by Fernando M. Pinguelo, Angelo A. Stio III, Suzanne M. Noyes and Daniel Sodroski

Size: px
Start display at page:

Download "by Fernando M. Pinguelo, Angelo A. Stio III, Suzanne M. Noyes and Daniel Sodroski"

Transcription

1 NIST Cybersecurity Framework Not a Guarantee, But Still a Good Bet Against FTC Action by Fernando M. Pinguelo, Angelo A. Stio III, Suzanne M. Noyes and Daniel Sodroski Businesses today have their work cut out for them. Small or large, no organization is immune from cybersecurity threats. Added pressures arise from stepped up government regulatory oversight and enforcement that targets an organization s privacy and security policies, procedures, and responses to a data breach. For example, the Federal Trade Commission (FTC) is one such agency that considers itself the super-regulator of consumer data. Toward this end, the FTC has been at the forefront of bringing enforcement actions against businesses with deficient security practices that expose sensitive personal information about consumers. The challenge for businesses, of course, is determining which security practices to employ to adequately protect sensitive information and avoid an enforcement action. With that comes the natural inclination to ask: What is the standard with which I must comply for my organization s data security practices to withstand scrutiny? But this simple question compels a daunting response. Data security and technology are inherently dynamic, with technological advances occurring daily, businesses using data in new ways, and security threats evolving with each new technological advancement. The result is that what may be a best practice today, may not be six months from now. Consequently, specific rules do not comport well with data security and the FTC refuses to offer rules that so many organizations expect. Instead, the FTC provides guidance in parallel with its enforcement activity. Recently, the FTC issued its position on a commonly asked question about standards that have developed out of the National Institute of Standards and Technology (NIST). 1 Specifically, the FTC answered the question, If I comply with the NIST Cybersecurity Framework, am I complying with what the FTC requires? In short, the answer is no, because there is no such thing as complying with the NIST Cybersecurity Framework. This article explains what the NIST Cybersecurity Framework is and how the FTC s standard differs from and aligns with the FTC s approach to cybersecurity. Lawyers advising business clients, small and large, should be familiar with these principles and standards. 44 NEW JERSEY LAWYER DECEMBER 2016 NJSBA.COM

2 The NIST Cybersecurity Framework: What it is and is Not President Barack Obama s Feb executive order titled Improving Critical Infrastructure Cybersecurity, prompted the NIST to develop a voluntary risk-based framework for the nation s critical infrastructure. Issued in Feb. 2014, the resulting NIST Cybersecurity Framework is a set of industry standards and best practices that assist organizations in identifying, protecting, detecting, responding to, and recovering from cybersecurity risks. 2 Importantly, the framework does not create new industry standards. Rather, it was created through the collaboration of the government and the private sector and is based on existing standards, guidelines, and practices with the current regulatory environment in mind. However, it is clear the framework does not supersede or supplement existing laws or regulations. 3 Although created for the government s critical infrastructure, the framework can apply to any organization, regardless of the organization s size, sophistication, or cybersecurity risk level. Because it employs common, easily understood language, the framework permits both internal and external organization stakeholders not just an information technology (IT) department to understand, address, manage, and reduce cybersecurity risks. The NIST Cybersecurity Framework is organized into five continuous and concurrent functions identify, protect, detect, respond, and recover which constitute the framework s core for reducing cybersecurity risks. Each of the core functions provides a process for an organization s management of cybersecurity risks. Identify means to develop the organizational understanding to manage cybersecurity risks to systems, assets, data, and capabilities. By understanding the risks to an organization s systems, assets, data, and capabilities, the organization can focus and prioritize its cybersecurity efforts to align with their risk management strategy and business requirements. Protect means to develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. This function encompasses providing training to employees regarding cybersecurity risks and protection; limiting access to systems, data, and assets; using technology to secure data; and maintaining cybersecurity policies. Detect means to develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. This function promotes the monitoring of information systems frequently and testing processes to detect irregular activity. Respond means to develop and implement the appropriate activities to take action regarding a detected cybersecurity event. The respond function includes executing the organization s processes and procedures for response, coordinating and communicating with internal and external stakeholders, controlling and mitigating the event within an adequate response time, and revising the organization s processes and procedures to incorporate lessons learned from the cybersecurity event. Recover means to develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. This function facilitates an organization s timely recovery to normal operations and seeks to minimize the impact of the cybersecurity event on the organization s internal and external stakeholders. Each core function is broken down further into categories of an organization s needs and activities. For example, the protect function includes access control, awareness and training, and protective technology. Each category is further divided into subcategories of specific outcomes of technical or management activities. In this regard, subcategories of access control include the specific activities of managing credentials and remote access for authorized users. Then, within each subcategory are informative references to specific sections of standards, practices, and guidelines that illustrate a method for achieving the desired outcome. For example, for more information on the subcategory Identities and credentials are managed for authorized devices and users, the framework directs one to NIST Special Publication SP Revision 4 s detailed guidelines for account management in its Security and Privacy Controls for Federal Information Systems and Organizations. Because the framework provides guidance for the process an organization can take to identify, protect, detect, respond to, and recover from cybersecurity risks, it is not a checklist, standard, or ladder for organizations to climb to a static end point. Instead, the core functions are intended to be performed continuously and concurrently to protect against cybersecurity risks. Moreover, each organization faces unique risks requiring varying approaches to cybersecurity. The framework is a guide for organizations to use to build their own cybersecurity programs. It is meant to direct organizations to assess their current security capabilities, set goals for immediate and future improvement, and create a plan for achieving those individual goals of improving and maintaining their cybersecurity program. The framework can also help an organization determine which activities are most important to prioritize investments and maximize the impact of every dollar spent on security. But the framework does not contain specific requirements, practices, or elements that must be implemented to ensure protection. After all, there is no NJSBA.COM NEW JERSEY LAWYER DECEMBER

