Presented By
AWCBC GOVERNANCE SUMMIT
2021
Cybersecurity
risk governance
Dan Michaluk
June 10, 2021
The degree and nature
of the risk to boards
o Cyber (outside > in)
• Ransomware/malware
• Business e-mail compromise and fraud
• Misconfiguration driven exposures
• Distributed denial of service (DDoS)
o Other (inside > out)
• Insider theft
• Snooping
• Errant e-mails
• Lost devices, papers…
Register of data security problems
The degree and nature of the risk to boards
3
o Attacks up by 150% in 2020
o Ransom payments are up more than 300% in
2020
o Double and triple extortion threat
• Lock up data
• Steal data and hold it ransom
• DDoS or doxing threat
o Market for insurance is hardening
• Premiums up 20% to 50%
• Higher deductibles, limits and co-insurance
• New conditions for coverage and harder vetting
The ransomware threat is very high
The degree and nature of the risk to boards
4
The public sector is a primary target
The degree and nature of the risk to boards
5
o Budgetary pressures tend to leave public
sector entitles with weaker defences
o Government and MUSH sector attacks are
very common
o Privacy compliance failures
o Reputational problems
• What’s the impact on the operation of
ruptured trust?
• Access legislation invites full and unmitigated
transparency
o Response costs
• Operational drain
• Hard costs
o Civil liability and liability to employees
Manifestations of risk
The degree and nature of the risk to boards
6
Cyber security 101 for
governors
o The practice of protecting information by
mitigating information risks
o The value of information to organizations is
derived from its
• Confidentiality
• Integrity
• Availability
Meaning of information security
Cyber security 101 for governors
8
o The process of managing the deployment,
maintenance, upgrading and disposal of IT
assets
o An IT asset is hardware, software or data
repository within the technology
environment
o Common problems
• Assets that have been adopted but are not
under management
• Legacy technologies can be vulnerable and
may not integrate with current security
technologies
Asset management
Cyber security 101 for governors
9
o The use of layered, redundant measures to
protect information and systems with the
expectation that some measures will fail
o Achieved through implementation of an array
of controls – physical, administrative and
technical
o And achieved through layering – perimeter
security >> system level security
o The cloud and remote work have led to a
focus on controls deeper than the perimeter –
internal monitoring is now very important
o Readiness to respond to events and incidents
is another aspect of layering
Defence in depth
Cyber security 101 for governors
10
o A security event is a possible problem that
should be assessed
o An security incident is a confirmed problem
that needs to be managed through the
incident response process
• Cyber attack
• A misconfiguration
• An errant communication
o A “breach” is a legal concept that relates to
unauthorized access to information or loss,
theft…
Events, incidents and “breaches”
Cyber security 101 for governors
11
o Insecure remote access
• Exposed remote desktop protocol
• No multi-factor authentication
o Vulnerability and patch management
o Poor implementation of least privilege
principle
o Poor network visibility
o Poorly implemented and untested backup
procedures
Common problems
Cyber security 101 for governors
Coveware Q1 2021 Ransomware Report
12
Cybersecurity oversight
o Establish tone at the top
o Build the board’s cyber competency
• How to educate board members?
• Who ought to be recruited?
o Talk to each other and benchmark your
oversight practices
o If IT or IT security presents the report, don’t
exclude other executives
o Consider using the NIST Cybersecurity
Framework to structure the dialogue with
management
Overview
Cybersecurity oversight
14
o Develop an organizational understanding to
manage cybersecurity risk to systems, people,
assets, data, and capabilities.
• Do we have asset inventories? With a
classification scheme? When were they last
updated?
• Are our roles and responsibilities clearly and
appropriately assigned? By what policies? When
were they last updated?
• Do we have processes for ongoing risk
assessment? What are they? Do we use third
parties, and how?
- Overall
- Supply chain
Identify
Cybersecurity oversight
15
o Develop and implement appropriate
safeguards to ensure secure delivery of
critical services.
• What is most our most critical data?
• Where is it backed up?
• Have we tested our backup procedure?
• Who has access to it?
• How do we make sure they are who they are?
• How do we know we can trust them?
• What do we do to train them?
Protect
Cybersecurity oversight
16
o Develop and implement appropriate
activities to identify the occurrence of a
cybersecurity event.
• How do we gain visibility into our network
activity?
• What data do we collect?
- Internal
- External (threat intelligence)
• Who analyzes it?
• Who decides if we have an incident? What’s
the threshold? What happens then?
Detect
Cybersecurity oversight
17
o Develop and implement appropriate activities
to take action regarding a detected
cybersecurity incident.
• Do we have an incident response plan?
• When was it last updated?
• Have we scenario tested it?
• Who’s on the incident response team?
• Have they been trained?
• Have we pre-retained outside providers?
• When was our last incident? What did we learn
from it about our ability to respond?
• Is that reflected in our plan?
Respond
Cybersecurity oversight
18
o Develop and implement appropriate activities
to maintain plans for resilience and to restore
any capabilities or services that were impaired
due to a cybersecurity incident.
• When was our last incident?
• Did we debrief? How?
• What did we learn from it about our ability to
respond?
• Is that reflected in our plan?
• Did we communicate with our stakeholders
about these learning?
Recover
Cybersecurity oversight
19
Questions?
Questions?
For more information, contact:
The information contained herein is of a general nature and is not intended to constitute legal advice, a complete statement of the law, or an opinion on
any subject. No one should act upon it or refrain from acting without a thorough examination of the law after the facts of a specific situation are considered.
You are urged to consult your legal adviser in cases of specific questions or concerns. BLG does not warrant or guarantee the accuracy, currency or
completeness of this presentation. No part of this presentation may be reproduced without prior written permission of Borden Ladner Gervais LLP.
© 2021 Borden Ladner Gervais LLP. Borden Ladner Gervais is an Ontario Limited Liability Partnership.
Thank You
Dan Michaluk
Partner
416.367.6097
dmichaluk@blg.com

