Sunteți pe pagina 1din 29

PERSPECTIVES ON

CYBER RISK
2017

PERSPECTIVES ON cyber risk 2017 page 1 contents


Most people are starting to realize that there are
only two different types of companies in the world:
those that have been breached and know it and
those that have been breached and don’t know it.

Ted Schlein, Venture Capitalist at Kleiner Perkins Caufield & Byers

PERSPECTIVES ON cyber risk 2017 page 2 contents


Contents

04 Introduction
06 Methodology
07 Key findings
08 Finding One
Growing concern over cyber risk
12 Finding Two
Cyber risk and the supply chain
16 Finding Three
Cyber security is not an IT issue
20 Finding Four
The changing privacy landscape
24
Finding Five
Cyber insurance is on the rise
27 How we can help
28 Contacts

PERSPECTIVES ON cyber risk 2017 page 3 contents


The 12 months since the publication of our last Perspectives on
Introduction
Cyber Risk report have seen some of the most devastating cyber
incidents yet. Every kind of organisation – government, state owned
enterprises, public and private companies and not-for-profits – has
been affected. In every industry – from finance, retail, hospitality and
healthcare, to mining and resources, utilities, professional services and
education, it’s clear that everyone is fair game in cyberspace.
High profile incidents occurring during 2016 include:

ƒƒ Allegations that Russia was involved documents, the subsequent resignation


in hacking activities relating to the US of Iceland’s Prime Minister, and ongoing
election, including hacks on the Democratic investigations into numerous organisations By 2021, cyber crime could

$6
National Convention and consequent and individuals (including a number of cost the world in excess of
email leaks. world leaders).
ƒƒ A US$81 million cyber heist involving an ƒƒ Distributed denial of service (DDoS)
attack against global financial messaging attacks against security researcher Brian
system SWIFT. Krebs, French media company OVH,
ƒƒ Large data thefts from social media the Rio Olympics online presence, the
networks, including Tumblr (65 million Australian Bureau of Statistics eCensus

trillion
accounts), LinkedIn (117 million accounts), website, and domain name server
AdultFriendFinder.com (339 million company Dyn. The attack against Dyn was
accounts), Myspace (427 million accounts) particularly devastating, disrupting internet
and Yahoo (500 million accounts). connectivity for around 70 companies, annually
including giants like Twitter, Spotify, Paypal,
ƒƒ The attack against Panamanian law
Airbnb and Reddit.
firm Mossack Fonseca, which resulted
in the theft of more than 11 million

PERSPECTIVES ON cyber risk 2017 page 4 contents


ƒƒ The accidental exposure of the personal We found that, although incremental
information of around 550,000 blood progress has been made during the past 12
Introduction donors by the Australian Red Cross. months, organisations’ issues and concerns, We have revised the terminology used
continued far from abating, have intensified. This is in this year’s report in line with evolving
ƒƒ The potential compromise of hundreds of
being driven by the growing volume, scale industry practice:
point-of-sale systems, enabling hackers to
remotely administer POS devices located in and sophistication of the cyber security cyber attack A deliberate act that seriously
retail outlets around the world. threat; an increasingly onerous Australian compromises national security, stability or
and global regulatory landscape; and an prosperity by manipulating, denying access to,
Cyber security can no longer legitimately be degrading or destroying information systems
increase in organisational interconnection
considered the domain of IT alone. Cyber or the information resident on them 1
and interdependence as a result of the rapid
attacks can entirely shut down businesses, cyber incident An occurrence that actually
adoption of cloud-based technologies.
causing significant (and sometimes or potentially results in adverse effects on
irreparable) damage to corporate and Cyber security has transcended the realm information systems or the information
government reputations, relationships of the technical – it is now a business, resident on them 2
and systems; adversely impacting other economic and national security priority,
cyber security The safeguards and actions
businesses in the supply chain; compromising which requires that a culture of cyber that can be used to protect against
the privacy of millions of individuals and resilience be woven into the fabric of public cyber incidents 3
threatening economic wellbeing and national and private sector organisations’ overall risk cyber risk Operational risks to information
security. By 2021, it is estimated that cyber management approach. and technology assets that have
crime will cost the world in excess of $6 Our survey indicates that most organisations consequences affecting the confidentiality,
trillion annually.7 still have a long way to go to achieve this. availability or integrity of information systems
or the information resident on them 4
In this increasingly fraught climate, in late
cyber resilience An organisation’s ability to
2016 we conducted our second annual
prepare for, respond to and recover from
cyber security survey, to assess changes in a cyber incident (including its ability to
Australian organisations’ cyber resilience over operate during, and adapt to and recover
the past 12 months. from, a cyber incident) 5
The survey was targeted at legal counsel, data breach A situation where information
risk managers, Board members and senior (usually including personal information) is
executives. Respondents to the survey lost or subjected to unauthorised access,
came from both public and private modification, disclosure, or other misuse
or interference, often as a result of a
sector organisations, across a wide range
cyber incident 6
of industries.