3 such thing as complete protection from cybersecurity risks, and the framework is also not a cure-all or a silver bullet for protecting organizations. Every day, new risks seek to exploit previously unknown vulnerabilities, which is why the framework is not a guideline that can be reviewed once and forgotten. Organizations need to continually revisit the framework s processes for improving their cybersecurity systems as the organizations assets, sophistication, and cybersecurity risks change. Just as an organization is constantly evolving, the framework is not static, but a living document that will continue to be updated and improved as the industry provides feedback on [its] implementation. 4 FTC Security Standards Since being founded in 1914, the FTC has functioned as the nation s consumer protection agency. The FTC is committed to protecting consumer privacy and promoting data security through its Federal Trade Commission Act, Section 5 power to prohibit unfair or deceptive acts or practices in or affecting commerce. 5 The commission s standard for data security, and what constitutes unfair or deceptive acts, is reasonableness. But what does this amorphous standard mean? Last summer, Wyndham Worldwide challenged the FTC s authority to regulate cybersecurity practices and the FTC s lack of a defined standard. 6 A New Jersey District Court held that the FTC Act permits the FTC to regulate cybersecurity practices and refused to carve out a data-security exception to the FTC s unfairness authority. 7 The court concluded that fair notice of what constitutes reasonable cybersecurity practices does not require[] the FTC to formally issue rules and regulations before it can file an unfairness claim in federal district court. 8 Recognizing the evolving landscape of cybersecurity, the court explained that the prohibitions in Section 5 of the act are necessarily flexible and intended for cases arising out of unprecedented situations. According to the court, the FTC s complaints, consent agreements, public statements, and business guidance brochure provide sufficient guidance to companies about the FTC s standards for reasonable and appropriate data security practices. 9 On appeal, the Third Circuit affirmed the district court s holding, finding that Wyndham was not entitled to know with ascertainable certainty the cybersecurity standards by which the FTC expected it to conform. 10 The court went on to recognize that Wyndham and other organizations only need fair notice that its conduct could fall within the purview of FTC enforcement under Section The FTC considers whether an organization s approach to security is reasonable in light of the volume and sensitivity of the information the organization maintains. The FTC also considers the size and complexity of the organization s operations and the cost of the resources available to address the organization s vulnerabilities. Overall, the FTC looks at whether the company has undertaken a reasonable approach to secure its data. Rather than waiting for a clear delineation from the FTC of the type of conduct it is going to police, businesses need to be cognizant of past and current enforcement actions, FTC-issued security guidebooks, and other resources available on the FTC s website. 12 One such guideline the FTC has provided to organizations is the Start with Security: A Guide for Business, Lessons Learned from FTC Cases. 13 In this guideline, the FTC has distilled its more than 50 enforcement actions into 10 lessons for addressing vulnerabilities that affect organizations and practical guidance on how to reduce data and privacy risks. The 10 lessons are: 1) start with security; 2) control access to data sensibly; 3) require secure passwords and authentication; 4) store sensitive personal information securely and protect it during transmission; 5) segment the network and monitor who s trying to get in and out; 6) secure remote access to the network; 7) apply sound security practices when developing new products; 8) make sure service providers implement reasonable security measures; 9) put procedures in place to keep security current and address vulnerabilities that may arise; and 10) secure paper, physical media, and devices. 14 As the FTC recognized, most of these lessons result from basic security mistakes. However, the FTC will continue to bring enforcement actions if organizations fail to employ reasonable and appropriate cybersecurity practices. NIST Cybersecurity Framework Aligns with the FTC s Approach The FTC has recognized that the NIST Cybersecurity Framework s approach is fully consistent with its own approach to cybersecurity. In fact, the FTC has been evaluating and bringing Section 5 enforcement actions against organizations for years for failing to take reasonable and appropriate steps to identify, protect, detect, respond to, and recover from the five core functions of the framework. The FTC took action against companies, like Petco, which failed to identify its cybersecurity risks and develop a roadmap for addressing them. In the enforcement action against Petco, the FTC brought a Section 5 claim under the deception prong, alleging Petco failed to identify security flaws in its website that violated privacy promises it made to its customers. 15 The alleged security flaws were commonly known web-based application attacks that would have been preventable had Petco implemented reasonable and appropriate security measures to secure and protect sensitive 46 NEW JERSEY LAWYER DECEMBER 2016 NJSBA.COM