More Related Content

PPTX
Building Cyber Resilience: No Safe Harbor
PPTX
Cyber Incident Response - When it happens, will you be ready?
PDF
Vulnerability management - beyond scanning
PDF
Cybersecurity Goverence for Boards of Directors
PPTX
The Science and Art of Cyber Incident Response (with Case Studies)
PPTX
A guide to Sustainable Cyber Security
PPTX
Robert Nichols: Cybersecurity for Government Contractors
PDF
Cybersecurity solution-guide
Building Cyber Resilience: No Safe Harbor
Cyber Incident Response - When it happens, will you be ready?
Vulnerability management - beyond scanning
Cybersecurity Goverence for Boards of Directors
The Science and Art of Cyber Incident Response (with Case Studies)
A guide to Sustainable Cyber Security
Robert Nichols: Cybersecurity for Government Contractors
Cybersecurity solution-guide

What's hot (17)

PDF
Data breach-response-planning-laying-the-right-foundation
PDF
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
PDF
Cybersecurity in the Boardroom
PPT
Security Lifecycle Management
PDF
Cyber Security Tips and Resources for Financial Institutions
PDF
What CIOs Need To Tell Their Boards About Cyber Security
PPTX
Cybersecurity & the Board of Directors
PDF
Dynamic Cyber Defense
PPTX
Ivanti Threat Thursday for April 30
PDF
Security Program Guidance and Establishing a Culture of Security
PDF
OWASP based Threat Modeling Framework
PDF
Improving Cyber Security Literacy in Boards & Executives
PDF
NESCO Town Hall Workforce Development Presentation
PPTX
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
PPTX
ComResource - NW Agent Cybersecurity
PPTX
Cyber Security Planning: Preparing for a Data Breach
PPTX
Cas cyber prez
Data breach-response-planning-laying-the-right-foundation
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Cybersecurity in the Boardroom
Security Lifecycle Management
Cyber Security Tips and Resources for Financial Institutions
What CIOs Need To Tell Their Boards About Cyber Security
Cybersecurity & the Board of Directors
Dynamic Cyber Defense
Ivanti Threat Thursday for April 30
Security Program Guidance and Establishing a Culture of Security
OWASP based Threat Modeling Framework
Improving Cyber Security Literacy in Boards & Executives
NESCO Town Hall Workforce Development Presentation
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
ComResource - NW Agent Cybersecurity
Cyber Security Planning: Preparing for a Data Breach
Cas cyber prez
Ad

