Same Threats, New Opportunities: The Current State of Corporate Cybersecurity
After a year of high profile data breaches, in-house counsel are bracing for another year of cybersecurity frustrations and scrutiny.
December 14, 2017 at 08:00 AM
10 minute read
2017 marked a year full of cybersecurity nightmares for big, well-resourced companies. For starters, it was revealed that a 2013 data breach at Yahoo made vulnerable every user account, including those at its subsidiaries Flickr and Tumblr. Meanwhile, a Wells Fargo lawyer inadvertently exposed financial information for some of the bank's wealthiest customers by sending unredacted discovery documents to opposing counsel. And not only did a breach into credit reporting company Equifax expose the Social Security and driver's license information of upwards of 143 million people, but the company's handling of the breach and ensuing allegations of insider trading produced public outrage and regulatory scrutiny. Even the U.S. government was subject to a major data breach, with the Securities and Exchange Commission (SEC) revealing that hackers had managed to breach the agency's Electronic Data Gathering, Analysis, and Retrieval (EDGAR) system.
While these stories dominated headlines, identity protection company IdentityForce found that at least another 37 large corporations announced major data breaches to their customers this year. The threat of cyberattack shows little signs of slowing into 2018, prompting corporate counsel to begin thinking about how to handle the next year in cybersecurity.
|Same Issues, New Year
Amar Sarwal, chief legal officer and senior vice president of advocacy and legal services at the Association of Corporate Counsel, suggests that general counsel may want to expect “more of the same” in the cybersecurity threat landscape. “It's not like we solved the issues that are in front of us now, from state-sponsored hacking or otherwise. Those issues have not been resolved yet. Those issues will continue to linger in future years,” he notes. As for a company's potential to be hacked, he adds, “It's a matter of when, not if. … Every company from the board of directors on down should recognize that.”
Olga Mack, general counsel at sales engagement platform company ClearSlide, thinks that 2018 is likely to bring “more, not less, attacks.” While she believes attacks on large, high-profile companies are likely to continue, hackers may also target more vulnerable organizations. Smaller and mid-sized companies, for example, “have a smaller budget to protect themselves, and they have a lot of very valuable information,“ she says. “There's kind of equal opportunity for everyone” to be hacked.
Some small and mid-sized firms have turned to cloud hosting to try to ward off cyberattackers in hopes that specialized third-party vendors may be able to safeguard data better than they can. Gerald Werner, global director of information security at K2 Intelligence, says this strategy could certainly backfire in coming years. “More and more companies are moving critical systems to the cloud with the understanding that their data will be safe. Unfortunately, insufficiently secured systems bring new opportunities for hackers to access information or to lock critical systems until a ransom is paid,” he says.
Although many have noted the potential vulnerabilities inherent in internet of things (IoT) devices, 2017 saw relatively few attacks on them. However, given their increasing popularity in both the consumer and enterprise markets, Mack says the coming year may see far more exploitation of these devices. “I think it may happen next year. I think it's an even larger threat.”
Werner says IoT-enabled home assistant devices could be particularly at risk. “These systems are inexpensive devices with a microphone. Essentially, they are full-blown recording devices that will send audio to a hooked-up data center for processing,” he explains.
With the potential for expanded threat, the ACC's Sarwal notes that organizations may see more pressure to clamp down on collaborators and vendors with whom they share data. “The focus on the supply chain is only becoming more intense, with many of these hacks being on third-party vendors,” he says.
|Regulatory Gambits
The regulatory stakes around cybersecurity seem slated to rise over the next year. Data breach notification laws are now in place in all but two U.S. states, many of which, along with local municipalities, are adopting additional requirements for data handling. Several bills have been proposed at the federal level, including one allowing organizations to “hack back” at cyberattackers, but so far none has gained significant bipartisan traction.
Rahul Mukhi, counsel at Cleary Gottlieb Steen & Hamilton, explains that much about regulatory policy and its potential applications is still new enough to where many of its conventions are still being hammered out. Enforcement action around the Yahoo breach, however, could signal a change in regulators' enforcement priorities. “If they bring enforcement action there, or settlement, I believe that'd be the first time they've done that based on cybersecurity risk disclosures,” he explains.
In addition, multinational companies will need to ensure their information governance structures match those mandated by the European Union's General Data Protection Regulation (GDPR), set to take effect next May. The GDPR sets forth a wide set of strict data management and retention responsibilities, coupled with a steep fine for noncompliance of up to 4 percent of annual global revenue turnover.