PERSPECTIVES ON cyber risk 2017 page 5 contents


MinterEllison’s online survey was completed by more than 100 legal counsel, CIOs, COOs, Board members, IT specialists and risk
managers of ASX200 and private companies, government and not-for-profit organisations. Depending on their role within the
Methodology organisation, they responded to either the CIO survey or Board survey.
Participants responded to questions about cyber security roles, responsibilities and attitudes within their organisations.
The survey was conducted between September and November 2016. This report reflects the quantitative results of the survey
questions and the respondents’ qualitative comments.
All information provided by the participants is confidential and reported primarily in aggregate form.
Where appropriate, MinterEllison has used interviewee quotes to support the report’s findings and opinions. The views
expressed in this report do not necessarily reflect the views of the individual respondents unless otherwise stated.
We make no representation or warranty about the accuracy of the information, or about how closely the information gathered
will reflect actual organisational performance or effectiveness.
Due to rounding, responses to the questions covered in this report may not add up to 100 per cent.

PERSPECTIVES ON cyber risk 2017 page 6 contents


Key findings one
Awareness of cyber risk has
two
Despite concerns about
increased as the problem the increasing cyber threat,
grows – but concrete actions organisations remain
have not changed complacent about reviewing
and testing their own cyber
resilience (and the cyber
resilience of their suppliers)

three
Cyber security is still
four
The privacy landscape is
five
The increasing uptake of cyber
(wrongly) seen as being changing – both in Australia insurance indicates some
primarily an IT issue and overseas willingness to act on managing
cyber risk

PERSPECTIVES ON cyber risk 2017 page 7 contents


one respondents who reported their
organisations had been subject to more than
Awareness of five cyber incidents in the previous 12 months.
cyber risk has
increased as the
problem worsens 2015: 8%
– but concrete
actions have not
changed
2016: 18%
5X
CYBER ATTACKS

12 MONTHS

PERSPECTIVES ON cyber risk 2017 page 8 contents


finding one

2016 saw a Our survey results reflect this increase in the


number of cyber incidents occurring.
that they were either somewhat or very
dissatisfied with their organisation’s capability
We’re seeing greater awareness, but also
less understanding, and not enough action
year-on-year increase In 2015, just 8% of respondents reported that to prevent cyber incidents doubled, from Perhaps because of the increased awareness
their organisations had been subject to more 18% in 2015 to more than 40% in 2016. and the increasing scale and complexity
in the number of than five cyber incidents in the previous 12 Similarly, at the Board level, 65% of of cyber risk, our survey results indicate

reported cyber months that had compromised their systems


or data. In 2016, this percentage more than
respondents indicated that they considered
cyber risk to be more of a risk than 12
organisations perceive that they understand
less about the extent of their own exposure to
incidents, including doubled, to 18%. months ago, while 35% of Board respondents cyber incidents than they did 12 months ago.
With the increase in the number of cyber indicated that cyber risk ranked as a top 5 risk
many high profile incidents, it is little surprise that survey (up from 29% in 2011).

incidents.8 2016 respondents expressed increased concern


in relation to their organisations’ ability to
was also the year of prevent such incidents. In our CIO survey, the
percentage of respondents who indicated
ransomware, with
the number of daily
ransomware attacks
increasing by 300% Percentage of
over 2015.9
18%
2015
40% respondents
dissatisfied with
their organisation’s
2016 capability to prevent
cyber incidents

PERSPECTIVES ON cyber risk 2017 page 9 contents


finding one

Our survey results In 2015, just over 40% of our CIO survey In our Board survey, 44% of organisations ƒƒ About 47% indicated that they do not
respondents considered they had a very responded that the Board is only briefed on regularly audit their suppliers’ IT security
show that, although good understanding of their organisations’ cyber security issues annually or on an ad hoc practices (largely unchanged from 2015).
organisations are aware exposure to cyber incidents. However, in basis, while 13% of organisations said that the ƒƒ Over 40% indicated their organisation does
of the ever increasing 2016, only 10% indicated they had a very Board received no briefings at all.10 not have a data breach response plan (up
good understanding, while more than 20% In our CIO survey: from 27% in 2015).
cyber security threat, considered they had a poor understanding.
ƒƒ Just over half of respondents indicated ƒƒ Only 8% of respondents conduct regular
many are still not taking Our results also indicate there has been their organisations had increased their internal staff training on IT security issues
little change in the practical actions that
appropriate steps to expenditure on IT security over the more frequently than annually (only
organisations are taking in order to address previous 12 months (similar to 2015). marginally improved from 2015).
properly understand the cyber risk.
ƒƒ Less than 20% indicated they regularly And for those organisations that do have
extent of their exposure, assess their customers’ cyber risk profile a data breach response plan, nearly 44%

42%
and to implement (largely unchanged from 2015). reported they do not regularly test that plan
(at least annually).
necessary practical
measures to mitigate
cyber risk and improve
their cyber resilience.
do not have a data breach response
plan (up from 27% in 2015)


[We need to] provide additional resources
and budgets to strengthen our cyber security.