Similar to Cybersecurity Risk Governance (20)

PPTX
Critical Issues in School Board Cyber Security
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PPTX
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
PPTX
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
PDF
Cybersecurity Roadmap Development for Executives
PPT
Cybersecurity and the regulator, what you need to know
PPTX
Selling security to the C-level
PDF
Protecting Your Business From Cyber Risks
PPTX
Cyber Recovery - Legal Toolkit
PPT
Information Technology Security Basics
PDF
Cyber forensic readiness cybercon2012 adv j fick
PDF
Combating cyber crimes chinatu
PDF
2014 ota databreach3
PPTX
Dancyrityshy 1foundatioieh
PDF
Top 10 Cybersecurity Predictions for 2015
PDF
Cybercrime Bill 2014: Due Diligence
PPTX
Using Technology and People to Improve your Threat Resistance and Cyber Security
PDF
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
PDF
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
Critical Issues in School Board Cyber Security
Dealing with Information Security, Risk Management & Cyber Resilience
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Cybersecurity Roadmap Development for Executives
Cybersecurity and the regulator, what you need to know
Selling security to the C-level
Protecting Your Business From Cyber Risks
Cyber Recovery - Legal Toolkit
Information Technology Security Basics
Cyber forensic readiness cybercon2012 adv j fick
Combating cyber crimes chinatu
2014 ota databreach3
Dancyrityshy 1foundatioieh
Top 10 Cybersecurity Predictions for 2015
Cybercrime Bill 2014: Due Diligence
Using Technology and People to Improve your Threat Resistance and Cyber Security
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
(ISC)² Certified in Cybersecurity (CC) self-paced course .pdf
Ad

More from Dan Michaluk (20)

PPTX
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
PPTX
Introduction to FOI law (the law of information)
PPTX
Higher Education Sexual Violence Presentation
PPTX
Cyber class action claims at an inflection point
PPTX
The pandemic and privacy
PPTX
Union access to information
PPTX
The Current State of FOI
PPTX
Cyber, secrecy and the public body
PPTX
The privacy and security implications of AI, big data and predictive analytics
PPTX
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
PPTX
Privacy, Data Security and Anti-Spam Compliance
PPTX
Cyber Insurance and Incident Response Practice
PPTX
Role of a breach coach
PPTX
PHIPA for school boards
PPTX
Privacy, Data Security and Anti-Spam Compliance
PPTX
Finding internet evidence
PPTX
Sexual Assault in Higher Education - Law Policy and Practice
PPTX
Canadian Association of University Solicitors - Privacy Update 2016
PPTX
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
PPTX
Cybersecurity and data loss - It's not just about lost USB keys today
Ecno cyber - 23 June 2023 - djm(137852631.1).pptx
Introduction to FOI law (the law of information)
Higher Education Sexual Violence Presentation
Cyber class action claims at an inflection point
The pandemic and privacy
Union access to information
The Current State of FOI
Cyber, secrecy and the public body
The privacy and security implications of AI, big data and predictive analytics
Advocates' Society Tricks of the Trade 2019 - A Privacy Update
Privacy, Data Security and Anti-Spam Compliance
Cyber Insurance and Incident Response Practice
Role of a breach coach
PHIPA for school boards
Privacy, Data Security and Anti-Spam Compliance
Finding internet evidence
Sexual Assault in Higher Education - Law Policy and Practice
Canadian Association of University Solicitors - Privacy Update 2016
Student Conduct Investigations - Examining Evidence and Determining Credibiliity
Cybersecurity and data loss - It's not just about lost USB keys today

Recently uploaded (20)

