41
Cyber Risk & Fraud 2.0 Shawn E. Tuma Scheef & Stone, LLP @shawnetuma

Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

Embed Size (px)

Citation preview

Page 1: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

Cyber Risk & Fraud 2.0

Shawn E. TumaScheef & Stone, LLP@shawnetuma

Page 2: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

Shawn TumaPartner, Scheef & Stone, L.L.P.

214.472.2135

[email protected]

@shawnetuma

blog: shawnetuma.com

web: solidcounsel.com

This information provided is for educational purposes only, does not constitute legal advice, and no attorney-client relationship is created by this presentation.

Shawn Tuma is a cyber lawyer business leaders trust to help solve problems with cutting-edge issues involving cybersecurity, data privacy, computer fraud, intellectual property, and social media law. He is a partner at Scheef & Stone, LLP, a full service commercial law firm in Texas that represents businesses of all sizes throughout the United States and, through its Mackrell International network, throughout the world.

Texas SuperLawyers 2015

Best Lawyers in Dallas 2014 & 2015, D Magazine (Digital Information Law)

Chair, Collin County Bar Association Civil Litigation & Appellate Section

College of the State Bar of Texas

Privacy and Data Security Committee, Litigation, Intellectual Property Law, and Business Sections of the State Bar of Texas

Information Security Committee of the Section on Science & Technology Committee of the American Bar Association

Social Media Committee of the American Bar Association

North Texas Crime Commission, Cybercrime Committee

Infragard (FBI)

International Association of Privacy Professionals

Information Systems Security Association

Contributor, Norse DarkMatters Security Blog

Editor, Business Cyber Risk Law Blog

Page 3: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 4: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

“There are only two types of companies: those that have been hacked, and those that will be.” –Robert Mueller

Page 5: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

97% - Companies Tested – Breached in Prior 6 mos.

Page 6: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

Odds: Security @100% / Hacker @ 1

Page 7: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 8: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 9: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 10: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 11: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 12: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 13: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 14: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 15: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 16: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 17: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Data

Sources

Company Data

Workforce Data

Customer / Client Data

Other Parties’

Data

3rd Party Business

Associates’ Data

Outsiders’ Data

Page 18: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Threat Vectors

Network

Website

Email

BYOD

USBGSM

Internet Surfing

Business Associates

People

Page 19: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Malicious

• compete

• newco

• Sabotage

• disloyal insider

Negligence

• email

• usb

• passwords

Blended

• foot out the door

• misuse of network

• stealing data

• negligence with data

• violate use policies

Hacking / Cracking

Social Engineering

Malware

Stealing

Planting

Corrupting

Outsider & Insider Threats

Page 20: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

data devices

misuse?

Page 21: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

•Stewardship

•Public Relations

•Legal

Page 22: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

Responding: Execute Breach Response Plan

• contact attorney (privilege)

• assemble your Response Team

• notify Card Processor

• contact forensics

• contact notification vendor

• investigate breach

• remediate responsible vulnerabilities

• reporting & notification

Page 23: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

What does “reporting & notification” mean?

• Law Enforcement

• State Attorneys General

• pre-notice = VT (14 days), MD, NJ St. Police

• Federal Agencies

• FTC, SEC, HHS, etc.

• Consumers

• Fla, Ohio, Vermont = 45 days

• Industry Groups

• PCI, FINRA, FFIEC

• Credit Bureaus

• Professional Vendors & Suppliers

Page 24: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

first name or

first initial

last name

SSN

DLN or

GovtID

data breach

first name or

first initial

last name

Acct or Card #

Access or

Security Code

data breach

Info that IDs Individual

Health-care, provided, or

paydata breach

Duty to notify when “unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of sensitive personal information …” Tx. Bus. Comm. Code § 521.053

CIVIL PENALTY $100.00 per individual per day for notification delay, not to exceed $250,000 for single breach § 521.151

Page 25: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

2013 Cost (pre-Target) $188.00 per record $5.4 million = total average cost paid by organizations

2014 Cost$201 per record

$5.9 million = total average cost paid by organizations

“The primary reason for the increase is the loss of customers following the data breach due to the additional expenses required to preserve the organization’s brand and reputation.” –Ponemon Institute 2014 Cost of Data Breach Study

Cost of a Data Breach

Page 26: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference
Page 27: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

2014: 90% Preventable

Page 28: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

Blocking & Tackling

Theft

Lost

Passwords

Phishing

Websites

Basic IT

Case Stories

Page 29: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

Blocking & Tackling

You will be breached, but will you be liable?