4 consumer information, including readily available defenses that would have blocked such attacks. Both the FTC and the NIST Cybersecurity Framework encourage companies to take steps to identify threats and areas of vulnerability to both data and personal information. The FTC has also pursued enforcement actions against Twitter 16 and Accretive Health, 17 for failing to protect its organizational data. In the action against Twitter, the FTC alleged that Twitter provided the majority of its employees with administrative control over its system, which increased the chance of a serious breach. Rather than limiting administrative control to a select few, the FTC alleged that a hacker could gain control of Twitter s system by obtaining access to almost any employee s credentials. In its action against Accretive Health, an employee s laptop computer, containing 20 million pieces of information on 23,000 patients, was stolen from the employee s car. The FTC alleged the organization failed to create adequate data security measures to protect sensitive consumer information against the risk of theft or misuse. Both the FTC and the NIST Cybersecurity Framework advise organizations to control access permissions and protect data on the move. FTC actions have also resulted from organizations failing to detect the occurrence of a cybersecurity breach in a timely manner. When Dave and Buster s failed to implement intrusion detection software or monitor its system for irregular activity, the FTC brought a Section 5 action against the company after consumers credit and debit card information was hacked, resulting in several hundred thousand dollars in fraudulent charges. 18 Had Dave and Buster s followed the NIST Cybersecurity Framework s guideline and monitored the activity on its systems, it may have identified the intrusion earlier and may have minimized the attack. The FTC and the framework encourage use of monitoring systems to alert organizations to unauthorized personnel, connections, devices, and software on their systems. The widely publicized FTC action against Wyndham Worldwide resulted from the organization s failure to respond to a detected cybersecurity event. 19 The FTC alleged that Wyndham was aware of a previous cybersecurity breach, but despite its knowledge did not respond properly and failed to monitor its system for the same malware used in subsequent attacks, resulting in the total exposure of 619,000 consumer records. Specifically, Wyndham experienced two more breaches by hackers using the same or similar techniques as the first breach. The FTC alleged that Wyndham failed to remedy known security vulnerabilities, failed to employ NJSBA.COM NEW JERSEY LAWYER DECEMBER

