17
Managing Enterprise Risks in a Digital World 2019 BakerHostetler Data Security Incident Response Report April 16, 2019 Lynn Sessions | [email protected] | 713.646.1352 Craig Hoffman | [email protected] | 513.929.3491 Paul Karlsgodt | [email protected] | 303.764.4013

Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM

Managing Enterprise Risks in a Digital World

2019 BakerHostetler Data Security Incident Response Report

April 16, 2019

Lynn Sessions | [email protected] | 713.646.1352Craig Hoffman | [email protected] | 513.929.3491Paul Karlsgodt | [email protected] | 303.764.4013

Page 2: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM

BakerHostetler

2019 Key Findings• Please enable MFA!• How big is the cloud?• Incidents will not go away• Basic hygiene• Get ahead of the compliance curve• Use “compromise threat intelligence”• Focus on effective cybersecurity• Phishing is remarkably effective• Digital risk management requires an enterprise approach• Do M&A due diligence• GDPR has changed the incident response game• Regulators are working together and on their own• Class actions arising from data breaches or that allege violations of

privacy laws continue

Page 3: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM
Page 4: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM
Page 5: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM
Page 6: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM
Page 7: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM
Page 8: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM
Page 9: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM
Page 10: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM

Ransomware

• Commodity

• More problematicTrickbot to Emotet to RyukAccess, lateral movement, delete backupfiles, deploy Ryuk, wait to be contacted,and then demand large ransom

Page 11: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM

95 Days 10 Days 36 Days 50 Days

Network Intrusion Timeline

Page 12: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM
Page 13: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM

Forensic Investigations

BakerHostetler

Page 14: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM

Regulatory Enforcement Trends• Timing• Risk assessments• Security practices• Remedial measures

Page 15: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM

Litigation

Data Breach Litigation• Lost/stolen device litigation ending, network

intrusions now predominant underlying issue• No decisions on class certification in 2018, one early

in 2019• Increase in shareholder derivative actions

Privacy Statute Litigation• BIPA• Impact of CCPA?

Page 16: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM

Compromise ReadyKnow your environmentThreat information gatheringTechnology – preventative & detectivePersonnel – awareness & trainingSecurity assessments

Identify assets and sensitive dataImplement reasonable safeguardsIncrease detection capabilities

Vendor managementRegulatory complianceGet involved in acquisitionsConduct tabletop exercises Cyber liability insuranceOngoing diligence and oversight

BakerHostetler

“Compromise Response Intelligence”• Look at incidents that affected similar

entities and the outcomes• Do you face the same risk?

Page 17: Managing Enterprise Risks in a Digital World 2019 ... · 4/16/2019  · PowerPoint Presentation Author: Hoffman, Craig A. Created Date: 4/16/2019 3:25:15 PM

Post-Incident

• Conduct lessons-learned session to evaluate IR approach – start with in-person meeting

• Evaluate containment action items and determine if any short-term or longer-term enhancements are warranted based on what occurred

• Leverage the “window”• Work to move security from technical silo to an enterprise

risk addressed by the enterprise – integration of disciplines to address “digital risks”