Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.
In an interview with ALM's Legaltech News, Google Inc., General Counsel Kent Walker explains: “You only need to read the news ' from credit card theft to photo hacks to widespread e-mail breaches ' to see the increase in cybercrimes by vandals, criminal hackers and even state-sponsored entities. And those attacks are becoming more sophisticated, even as people grow more wary. Our growing use of multiple connected devices improves productivity, but also expands the attack surface.”
Legal teams may be prepared to navigate compliance and risk issues, but the complexity of cyberthreats ' not to mention the unpredictable ways damage wrought by them can ripple ' demands new partnerships and resources. And while corporations will never get ahead of the strategies employed by cybercriminals, the partnerships engendered by the challenge can make available defenses stronger.
Know Your Enemy
The wisdom of Sun Tzu from The Art of War ' “If you know the enemy and know yourself, you need not fear the result of a hundred battles” ' holds true today in the cybersecurity space, yet while legal teams may have an inkling of where they need to shore up their defenses, the threats are that much harder to know.
The lineup of malfeasants hoping to crash corporate gates is an evolving m'lange of insiders, hackers, government-backed organizations, activists and criminals. Each year, Verizon's Data Breach Incident Report (DBIR) offers an in-depth look at the changing roster of usual suspects in the cybercrime field, along with an examination of the vectors used and the industries targeted.
According to the most recent DBIR, for the largest organizations in the world, cybersecurity events accounted for $400 million in damages and 700 million compromised records in 2014. The most common method used to gain access to records was through program errors, which accounted for 29.4% of the recorded incidents. Malware and insider misuses claimed 25.1% and 20.6%, respectively. Surprisingly, point-of-sale intrusions accounted for only 0.7% of recorded attacks, despite having made headlines in some of the most public data breaches of 2014.
While this information shows which types of methods have been used to gain access, it belies the diversity of bad actors responsible for such attacks.
FireEye, Inc., has played a significant role in the investigation and remediation of some of the most widely publicized attacks of the last three years. The company's intelligence indicates that, to date, over 95% of the world's top companies have already been breached but may not know it yet, and according to FireEye SVP, General Counsel and Corporate Secretary Alexa King, cybercriminals on the whole are growing in strength.
“The landscape is rapidly evolving with extremely sophisticated attacks through well-funded campaigns. From our perspective, it's a new level of organized crime and espionage. Today's attacks are advanced, stealthy, targeted and persistent, and those responsible are often unknown,” King says.
Given that stealth is an underlying goal of cybercrime rings, a full view of usual suspects is difficult to come by. Elaborating further on the mushrooming threat of organized cybercrime networks, King explains: “The reason we think about it as organized crime is that it's really escalated in sophistication from the solo hackers of years ago. These are nation states, they are organized criminals, and they are entities that are spending a lot of time and resources learning how to attack organizations. Their goal is sometimes financial, either directly or through non-public information they can use for financial benefit. It can be intellectual property, a nation state or organization may want to see the latest designs or innovations that your company is developing, for example. It's a heightened threat level with much higher risk for organizations and higher reward for cyberattackers.”
Know Yourself
If knowing your enemy is step one in building a better cybersecurity defense, then knowing yourself is the critical phase two of that process. The legal team may not have historically had the technological chops to address cybersecurity liability itself, but it can find a number of allies both inside and outside of the organization to make the calls necessary to reduce business and legal liability resulting from data breaches.
“We rely on thousands of people across Google to provide security measures. That's just not realistic for most companies, but security is undeniably a cross-team discipline. You need technical engineering experts who can detect and protect against incidents. But it doesn't end there,” Walker explains. “Legal, business and customer support teams all need to build cybersecurity into their work, including how they build services and work with vendors. Your CEO and board need to understand and buy into the company's approach.”
As Walker correctly points out, many companies are not sufficiently staffed to devote resources to the fight against cyberassailants. However, those companies still have options for accessing expertise.