5 reasonable measures to detect unauthorized access, and failed to follow proper incident response procedures. The FTC and the NIST Cybersecurity Framework urge organizations to contain cybersecurity events and take the appropriate actions necessary to prevent the same or similar attacks in the future. Further, organizations need to communicate about cybersecurity attacks with their internal and external stakeholders. Finally, the FTC has brought an enforcement action against Oracle based on Oracle s failure to communicate with its consumers about how to recover from a cybersecurity event. 20 The FTC alleged that Oracle knew about major security vulnerabilities in its software yet promised its consumers that installing the software would make their systems more safe and secure. The FTC alleged that Oracle failed to communicate truthfully about what consumers would need to do in order to be protected from similar breaches in the future. According to the FTC, because Oracle left its consumers vulnerable to additional breaches, the organization did not fully recover from the cybersecurity event under the NIST Cybersecurity Framework or the FTC s standards. The FTC required Oracle to communicate with its consumers through its website, social media, and external parties about how to protect themselves from similar attacks. Had these organizations followed the security practices emphasized in the NIST Cybersecurity Framework identify, protect detect, respond to, recover from the organizations could have reduced the risk of a cybersecurity incident and potential exposure under Section 5 of the FTC Act. Key Takeaways Even though the NIST Cybersecurity Framework is not a cure-all and does not provide immunity from an FTC action, the FTC still encourages organizations to utilize its processes to improve its risk-based security. If an organization is continuously and concurrently working through the framework s core functions, it is more likely the organization will have undertaken a reasonable process to secure data and make it less likely that the FTC will come knocking. Both the FTC and the NIST Cybersecurity Framework contemplate that there is no one-size-fits-all approach to cybersecurity. However, FTC guidance and its enforcement approach take into account that organizations using the framework are more likely to assess and improve their control over cybersecurity risks, resulting in a higher likelihood the organization has undertaken a reasonable process to secure data. At a minimum, businesses should utilize both the NIST Cybersecurity Framework and the FTC s Start with Security guidance to reasonably address cybersecurity issues, to better protect consumer data, and to be proactive rather than forced to be reactive. And finally, because what is reasonable today may not be reasonable tomorrow in the cybersecurity realm, businesses need to be constantly designing, redesigning, and updating their cybersecurity policies and procedures. Fernando M. Pinguelo is a partner with Scarinci Hollenbeck and chair of its cybersecurity and data protection group. Angelo A. Stio III is a commercial litigation partner with Pepper Hamilton LLP and a member of the firm s privacy, security and data protection practice group. Suzanne M. Noyes is an associate in Pepper Hamilton LLP s commercial litigation department. Daniel Sodroski is a litigation associate with Borah, Goldstein, Altschuler, Nahins & Goidel, P.C. ENDNOTES 1. See blogs/business-blog/2016/08/nist-cybersecurity-framework-ftc. 2. The NIST Cybersecurity Framework and other industry resources are available at: https: // 3. See cybersecurity-framework-faqs-using-framework. 4. Cybersecurity Framework Version 1.0, Executive Summary dated Feb. 12, U.S.C. 45(a). 6. See FTC v. Wyndham Worldwide Corp., 10 F. Supp. 3d 602 (D.N.J. April 7, 2014). 7. Id. at Id. at Id. at FTC v. Wyndham Worldwide Corp., 799 F.3d 236, 255 (3d Cir. 2015). 11. Id. at 255, See FTC v. Wyndham Worldwide Corp., 10 F. Supp. 3d 602, (D.N.J. April 7, 2014). 13. The FTC s Start with Security guideline and other FTC resources are available at: Id. 15. See See See See See See 48 NEW JERSEY LAWYER DECEMBER 2016 NJSBA.COM

Cybersecurity for Health Care Providers

Cybersecurity for Health Care Providers Cybersecurity for Health Care Providers Montgomery County Medical Society Provider Meeting February 28, 2017 T h e MARYLAND HEALTH CARE COMMISSION Overview Cybersecurity defined Cyber-Threats Today Impact

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

Framework for Improving Critical Infrastructure Cybersecurity. and Risk Approach

Framework for Improving Critical Infrastructure Cybersecurity. and Risk Approach Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 and Risk Approach June 9, 2016 cyberframework@nist.gov Executive Order: Improving Critical Infrastructure

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect

Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect Mark Your Calendars: NY Cybersecurity Regulations to Go into Effect CLIENT ALERT January 25, 2017 Angelo A. Stio III stioa@pepperlaw.com Sharon R. Klein kleins@pepperlaw.com Christopher P. Soper soperc@pepperlaw.com

More information

Privacy, Cyber Threats and Risk Mitigation Mitigating Liability Through the SAFETY Act