Although in-house counsel are working to prepare for May, many organizations are anxious about their ability to comply appropriately. Mukhi hopes that regulatory agencies enforcing GDPR can find a way to acknowledge the realities companies face in securing their data.
“It's got to be risk-based, and hindsight is 20/20. The budgets for cybersecurity are getting bigger and bigger, but the tipping point where there's only so much you can do within reasonable limits of your finances, I think there has to be sensitivity to that by the regulators,” Mukhi says.
Mack hopes new regulations address companies as partners rather than adversaries in trying to stop cyberattacks. Such policy, she says, could shape “how we have an open conversation with policymakers without fearing that our companies will be targeted. There needs to be a change in incentives in how we deal with that.”
|Litigation Outlook
Some of 2017's high-profile breaches have also raised concerns among organizations about the potential for litigation. Mukhi notes that while it still may be too early to tell what kinds of litigation risks organizations dealing with cyberbreaches may face in 2018, the next year may give some stronger indicators of how well these organizations may fare.
At this point, there's fairly little precedent: Only in the last year or so have litigators taken on numerous class action questions around these data breaches, and given the lagging speed of litigation, they haven't yielded a ton of definitive judgments. “The early trend was deemed to result in dismissal of the claims on the theory that if you have a breach, but the customers can't show that the bad guys stole their information and committed fraud, there's no injury to the customers,” Mukhi says.
However, that trend may be changing, following from a California federal judge's decision to allow claims against Yahoo to move forward. “The fact that your personal information was lost in and of itself was an injury, that allowed the case to go forward,” Mukhi adds.
Litigation addressing the responsibilities of companies to safeguard data has also not moved particularly quickly through the courts. Although Mukhi sees some potential for claims against Equifax to move a little further because of the allegations of insider trading leveled against the company, he also sees a fair amount of trepidation from courts around holding companies accountable for cyberattacks. “There's a reluctance without more evidence to penalize the companies and management for the fact that there are criminals out there constantly trying to break into systems.”
|Looking Ahead
Mack believes that many companies have taken this year's major cyberbreaches as a warning for what's to come and are beginning to prepare accordingly. “Crisis management policy was really not on the radar. Now, everyone is scrambling to have something along those lines, because while you can't control whether a crisis occurs, you can certainly be prepared,” she says.
Over the last few years, ideas about what practices and policies can help organizations be formally “prepared” have shifted quite a bit. Paraphrasing boxer Mike Tyson, Sarwal says, “Everyone has a plan until they're punched in the face,” adding that formulating a response plan without any real intent of using it can often leave companies exposed to harm. “When you get to the actual situation, it's sometimes more effective. It's a matter of actually testing it with real exercises, not just putting it into a notebook and putting it on a shelf.”
Mack adds response plans may rely a little more heavily on technology as part of their defensive strategy in coming years. “I think we'll increasingly rely on data sources to use predictive modeling to understand what's likely to happen. I think our models and our data are increasingly better at that.”
But even as industry cybersecurity best practices shore up, cyberattackers aren't likely to go away, nor be any less effective. “The hackers are so much more creative right now,” Sarwal says. “There are so many more things that hackers can go after. They've only touched the surface of that.”
With many organizations feeling outgunned in their ability to ward off cyberattacks, some may be forced to rethink their data retention practices. Notably, as artificial intelligence begins to work its way into nearly every industry, companies are increasingly mining large data sets to train algorithms that could help boost efficiency later on. “You think about the big data revolutions, you have to Hoover up as much data as you can to have these algorithms do their job,” Sarwal notes. “Then you have to store that data.”
Mukhi believes that storing this data could come at a cost. “Especially for companies that are in the data mining business, if you don't need the data and there's no requirement to keep it, it's just a huge risk sitting on your boat,” he says.
Given the increasing likelihood of cyberattack and potential for penalties, many are hoping that in-house counsel and state regulators can find a way to rethink the individualized and defensive ways in which organizations handle cybersecurity, and instead find ways to promote more collaboration amongst these groups.
“I think we need to start looking at it as a more communal problem,” Mack says. “Smaller companies and entities have a smaller budget. We need to find a way to address the 'tragedy of the commons' issue. I really think that individually, even Fortune 500 companies can be brought to their knees, but collectively I think we can be stronger.”
Sarwal echoes Mack's call for teamwork among companies and regulators. “I hate to be pessimistic, but there's going to be some tough times ahead. My hope is that the regulators recognize this and work together with companies, not in a blame or shame way, but to recognize that we're all in this together.”
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250