“What we're seeing now is that companies may not have the robust and complex internal cybersecurity teams that are needed to address advanced persistent threats, but more and more are considering outsourcing that role to a third-party cyberdefense partner,” King says. “Unless you have the time and resources to train experts internally, you may miss something.”
In addition to the partnerships required to protect a company from cybersecurity risk, consideration must be given to the prevailing regulatory atmosphere in the U.S. Regulatory risk should also be considered in internal explorations of cyberdefense and strategy.
Brenda Sharton, co-chair of Goodwin Procter's privacy and data security practice, has been a practicing privacy and cybersecurity litigator since the late 1990s. She's seen regulation surrounding data security evolve and how it's become a challenge for corporate legal departments that are victims of attacks.
As it relates to navigating the complicated regulatory environments, Sharton advises: “At the board level, some of the things you may consider are having a competent chief information and security officer, or alternatively for smaller companies engaging outside technical expertise. Perfect security doesn't exist, but every organization can learn to be stronger. If you're learning from the experience of others, that's even better.”
As of yet, cybersecurity legislation creating a minimum bar of compliance across all sectors and industries has eluded passage in the U.S. Congress. The patchwork of state laws and regulation is likely to prevail for some time, and with no safe harbor provided by compliance, cyberattacks carry an increasing legal and business risk for organizations
Take the findings of a recent Mayer Brown survey, for example. Researchers there sought to unearth the prevailing attitudes of corporate lawyers and executives surrounding cybersecurity. When respondents were asked to assess how cyberissues have increased the risk of lawsuits, 57% indicated that cyberrisk had a modest impact on litigation risk, and 63% agreed that the potential legal fallout from such events has now become a “cost of doing business.”
King says: “If you think about some of those high-visibility breaches we've all read about in the past few months, we've seen among other things; stock price drops, shareholder suits, government investigations and even executive resignations. There's even a risk that private communications can leak. On the consumer end, customers can lose faith in your systems or your integrity as a company and if that happens, they will go elsewhere. The costs associated with those risks can be in millions or billions of dollars and loss of reputation and relationships with customers can be irreparable. In my mind, the legal and business ramifications are intertwined because as you experience business losses, you'll also experience potential legal exposure.”
And, as if managing the challenges of reputation and regulation weren't enough, Walker reminds us that the legal team's involvement with vendors, law firms and other external organizations can also pose a risk. Insider misconduct was the third most common vector of attack for data breach, according to Verizon's DBIR, and as such, weak cybersecurity precautions within that network can manifest downstream for organizations. “Your data is only as safe as the weakest link in the chain,” Walker adds. “Given the sensitive materials handled by law firms, any firm should be using strong, cloud-based security, two-factor verification of access and other protective measures.”
Know Where to Start
As has been stated many times about cybersecurity, it's not a matter of if a company will be attacked, but rather when . Breaches reported in the news are a small tip of a much larger iceberg, and traditional modes of defense have become antiquated in the face of new and increasingly organized dangers. With that in mind, legal departments and organizations as a whole must fill their cyberdefense quivers with a combination of technology, training and process management.
“The critical issue is to fill the security holes that are left open, those left by firewalls, intrusion protection systems, gateways and antivirus software,” King says. “Today's cyberthreats are shape shifters, so you can't recognize them based on what they looked like yesterday. Through concepts like signature-less environments you can detect threats in real time, and use the time saved to contain threats. We think a winning solution requires more than just that technology, but it's a combination of technology training and expertise.”
But even with those novelties included in a cyberdefense plan, when data security precautions are inevitably breached, planning and proactivity can help mitigate the liabilities associated with data loss. This means thinking about the breach in advance, and having representatives from potentially affected departments ready to assess the situation and react accordingly, even if the internal resources needed for cybersecurity defense teams are unavailable.
