30
Scott B. Suhy CEO NetWatcher.com [email protected] CYBER SECURITY FOR LAW FIRMS What steps your firm should take to protect against a cyber attack Steve Britt Partner Berenzweig Leonard [email protected] Steve Rutkovitz CEO Choice Cyber Security [email protected]

CYBER SECURITY FOR LAW FIRMS

Embed Size (px)

Citation preview

Page 1: CYBER SECURITY FOR LAW FIRMS

Scott B. [email protected]

CYBER SECURITY FOR LAW FIRMSWhat steps your firm should take to

protect against a cyber attack

Steve BrittPartnerBerenzweig [email protected]

Steve RutkovitzCEOChoice Cyber [email protected]

Page 2: CYBER SECURITY FOR LAW FIRMS

2

Agenda

•Why law firms are vulnerable to cyber attack•What are lawyer's ethical duties •The value of privilege & how to obtain it•The value of the security assessment•The value of continuous security monitoring•Q&A

Page 3: CYBER SECURITY FOR LAW FIRMS

3

Why law firms are vulnerable to exploitation

Page 4: CYBER SECURITY FOR LAW FIRMS

• Wiley Rein hacking in 2012

• Cravath, Swain & Moore + Weil Gotshal & Manges hacked in 2015

• Fenwick & West has been hacked twice

• The 2015 ABA Law Firm Survey of 90,000 respondents reported; • 25% of firms with at least 100 attorneys have a breach, • 15% of all firms have had a breach • 34% of 100 law firms have had clients request a security audit • Large clients routinely send security due diligence questionnaires

• Most common types of breaches: Loss or theft of laptops, thumb drives, smart phones or tablets, spear phishing and employees/third parties using unauthorized hardware and software (Evernote/Google Drive)

Current Data Breach Landscape

Page 5: CYBER SECURITY FOR LAW FIRMS

• Their organization’s protection level is usually weaker than their corporate counterparts (customers)

• Law firms rarely report a breach…

According to the 2015 ABA Legal Technology Survey Report, 15 percent of overall firms and 25 percent of law

firms with at least 100 attorneys have experienced a breach, yet almost half of attorneys say their firms have

no data breach response plan in place. (more here).

Bottom-line: Law firms are great targets for cybercriminals

Page 6: CYBER SECURITY FOR LAW FIRMS

Confidential details of offshore accounts for 12 world leaders & 128 public officials.

11.5 million confidential documents and 2.6 terabytes of data were stolen.

The firm’s customer facing WordPress website was running an outdated/vulnerable version of a plugin called ‘Revolution Slider’ that enabled a hacker to exploit a well known bug and gain access to its mail servers hosted on the same IP network.

The exploit was well known to the hacker community and published back in October 2014 however the plugin was never updated

Case Study: Mossack FonsecaThe Panama Papers

We have hundreds of law firms that we see increasingly being targeted by hackers.”– Mary Galligan, the special agent in charge of cyber and special operations for the

FBI’s New York Office.

Page 7: CYBER SECURITY FOR LAW FIRMS

HacktivistPuckett & Faraj, a Washington-area firm, was hacked by activists associated with the group Anonymous, who were angered by the firm’s representation of a U.S. soldier who pleaded guilty in connection with his role in the death of 24 Iraqi civilians. (more)

CyberespionageGipson Hoffman & Pancione, based in Los Angeles, was hacked because of a software piracy lawsuit it filed against the Chinese government. (more)

Financial GainA broker named “Oleras” living in Ukraine was detected attempting to hire hackers to break into firms’ computer systems so he could trade on insider information at Flashpoint, a New York threat intelligence firm. (more)

Insider TradingHackers broke into the computer networks at some of the country’s most prestigious law firms (including Cravath Swaine & Moore LLP and Weil Gotshal & Manges LLP). Federal investigators are exploring whether they stole confidential information for the purpose of insider trading, according to people familiar with the matter. (more)

Why?

Page 8: CYBER SECURITY FOR LAW FIRMS

• The American Bar Association Model Rules of Professional Conduct, requires law firms to protect client information (Model Rule 1.1, 1.4 & 1.6)

• 47 states also have Data Breach Notification Laws. Listed here.

• There are also sector specific requirements – HIPAA, PCI-DSS…

It is your responsibility to protect your client’s data!

Page 9: CYBER SECURITY FOR LAW FIRMS

• The ABA Commission on Ethics 20/20 added new amendments and comments

• “Lawyers must keep abreast of benefits and risks of technology”

• “Lawyers must take reasonable steps to prevent inadvertent or unauthorized disclosure or unauthorized access to client information.”

• 19 states now have laws dealing with electronic and paper record disposal

Your firm’s reputation is all it has. You never want to have to put out a release like this:

“Last summer, the Firm identified a limited breach of its IT systems. We have worked closely with law enforcement authorities who have jurisdiction over this matter, and we are not aware that any of the information that may have been accessed has been used improperly. Upon identifying the incident we immediately supplemented our IT security measures with the assistance of additional outside security consultants. Client confidentiality is sacrosanct. We continually invest in state-of-the-art systems and procedures and work with clients and security firms to assess the strength of our protections. We will continue to work to ensure our systems are best in class.”