PERSPECTIVES ON cyber risk 2017 page 10



contents
finding one

Embedding cyber resilience


Identify the extent of the organisation’s Develop and implement procedures to Deploy the resources (both human and
exposure to cyber risk. protect the organisation. technical) required to identify a cyber
ƒƒ Identify the information and other ƒƒ Implement and continually assess and breach in a timely manner.
assets that are essential to the update the organisation’s security-related ƒƒ Implement and continually improve
organisation (including intellectual policies and procedures (including monitoring processes and procedures.
property, infrastructure, personnel and its monitoring and detection policies ƒƒ Collaborate with peer organisations and
financial information). and processes and its data breach government agencies to share and improve
ƒƒ Identify and prioritise threats and response plan). the organisation’s cyber intelligence.
vulnerabilities faced by the organisation ƒƒ Recognise that cyber security is about
Embedding cyber (and not just technical threats, but also people, not just technology, and ensure
Have procedures in place to respond to, and
recover from, a cyber breach.
resilience within an vulnerabilities relating to personnel that all of the organisation’s personnel ƒƒ Implement and regularly test a data breach
and processes). (beyond just those charged with dealing
organisation involves ƒƒ Ensure that the organisation has sufficient with cyber incidents) are properly educated
response plan (see page 23).
ƒƒ Implement and regularly test business
more than just keeping resources to deal with a cyber incident. and trained. This may involve:
continuity and disaster recovery plans
the Board regularly ƒƒ Assess the level of awareness of cyber risk • Raising awareness of cyber security
issues and concerns in a wider context
(which should include a regular backup
within the organisation. plan for all data stored in the cloud).
informed of cyber risk ƒƒ Assess the extent to which the organisation
to engage personnel (for example, how
individuals can better protect their
issues. is exposed to supply chain risk by its
families and personal finances).
reliance on third party suppliers and key
customers (which may require reviewing • ‘Gamification’ of cyber security issues,
the cyber resilience of those third parties). to increase the level of engagement
and interest in the organisation’s cyber
ƒƒ Assess the extent to which cyber risks
security program.
are integrated into the organisation’s
general risk management procedures • Enlisting other departments within the
(including into periodic organisational organisation to assist the IT security
risk assessments and business department, so that others within the
continuity planning). organisation can be the eyes, ears and
voice of the cyber security program.

PERSPECTIVES ON cyber risk 2017 page 11 contents


two
organisations which regularly review
and test IT systems to identify new
Despite concerns or emerging threats or vulnerabilities
about the
increasing
cyber threat,
organisations
remain complacent
73
2015
57
2016
% %

about reviewing
and testing
their own cyber
resilience (and the
cyber resilience of
their suppliers)

PERSPECTIVES ON cyber risk 2017 page 12 contents


finding two

According to our This is despite a significant number of high


profile attacks over the last three years which
The subsequent investigation determined
that hackers had accessed Target’s network
ƒƒ More than US$160 million in costs booked
by Target across 2013 and 2014 relating to
CIO survey only 57% of have involved external actors attacking IT through credentials stolen from a company the data breach.
systems through vulnerabilities in the systems that supplied Target with refrigeration and ƒƒ More than US$200 million in estimated
organisations regularly or practices of third party suppliers. There is HVAC services. costs on the part of banks and credit
also an overwhelming perception of those
review and test surveyed (nearly 80%) that external actors –
The fallout from the Target data
breach included:
unions having to re-issue 21.8 million
credit cards.
their key IT systems including nation states, terrorists, organised
crime syndicates and hacktivists – constitute
ƒƒ Significant reputational damage, which ƒƒ More than 140 class action and other law
may have explained, at least in part, a 46% suits launched against Target (including by
to identify new or the most significant cyber security threat to
year-on-year reduction in profits. banks and consumers).
their organisations.11
emerging threats or Target US’s 2014 data breach is a dramatic
ƒƒ The resignation of Target’s CIO, followed a More recently, in the October 2016 data
few months later by the resignation of its breach affecting the Australian Red Cross, a file
vulnerabilities (down example of what can go wrong when a third
party supplier opens the door to malicious
CEO, President and Chairman of the Board. containing the personal information (including

from 73% in 2015). external actors. In that case, 40 million


ƒƒ The layoff of 475 employees at Target’s
head office.
sensitive medical information) of more than
550,000 blood donors was inadvertently
credit card numbers, as well as the personal
published on a publicly exposed server by
At the same time, only information of 70 million individuals, were ƒƒ Institutional Shareholder Services’
(ultimately unsuccessful) attempt to
the third party contractor charged with
stolen through malware installed within
33% of organisations Target’s point-of-sale system. remove all of the members of Target’s audit
maintaining the Red Cross’ website.
and corporate responsibility committee
regularly audit their (comprising 7 of Target’s 10 directors).

suppliers’ IT security
practices (largely
unchanged from
2015). “
[We need] independent review
of cyber protection for adequacy.

