Inside and out: defending against cyber attacks
With money, regulatory action and reputation all on the line, cybersecurity is an ongoing issue for companies of all sizes, and the legal department undoubtedly needs to be involved at multiple steps along the way.
June 26, 2014 at 08:00 PM
19 minute read
There is no organization in the world impervious to the threat of a cyberattack. In fact, a Kaspersky Lab and B2B International survey found that 91 percent of organizations dealt with an attempted data breach at some point in 2013. In all likelihood, the remaining 9 percent are ignorant of attempted break-ins rather than immune to them. With money, regulatory action and reputation all on the line, cybersecurity is an ongoing issue for companies of all sizes, and the legal department undoubtedly needs to be involved at multiple steps along the way.
But in the new technological environment, no department is an island. The need to be involved early and often with departments like IT, security and compliance is essential to defend against cyberattackers.
The first step to that defense is to know what you're up against.
External infiltrators
Headline making cyber incidents are most often associated with theft of customer information, and that is no doubt a risk for larger customerfocused companies. But while these disruptive incidents carry great narrative potential due to their visceral impact on the public and the outrage they trigger, consumer data theft is the end goal of a variety of attack vectors.
“The most challenging piece for inside counsel is figuring out what criminals are doing. I was a criminal prosecutor for 12 years before coming to Walgreens, and then, as now, the criminals are always one step ahead. What we're least likely to be aware of is what's next on the horizon for those criminals,” says Shannon Couffer, director of regulatory law at the Walgreens Company.
The fact is, consumer information can be stolen as the result of a point of sale (POS) infiltration, malware infection or even something as simple as a disgruntled employee walking out the door with a hard drive. There's no way to tell what breach vector you could be up against next. Rather than just preparing to defend against an array of attacks, looking at the actors involved could better prepare a corporation for the inevitable breach.
“I think a lot of companies have geared their strategy towards information security incidents concerning people that are trying to get consumer information, credit cards and social security numbers,” says Ed McNicholas, co-leader of Sidley Austin's privacy, data security and information law practice. “A modern threat vector that they need to be more concerned about are advanced persistent threat attacks, agents that are often affiliated with foreign nation states, and they are seeking to go after the intellectual property of the company.”
In May, the Department of Justice charged Chinese hackers with ties to the People's Liberation Army, and Russia and the United States frequently trade accusations of cyberespionage against each other. It's clear that in addition to the average hacker, highly organized criminal and military hacking campaigns will continue to evolve as a threat for corporations.
“Two key things are happening; one is that we're seeing some of the organized criminal elements which previously focused on identity theft use techniques typically employed by the nation states, making them much more dangerous. The other element is that some of the actors in the nation states' threat, although closely tied to the government, may be operating independently as if there were a military unit that has become a band of mercenaries.”
From the inside
Undoubtedly, organized criminal units are of the utmost concern to the organizations, but just as troubling are threats facilitated by human error.
“I've seen internal employee misuse situations which can either be malicious or the result of human error. Malicious if you have an employee who turns out to be a bad actor. Or human error that puts the company at risk, whether that's forgetting a laptop in a car, or clicking on a link that infects the entire organization,” says Liisa Thomas, a partner at Winston & Strawn and chair of the firm's global Privacy and Data Security Law practice.
Though Verizon's 2014 Data Breach Investigations Report showed that insider misuse contributed to only 8 percent of data breaches, the study looked only at confirmed security incidents. The cost of such mistakes can still be quite large for a corporation. A Ponemon and IBM report released in May pegged the average expense associated with human error-facilitated breaches at $117 million annually, but also indicated that as training sessions that educate employees on data risk become more common, incident rates have also dropped.
“The insider threat is, in my experience, responsible for considerably more than people realize. It's far more common for so-called “trusted insiders” to negligently or maliciously abuse their authorized access to engage in activities that expose the company to risk than it is for criminal organizations to target a company,” says Jason Straight, senior vice president and chief privacy officer of UnitedLex.
The bottom line is, whether it's from inside or outside, perpetrated by foreign covert agents or bumbling sales managers, the threat of a information breach has never been greater. The legal team can no longer sit on the sidelines.
