business

• A voluntary, risk-based approach to manage

cybersecurity risk, in a cost-effective way, based on

business needs

• The framework is not regulation

– There is no compliance requirement

It’s about MANAGING RISKS and making APPROPRIATE

INVESTMENTS in cybersecurity efforts

What do you

do?

How well do you do it?

What do you need

to do?

Page 8: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

KEY SECURITY ISSUES TO CONSIDER

• Are law firms & vendors vetted for security?

– If so, who is responsible for managing this process?

– How are new vendor requests identified and communicated

to responsible party?

– What is the process for requesting/evaluating information

from vendors and law firms?

– Is there an established timeline SLA for approvals?

– What types of security issues need to be considered?

Page 9: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

For Organizations with Clients in Banking/Healthcare Industry

• What experience do you have dealing with highly confidential data, PII,

PCI, PHI ?

• What level of security vetting has been performed for any

subcontractors you have or plan to use?

• Does your organization manage/handle/store/process HIPAA/HITECH

related data

• Have you undertaken any specific efforts to comply with the new

regulations around HIPAA & HITECH?

• Is your organization considered a business associate?

• Have you undertaken efforts to achieve PCI Compliance?

Page 10: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

Personally Identifiable Information

• What special efforts are utilized to manage communication of PII?

• Data encryption in transit?

• Data encryption at rest?

• Secured email systems that password encrypt data

files/attachments?

• Limitations on sending key PII data (social security numbers, bank

account numbers) via regular email?

• Confidentiality agreements

• Conflict check/management

Page 11: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

We’ll now open it up…

Open Forum

Page 12: Data Security Concerns: Law Departments and Service Providersilta.personifycloud.com/webfiles/productfiles/2172142/...Mainframes Desktops VoIP Virtualization Cloud / Mobile > 1940

Thank You!

Please Complete your Session Evaluations – Feedback is a gift!