PERSPECTIVES ON cyber risk 2017 page 13


“ contents
finding two

Other examples of data breaches occurring Yet, according to our CIO survey, only a third of Other legal and regulatory consequences,
because of third party suppliers include: organisations regularly audit their suppliers’ IT including breach of the Corporations Act 2001
ƒƒ Cogent Healthcare’s 2013 data breach, security practices, while more than 90% plan (Cth) (Corporations Act), and under ‘long arm’
where a medical transcription vendor’s to deliver one or more of their IT functions via overseas legislation (such as the EU General
security lapse resulted in the data of 32,000 the cloud over the next 12 months. Data Protection Regulation) are considered in
patients being inadvertently published on Findings 3 and 4 of this report.
Risk of legal and regulatory action
a publicly exposed server. In addition to potentially significant financial
ƒƒ US Home Depot’s 2014 data breach, where and reputational consequences, organisations
hackers used credentials stolen from a third may face legal and regulatory action for
party vendor to gain access to point of failing to properly consider and manage
sale data and steal the details of 56 million supply chain risk. For example, under the
payment card accounts. accountability provisions in the Australian
ƒƒ Vulnerabilities in the web-based platform Privacy Act 1988, organisations that disclose
of photo service vendor PNI Media, personal information overseas are deemed
resulting in the theft, during 2014 and to be responsible for the acts and practices
2015, of the personal information of many of their overseas vendors in relation to that
thousands of Costco and CVS customers. information (unless an exception applies).

More than

90%
plan to deliver one or more of
their IT functions via the cloud
over the next 12 months.

PERSPECTIVES ON cyber risk 2017 page 14 contents


finding two

Addressing supply chain risk


ƒƒ Conduct thorough due diligence on • Where applicable, require the supplier to • Provide for appropriate disengagement
the cyber resilience of suppliers and key comply with privacy and other specific rights and obligations.
customers (including by considering the regulatory requirements that apply to
• Appropriately allocate risk between the
technical, personnel and process issues the organisation (but may otherwise not
organisation and the supplier:
raised in Finding 1 from the standpoint of apply to the supplier), including flowing
those organisations). down any specific audit rights imposed -- Scrutinise the impact of limitations and
exclusions on the supplier’s liability in
ƒƒ Identify the data (including personal by regulators.
the context of a cyber incident.
Organisations must information) that will be handled by • In light of the enactment of Australia’s -- Incorporate indemnities that shift risk
suppliers, including where it will be held, mandatory data breach notification law: to the supplier in circumstances where
improve their own where it will be transferred to, and how it they have failed to adequately prevent
-- R
equire the supplier to notify the
cyber resilience by will be accessed and stored.
organisation should it suffer a data
or mitigate a cyber incident.
ƒƒ Impose rigorous contractual obligations on -- Require the service provider to take
taking proactive suppliers in relation to cyber security and
breach (whether or not affecting the
out insurance (including, where
organisation’s data).
steps to identify and the protection of data:
-- W
here the breach does affect the
appropriate, cyber insurance).
• Mandate compliance with specific • Apply restrictions and controls on
mitigate supply security and data protection, storage,
organisation’s data, mandate that the
subcontracting, so that the organisation
organisation will control the process for
chain risk. backup and recovery requirements
notifying regulators and other parties
maintains transparency and control of
and standards (and require that those the end-to-end supply chain.
in relation to the data breach.
obligations be imposed on the supplier’s
• Impose business continuity and disaster
subcontractors). • C
onfirm the organisation’s ownership of
recovery obligations, including requiring
its data, and require prompt access to the
• M
andate compliance with applicable the supplier to have, and to regularly test
organisation’s data in the custody of the
privacy and data protection laws and update, a data breach response plan.
supplier (in an open industry standard or
other pre-agreed format).

PERSPECTIVES ON cyber risk 2017 page 15 contents


three
Finding

Board respondents who said IT departments


Cyber security is remain principally responsible for cyber risk
management, compliance and review activities
still (wrongly) seen
as being primarily

56%
an IT issue

IT departments
principally
responsible

PERSPECTIVES ON cyber risk 2017 page 16 contents


finding three

Australian and other The 2016 Ponemon Institute Cost of Data


Breach Study found that the total cost of
must be embedded within organisations’
culture. As we pointed out in Report 429:
ƒƒ About 44% of Board survey respondents
told us their Boards are only briefed on
corporate regulators a data breach has now increased to US$4 Cyber Resilience - Health Check (Report cyber security issues annually or on an
million per breach (up from US$3.79 million 429), the obligations on company directors ad hoc basis while 13% told us that their
understand the in 2015). Juniper Research estimates that the and officers to discharge their duties with Boards received no briefings at all.
rapid digitisation of consumer and enterprise care and diligence extend to cyber security.
growing nature of records will increase the global cost of data However, many boards are still leaving
cyber risk, and the breaches to US$2.1 trillion by 2019 – four
times the 2015 estimate.
it to their technology leaders to manage
this threat. “
systemic, enterprise- The cyber incidents referenced (pages 4 and The SEC has expressed equivalent views:15

