40
The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance Forum The Metropolitan Club of Chicago September 26, 2019 REUTERS / Firstname Lastname

The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

The Internet of Things (IoT) and Cybersecurity:

Is Your Phone Hacking Your Company?

The 2019 Corporate Risk, Ethics & Compliance Forum

The Metropolitan Club of Chicago

September 26, 2019

REUTERS / Firstname Lastname

Page 2: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Panelists:

Akin Akinbosoye, Director of Cybersecurity, MxD

Christina Ayiotis, Vice President, Renaissance Information Governance and Privacy, OCC

Matthew Baciak, Counsel, Global Privacy, Hyatt Hotels Corporation

Moderator:

Joseph Raczynski, Technologist, Large & Medium Law Firms, Thomson Reuters

The Internet of Things (IoT) and Cybersecurity:

Is Your Phone Hacking Your Company?

Page 3: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Introduction to Discussion

Page 4: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance
Page 5: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

5 Edit presentation title on Slide Master using Insert > Header & Footer

2-column content with subhead slide

Hackers built proof-of-concept malware

that can spread from turbine to turbine

to paralyze or damage them…

Using a $5 Raspberry Pi

Page 6: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

6 Edit presentation title on Slide Master using Insert > Header & Footer

How a Bug in an Obscure Chip Exposed a Billion

Smartphones to Hackers…

Page 7: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

When IoT Attacks…When IoT Attacks…

Page 8: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

8 Edit presentation title on Slide Master using Insert > Header & Footer

Chinese hackers cracked into a Tesla by having it

connect to a rouge WiFi connection and were able

to disable its brakes. Later they found a way to do

the same with its cell chipset…

Page 9: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

What is Security Worth to You?

30 % Filled Out The Survey 70 % Filled Out The Survey

Rob May - TEDx

Page 10: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

CASE STUDY

How One of the World’s Largest Law Firms Was Paralyzed by Petya…

– If it can happen to them, it can happen to anyone.

Jonathan Crowe – Barkley Blog

Page 11: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Victim

@joerazz

Page 12: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Tuesday June 27, 2017• 5:48am: Reports of a major cyber attack

first reported targeting companies primarily in Ukraine.

• 6am: ”The Firm’s” Madrid office experiences signs of infection and is immediately locked down.

• 7:37am: ”The Firm’s” phone lines are reported down.

• 7:55am: The firm’s web portal, used to access sensitive documents, is reported down, as well.

• Tuesday morning: Firm employees are instructed via text message alert system not to start their computers or connect to the Firm network.

It begins…

@joerazz

Page 13: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Tuesday June 27, 2017

• 9:36am: “The Firm” issues a statement confirming suspicious activity was detected on its network that appears to be related to Petyaoutbreak, says IT team acted quickly to prevent the spread.

• 10am: Photo of a whiteboard outside the firm’s D.C. office alerting firm employees the network is down and not to turn on computers is posted on Twitter.

• Tuesday afternoon: Firm employees are instructed via text to continue to work as much as possible with limited firm technology and to leave the office at 3pm with permission.

Page 14: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Wednesday, June 28 (+1 day following attack)

• 6:42am: Firm issues second statement announcing it is working closely with leading external forensic experts and relevant authorities, including the FBI.

• Wednesday morning: Firm employees notified via text alert system that offices are open, phones are operational, and email should be back up and running within hours.

• Wednesday evening: Firm employees notified via text progress has been slower than expected, and document management and email systems are expected to be functioning by Thursday morning.

@joerazz

Page 15: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Monday, July 3 (+6 days following attack)

• 1am: Six days following the attack, the firm

announces email has been restored, but

other systems are still in the process of being

brought back online. It also confirms no

evidence suggests client data had been

exfiltrated or compromised, though

investigation is still ongoing.