– Cravath, Swaine & Moore LLP

Page 10: CYBER SECURITY FOR LAW FIRMS

• ACP protects communications between clients and their lawyers in a confidential setting that relate to legal advice and do not further a crime or fraud, as long as the privilege has not been waived

• This privilege is subject to several constraints

• It doesn’t apply based on the parties mutual agreement

• In most cases it will not apply to agents of the client unless the agent is necessary to transmit the privileged communication (e.g., translators)

• Lawyer-agents CAN be subject to the attorney-client privilege if the agent is assisting the lawyer in providing legal advice (United States v. Kovel, 296 F2d. 918 (2nd Cir. 1961)

The Value of Attorney Client Privilege

Page 11: CYBER SECURITY FOR LAW FIRMS

• Here are the best practices to demonstrate the necessity of an agent’s role in legal advice;

• Lawyer should document the need for agent's assistance and how it will be used

• Agent should work under the lawyer's direction – not the client’s

• Lawyer should incorporate the agent’s work into the lawyer’s legal advice, rather than simply forwarding the agent’s work, and

• Lawyer should document how he or she used agents work in its advice

A Lawyer-Agent’s Role

Page 12: CYBER SECURITY FOR LAW FIRMS

12

The value of the security assessment

Page 13: CYBER SECURITY FOR LAW FIRMS

• Most of the industry is “Winging it”

• No Comprehensive Approach

• Lack of a Controlled Framework

• No Structured Solution

Lack of Structure 

Page 14: CYBER SECURITY FOR LAW FIRMS

End to End Solution 

The Choice Cybersecurity Approach:

• Assess with a Gap Analysis

• Address vulnerabilities with a multi layered approach

• Maintain an acceptable level of risk through continuous monitoring and scanning

Page 15: CYBER SECURITY FOR LAW FIRMS

Risk Assessment 

• In order to move from Protection to Detection you must identify your assets

• Questions to ask:• What is important to your firm?• What are you trying to protect?• What are your threats?• How would a breach affect your

firm?• How would you respond to a

breach of confidentiality?

Page 16: CYBER SECURITY FOR LAW FIRMS

Data Assets 

• Data can be anywhere

• Cloud

• Mobile

• Servers

• Workstations

• Phones

• Tablets

• Laptops

Page 17: CYBER SECURITY FOR LAW FIRMS

What is Sensitive Data? 

1. Social Security Numbers

2. Credit Cards

3. Date of Birth

4. Driver’s License

5. Passport

6. IP Address

7. Digital Identity

Page 18: CYBER SECURITY FOR LAW FIRMS

Failed Assessment Example

• 666,732 Files Scanned

• 2,162 Suspected Incidents Found

• 327 Files with Suspect Data

• $888,600 Liability

Page 19: CYBER SECURITY FOR LAW FIRMS

2 Parts of the Risk Assessment

• Identify Vulnerabilities• Software • Hardware• Firewall• Sensitive Data

Page 20: CYBER SECURITY FOR LAW FIRMS

Executive Summary

Executive Summary

Page 21: CYBER SECURITY FOR LAW FIRMS

21

The value of continuous monitoring

Page 22: CYBER SECURITY FOR LAW FIRMS

Antivirus doesn’t work allthat well anymore…

“Crypting Service”

Example: http://execrypt.com “This is an automatic online service ExeCrypt which can help you to obfuscate binary data. Our service is indispensable tool to get secure your program content form curious researchers and prevent detection by antivirus programs.”

Follow Gartner for EP Protection Platforms

Protect the Endpoint…

Page 23: CYBER SECURITY FOR LAW FIRMS

• Firewall• Unified Threat

Management• Next Generation Firewall• Managed Firewall• Intrusion Protection

System (IPS)

Great, but not enough…

Firewall - Protect the Front Door!

Page 24: CYBER SECURITY FOR LAW FIRMS

• Malware Exploit!!!• Clicking on Phishing messages

and bad links• Running outdated software with

security vulnerabilities (Flash, Java, Windows…)

• Downloading risky software (TOR, BitTorrent, Telnet, Android apps…)

• Going to explicit websites• Sending info over the internet in

clear text

Continuous Monitoring – Know when someone lets the bad guy through the front door….

Page 25: CYBER SECURITY FOR LAW FIRMS

• Tools used for pen testing are widely available for anyone to leverage (metasploit, nmap, openvas etc..) all great but can be used against you too..

• https://showdan.io

Continuous Monitoring – Know when a bad actor is inside your network…

Page 26: CYBER SECURITY FOR LAW FIRMS

• Security hygiene • Lack of rigorous policy &

plans• Lack effective monitoring

What’s the Issue?

Page 27: CYBER SECURITY FOR LAW FIRMS

• Command & Control Malware• Ransomware• Spyware

Continuous Monitoring – Know when you are being exploited!

Page 28: CYBER SECURITY FOR LAW FIRMS

• Managed Security Service• Easy to install• Easy to use• Accurate• Affordable

• For as low as $299 a month

Continuous Monitoring – Know your score!

Page 29: CYBER SECURITY FOR LAW FIRMS

29

Q&A

Page 30: CYBER SECURITY FOR LAW FIRMS

Thank You

Scott B. [email protected]

Steve BrittPartnerBerenzweig [email protected]

Steve RutkovitzCEOChoice Cyber [email protected]