Privacy, Cyber Threats and Risk Mitigation Mitigating Liability Through the SAFETY Act Privacy, Cyber Threats and Risk Mitigation Mitigating Liability Through the SAFETY Act Joe DePaul, Senior Vice President Brian Finch, Partner April 9, 2015 Pillsbury Winthrop Shaw Pittman LLP The Threat

More information

Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology

Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology It s a hot topic!! Executives are asking their CISOs a LOT of questions about it Issues are costly, from a financial and a reputational

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

Cybersecurity: Incident Response Short

Cybersecurity: Incident Response Short Cybersecurity: Incident Response Short August 2017 Center for Development of Security Excellence Contents Lesson 1: Incident Response 1-1 Introduction 1-1 Incident Definition 1-1 Incident Response Capability

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 Agenda Rise in Data Breaches Effects of Increase in Cybersecurity Threats Cybersecurity Framework

More information

Choosing the Right Cybersecurity Assessment Tool Michelle Misko, TraceSecurity Product Specialist

Choosing the Right Cybersecurity Assessment Tool Michelle Misko, TraceSecurity Product Specialist Choosing the Right Cybersecurity Assessment Tool Michelle Misko, TraceSecurity Product Specialist Agenda Industry Background Cybersecurity Assessment Tools Cybersecurity Best Practices 2 Cybersecurity

More information

Managing Cybersecurity Risk

Managing Cybersecurity Risk Managing Cybersecurity Risk Maureen Brundage Andy Roth August 9, 2016 Managing Cybersecurity Risk Cybersecurity: The Current Legal and Regulatory Environment Cybersecurity Governance: Considerations for

More information

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED HEALTHCARE ORGANIZATIONS ARE UNDER INTENSE SCRUTINY BY THE US FEDERAL GOVERNMENT TO ENSURE PATIENT DATA IS PROTECTED Within

More information

Cybersecurity, safety and resilience - Airline perspective

Cybersecurity, safety and resilience - Airline perspective Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,

More information

CHAPTER 13 ELECTRONIC COMMERCE

CHAPTER 13 ELECTRONIC COMMERCE CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.

How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely

More information

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. How to implement NIST Cybersecurity Framework using ISO 27001 WHITE PAPER Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

More information

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED

More information

GUIDELINES ON MARITIME CYBER RISK MANAGEMENT

GUIDELINES ON MARITIME CYBER RISK MANAGEMENT E 4 ALBERT EMBANKMENT LONDON SE1 7SR Telephone: +44 (0)20 7735 7611 Fax: +44 (0)20 7587 3210 GUIDELINES ON MARITIME CYBER RISK MANAGEMENT MSC-FAL.1/Circ.3 5 July 2017 1 The Facilitation Committee, at its

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center What to expect from today: The ugly truth about planning Why you need a plan that works Where

More information

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK 03 Introduction 04 Step 1: Preparing for a breach CONTENTS 08 Step

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments 1 ID.AM-1: Physical devices and systems within the organization are inventoried Asset Management (ID.AM): The

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

HEALTH CARE AND CYBER SECURITY:

HEALTH CARE AND CYBER SECURITY: HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers

More information

SEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks

SEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks SEC Key Considerations for Public Companies for Mitigating and Disclosing Cybersecurity Risks By Richard A. Blunk (Thermopylae Ventures, LLC) and Apprameya Iyengar (Morrison Cohen LLP) The SEC has continued

More information

The Evolving Threat to Corporate Cyber & Data Security

The Evolving Threat to Corporate Cyber & Data Security The Evolving Threat to Corporate Cyber & Data Security Presented by: Sara English, CIPP/US Sara.English@KutakRock.com 1 http://blogs.wsj.com/law/2015/12/09/employee error leading cause of data breaches

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

Re: McAfee s comments in response to NIST s Solicitation for Comments on Draft 2 of Cybersecurity Framework Version 1.1

Re: McAfee s comments in response to NIST s Solicitation for Comments on Draft 2 of Cybersecurity Framework Version 1.1 January 19, 2018 VIA EMAIL: cyberframework@nist.gov Edwin Games National Institute of Standards and Technology 100 Bureau Drive, Mail Stop 8930 Gaithersburg, MD 20899 Re: McAfee s comments in response

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018 Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your

More information

Updates to the NIST Cybersecurity Framework

Updates to the NIST Cybersecurity Framework Updates to the NIST Cybersecurity Framework NIST Cybersecurity Framework Overview and Other Documentation October 2016 Agenda: Overview of NIST Cybersecurity Framework Updates to the NIST Cybersecurity