@joerazz

Page 16: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Thursday, July 6 (+9 days following attack)

• Thursday morning: Sources briefed

on the firm's recovery indicate that

while email has been restored, the firm

has yet to regain complete access to

emails sent or received before the

attack, and that some staff are still

unable to access documents directly.

• Thursday afternoon: The firm issues

another statement acknowledging

bringing all systems back online may

take time, but that offices are open

and the firm is advising clients.

@joerazz

Page 17: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Monday, July 10 (+13 days following attack)

• 4:35am: Firm issues another

statement thanking clients and partners for

their patience and acknowledging that while

email and other tools central to client

services are safely back online, other major

systems are still being restored.

@joerazz

Page 18: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Lessons Learned

1. Attack Prevention – “The Firm” acted quickly but detection is not the primary key

2. Everyone Has A Plan – Before the attack “The Firm” had published "9 things you should know to protect your company from the next attack“

3. No Firm Is Immune – “The Firm” was rated as a very good when it came to cybersecurity plan

@joerazz

Page 19: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Other Lessons

• Do you have phone numbers of your vendors personal contacts?

• Do you have an offline inventory of all logins and passwords?

• Do you have personal email addresses and cell phones of all employees?

• Have you completed a fire drill?

@joerazz

Page 20: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Discussion

Page 21: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

21

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Yes, your office copy machine, microwave and coffee maker could lead to a data

breach. Once upon a time, wireless networks were utilized solely by computers.

Today, however, wireless networks are utilized by computers, smartphones and

other technologies that can transmit and receive seemingly limitless amounts of

data—an attractive opportunity for cyber-criminals.

This panel closely examines:

• Weak spots or vulnerabilities within the Internet of Things (IoT);

• The importance of establishing training and policy guidelines for employees and IT

personnel;

• The role of both corporate and outside counsel in protecting a company’s data, digital

assets and intelligence;

• Developing an effective data breach incident response plan; and

• Essential insurance considerations.

Page 22: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

The Big Picture: A Truly Global Internet

• F-Secure Attack Landscape H12019 https://s3-eu-central-1.amazonaws.com/evermade-fsecure-assets/wp-content/uploads/2019/09/12093807/2019_attack_landscape_report.pdf

• “ . . internet of things (IoT) device insecurity has emerged as a top concern and top driver of internet attack traffic in the first half of 2019 . . .largest share of attack traffic, 760 million events, was measured on the Telnet protocol . . .malware found in the honeypots was dominated by various versions of Mirai, which infects IoT devices that use default credentials and co-opts those devices into botnets that conduct DDoS attacks.” Melissa Michael, Attack Landscape H1 2019: IoT, SMB traffic abound F-Secure Blog (September 19, 2019) https://blog.f-secure.com/attack-landscape-h1-2019-iot-smb-traffic-abound/

• India most attacked nation in the IoT space in second quarter of 2019

• Cyberattacks grew 22% on India’s IoT deployments in Q2 (August 9, 2019) https://economictimes.indiatimes.com/tech/internet/cyberattacks-grew-22-on-indias-iot-deployments-in-q2/articleshow/70606639.cms?utm_source%3Dtwitter_web%26utm_medium%3Dsocial%26utm_campaign%3Dsocialsharebuttons

Page 23: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

23 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

The Big Picture: A Truly Global Internet

• The ADVERSARY is not just your friendly neighborhood cyber/criminal (Nation State

actors; Terrorists, etc.)

• Microsoft has been tracking hackers (Strontium, Fancy Bear, APT28) linked to Russian

spy agencies who use internet-connected phones and printers to break into corporate

networks Patrick Howell O’Neill, Russian hackers are infiltrating companies via the

office printer MIT Technology Review (August 5, 2019)

https://www.technologyreview.com/f/614062/russian-hackers-fancy-bear-strontium-

infiltrate-iot-networks-microsoft-report/

• Got access because IoT devices deployed with default passwords or because latest security

update was not applied

• Hackers move “from one device to another, establishing persistence and mapping the network”

Page 24: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

24 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

The Big Picture: A Truly Global Internet

• The ADVERSARY is not just your friendly neighborhood cyber/criminal (Nation State actors; Terrorists, etc.)