PPTX
Cyber Bullying & harassment on social media.pptx
PDF
UNIT-2- SALE OF GOODS ACT 1930.pdf (Applicable for India)
PDF
LATEST AMENDMENT COMPANY LAW 2016 FOR MALAYSIAN LAW
PDF
Legal Strategics for Startup Success Contracts.pdf
PDF
UNIT-7_ IPR_Final PPT.pdf (Applicable for India)
PPTX
A-BREIF-SUMMARY-OF-THE-FIRST-VOYAGE-AROUND-THE-WORLD-BY-MAGELLAN-BY-ANTONIO-P...
PDF
Manipur-Report.pdf governance failure in Manipur
PDF
Principles and Concepts Applicable on Election Law.pdf
PDF
Divorce Attorney Chicago – Guiding You Through Every Step
PPTX
white collar crime .pptx power function and punishment
PPTX
Types_of_Partnership_1932.pptx legal law
PPT
Judicial Process of Law Chapter 2 Law and Legal Systems
PDF
Case Digest_ G.R. No. 45081 - Angara vs. Electoral Commission.pdf
PDF
UNIT- 10_Universal Ethics.pdf (Business Context)
PPT
Federalism lecture note power point for law
PDF
UNIT- 5 & 6_Industrial Relations PPT.pdf
PDF
CORPORATE GOOD GOVERNANCE_ CONTEMPORARY TRENDS AND CHALLENGES (1).pdf
PDF
Civil Court Procedure by Shivam Dhawal.pdf
PDF
The family of Tagin tribe of Arunachal Pradesh -- by B_B_ Pandey -- First edi...
PDF
Common Estate Planning Mistakes to Avoid in Wisconsin
Cyber Bullying & harassment on social media.pptx
UNIT-2- SALE OF GOODS ACT 1930.pdf (Applicable for India)
LATEST AMENDMENT COMPANY LAW 2016 FOR MALAYSIAN LAW
Legal Strategics for Startup Success Contracts.pdf
UNIT-7_ IPR_Final PPT.pdf (Applicable for India)
A-BREIF-SUMMARY-OF-THE-FIRST-VOYAGE-AROUND-THE-WORLD-BY-MAGELLAN-BY-ANTONIO-P...
Manipur-Report.pdf governance failure in Manipur
Principles and Concepts Applicable on Election Law.pdf
Divorce Attorney Chicago – Guiding You Through Every Step
white collar crime .pptx power function and punishment
Types_of_Partnership_1932.pptx legal law
Judicial Process of Law Chapter 2 Law and Legal Systems
Case Digest_ G.R. No. 45081 - Angara vs. Electoral Commission.pdf
UNIT- 10_Universal Ethics.pdf (Business Context)
Federalism lecture note power point for law
UNIT- 5 & 6_Industrial Relations PPT.pdf
CORPORATE GOOD GOVERNANCE_ CONTEMPORARY TRENDS AND CHALLENGES (1).pdf
Civil Court Procedure by Shivam Dhawal.pdf
The family of Tagin tribe of Arunachal Pradesh -- by B_B_ Pandey -- First edi...
Common Estate Planning Mistakes to Avoid in Wisconsin