wide – and potentially 5) that occurred in 2016 (including the eBay,


LinkedIn, Target, Mossack Fonseca, SWIFT
“… boards must take seriously their
responsibility to ensure that management
economy-wide –
57%
and Red Cross data breaches), as well as has implemented effective risk management
numerous other high profile cyber incidents protocols. Boards of directors are already
effects of a serious over the last 24 months (including the 2014 responsible for overseeing the management
Sony Pictures data breach, the 2015 Ashley
cyber incident. Their Madison breach, and the 2015 Anthem
of all types of risk, including credit risk,
liquidity risk, and operational risk – and
views are supported Health data breach), exemplify not only
the increasing sophistication of the cyber
there can be little doubt that cyber-risk also
must be considered as part of board’s overall
by empirical data. security threat, but also the severe financial, risk oversight. “
reputational and legal consequences that
Unfortunately, our Board survey results do
cyber incidents may have on affected Percentage of Boards
not reflect Australian and overseas corporate
organisations. It is the potential scale and
regulators’ perspectives on how Boards briefed annually, on an
severity of damage to organisations that
elevates cyber risk beyond the realm of IT risk
should approach cyber risk. More specifically: ad hoc basis or not at all
ƒƒ Just over half of our Board survey
alone, transforming it into an enterprise-wide
respondents told us that their IT
risk, and one requiring appropriate Board
departments remain principally responsible
oversight. According to ASIC: 14
for cyber risk management, compliance and
“The dynamic nature of the cyber threat
review activities (largely unchanged from
landscape means that a comprehensive and
last year).
long-term commitment to cyber resilience

PERSPECTIVES ON cyber risk 2017 page 17 contents


finding three

Potential for legal exposure if directors don’t take Corporations Act). No such action has, as yet, been brought ƒƒ Responsibility for breaching APRA’s prudential standards
appropriate action in Australia in relation to a cyber incident. However, with relating to outsourcing for organisations regulated by APRA
In addition to the reputational harm to the organisation that the increase in shareholder activism and litigation-funder (banks, insurance companies and most members of the
may result from a cyber incident, there is the potential for driven class actions against companies and directors (both superannuation industry).
substantial legal exposure (including personal liability on the in Australia and overseas), and the ever increasing volume
part of directors and employees). This may include: and sensitivity of data being handled by organisations, a
derivate action stemming from a large-scale data breach
ƒƒ Personal liability for directors for breach of their obligations
under section 180 of the Corporations Act. This section
may only be a matter of time. A cyber-attack can affect us all. It can
requires directors to exercise their powers and discharge ƒƒ Where the organisation is an ASX-listed entity, liability for undermine businesses and impact
their duties with reasonable care and diligence. Given the breach of the continuous disclosure rules, which require an our economy. It may also erode
widespread coverage of cyber incidents, particularly over organisation to disclose matters that a reasonable person investor and financial consumer
the last five years, and public statements of Australian and would expect to have a material effect on the price or value
trust and confidence in the financial
overseas corporate regulators as to the proper approach of the organisation’s shares16. Although the vast majority
of data breaches are unlikely to reach this standard, it is
system and wider economy.
to cyber risk, it seems apparent that directors must now
consider cyber risk as part of their risk management activities, conceivable that a particularly serious data breach (of the
The Australian Securities and Investments
and implement appropriate strategies to mitigate it. scale and severity of the Target or Sony Pictures breaches) Commission (ASIC)6
would invoke these continuous reporting obligations.
ƒƒ Where the organisation has raised capital from investors
through a public offer, personal liability for directors if cyber ƒƒ Liability of the organisation (and potentially its officers or
risk is not adequately disclosed in the relevant prospectus. If employees) for claims of misleading or deceptive conduct
Effective board oversight of
cyber risk is a significant factor for the organisation such that under the Competition and Consumer Act 2010 (Cth), for
example, as a result of failing to act in accordance with the
management’s efforts to address
it would form part of the information that investors and their
organisation’s privacy policy. Although no such action has yet [cyber security] issues is critical to
professional advisers would reasonably require to make an
informed assessment of the organisation’s offer, the directors been brought in Australia, the US Federal Trade Commission preventing and effectively responding
of that organisation may be personally liable (under section has launched over 50 enforcement actions against to successful cyber-attacks and,
729 of the Corporations Act) for loss or damage suffered organisations relating to cyber security under equivalent ultimately, to protecting companies
by investors as a consequence of cyber security issues provisions of the US Federal Trade Commission Act17. and their consumers, as well as
materialising, if cyber risk was inadequately disclosed. ƒƒ Liability for breach of contract claims from suppliers or protecting investors and the integrity
ƒƒ Derivative shareholder actions against directors where such customers, for breach of specific obligations imposed on
the organisation in relation to data security, the protection
of the capital markets.
an action can be shown (to the Federal Court) to be in the
best interests of the company (under Part 2F.1 of the of personal information, and obligations of confidence
Luis Aguilar, Commissioner, US Securities and
(which may, in some cases, permit the termination of the Exchange Commission (SEC)7
contract by the affected customer or supplier).