• “ . . .critics speculate that the Chinese firm could incorporate technology into the cars that would allow CRRC – and the Chinese government – to track the faces, movement, conversations or phone calls of passengers through the train’s cameras or Wi-Fi. . . risks of giving a Chinese company the ability to monitor or control American infrastructure could not be understated given recent laws requiring Chinese companies to turn data to Beijing upon request.” Ana Swanson, Fearing ‘Spy Trains,’ Congress May Ban a Chinese Maker of Subway Cars (September 15, 2019) THE NEW YORK TIMES https://www.nytimes.com/2019/09/14/business/chinese-train-national-security.html?action=click&module=Top%20Stories&pgtype=Homepage

($100 Million new factory in Chicago built by a Chinese state-owned company)

• UK National Cyber Security Centre, Weekly Threat Report 13th September 2019 https://www.ncsc.gov.uk/report/weekly-threat-report-13th-september-2019

• More than a million IoT radio devices affected by backdoor vulnerability – Telestar Digital GmbH

Page 25: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

25 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company? IoT Security Laws

UK

• Department for Digital, Culture, Media & Sport, The Government’s Code of Practice for Consumer Internet of Things (IoT) Security for manufacturers, with guidance for consumers on smart devices at home (Last updated June 6, 2019) https://www.gov.uk/government/collections/secure-by-design

US - PASSED (California and Oregon laws to take effect January 1, 2020)

• Oregon- H.B. 2395: Relating to security measures required for devices that connect to the Internet; creating new provisions; and amending ORS 646.607https://olis.leg.state.or.us/liz/2019R1/Downloads/MeasureDocument/HB2395/Enrolled

• Requires manufacturers of “connected devices” to equip them with “reasonable security features”

• California- SB-327 Information privacy: connected devices (September 2018)—Security of Connected Devices https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180SB327

US - PROPOSED

• Illinois- H.B. 3391 Security of Connected Devices Act http://www.ilga.gov/legislation/BillStatus.asp?DocNum=3391&GAID=15&DocTypeID=HB&LegId=119982&SessionID=108&GA=101

• Maryland- (S. 553/H.B. 1276) Security Feature for Connected Devices – Requirements, Procurement Preferences, and Reports http://mgaleg.maryland.gov/webmga/frmMain.aspx?id=hb1276&stab=01&pid=billpage&tab=subject3&ys=2019RS

Page 26: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

26 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Federal Activity Regarding IoT Security

• Proposed Securing Internet of Things Cybersecurity Improvement Act of 2019

• Congressional Budget Office (September 13, 2019) transmitted a cost estimate

https://www.cbo.gov/publication/55625

• Proposed? Securing the Internet of Things Act of 2017

• Cybersecurity standards for certain radio frequency equipment https://www.congress.gov/bill/115th-

congress/house-bill/1324/text

• Proposed Cyber Shield Act of 2017 https://www.govtrack.us/congress/bills/115/hr4163

• Proposed State of Modern Application, Research, and Trends of IoT Act or the SMART

IoT Act https://www.congress.gov/bill/115th-congress/house-bill/6032

Page 27: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

27 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Federal Activity Regarding IoT Security

• U.S. Consumer Product Safety Commission

• A FRAMEWORK OF SAFETY for the Internet of Things: Considerations for Consumer

Product Safety (January 2019) https://www.cpsc.gov/s3fs-

public/A_Framework_for_Safety_Across_the_Internet_of_Things_1-31-

2019_0.pdf?1KJ.t4Tn04v9OtEBr2s0wyLAP.KsuuQ3

• “Ensure transparency in data collection, data sharing, and data use so that consumers can make

informed decisions about their own data and potential risks that may arise from the repurposing of that

data. Ensure clear privacy policy statements.”