“Incident response is not a simple matter,” Walker adds. “It can be hard to assess the extent and scope of the damage to your systems and to your customers' information. You need established procedures and committed resources so that you can move quickly and in the right direction; it's critical to avoid the kind of panic that leads to errors (and can even make matters worse). The first priority is the technical response ' being clear on what happened, how it happened, and how best to restore security. But you also want to notify affected parties promptly, so the legal team needs to move rapidly as well, and to manage the communications carefully, since the details matter. You want all the right people in the rapid-response team. Manage internal discussions to avoid wild (and often incorrect) speculation. And make sure you do an after-action report to ensure that the company learns the right lessons for the inevitable next time.”
Chris DiMarco is the Executive Editor of Legaltech News, an ALM sibling of this newsletter.
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.
In an interview with ALM's Legaltech News,
Legal teams may be prepared to navigate compliance and risk issues, but the complexity of cyberthreats ' not to mention the unpredictable ways damage wrought by them can ripple ' demands new partnerships and resources. And while corporations will never get ahead of the strategies employed by cybercriminals, the partnerships engendered by the challenge can make available defenses stronger.
Know Your Enemy
The wisdom of Sun Tzu from The Art of War ' “If you know the enemy and know yourself, you need not fear the result of a hundred battles” ' holds true today in the cybersecurity space, yet while legal teams may have an inkling of where they need to shore up their defenses, the threats are that much harder to know.
The lineup of malfeasants hoping to crash corporate gates is an evolving m'lange of insiders, hackers, government-backed organizations, activists and criminals. Each year, Verizon's Data Breach Incident Report (DBIR) offers an in-depth look at the changing roster of usual suspects in the cybercrime field, along with an examination of the vectors used and the industries targeted.
According to the most recent DBIR, for the largest organizations in the world, cybersecurity events accounted for $400 million in damages and 700 million compromised records in 2014. The most common method used to gain access to records was through program errors, which accounted for 29.4% of the recorded incidents. Malware and insider misuses claimed 25.1% and 20.6%, respectively. Surprisingly, point-of-sale intrusions accounted for only 0.7% of recorded attacks, despite having made headlines in some of the most public data breaches of 2014.
While this information shows which types of methods have been used to gain access, it belies the diversity of bad actors responsible for such attacks.
FireEye, Inc., has played a significant role in the investigation and remediation of some of the most widely publicized attacks of the last three years. The company's intelligence indicates that, to date, over 95% of the world's top companies have already been breached but may not know it yet, and according to FireEye SVP, General Counsel and Corporate Secretary Alexa King, cybercriminals on the whole are growing in strength.
“The landscape is rapidly evolving with extremely sophisticated attacks through well-funded campaigns. From our perspective, it's a new level of organized crime and espionage. Today's attacks are advanced, stealthy, targeted and persistent, and those responsible are often unknown,” King says.
Given that stealth is an underlying goal of cybercrime rings, a full view of usual suspects is difficult to come by. Elaborating further on the mushrooming threat of organized cybercrime networks, King explains: “The reason we think about it as organized crime is that it's really escalated in sophistication from the solo hackers of years ago. These are nation states, they are organized criminals, and they are entities that are spending a lot of time and resources learning how to attack organizations. Their goal is sometimes financial, either directly or through non-public information they can use for financial benefit. It can be intellectual property, a nation state or organization may want to see the latest designs or innovations that your company is developing, for example. It's a heightened threat level with much higher risk for organizations and higher reward for cyberattackers.”
Know Yourself
If knowing your enemy is step one in building a better cybersecurity defense, then knowing yourself is the critical phase two of that process. The legal team may not have historically had the technological chops to address cybersecurity liability itself, but it can find a number of allies both inside and outside of the organization to make the calls necessary to reduce business and legal liability resulting from data breaches.
“We rely on thousands of people across
As Walker correctly points out, many companies are not sufficiently staffed to devote resources to the fight against cyberassailants. However, those companies still have options for accessing expertise.