More information

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles Incident Response Lessons From the Front Lines Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles 1 Conflict of Interest Nolan Garrett Has no real or apparent conflicts of

More information

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014

Computer Security Incident Response Plan. Date of Approval: 23-FEB-2014 Computer Security Incident Response Plan Name of Approver: Mary Ann Blair Date of Approval: 23-FEB-2014 Date of Review: 31-MAY-2016 Effective Date: 23-FEB-2014 Name of Reviewer: John Lerchey Table of Contents

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary

More information

NCSF Foundation Certification

NCSF Foundation Certification NCSF Foundation Certification Overview This ACQUIROS accredited training program is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity

More information

Overview of the Cybersecurity Framework

Overview of the Cybersecurity Framework Overview of the Cybersecurity Framework Implementation of Executive Order 13636 Matt Barrett Program Manager matthew.barrett@nist.gov cyberframework@nist.gov 15 January 2015 Executive Order: Improving

More information

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time TM Plan. Protect. Respond. Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time Registration is open for the April webinar:

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Draft Version 1.1 National Institute of Standards and Technology January 10, 2017 Note to Reviewers on the Update and Next Steps The draft

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager 2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager NIST Cybersecurity Framework (CSF) Executive Order 13636 Improving Critical Infrastructure Cybersecurity tasked the National

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity November 2017 cyberframework@nist.gov Supporting Risk Management with Framework 2 Core: A Common Language Foundational for Integrated Teams

More information

Heavy Vehicle Cyber Security Bulletin

Heavy Vehicle Cyber Security Bulletin Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin

More information

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest? Data Privacy According to statistics provided by the Data Breach Level Index, hackers and thieves are stealing more than 227,000 personal records per hour as of 2017, generally targeting customer information

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Emerging Issues: Cybersecurity. Directors College 2015

Emerging Issues: Cybersecurity. Directors College 2015 Emerging Issues: Cybersecurity Directors College 2015 Agenda/Objectives Define Cybersecurity Cyber Fraud Trends/Incidents FFIEC Cybersecurity awareness initiatives Community Bank expectations FFIEC Cybersecurity

More information

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston Cybersecurity Landscape Major Data Breaches (e.g., OPM, IRS) Data Breach Notification Laws Directors Derivative Suits Federal Legislation

More information

Cybersecurity Considerations for GDPR

Cybersecurity Considerations for GDPR Cybersecurity Considerations for GDPR What is the GDPR? The General Data Protection Regulation (GDPR) is a brand new legislation containing updated requirements for how personal data of European Union

More information

ST. VINCENT AND THE GRENADINES

ST. VINCENT AND THE GRENADINES ST. VINCENT AND THE GRENADINES MARITIME ADMINISTRATION CIRCULAR N ISM 014 MARITIME CYBER RISK MANAGEMENT MSC.1/CIRC.1526, MSC-FAL.1/CIRC.3, RESOLUTION MSC.428 (98) TO: APPLICABLE TO: SHIPOWNERS, SHIPS

More information

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data Business White Paper Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data Page 2 of 7 Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data Table of Contents Page 2

More information

The Honest Advantage

The Honest Advantage The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Information for entity management. April 2018

Information for entity management. April 2018 Information for entity management April 2018 Note to readers: The purpose of this document is to assist management with understanding the cybersecurity risk management examination that can be performed

More information

NDIS Quality and Safeguards Commission. Incident Management System Guidance

NDIS Quality and Safeguards Commission. Incident Management System Guidance NDIS Quality and Safeguards Commission Incident Management System Guidance Version 1 - May 2018 Acknowledgment This guidance is published by the Australian Government, using resources developed by the

More information

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017 DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.