• “Products worn on or in the body (‘wearables’ or implants)– Address information security and privacy . .

.Address risks of defects, flaws, vulnerabilities, malfunctions, performance manipulation of the product . .

. leading to potential criminalization/weaponization.”

Page 28: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

28 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company? NIST June 2019 Considerations for Managing Internet of Things (IoT) Cybersecurity and

Privacy Risks (NISTIR 8228) https://csrc.nist.gov/publications/detail/nistir/8228/final

• ” . . . expanding collection of diverse technologies that interact with the physical

world”

• “ . . . convergence of cloud computing, mobile computing, embedded systems, big

data, low-price hardware, and other technological advances”

• Differences between managing IoT vs. Conventional IT devices

• IoT devices interact with physical world differently

• Many IoT devices cannot be accessed, managed, or monitored in the same way

• The availability, efficiency, and effectiveness of cybersecurity and privacy capabilities

are often different

Page 29: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

29 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company? NIST June 2019 Considerations for Managing Internet of Things (IoT) Cybersecurity and

Privacy Risks (NISTIR 8228) https://csrc.nist.gov/publications/detail/nistir/8228/final

• High-level risk mitigation strategies

• Protecting Device Security

• Asset Management, Vulnerability Management, Access Management, Device Security

Incident Detection

• Protecting Data Security

• Data Protection, Data Security Incident Detection

• Protecting Individuals’ Privacy

• Information Flow Management, PII Processing Permissions Management, Informed Decision

Making, Disassociated Data Management, Privacy Breach Detection

Page 30: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

30 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company? The convergence of IT, OT, and Managing Cyber Risk

• Zero Days-- 2016 Alex Gibney documentary about Stuxnet

• Ghost Fleet– 2015 P.W. Singer & August Cole novel

Detecting and Protecting Against Data Integrity Attacks in Industrial Control Systems Environments: Cybersecurity for the Manufacturing Sector

• The National Cybersecurity Center of Excellence released a June 2019 DRAFT (Public comment closed July 25, 2019)

• NCCoE will leverage NIST Engineering Laboratory “to provide a comprehensive approach that manufacturing organizations can use to address the challenge of protecting ICS against data integrity attacks by leveraging . . . behavioral anomaly detection, security incident and event monitoring, ICS application whitelisting, malware detection and mitigation, change control management, user authentication and authorization, access control least privilege, and file-integrity checking mechanisms” [EMPHASIS ADDED]

Page 31: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

31 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Industry 4.0

Good Practices for Security of Internet of Things in the context of Smart Manufacturing—

November 2018 ENISA Report https://www.enisa.europa.eu/publications/good-

practices-for-security-of-iot

– Smart Manufacturing defined as “next-generation industrial manufacturing processes

and systems built on emerging information and communication technologies in line with

Industry 4.0, such as additive manufacturing, advanced analytics and IT/OT integration”

• Other technologies that benefit Industry 4.0 and Smart Manufacturing include: IIoT end devices,

machine-to-machine (M2M) communication, big data analytics, advanced robotics, artificial

intelligence (AI), machine learning (ML), predictive maintenance, real time monitoring, advanced

loss analytics, cloud computing, additive manufacturing, and augmented reality

Industry 4.0 – Cybersecurity Challenges and Recommendations– May 2019 ENISA Paper

https://www.enisa.europa.eu/publications/industry-4-0-cybersecurity-challenges-and-

recommendations

Page 32: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

32 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Why Should Lawyers Care?

• Organization may have a duty to protect certain information types and that will include

understanding security threats and mitigating them

• Lawyers themselves have ethical obligations to keep their Clients’ Confidences so must

understand how this new technological capability impacts ability to protect the

confidentiality and integrity of data

• Protecting privacy means understanding the data flows of the devices and architecting

business process (and protections) to ensure privacy requirements are met

• Effectively being able to manage and assess corporate risk, protecting privilege, and

ensuring containment and remediation occur properly during a security incedent/breach

necessitates having an incident response plan and communication structure with legal

playing a central role.