“What we're seeing now is that companies may not have the robust and complex internal cybersecurity teams that are needed to address advanced persistent threats, but more and more are considering outsourcing that role to a third-party cyberdefense partner,” King says. “Unless you have the time and resources to train experts internally, you may miss something.”
In addition to the partnerships required to protect a company from cybersecurity risk, consideration must be given to the prevailing regulatory atmosphere in the U.S. Regulatory risk should also be considered in internal explorations of cyberdefense and strategy.
Brenda Sharton, co-chair of
As it relates to navigating the complicated regulatory environments, Sharton advises: “At the board level, some of the things you may consider are having a competent chief information and security officer, or alternatively for smaller companies engaging outside technical expertise. Perfect security doesn't exist, but every organization can learn to be stronger. If you're learning from the experience of others, that's even better.”
As of yet, cybersecurity legislation creating a minimum bar of compliance across all sectors and industries has eluded passage in the U.S. Congress. The patchwork of state laws and regulation is likely to prevail for some time, and with no safe harbor provided by compliance, cyberattacks carry an increasing legal and business risk for organizations
Take the findings of a recent
King says: “If you think about some of those high-visibility breaches we've all read about in the past few months, we've seen among other things; stock price drops, shareholder suits, government investigations and even executive resignations. There's even a risk that private communications can leak. On the consumer end, customers can lose faith in your systems or your integrity as a company and if that happens, they will go elsewhere. The costs associated with those risks can be in millions or billions of dollars and loss of reputation and relationships with customers can be irreparable. In my mind, the legal and business ramifications are intertwined because as you experience business losses, you'll also experience potential legal exposure.”
And, as if managing the challenges of reputation and regulation weren't enough, Walker reminds us that the legal team's involvement with vendors, law firms and other external organizations can also pose a risk. Insider misconduct was the third most common vector of attack for data breach, according to Verizon's DBIR, and as such, weak cybersecurity precautions within that network can manifest downstream for organizations. “Your data is only as safe as the weakest link in the chain,” Walker adds. “Given the sensitive materials handled by law firms, any firm should be using strong, cloud-based security, two-factor verification of access and other protective measures.”
Know Where to Start
As has been stated many times about cybersecurity, it's not a matter of if a company will be attacked, but rather when . Breaches reported in the news are a small tip of a much larger iceberg, and traditional modes of defense have become antiquated in the face of new and increasingly organized dangers. With that in mind, legal departments and organizations as a whole must fill their cyberdefense quivers with a combination of technology, training and process management.
“The critical issue is to fill the security holes that are left open, those left by firewalls, intrusion protection systems, gateways and antivirus software,” King says. “Today's cyberthreats are shape shifters, so you can't recognize them based on what they looked like yesterday. Through concepts like signature-less environments you can detect threats in real time, and use the time saved to contain threats. We think a winning solution requires more than just that technology, but it's a combination of technology training and expertise.”
But even with those novelties included in a cyberdefense plan, when data security precautions are inevitably breached, planning and proactivity can help mitigate the liabilities associated with data loss. This means thinking about the breach in advance, and having representatives from potentially affected departments ready to assess the situation and react accordingly, even if the internal resources needed for cybersecurity defense teams are unavailable.
“Incident response is not a simple matter,” Walker adds. “It can be hard to assess the extent and scope of the damage to your systems and to your customers' information. You need established procedures and committed resources so that you can move quickly and in the right direction; it's critical to avoid the kind of panic that leads to errors (and can even make matters worse). The first priority is the technical response ' being clear on what happened, how it happened, and how best to restore security. But you also want to notify affected parties promptly, so the legal team needs to move rapidly as well, and to manage the communications carefully, since the details matter. You want all the right people in the rapid-response team. Manage internal discussions to avoid wild (and often incorrect) speculation. And make sure you do an after-action report to ensure that the company learns the right lessons for the inevitable next time.”
Chris DiMarco is the Executive Editor of Legaltech News, an ALM sibling of this newsletter.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.