Security First Approach Provides a Significant Advantage to Law Firms
The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible.
November 16, 2017 at 02:15 PM
8 minute read
This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.
Monumental cyber events, such as the recent Equifax breach, draw enormous press attention, public outrage and government scrutiny. The coverage is almost exclusively negative, challenging the security capabilities of the firm and questioning whether negligence played a role.
These breach stories fuel a security industry that all too often feeds on fear, uncertainty and doubt — a practice collectively referred to as selling FUD. The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible. When the industry gets wise to this cycle of promise and disappointment, security vendors switch to the other side of their mouth to espouse a security strategy of multiple systems and technologies, known as defense in depth.
For the most part, this practice prevails, and perhaps even suits, an economy built on free market companies that overlook cybersecurity until they suffer a cyber near miss, a devastating cybersecurity event, or when the government and regulators turn their investigatory sights on their industry and operations (jovially referred to as the Eye of Sauron, in reference to the Lord of the Rings). Only then do most companies adopt a more hardened security practice. However, there is a movement towards a security first approach within more proactive organizations.
Security first is a holistic approach that views security not as an information technology nuisance in need of tight cost-management controls, but as a competitive advantage to differentiation from traditional business offerings. With this shift, service providers can tailor their offering to clients in heavily regulated industries, or those that control highly confidential information such as financial information, healthcare records, or other forms of sensitive personally identifiable information (PII).
Most regulatory frameworks, including those of the Securities Exchange Commission (SEC) and Health Insurance Portability and Accountability Act (HIPAA), include provisions for vendors, business associates, consultants, and other third-parties with access to controlled data. The security first approach provides a significant advantage to firms with existing regulated clients, or building a new practice as a third-party within regulated industries.
Security first plays a dual role for law firms. First, any law firm engaging with SEC-regulated financial institutions, such as hedge funds or healthcare providers (HIPAA governed), will no doubt have to build out a robust and documented cybersecurity program in order to pass the scrutiny of their clients. Completing due diligence questionnaires (DDQ) for banks and hospitals is now all too common and incredibly time-intensive for those teams involved.
Within financial services, alternative investment funds (generally referred to as hedge funds) adopted a security first approach in response to the proliferation of due diligence requests from banks and potential investors.
AITEC was founded by investment technology leaders as a private secure community of senior management experts who share advice, knowledge, insights, and best practices with each other for the betterment of the alternative investment industry.
In response to the pressures presented by answering constant and varying DDQs, they partnered with AIMA (Alternative Investment Management Association) to create a standardized security DDQ that worked as a framework for investment firms upon which to build their cybersecurity policies and procedures. It gave investors and clients a way of accurately measuring those firms and their cybersecurity policies and procedures. There are now over100 vendors using the DDQ within the industry.
A security first approach starts with the legal industry building its own standard, leveraging guidance from the American Bar Association (ABA), the International Legal Technology Association (ILTA) LegalSEC council, and the Association of Legal Administrator (ALA).
The approaches described leverage security first as a means of retaining existing business or perhaps entering new opportunities within highly regulated, or at least controlled, industries. More progressive law firms have moved beyond this effort to build out their own privacy and data security practices founded on their enriched security posture.
Law firms are uniquely positioned to provide privacy and data security guidance and expertise. As I have been known to say, “all roads lead to Rome,” which in this case refers to law firms. Firms help write legislation at all levels of government, and then interpret these laws on behalf of their clients. Law firms broker business insurance, establish governance and legal policies at the business level, broker financial deals, lead mergers and acquisitions, file patents and copyrights, and so on. Law firms are the nexus of the economy.
As such, law firms are actively engaged in numerous facets of cybersecurity from planning, prevention, response and post-event litigation:
Planning:
- Risk management consulting: Helping businesses audit sensitive assets under management, determining top cyber risks, and building out a risk management plan including data protection, breach notification, insurance, etc.
- Board-level cybersecurity awareness and obligation training: Board members have an incumbent duty to include cyber security in their fiduciary responsibilities, yet many board members lack an understanding of cyber risks and how they affect their duty as a board member. Law firms can interpret responsibilities and create a framework of responsibilities, reporting, budgeting, and risk management.
- Cyber insurance policy and planning: Cyber insurance is becoming a standard part of any company's risk management policy, yet in absence of actuarial data, and with myriad options, companies need advice on how to build a portfolio of insurance that aligns to their needs and budget.
Prevention:
- Global data transfer solutions: The transfer of data across national and international borders creates a convoluted patch work of privacy and breach notifications laws — think GDPR. Laws firm can help navigate this regulatory maze.
- Compliance with local privacy laws: Helping determine local compliance with state, national, and international data protection, privacy (such as right to be forgotten), and other legislative obligations.
Response:
- Incident response and post-breach crisis management: Law firms have a role to play in incident response planning and post-breach response including the technical investigation, coordination with law enforcement, and exercising notification requirements. In the event of a breach, the lawyer of record or general counsel should be the first call, and as such become the quarter back in any response program.
- Government and law officials' data requests: When government or law officials request data, this places companies in a difficult position between protecting their customer's privacy expectations, while cooperating with law enforcement as required by statue. Law firms must quarterback such requests and the resulting exchanges of data.
Litigation and Defense:
- Regulatory examinations and defense: Firms require legal advice in matters of regulatory examinations, understanding requirements, compliance standards, transfers of data or evidence, and potential legal defenses if the regulatory investor levies fines or files criminal charges.
- Class-action suits resulting from a data breach: In the wake of Target and other retailers, and now Equifax, class-action suits, or suits between vendors and customers, are standard fare post-breach. Law firms play a traditional role here providing either plaintiff or defense services.
- Intellectual property protection: In certain cases, data breaches result in the loss of intellectual property rather than money or other data which is resold on the dark markets. When IP is stolen, it often emerges in the hands of competitors and original owners will seek damages or rendition of IP violations.
Law firms have a unique opportunity to promote the adoption of an enriched security program across the economy, while building a business based on a security first philosophy. It's a win-win situation. However, the window for a distinct advantage leveraging security will only remain open for a finite period. Once a few prospectors strike gold, every hopeful will descend on the same claimed opportunity with a shovel and pick. Those that stake a claim early will have a significant advantage as a security first provider, and will remain both technically and economically ahead of those parties who begrudgingly adopt an updated security posture because everyone else is.
Mark Sangster is a cybersecurity evangelist who has spent significant time researching and speaking to peripheral factors influencing the way that legal firms integrate cybersecurity into their day-to-day operations. In addition to Mark's role as VP and industry security strategist with managed cybersecurity services provider eSentire, he also serves as a member of the LegalSec Council with the International Legal Technology Association (ILTA). He can be reached at [email protected].
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1'Largest Retail Data Breach in History'? Hot Topic and Affiliated Brands Sued for Alleged Failure to Prevent Data Breach Linked to Snowflake Software
- 2Former President of New York State Bar, and the New York Bar Foundation, Dies As He Entered 70th Year as Attorney
- 3Legal Advocates in Uproar Upon Release of Footage Showing CO's Beat Black Inmate Before His Death
- 4Longtime Baker & Hostetler Partner, Former White House Counsel David Rivkin Dies at 68
- 5Court System Seeks Public Comment on E-Filing for Annual Report
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250