<i>Cybersecurity Roundtable:</i> Chicago's Tech Experts Answer Three Critical Cybersecurity Questions
Earlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime.
September 06, 2018 at 02:35 PM
9 minute read
This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.
We're long past the point where cybersecurity can be treated like a corporate trend or as a bullet point on your IT team's wish list. As networks around the world become more sophisticated and complex, cybercriminals are correspondingly honing their talents in everything from hacking and phishing to cyberterrorism and general mayhem.
Modern organizations with savvy security know this and watch events and trends closely. They know that global ransomware damages totaled $325 million in 2015 and that number is supposed to quadruple by 2020. They also know 33% of U.S. companies experienced some sort of data breach in 2016, and most of them had no idea anything happened. In response to threats on the horizon, companies are building the right teams of experts to help prevent the worst from happening, or at least mitigate damage.
The resulting chief security officer boom is a collaborative one, where those experts work together to identify priorities and best practices for protecting their organizations and the health of our shared digital economy. Earlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime. The group included Ricardo Lafosse, CISO at Morningstar; Jerry Finley, director of cybersecurity and deputy CSO at Relativity; Dara Tarkowski, founding partner at Actuate Law; and Joe Rickard, CISO at Incapital. Cybersecurity Law & Strategy asked the group to expand on some questions that came up at the panel.
|Q: What Cybersecurity Incident Keeps You Up At Night?
Dara Tarkowski: At the end of the day, all our clients say the same thing: “Our biggest nightmare is having to report something to a regulator.” Many of these [cybersecurity] issues are devastating. Businesses are worried about risking consumer harm as well as suffering monetary losses, having to notify insurance carriers and reputational harm. They also wonder how these incidents may impact shareholder announcements, and worry about the ancillary problems that happen when you experience an incident like this. Individuals like me come in and try to clean up all the spiraling messes that ensue. One data breach could result in a company reporting to 50 regulators in addition to facing civil litigation, shareholder litigation, security litigation, and many other problems — all because of one patch that wasn't fixed.
Jerry Finley: Something that is on my mind quite often is the threat of hardware attacks as they could harm your corporate environment as well as your product and cloud environments. These are the types of concerns that I tend to be more worried about.
Ricardo Lafosse: At Morningstar, our data is the foundation for everything we do. We are constantly evaluating our environment to deter a potential cybersecurity crisis like the Equifax breach. It is crucial to know where all our key assets are located and to ensure we have the appropriate controls in place to prevent this type of data breach and make sure nothing was overlooked. That is why organizations need to have ongoing situational awareness on their external presence and put the appropriate, preventive measures in place. If a hacker were to infiltrate a data system, organizations should devise not only an action plan, but also place measures in place to make it extremely difficult for a hacker to get to that data.
Joe Rickard: That is a good point that Ricardo raises about making it difficult to get to the data. Last year, an issue that was keeping me up at night was the threat of ransomware. Traders tend to get bored in the middle of the day, so they'll sometimes go on different websites. This presents great opportunities to click on the wrong link. I went through an exercise where I verified that, when someone in bond trading at our company clicked on the wrong link, it wouldn't bring down the system that our people in risk management needed to do their jobs. That wasn't an easy project, but it was an important one.
|Q: What Is Your Stance on Executives Bringing Their Own Device When Traveling Overseas?
JR: Interestingly, five years ago, everyone wanted to bring their own device. Now, the climate [around data security] is so complex that the pendulum is swinging back the other way. We're starting to no longer support people's personal devices. These types of issues are becoming more and more challenging for organizations. It really comes down to knowing the rules of the country you are operating in. For example, it is illegal in Saudi Arabia to have a separate Internet connection that doesn't go through the government's proxy server. It is important to know these types of regulations, so you are not getting your executives in trouble when they are overseas.
RL: It's about knowing the environment. Having a global workforce, we have put in protections to protect our data regardless of location. Our overall security approach at Morningstar is to protect the data, regardless of the platform where it's hosted. If it is in the cloud or on your mobile device, we ensure the appropriate security controls are in place. There are different risks that are associated with different countries. And, you should consider the maturity of the cyber criminals in that specific area. What I always say is prepare for the worst.
JF: I agree that it depends on where the executives are traveling throughout the world. At Relativity, we maintain a list of areas throughout the globe that carry a high risk of cyber attacks. Also, if we have a Relativian who is traveling to one of these higher risk places, we will often provide them a laptop that allows for forensic analysis to be performed once the device is returned to the U.S. The FBI also maintains an updated list of countries with a high risk of cyber activity and the types of incidents that you should have on your radar when traveling there.
DT: An organization needs to engage counsel from relevant jurisdictions when your organization is putting together policies and procedures around traveling. This is especially critical if your organization has an international presence. International travel poses different types of security risks for executives, in certain parts of the world in particular. Companies must know the risks in order to make informed policy decisions or invest in additional security protocols. The more work your team does on the front end, the more defensible you are if an incident occurs.
|Q: Why Is It Important for Organizations to Have an Incident Response Plan?
DT: Being proactive and preventing these types of incidents is critical. But, it is equally as important to have checkpoints as part of your incident response plan so you can prevent the domino effect of regulatory and legal issues that ensue from a breach. As organizations form their plan and envision various scenarios, it is inevitable that they will evaluate their current processes in order to identify their pain points. This is a healthy exercise and necessary for the development of policies and procedures.
JF: It is crucial to have an incident response plan, especially in the event of ransomware. Of course, these things can get complicated, but we have processes in place surrounding this type of event that will help us keep a level head if the need arises. It is also important to note in your incident response plan which systems require which level of reporting and the time limits for reporting that should be respected from a legal standpoint.
JR: We have found it is critical to conduct a data classification exercise. If your organization hasn't done it, I highly encourage you to do so. Organizations should go to their business unit managers and have them answering the following: “Which systems would ruin your day if they were to go down?” Have them list the specific features and functionality of the systems that they need to do their jobs. Something I am always thinking about is having data on certain screens or menus that could be wrong. We publish bond prices on these screens that traders execute on, and if we were to publish the wrong price, it could be a several million-dollar problem. For every process that you think is important, test its backup. And, I am not saying do a tabletop exercise; run the backup for a couple of days to make sure you can maintain operations if a failure happens.
RL: To echo what Joe said, a great exercise is to obtain information from business unit managers and have them perform a business impact analysis on what would happen if a system were to go down. There are templates available for download that can guide organizations through getting this type of information from business unit managers in a non-aggressive manner. When forming an incident response plan, make sure corporate communications is involved. One way or another [when something happens], whether internally or externally, it's likely you will have to make some sort of statement. The first time a breach occurs is not the first time you should be working with these experts. Having relationships with their team, executive management, and legal is paramount. Another key component is solidifying a breach notification process to notify different groups within the organization, including the board.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllApple Asks Judge to 'Follow the Majority Practice' in Dismissing Patent Dispute Over Night Vision Technology
Companies' Dirty Little Secret: Those Privacy Opt-Out Requests Usually Aren't Honored
Schools Win Again: Social Media Fails to Strike Public Nuisance Claims
5 minute readTrending Stories
- 1Legal Events for Georgia Lawyers
- 2'There is No Time to Waste': Matt Gaetz Withdraws From AG Nomination
- 3The Growing PFAS Morass: Why Insurance Should Cover These Products Liability Claims
- 4Dallas Jury Awards $98.65M in Botham Jean Killing by Dallas Officer
- 5In Talc Bankruptcy, Andy Birchfield Skipped His Deposition. Could He Face Sanctions?
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250