PERSPECTIVES ON cyber risk 2017 page 18 contents


finding three

educating boards about cyber risk

ƒƒ Adopt written cyber security policies, ƒƒ Appoint a Board member who has cyber ƒƒ If the organisation is a listed company,
procedures and internal controls, including: security expertise, or alternatively, appoint comply with continuous disclosure
• C
learly setting out who in management an independent expert who can present to obligations in relation to cyber incidents
has primary oversight of cyber the Board on cyber security issues. that may reasonably be expected to
Boards must be cyber security issues. ƒƒ Adopt a cyber ‘value-at-risk’ model that materially affect the price or value of the
not only quantifies cyber risk in financial organisation’s shares.
risk aware, and there • Adopting and regularly reviewing the
terms, but enables the Board to formulate ƒƒ If the organisation is seeking to raise capital
company’s data breach response plan.
are a number of steps • M
aintaining a responsive approach to
strategies and controls in relation to cyber from retail investors, clearly and concisely
risk, to treat cyber resilience as a potential outline the cyber risks faced by the
they can take. new threats or elevated threats against differentiator, and to track the organisation’s organisation in any prospectus or public
an agreed risk appetite. cyber maturity across time. offer document that is issued.
• R
eceiving and reviewing regular reports ƒƒ Review annual budgets for IT security and
on cyber security incidents. data protection expenditure (including for
cyber insurance).
• S upporting cyber awareness and training
across the organisation.


[We need to] continue to educate our people that cyber
security is an organisation wide issue, not an IT issue.

PERSPECTIVES ON cyber risk 2017 page 19


“ contents
four
Finding

The new mandatory data breach notification


scheme starts in early 2018 – an addition to
The privacy existing Commonwealth, State and Territory
landscape is privacy and data security legislation.

changing, both
in Australia and
DATA
overseas
BREACH!

PERSPECTIVES ON cyber risk 2017 page 20 contents


finding Four

More than half Mandatory data breach notification


in Australia
legislation, as well as requirements that may
be imposed on organisations under contract.
the protection of personal and other
information, such as the Commonwealth
of CIO survey The Privacy Amendment (Notification of These include: Government’s Protective Security
Serious Data Breaches) Bill 2015 has passed ƒƒ The Australian Privacy Principles (APPs): Policy Framework.
respondents agreed both houses of Federal Parliament with most notably, APP11, which requires ƒƒ Requirements imposed on public sector

that mandatory data little objection and no amendments. The


new mandatory data breach notification
organisations to take reasonable steps
to protect personal information from
organisations under State and Territory
privacy legislation, and which require the
breach notification scheme will therefore be inserted into the misuse, interference and loss, and from implementation of additional procedures
Privacy Act 1988 (Cth) as new Part IIIC, and will unauthorised access, modification and and policies for dealing with data security
requirements should commence in February 2018. disclosure, and to permanently destroy or breaches (these obligations may also be

be introduced into The scheme imposes new obligations on


organisations that are subject to the Privacy
de-identify the information when it is no
longer required for any purpose permitted
imposed on private sector organisations
through outsourcing contracts with public
Australian law (largely Act to: by the APPs. sector entities).
ƒƒ The additional obligations imposed on ƒƒ Additional requirements imposed on public
unchanged from ƒƒ Carry out a reasonable and expeditious
assessment if they have reasonable grounds credit providers and credit reporting and private sector organisations under

2015). This will now to suspect that there may have been an
eligible data breach (and to take reasonable
bodies under Part IIIA of the Privacy Act and
the registered Credit Reporting Code in
State and Territory health records laws.
ƒƒ Contractual requirements imposed on
happen. steps to complete that assessment within relation to the security of credit and credit organisations that collect and handle
30 days). eligibility information. payment card information under the
ƒƒ Unless an exemption applies, make the ƒƒ The data security requirements imposed by Payment Card Industry Data Security
prescribed notifications to the OAIC (and, if the Privacy (Tax File Number) Rule 2015. Standards (PCI DSS), which set out
practicable, to affected individuals) as soon ƒƒ Requirements imposed on obligations to maintain the security of
as they are aware that there are reasonable telecommunications carriers and card information and respond when
grounds to believe that there has been an internet service providers under the data breaches involve payment cards or
eligible data breach. Telecommunications (Interception and cardholder data.
Other Australian privacy and data security Access Act) 1979 (Cth) to maintain the ƒƒ Mandatory data breach notification
requirements confidentiality of the metadata that they requirements imposed on healthcare
are required to retain under that Act. provider organisations, registered
The scheme will be in addition to all of
ƒƒ Legislative requirements imposed on contracted service providers as well as
the existing privacy and data security
Commonwealth, State and Territory registered repository and portal operators
requirements imposed by Australian
government agencies in relation to under the My Health Records Act 2012 (Cth).
Commonwealth, State and Territory