“Must Haves” if you haveComputerData Internet

Page 30: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

Blocking & Tackling

Approved & DocumentedBasic IT Security

Basic Physical Security

Policies & Procedures Focused on Data Security Company

Workforce (Rajaee v. Design Tech Homes, Ltd.)

Network

Business Associates (Travelers Casualty v. Ignition Studio, Inc.)

Implementation & Training

Regular Reassessment & Update

Page 31: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Security Culture

Assess, Audit, Gap Analysis

Develop Strategic Plan

Implement & Execute Plan

Manage Response &

Conflict

Reassess & Update

protecting

businesses’

information

protecting

businesses fromtheir information

Risk Compliance

Program

Page 32: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Security Culture

Assess, Audit, Gap Analysis

Develop Strategic Plan

Implement & Execute Plan

Manage Response &

Conflict

Reassess & Update

protecting

businesses’

information

protecting

businesses fromtheir information

Risk Compliance

Program

Page 33: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Security Culture

Assess, Audit, Gap Analysis

Develop Strategic Plan

Implement & Execute Plan

Manage Response &

Conflict

Reassess & Update

protecting

businesses’

information

protecting

businesses fromtheir information

Risk Compliance

Program

Page 34: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Security Culture

Assess, Audit, Gap Analysis

Develop Strategic Plan

Implement & Execute Plan

Manage Response &

Conflict

Reassess & Update

protecting

businesses’

information

protecting

businesses fromtheir information

Risk Compliance

Program

Page 35: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Security Culture

Assess, Audit, Gap Analysis

Develop Strategic Plan

Implement & Execute Plan

Manage Response &

Conflict

Reassess & Update

protecting

businesses’

information

protecting

businesses fromtheir information

Risk Compliance

Program

Page 36: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Security Culture

Assess, Audit, Gap Analysis

Develop Strategic Plan

Implement & Execute Plan

Manage Response &

Conflict

Reassess & Update

protecting

businesses’

information

protecting

businesses fromtheir information

Risk Compliance

Program

Page 37: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Security Culture

Assess, Audit, Gap Analysis

Develop Strategic Plan

Implement & Execute Plan

Manage Response &

Conflict

Reassess & Update

protecting

businesses’

information

protecting

businesses fromtheir information

Risk Compliance

Program

Page 38: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Security Culture

Assess, Audit, Gap Analysis

Develop Strategic Plan

Implement & Execute Plan

Manage Response &

Conflict

Reassess & Update

protecting

businesses’

information

protecting

businesses fromtheir information

Risk Compliance

Program

Page 39: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

• Login Credentials

• “You don’t drown from falling into the water”

• 25k v. 40m (T) / 56m (HD)

Page 40: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com

Protecting businesses from information

Contracts

• 3rd party liability

• Healthcare (BA)

• Software license audit

• Permissible access & use in policies, BYOD

• EULA / TOS

Marketing

• FTC Act § 5

• SPAM laws

• NLRB rules

• CDA § 230

• Website audits

• IP issues

• Acct ownership

Privacy

• Privacy policies

• Privacy & data practices

• Destruction policies

• Monitoring workforce

• Business intelligence

Industry Regulation

• PCI (Payment Card Industry)

• FFIEC (Federal Financial Institution Examination Council)

• FINRA (Financial Industry Regulatory Authority)

• SIFMA (Securities Industry and Financial Markets Association)

Page 41: Cybersecurity | Fraud 2.0 Presentation to the Association of Certified Fraud Examiners Annual Fraud Conference

www.solidcounsel.com41

protecting misusing respondingdata

devices