A balanced approach
Defending against cyberattacks requires the focus of multiple departments. IT and security can select and implement the technology solutions that offer some semblance of defense against attackers, but only the legal team can assess the risk and address the mired tangle of regulations associated with a cybersecurity incident. In terms of where specifically those efforts should be focused, the experts that spoke to InsideCounsel had several recommendations.
“It has to be a balanced approach as it relates to all aspects of this. Heavy on protection and risk assessment, but with a contingency plan if there is an event,” Couffer says. The organization of her team at Walgreens allows her to keep track of all potential legal ramifications that could stem from a breach, and could be useful for others looking to form a phalanx against cyber criminals.
Couffer adds, “Our legal division is staffed against different business units. If they have an issue, they'll go to their assigned person directly and make sure they have a seat at the table, that person learns all of their business and operational structures, what makes them tick and what their pain points are. That allows us to help as a business partner. It gives you an instantaneous team in the event of an incident.”
Straight says that when the inevitable breach has occurred, “the number one area legal should be focused on is incident response, and making sure that there is a plan that is documented and is implemented where people understand roles and responsibilities, and to make sure that legal has a very formal and central role in the response. We see legal getting caught off guard by incidents partly because they're not brought into the incident early enough. You don't want subjectivity in this area of the plan; there should be an automatic trigger.”
Straight says that often the emotional shock that comes along with a cyberbreach can prompt an organization to do too much. Time is certainly of the essence, but fully understanding the incident ensures that “oversharing” or need for correction will not occur.
In reality, risk assessment, data audit and employee training will only take an organization so far. Current trends show that sooner or later your organization will be attacked. While there is no silver bullet for addressing the issue, each of the experts we talked to said that the first and most critical step to more effective breach preparation starts with understanding the high level threats, and knowing where your data is.
“Focus on understanding what data you have and what your protection measures are. Organizations may have thought about the larger groups of data they have, but most have not sat down and done a comprehensive audit of exactly what they have and how it's stored,” Thomas says. “That exercise will eventually allow you to build a list of priorities on what you need to address.”
There is no organization in the world impervious to the threat of a cyberattack. In fact, a Kaspersky Lab and B2B International survey found that 91 percent of organizations dealt with an attempted data breach at some point in 2013. In all likelihood, the remaining 9 percent are ignorant of attempted break-ins rather than immune to them. With money, regulatory action and reputation all on the line, cybersecurity is an ongoing issue for companies of all sizes, and the legal department undoubtedly needs to be involved at multiple steps along the way.
But in the new technological environment, no department is an island. The need to be involved early and often with departments like IT, security and compliance is essential to defend against cyberattackers.
The first step to that defense is to know what you're up against.
External infiltrators
Headline making cyber incidents are most often associated with theft of customer information, and that is no doubt a risk for larger customerfocused companies. But while these disruptive incidents carry great narrative potential due to their visceral impact on the public and the outrage they trigger, consumer data theft is the end goal of a variety of attack vectors.
“The most challenging piece for inside counsel is figuring out what criminals are doing. I was a criminal prosecutor for 12 years before coming to Walgreens, and then, as now, the criminals are always one step ahead. What we're least likely to be aware of is what's next on the horizon for those criminals,” says Shannon Couffer, director of regulatory law at the
The fact is, consumer information can be stolen as the result of a point of sale (POS) infiltration, malware infection or even something as simple as a disgruntled employee walking out the door with a hard drive. There's no way to tell what breach vector you could be up against next. Rather than just preparing to defend against an array of attacks, looking at the actors involved could better prepare a corporation for the inevitable breach.
“I think a lot of companies have geared their strategy towards information security incidents concerning people that are trying to get consumer information, credit cards and social security numbers,” says Ed McNicholas, co-leader of
In May, the Department of Justice charged Chinese hackers with ties to the People's Liberation Army, and Russia and the United States frequently trade accusations of cyberespionage against each other. It's clear that in addition to the average hacker, highly organized criminal and military hacking campaigns will continue to evolve as a threat for corporations.
“Two key things are happening; one is that we're seeing some of the organized criminal elements which previously focused on identity theft use techniques typically employed by the nation states, making them much more dangerous. The other element is that some of the actors in the nation states' threat, although closely tied to the government, may be operating independently as if there were a military unit that has become a band of mercenaries.”