PERSPECTIVES ON cyber risk 2017 page 21 contents


finding Four

In Finding 3 we discussed other legal risks data subjects that takes place in the EU, to
to an organisation that may result from a adhere to those standards.
cyber incident, including liability arising ƒƒ Provides for the imposition of penalties for
under Australian corporations and consumer breaching the GDPR of up to €20 million
protection legislation. or 4% of annual worldwide revenue,
Overseas privacy and data security laws whichever is higher.
In addition to Australian laws, organisations ƒƒ Requires organisations (whether or not
must be aware of overseas privacy and data based in the EU) to provide EU data
protection laws that may apply to them, subjects with the ability to have their data
either because they do business in one or deleted or modified, to request reasons
more overseas jurisdictions, or because for decisions, to object to automated
‘long arm’ overseas regulation may apply to decisions or profiling and to request
their activities. manual intervention.
This includes mandatory data breach ƒƒ Provides for mandatory data
notification requirements in: breach notification.
ƒƒ 47 US States This GDPR has significant implications for
ƒƒ Alberta, Canada (with the whole of Canada organisational process change requirements,
expected to be subject to a mandatory and is likely to impact many Australian
Federal notification scheme by 2018) organisations that hold the data of EU data
subjects or that do business in the EU.
ƒƒ South Africa and South Korea.
Some US commentators have expressed
Moreover, from April 2018, the European
concern that the effect of mandatory data
Union’s General Data Protection Regulation
breach notification is increased class actions,
(GDPR) will come into effect. The GDPR:
triggered by harm caused by the breach.
ƒƒ Mandates stringent data security and
This may ultimately occur in Australia as
privacy protection standards.
notifications increase. Breach prevention, and
ƒƒ Operates extraterritorially in requiring failing that, swift and effective containment
non-EU organisations that offer goods and notification to mitigate and redress harm,
or services online to data subjects in the will be critical.
EU, or who monitor the behaviour of EU

PERSPECTIVES ON cyber risk 2017 page 22 contents


finding Four

Preparing for mandatory data


DATA
BREACH!
breach notification
Implement an effective data breach response • w
hen and how insurers will be notified ƒƒ The process for capturing ‘lessons learnt’
plan, which at minimum should set out: (including to ensure that delays in from the breach.
ƒƒ The members of the response team notification do not adversely affect the The data breach response plan should
(which will usually include senior IT, risk, insurance policy) be regularly ‘battle tested’ and rehearsed.
legal, HR and media/communications • w
hen and how law enforcement This may involve conducting ‘red teaming’
Australian organisations representatives), including who in the
organisation ‘owns’ the response plan.
agencies will be engaged. exercises – simulated adversarial attempts
to breach the organisation’s cyber and
must prepare for ƒƒ The circumstances in which actual or
ƒƒ The specific legislative obligations arising
data defences.
from a data breach (including under
mandatory data suspected breach should be escalated to
Australian and applicable overseas
It should also be regularly updated based on
the response team. the outcome of testing, as well as to reflect
notification. ƒƒ The actions and escalations to be taken by
mandatory data breach notification
legislation, and where applicable,
changes to the organisation’s business,
the response team, including: strategies, policies, processes, legal and
continuous reporting requirements) and
regulatory obligations and cyber risk profile.
• delegations of authority the processes for complying with those
obligations (including having near ‘ready to All staff should receive regular training in data
• r eporting lines (including when and how
go’ template notices). security and identification and escalation of
reporting to the Board will occur)
suspected or actual breaches.
ƒƒ Specific contractual requirements arising
• w
hen and how third parties will be
from a data breach such as an obligation to
engaged (such as forensic IT, lawyers and
notify customers of a suspected or actual
PR advisors), including the identities of
breach and provide assistance on request
those third parties
to respond to and investigate the breach,
and the processes for complying with those
requirements.

PERSPECTIVES ON cyber risk 2017 page 23 contents


five
Finding

Respondents who have purchased


The increasing some form of cyber insurance

uptake of cyber PASSWORD


insurance indicates
some willingness
to act on managing
2015 24%
cyber risk
2016 39%

PERSPECTIVES ON cyber risk 2017 page 24 contents


finding five

Our CIO survey While five years ago cyber insurance was
a niche product offered by only a small
collaborative process, insurers are increasingly
partnering with IT professionals, forensic
for insured organisations include cyber risk
assessments by specialist IT professionals,
results show that a handful of insurers in the Australian market, accountants, public relations professionals credit monitoring services and data breach
most blue-chip Australian insurers now offer and regulatory lawyers to provide a holistic response training.
rising proportion of tailored policies covering cyber risk, privacy response to cyber incidents. Traditional With the passage through Federal Parliament
and data security losses. claims management protocols are commonly
organisations are In the past 12 months we have seen the set aside in favour of insured organisations
of the Privacy Amendment (Notification of
Serious Data Breaches) Bill 2015, the uptake of
electing to purchase continued evolution of cyber insurance accessing urgent ‘breach coaching’ services
from these teams of professionals through
specialist cyber insurance is likely to continue
offerings, from traditional policies focused rising in the coming year.
specialist cyber on liability to third parties, to comprehensive telephone hotlines, websites or monitored
email addresses.
insurance to help hybrid products covering additional losses
such as breach response costs, regulatory Cyber risk insurers are providing value-add
manage the risks expenses and business interruption. In
recognition that cyber resilience is a
services to assist organisations in becoming
more cyber resilient. Common value-adds
associated with a
cyber incident.