Page 33: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

33 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Why Should Lawyers Care?

American Bar Association Standing Committee on Ethics and Professional

Responsibility, Formal Opinion 477 Securing Communication of Protected Client

Information (May 11, 2017)

https://www.americanbar.org/content/dam/aba/administrative/law_national_security

/ABA%20Formal%20Opinion%20477.authcheckdam.pdf

– Understanding the nature of the threat . . .proprietary information in highly sensitive industries such as

industrial designs, mergers and acquisitions or trade secrets, and industries like healthcare, banking,

defense or education, may present a higher risk of data theft . . . Every access point is a potential entry

point for a data loss or disclosure . . . Each access point, and each device, should be evaluated for

security compliance.

– A lawyer generally may transmit information relating to the representation of a client over the Internet

without violating the Model Rules of Professional Conduct where the lawyer has undertaken reasonable

efforts to prevent inadvertent or unauthorized access.

Page 34: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

34 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Why Should Lawyers Care?

American Bar Association Standing Committee on Ethics and Professional

Responsibility, Formal Opinion 483 Lawyers’ Obligations After an Electronic Data

Breach or Cyberattack (October 17, 2018)

https://www.americanbar.org/content/dam/aba/administrative/professional_responsi

bility/aba_formal_op_483.pdf

– Even lawyers who, (i) under Model Rule 1.6(c), make “reasonable efforts to prevent the . . . unauthorized

disclosure of, or unauthorized access to, information relating to the representation of a client,” (ii) under

Model Rule 1.1, stay abreast of changes in technology, and (iii) under Model Rules 5.1 and 5.3, properly

supervise other lawyers and third-party electronic-information storage vendors, may suffer a data

breach. When they do, they have a duty to notify clients of the data breach under Model Rule 1.4 in

sufficient detail to keep clients “reasonably informed” and with an explanation “to the extent necessary to

permit the client to make informed decisions regarding the representation.”

Page 35: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

35 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

• American Bar Association Model Rule 1.1 Competence:

• Comment [8]

• To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. (EMPHASIS ADDED)https://www.americanbar.org/groups/professional_responsibility/publications/model_rules_of_professional_conduct/rule_1_1_competence/comment_on_rule_1_1/

• American Bar Association Model Rule 1.6 Confidentiality of Information:

• Comment [18]

• . . requires a lawyer to act competently to safeguard information relating to the representation of a client against unauthorized access by third parties . . . reasonableness of lawyers efforts . . . sensitivity of information . . . the cost of employing additional safeguards . . . (EMPHASIS ADDED)https://www.americanbar.org/groups/professional_responsibility/publications/model_rules_of_professional_conduct/rule_1_6_confidentiality_of_information/comment_on_rule_1_6/

Page 36: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

36 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Lawyers and Incident Response Plan

• In order to have an accurate risk assessment, reviews happen at functional and leadership levels.

o Legal should be involved at each level to provide 1. legal risk assessment, and 2. help “manage” competing interests

• Legal should designate an incident response coordinator who manages incidents

o Helps preserve privilege

o Assists in the management of communication streams

▪ What gets communicated and to whom

o Should be involved in each functional assessment

▪ Let technical teams perform their analysis but assist and guide as necessary – narrow scope as needed

▪ Technical knowledge is preferred but not necessary

▪ Need to understand both business and technical impacts by having detailed operational knowledge and comprehension of threat landscape.