More information

HIPAA Security and Privacy Policies & Procedures

HIPAA Security and Privacy Policies & Procedures Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

Cybersecurity and Nonprofit

Cybersecurity and Nonprofit Cybersecurity and Nonprofit 2 2 Agenda Cybersecurity and Non Profits Scenario #1 Scenario #2 What Makes a Difference Cyber Insurance and How it Helps Question and Answer 3 3 Cybersecurity and Nonprofit

More information

Guidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17

Guidelines. on the security measures for operational and security risks of payment services under Directive (EU) 2015/2366 (PSD2) EBA/GL/2017/17 GUIDELINES ON SECURITY MEASURES FOR OPERATIONAL AND SECURITY RISKS UNDER EBA/GL/2017/17 12/01/2018 Guidelines on the security measures for operational and security risks of payment services under Directive

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

Addressing the elephant in the operating room: a look at medical device security programs

Addressing the elephant in the operating room: a look at medical device security programs Addressing the elephant in the operating room: a look at medical device security programs Ernst & Young LLP Presenters Michael Davis Healthcare Leader Baltimore +1 410 783 3740 michael.davis@ey.com Esther

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report Nationwide Cyber Security Review: Summary Report Nationwide Cyber Security Review: Summary Report ii Nationwide Cyber Security Review: Summary Report Acknowledgments The Multi-State Information Sharing

More information

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 Table of Contents Executive Summary...1 1.0 Framework Introduction...3

More information

NYDFS Cybersecurity Regulations

NYDFS Cybersecurity Regulations SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook guide. This guide has been created especially for you for use in within your security

More information

OA Cyber Security Plan FY 2018 (Abridged)

OA Cyber Security Plan FY 2018 (Abridged) OA Cyber Security Plan FY 2018 (Abridged) 1 Table of Contents Vision... 3 Goals, Strategies, and Tactics... 5 Goal #1: Create a Culture that Fosters the Adoption of Cyber Security Best Practices... 5 1.1

More information

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

NYDFS Cybersecurity Regulations: What do they mean? What is their impact? June 13, 2017 NYDFS Cybersecurity Regulations: What do they mean? What is their impact? Gus Coldebella Principal, Boston Caroline Simons Principal, Boston Agenda 1) Overview of the new regulations 2) Assessing

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action

2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action 2018 Data Security Incident Response Report Building Cyber Resilience: Compromise Response Intelligence in Action April 11, 2018 Contact Information Casie D. Collignon Partner Denver 303.764.4037 ccollignon@bakerlaw.com

More information

Jeff Wilbur VP Marketing Iconix

Jeff Wilbur VP Marketing Iconix 2016 Data Protection & Breach Readiness Guide February 3, 2016 Craig Spiezle Executive Director & President Online Trust Alliance Jeff Wilbur VP Marketing Iconix 1 Who is OTA? Mission to enhance online

More information

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Cyber Security and Inside Threats: Turning Policies into Practices Presented by Ingrid Fredeen and Pamela Passman Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0 Presented By Ingrid Fredeen, J.D.

More information

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response Cyber Incident Response Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response 1 2 Today, no Canadian business is immune from a potential attack. It s no longer

More information

CISO as Change Agent: Getting to Yes

CISO as Change Agent: Getting to Yes SESSION ID: CXO-W02F CISO as Change Agent: Getting to Yes Frank Kim Chief Information Security Officer SANS Institute @fykim Outline Catch the Culture Shape the Strategy Build the Business Case 2 #1 Catch

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

Regulation P & GLBA Training

Regulation P & GLBA Training Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Cyber risk management into the ISM Code

Cyber risk management into the ISM Code Building trust. Shaping Safety No. Subject: Cyber risk management into the ISM Code To: insb auditors/managing companies IMO Resolution incorporates maritime cyber risk management into the ISM Code making

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

Rethinking Information Security Risk Management CRM002

Rethinking Information Security Risk Management CRM002 Rethinking Information Security Risk Management CRM002 Speakers: Tanya Scott, Senior Manager, Information Risk Management, Lending Club Learning Objectives At the end of this session, you will: Design

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

DFARS Cyber Rule Considerations For Contractors In 2018

DFARS Cyber Rule Considerations For Contractors In 2018 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors

More information

The Cyber War on Small Business

The Cyber War on Small Business The Cyber War on Small Business Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Meet Our Speaker Dillon Behr Executive Lines Broker Risk Placement Services, Inc. Previously worked as Cyber

More information

SEC Issues Updated Guidance on Cybersecurity Disclosure

SEC Issues Updated Guidance on Cybersecurity Disclosure February 27, 2018 SEC Issues Updated Guidance on Cybersecurity Disclosure On February 21, 2018, the Securities and Exchange Commission (the SEC ) issued an interpretive release providing Commission-level

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information