PERSPECTIVES ON cyber risk 2017 page 25 contents


finding five

Considerations when purchasing cyber


risk insurance
ƒƒ Whether the policy provides cover for ƒƒ Any limitations on an organisation’s of privacy, third party liability claims may
the new assessment and notification preferred response to a cyber incident be advanced against insured organisations
obligations under the mandatory data (for example, does the insurer require an in contract. Organisations should therefore
breach reporting scheme set out in the insured organisation to obtain written take care to identify potential exclusions
Privacy Amendment (Notification of Serious permission prior to paying a ransom?). in the policy that may apply to such
Data Breaches) Bill 2015. ƒƒ The availability of value-add services, such contractual claims.
ƒƒ Whether the insurer offers urgent breach as credit monitoring, to assist organisations
coaching or cyber incident response in establishing and maintaining goodwill
Organisations seeking services (providing access for insured with customers following a data breach.

to secure cyber risk organisations to IT professionals, forensic


accountants, public relations professionals
ƒƒ Policy exclusions for liability assumed
under contract. As there is no basis under
insurance, or to renew and lawyers). Australian common law to sue for breach
an existing policy,
need to consider some
critical factors.

PERSPECTIVES ON cyber risk 2017 page 26 contents


MinterEllison’s cyber security team can help you address and mitigate cyber risk.
Conduct independent cyber risk reviews and Board-level cyber risk assessments.
Review third-party supplier contracts
to ensure that they appropriately address privacy and data protection issues, and do not inappropriately transfer cyber-related risks to your organisation.

Develop, review and update data breach response plans


as well as related policies and procedures, such as privacy and document retention policies.

Advise on privacy, data protection and cyber-related legal and commercial issues.
Develop and deliver cyber risk and privacy compliance tools
through face-to-face and online training (including via our award winning Safetrac online compliance system).

Conduct privacy audits and impact assessments


including in relation to cloud-based products and services.

Plan for, respond to and rebuild from, a data breach or cyber incident,
including breach coach services (where MinterEllison leads the data breach response process).

Advise on cyber insurance issues


including assisting with cyber risk advice; coverage issues, and strategic management of notifications and claims arising from cyber risk losses.

PERSPECTIVES ON cyber risk 2017 page 27 contents


Contacts

Paul Kallenbach Anthony Lloyd Anthony Borgese Amanda Story Cameron Oxley Veronica Scott Leah Mooney John Fairbairn
Partner Partner Partner Partner Partner Special Counsel Special Counsel Partner
T +61 3 8608 2622 T +61 2 9921 8648 T +61 2 9921 4250 T + 61 2 6225 3756 T +61 3 8608 2605 T +61 3 8608 2126 T +61 7 3119 6230 T +61 2 9921 4590
M +61 412 277 134 M +61 411 275 811 M +61 400 552 665 M +61 423 439 659 M +61 417 103 287 M +61 411 206 248 M +61 421 587 950 M +61 410 475 965

Endnotes
1
Australian Government, Australia’s Cyber 5
ASIC, Cyber resilience: Health check (March 4
These results are consistent with the New 2016), available at http://bit.ly/2lEHf8o.
Security Strategy, April 2016 at 15, available at 2015), available at http://bit.ly/1HyFGJC York Stock Exchange’s 2015 Cybersecurity in 7
Speech by SEC Commissioner Luis Aguilar,
http://bit.ly/1r6MNr0 6
Office of the Australian Information the Boardroom survey (available at http:// Cyber Risks and the Boardroom (June 2014),
2
US National Initiative for Cybersecurity Commissioner, Data breach notification – bit.ly/1P4v5yX), which found that 42% of available at http://bit.ly/2kFtG8M.
Careers and Studies Glossary, available at a guide to handling personal information surveyed Boards only discussed cyber security 8
Speech by ASIC Chairman Greg Medcraft,
http://bit.ly/2jrROaX security breaches issues ‘occasionally’.
Building Resilience: The Challenge of Cyber Risk
3
European Commission, Cybersecurity Strategy (August 2014), available at http://bit. 5
Interesting, Intel Security’s 2015 Grand (December 2016),
of the European Union: An Open, Safe and ly/1XVFk9h Theft Data report (available at http://intel. available at http://bit.ly/2m1B7Y7.
Secure Cyberspace (2013), 1
Cybersecurity Ventures, 2016 Cybercrime ly/2kFXBMP) found that external actors were 9
Speech by SEC Commissioner Luis Aguilar,
available at http://bit.ly/1Gp5CbC Report, available at http://bit.ly/2bHNaBz. responsible for only 57% of data breaches,
Cyber Risks and the Boardroom (June 2014),
while 43% of data breaches were caused by
4
J J Cebula and L R Young, ‘A Taxonomy of 2
2016 Cyber Attack Statistics, www. available at http://bit.ly/2kFtG8M.
the actions (whether negligent or malicious)
Operational Cyber Security Risks’ (2010) hackmagedon.com. 10
ASX Listing Rules, Rules 3.1, 3.1A and 3.1B.
of trusted insiders.
Technical Note CMU/SEI-2010-TN-028, CERT 3
US Department of Justice, How to Protect Your Paul Ferrillo and Christophe Veltsos, Take
11

Carnegie Mellon University, available at http://


6
Australian Securities and Investments
Networks from Ransomware (2016), available at Back Control of your Cybersecurity Now
bit.ly/1NEBcTU Commission, Cyber Security and Directors (May
http://bit.ly/2jRV2nD. Advisen, 2017.

PERSPECTIVES ON cyber risk 2017 page 28 contents


www.minterellison.com

PERSPECTIVES ON cyber risk 2017 page 29 contents

S-ar putea să vă placă și