Page 37: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

37 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Insurance Companies and IoT

• HOW INSURANCE COMPANIES ENGAGE IN THE INTERNET OF THINGS McKinsey & Company, Digital ecosystems for insurers: Opportunities through the Internet of Things (February 2019) https://www.mckinsey.com/industries/financial-services/our-insights/digital-ecosystems-for-insurers-opportunities-through-the-internet-of-things

• Four attractive and relevant digital ecosystems: Mobility/Connected Car; Smart Housing; Connected Health; and Commercial Lines (product innovation, distribution excellence, risk prevention . . supplier network management)

• INSURANCE—NOT JUST FOR COMPANIES Swiss Reinsurance Company Ltd, Personal cyber insurance: Protecting our digital lives (2019) https://www.swissre.com/dam/jcr:68e4d8fb-509c-4182-a219-c803f7d23af1/ZRH-18-00632-P1_Personal_cyber_insurance_Publication_WEB.pdf

• “ . . predicted that by 2030 there will be around 125 billion IoT devices globally, which represents a huge potential for cyberattacks . . .From identity theft, to hacking of subscription services and IoT home devices, the list of cyber risks people, and not just organisations, are facing is growing all the time as the cyber threat landscape metastasizes rapidly.”

Page 38: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

38 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Insurance Coverage Considerations

• Kelly A. Williams, The Future Is Here: The Internet of Things and the Law HOUSTON HARBAUGH https://www.hh-law.com/Articles/Insurance-Coverage-and-Bad-Faith-Articles/The-Future-Is-Here-The-Internet-Of-Things-And-The-Law.shtml

• “The IoT also raises a variety of insurance coverage issues . .whether a defective product claim arising from the IoT will qualify as an ‘occurrence’ . . the ‘products-completed operations hazard’ exclusion applies for liabilities arising from ‘work that has not yet been completed or abandoned.’ This begs the question of whether an IoT product is ever complete if it requires updates.”

• Catherine Serafin, A Policyholder’s Guide to IoT Claims Coverage RISK MANAGEMENT (February 2018) http://www.rmmagazine.com/2018/02/01/a-policyholders-guide-to-iot-claims-coverage/

• Tyler Gerking & David Smith, Are You Covered for California’s New IoT Laws? POLICYHOLDER PERSPECTIVE: Insights and Issues in Commercial Insurance Coverage (January 2019) https://www.farellacoveragelaw.com/2019/01/covered-californias-new-iot-laws.html/

Page 39: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

39 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Insurance Coverage Considerations

• Luke M. Schwenke, Insuring Against Unknown Cyber Attacks in the Age of IoT JOURNAL OF REINSURANCE 2019 Volume 26, Number 1 https://www.wm.edu/as/charlescenter/_documents/schwenkewinningessay.pdf

• Robert Parisi, Managing Director and Cyber Product Lead at Marsh Inc., believes, ‘the question of whether or not these insurance terms and conditions address IoT-related losses is one of the most interesting issues in the marketplace right now.’ There is a lot of debate as to what type of insurance policy will even cover these types of risk – will it reside with a cyber, property, or some other policy?

• AIG/Lex Baugh, Getting Hacked: IoT and Beyond RISK+INNOVATION 2018https://www.aig.com/content/dam/aig/america-canada/us/documents/innovative-tech/getting-hacked-iot-and-beyond.pdf

• The collaboration between Risk Managers and CISOs, and among them and other business leaders from across the company, should mirror the complexity and interconnectedness of attacks themselves.

Page 40: The Internet of Things (IoT) and Cybersecurity: Is …...The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your Company? The 2019 Corporate Risk, Ethics & Compliance

40 Edit presentation title on Slide Master using Insert > Header & Footer

The Internet of Things (IoT) and Cybersecurity: Is Your Phone Hacking Your

Company?

Role of In-House Counsel vs. Outside Counsel

• Understanding the Risks to be addressed:

• Data Breach

• IoT Ransomware

• Distributed Denial of Service Attacks (Victim; Unwitting Perpetrator)

• Privacy Harms

• Cyber-Physical Injury and/or Property Damage

• IoT Supply Chain –Interconnectedness and Liability

• Regulatory Concerns

• Reputational Harm/Brand Impact

• Potential Claims based on Negligence; Strict Liability; Consumer Protection Statutes