From the inside
Undoubtedly, organized criminal units are of the utmost concern to the organizations, but just as troubling are threats facilitated by human error.
“I've seen internal employee misuse situations which can either be malicious or the result of human error. Malicious if you have an employee who turns out to be a bad actor. Or human error that puts the company at risk, whether that's forgetting a laptop in a car, or clicking on a link that infects the entire organization,” says Liisa Thomas, a partner at
Though Verizon's 2014 Data Breach Investigations Report showed that insider misuse contributed to only 8 percent of data breaches, the study looked only at confirmed security incidents. The cost of such mistakes can still be quite large for a corporation. A Ponemon and IBM report released in May pegged the average expense associated with human error-facilitated breaches at $117 million annually, but also indicated that as training sessions that educate employees on data risk become more common, incident rates have also dropped.
“The insider threat is, in my experience, responsible for considerably more than people realize. It's far more common for so-called “trusted insiders” to negligently or maliciously abuse their authorized access to engage in activities that expose the company to risk than it is for criminal organizations to target a company,” says Jason Straight, senior vice president and chief privacy officer of UnitedLex.
The bottom line is, whether it's from inside or outside, perpetrated by foreign covert agents or bumbling sales managers, the threat of a information breach has never been greater. The legal team can no longer sit on the sidelines.
A balanced approach
Defending against cyberattacks requires the focus of multiple departments. IT and security can select and implement the technology solutions that offer some semblance of defense against attackers, but only the legal team can assess the risk and address the mired tangle of regulations associated with a cybersecurity incident. In terms of where specifically those efforts should be focused, the experts that spoke to InsideCounsel had several recommendations.
“It has to be a balanced approach as it relates to all aspects of this. Heavy on protection and risk assessment, but with a contingency plan if there is an event,” Couffer says. The organization of her team at Walgreens allows her to keep track of all potential legal ramifications that could stem from a breach, and could be useful for others looking to form a phalanx against cyber criminals.
Couffer adds, “Our legal division is staffed against different business units. If they have an issue, they'll go to their assigned person directly and make sure they have a seat at the table, that person learns all of their business and operational structures, what makes them tick and what their pain points are. That allows us to help as a business partner. It gives you an instantaneous team in the event of an incident.”
Straight says that when the inevitable breach has occurred, “the number one area legal should be focused on is incident response, and making sure that there is a plan that is documented and is implemented where people understand roles and responsibilities, and to make sure that legal has a very formal and central role in the response. We see legal getting caught off guard by incidents partly because they're not brought into the incident early enough. You don't want subjectivity in this area of the plan; there should be an automatic trigger.”
Straight says that often the emotional shock that comes along with a cyberbreach can prompt an organization to do too much. Time is certainly of the essence, but fully understanding the incident ensures that “oversharing” or need for correction will not occur.
In reality, risk assessment, data audit and employee training will only take an organization so far. Current trends show that sooner or later your organization will be attacked. While there is no silver bullet for addressing the issue, each of the experts we talked to said that the first and most critical step to more effective breach preparation starts with understanding the high level threats, and knowing where your data is.
“Focus on understanding what data you have and what your protection measures are. Organizations may have thought about the larger groups of data they have, but most have not sat down and done a comprehensive audit of exactly what they have and how it's stored,” Thomas says. “That exercise will eventually allow you to build
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllInside Track: How 2 Big Financial Stories—an Antitrust Case and a Megamerger—Became Intertwined
CLOs Still Jazzed About Gen Al, Even as They Realize Successfully Implementing It Is Harder Than It Looks
2 minute readAT&T General Counsel Joins ADM Board as Company Reels From Accounting Scandal
How Gen AI Is Changing Legal Work for In-House Counsel
Trending Stories
- 1Infant Formula Judge Sanctions Kirkland's Jim Hurst: 'Overtly Crossed the Lines'
- 2Trump's Return to the White House: The Legal Industry Reacts
- 3Election 2024: Nationwide Judicial Races and Ballot Measures to Watch
- 4Climate Disputes, International Arbitration, and State Court Limitations for Global Issues
- 5Judicial Face-Off: Navigating the Ethical and Efficient Use of AI in Legal Practice [CLE Pending]
- 6How Much Does the Frequency of Retirement Withdrawals Matter?
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250