Cybersecurity Risk Governance

  • 1. Presented By AWCBC GOVERNANCE SUMMIT 2021 Cybersecurity risk governance Dan Michaluk June 10, 2021
  • 2. The degree and nature of the risk to boards
  • 3. o Cyber (outside > in) • Ransomware/malware • Business e-mail compromise and fraud • Misconfiguration driven exposures • Distributed denial of service (DDoS) o Other (inside > out) • Insider theft • Snooping • Errant e-mails • Lost devices, papers… Register of data security problems The degree and nature of the risk to boards 3
  • 4. o Attacks up by 150% in 2020 o Ransom payments are up more than 300% in 2020 o Double and triple extortion threat • Lock up data • Steal data and hold it ransom • DDoS or doxing threat o Market for insurance is hardening • Premiums up 20% to 50% • Higher deductibles, limits and co-insurance • New conditions for coverage and harder vetting The ransomware threat is very high The degree and nature of the risk to boards 4
  • 5. The public sector is a primary target The degree and nature of the risk to boards 5 o Budgetary pressures tend to leave public sector entitles with weaker defences o Government and MUSH sector attacks are very common
  • 6. o Privacy compliance failures o Reputational problems • What’s the impact on the operation of ruptured trust? • Access legislation invites full and unmitigated transparency o Response costs • Operational drain • Hard costs o Civil liability and liability to employees Manifestations of risk The degree and nature of the risk to boards 6
  • 7. Cyber security 101 for governors
  • 8. o The practice of protecting information by mitigating information risks o The value of information to organizations is derived from its • Confidentiality • Integrity • Availability Meaning of information security Cyber security 101 for governors 8
  • 9. o The process of managing the deployment, maintenance, upgrading and disposal of IT assets o An IT asset is hardware, software or data repository within the technology environment o Common problems • Assets that have been adopted but are not under management • Legacy technologies can be vulnerable and may not integrate with current security technologies Asset management Cyber security 101 for governors 9
  • 10. o The use of layered, redundant measures to protect information and systems with the expectation that some measures will fail o Achieved through implementation of an array of controls – physical, administrative and technical o And achieved through layering – perimeter security >> system level security o The cloud and remote work have led to a focus on controls deeper than the perimeter – internal monitoring is now very important o Readiness to respond to events and incidents is another aspect of layering Defence in depth Cyber security 101 for governors 10
  • 11. o A security event is a possible problem that should be assessed o An security incident is a confirmed problem that needs to be managed through the incident response process • Cyber attack • A misconfiguration • An errant communication o A “breach” is a legal concept that relates to unauthorized access to information or loss, theft… Events, incidents and “breaches” Cyber security 101 for governors 11
  • 12. o Insecure remote access • Exposed remote desktop protocol • No multi-factor authentication o Vulnerability and patch management o Poor implementation of least privilege principle o Poor network visibility o Poorly implemented and untested backup procedures Common problems Cyber security 101 for governors Coveware Q1 2021 Ransomware Report 12
  • 14. o Establish tone at the top o Build the board’s cyber competency • How to educate board members? • Who ought to be recruited? o Talk to each other and benchmark your oversight practices o If IT or IT security presents the report, don’t exclude other executives o Consider using the NIST Cybersecurity Framework to structure the dialogue with management Overview Cybersecurity oversight 14
  • 15. o Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities. • Do we have asset inventories? With a classification scheme? When were they last updated? • Are our roles and responsibilities clearly and appropriately assigned? By what policies? When were they last updated? • Do we have processes for ongoing risk assessment? What are they? Do we use third parties, and how? - Overall - Supply chain Identify Cybersecurity oversight 15
  • 16. o Develop and implement appropriate safeguards to ensure secure delivery of critical services. • What is most our most critical data? • Where is it backed up? • Have we tested our backup procedure? • Who has access to it? • How do we make sure they are who they are? • How do we know we can trust them? • What do we do to train them? Protect Cybersecurity oversight 16
  • 17. o Develop and implement appropriate activities to identify the occurrence of a cybersecurity event. • How do we gain visibility into our network activity? • What data do we collect? - Internal - External (threat intelligence) • Who analyzes it? • Who decides if we have an incident? What’s the threshold? What happens then? Detect Cybersecurity oversight 17
  • 18. o Develop and implement appropriate activities to take action regarding a detected cybersecurity incident. • Do we have an incident response plan? • When was it last updated? • Have we scenario tested it? • Who’s on the incident response team? • Have they been trained? • Have we pre-retained outside providers? • When was our last incident? What did we learn from it about our ability to respond? • Is that reflected in our plan? Respond Cybersecurity oversight 18
  • 19. o Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. • When was our last incident? • Did we debrief? How? • What did we learn from it about our ability to respond? • Is that reflected in our plan? • Did we communicate with our stakeholders about these learning? Recover Cybersecurity oversight 19
  • 21. For more information, contact: The information contained herein is of a general nature and is not intended to constitute legal advice, a complete statement of the law, or an opinion on any subject. No one should act upon it or refrain from acting without a thorough examination of the law after the facts of a specific situation are considered. You are urged to consult your legal adviser in cases of specific questions or concerns. BLG does not warrant or guarantee the accuracy, currency or completeness of this presentation. No part of this presentation may be reproduced without prior written permission of Borden Ladner Gervais LLP. © 2021 Borden Ladner Gervais LLP. Borden Ladner Gervais is an Ontario Limited Liability Partnership. Thank You Dan Michaluk Partner 416.367.6097 [email protected]