2
In today’s rapidly evolving economy, businesses face a growing threat of data breaches—cyber attacks, natural disasters, structural failures, and human errors—resulting in the potential disclosure of confidential information. Robust cybersecurity policies work hand-in-glove to protect companies and their data, cus- tomers, and shareholders from the ever-increasing threats posed by 21st century technologies. A cyber attack can not only create devastating financial losses but also significant operational and reputational damage, as well as costly lawsuits. Responsible cyber risk management requires a complex strategy of ongoing support to navigate any potential crises. WHO WE ARE Blank Rome’s multidisciplinary cybersecurity and data privacy group assists clients with protecting their property and reputation from the unprecedent- ed cybersecurity challenges affecting them in today’s global digital economy. Importantly, our attorneys can offer a privileged attorney-client relation- ship through which our clients can identify and manage all of their security risks, protect their digital assets, and quickly respond to cyber threats while simultaneously protecting their efforts from discovery or public disclosure. WHAT WE DO Threat Awareness Exercise An interactive and iterative workshop consisting of a rigorous analysis of the cyber threats impacting your business. The exercise identifies your company’s unique cyber risks, including an assessment of the current threat environment and industry- wide trends. This process may also: Test the effectiveness of your existing response plans. Strengthen the awareness of the need for response planning. Provide a high-level overview of the laws, regulations, and best practices rel- evant to your industry sector. Improve the ability of multiple teams to communicate and work effectively when responding to a cyber incident. (continued on reverse) Did You Know? In 2014, corporations ranked cybersecurity as their number one priority. Cybercrime can cost businesses millions of dollars in lost revenue, operating expenses, and legal fees, not to mention reputational damage. It is not just high profile companies that are attacked. Small to medium sized businesses in the supply chain are prime targets. Many attacks target people, through spear phishing, malware, and misuse of credentials. Your employees may be your first and best line of defense if they are properly trained. CYBERSECURITY RISKS ARE ENTERPRISE RISKS CYBERSECURITY

CYBERSECURITY - Blank Rome LLP · 2014. 11. 6. · A cyber attack can not only create devastating financial losses but also significant operational and reputational damage, as well

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CYBERSECURITY - Blank Rome LLP · 2014. 11. 6. · A cyber attack can not only create devastating financial losses but also significant operational and reputational damage, as well

In today’s rapidly evolving economy, businesses face a growing threat of data breaches—cyber attacks, natural disasters, structural failures, and human errors—resulting in the potential disclosure of confidential information. Robust cybersecurity policies work hand-in-glove to protect companies and their data, cus-tomers, and shareholders from the ever-increasing threats posed by 21st century technologies.

A cyber attack can not only create devastating financial losses but also significant operational and reputational damage, as well as costly lawsuits. Responsible cyber risk management requires a complex strategy of ongoing support to navigate any potential crises.

WHO WE ARE

Blank Rome’s multidisciplinary cybersecurity and data privacy group assists clients with protecting their property and reputation from the unprecedent-ed cybersecurity challenges affecting them in today’s global digital economy. Importantly, our attorneys can offer a privileged attorney-client relation-ship through which our clients can identify and manage all of their security risks, protect their digital assets, and quickly respond to cyber threats while simultaneously protecting their efforts from discovery or public disclosure.

WHAT WE DO

Threat Awareness Exercise

An interactive and iterative workshop consisting of a rigorous analysis of the cyber threats impacting your business. The exercise identifies your company’s unique cyber risks, including an assessment of the current threat environment and industry-wide trends. This process may also:

Test the effectiveness of your existing response plans.

Strengthen the awareness of the need for response planning.

Provide a high-level overview of the laws, regulations, and best practices rel-evant to your industry sector.

Improve the ability of multiple teams to communicate and work effectively when responding to a cyber incident.

(continued on reverse)

Did You Know?

In 2014, corporations ranked cybersecurity as their numberone priority.

Cybercrime can cost businesses millions of dollars in lost revenue, operating expenses, and legal fees, not to mention reputational damage.

It is not just high profile companies that are attacked. Small to medium sized businesses in the supply chain are prime targets.

Many attacks target people, through spear phishing, malware, and misuse of credentials. Your employees may be your first and best line of defense if they are properly trained.

CYBERSECURITYRISKS

AREENTERPRISERISKS

CYBERSECURITY

Page 2: CYBERSECURITY - Blank Rome LLP · 2014. 11. 6. · A cyber attack can not only create devastating financial losses but also significant operational and reputational damage, as well

STRATEGY AND ACTION PLAN

Preparation and advanced planning separate those who succeed from those who fail. In the world of cybersecurity, there is simply not enough time to consider your options after an attack or breach is detected.

We work closely with your company to develop a comprehensive and scalable Cybersecurity Strategy & Action Plan and comprehensive recommendations for policies, programs, and technologies sufficient to combat the cyber threat. We focus on:

Your Individual Risk profile to determine threats and identify breach severity and response capabilities.

Corporate governance to review current policies, board/committee organization, and reporting structures.

Executive-level strategy and policies to confirm alignment with your company’s cyber risk profile.

Technologies assessment to identify gaps and deviations from your company’s policies and risk profile.

Crisis management protocols to ensure an effective response while maintaining full business operations.

NIST CYBERSECURITY FRAMEWORK IMPLEMENTATION

On February 19, 2014, the National Institute of Standards and Technology (“NIST”) released the long-awaited “Framework for Improving Critical Infrastructure Cybersecurity” (the “Framework”).

Blank Rome can work with you to navigate and apply the Framework in order to develop the protocols necessary to secure the processes, information, and systems directly involved in the delivery of critical services. Relying on our extensive experience, we help companies overlay the Framework over their current cyber security practices to determine gaps and develop a roadmap to improve-ment. Our services help to:

Establish a Cybersecurity Program. Using the Framework to create a cybersecurity program (or improve an existing program).

Prioritize and Scope. Identify business objectives and priorities to make cybersecurity decisions.

Conduct Risk Assessment. Discern the likelihood and potential impact of cybersecurity events, including new and emerg-ing threats.

Create Current and Target Profile. Identify how the Framework is currently being implemented by your organization and develop a Target Profile reflecting the outcomes.

Determine, Analyze, and Prioritize Gaps. Compare current and target Profiles to identify gaps that should be addressed.

Implement an Action Plan. Adopt measures to resolve gaps between the current and target Profiles and address the risks identified in the risk assessment.

FOR MORE INFORMATION,PLEASE CONTACT:

Steven L. CaponiPARTNER, BLANK ROME LLP

[email protected]

CYBERSECURITYLAW WATCH

Through our blog we provide timely

and knowledge updates, alerts, and

insights regarding current cyber

issues and trends.

Please visit our blog to learn more:

http://cybersecuritylawwatch.com

CYBERSECURITY