Lawyers and information security professionals have something very fundamental in common: We see risk everywhere we look.
As someone who began his career as an attorney but has gradually transitioned into information security, I have hung around long enough now to see the two disciplines gradually converge. Cybersecurity and the law are colliding all around us—sometimes violently, but increasingly in a more productive and mutually beneficial way. I have been an advisor to lawyers and security professionals alike, helping each understand the perspective and preoccupations of the other. Each discipline needs the other, and nowhere is that more apparent than in the area of data breach response.
Companies who suffer a security breach that exposes sensitive information can now expect to be abruptly thrust into one legal process or another. Whether that process takes the form of a regulatory inquiry, a class-action suit or a contractual dispute, counsel’s role in helping respond to what was long considered “an IT issue” is more critical than ever before. For this reason, proactive cybersecurity professionals have begun seeking guidance from the legal department before an incident forces them together.
But where to start?
I recommend that legal and cybersecurity professionals focus their initial collaborative efforts on achieving defensibility. From a legal perspective, a defensible security program is one that will withstand post-breach scrutiny and be deemed “reasonable” under the microscope of hindsight. Developing a defensible cybersecurity risk program involves working backwards from the moment of breach impact to look at all the steps along the way that could have been taken to prevent or mitigate the damage from a breach event.
Why do I suggest this as a starting point? Because scrutiny of the steps taken – or not taken – to forestall a cybersecurity incident will undoubtedly come once you have suffered an incident. It’s far better to have taken a look in the mirror before you present yourself to the world. Despite the fact that your program will, by definition, have “failed” by the time the scrutiny commences, it is still possible to demonstrate your diligence in limiting exposure and containing the damage.
So how can you ensure your diligence is reasonably defensible?
Lawyers will rightly point to the concept of precedence. Courts are nearly always influenced—and in some cases bound—by similar cases and judicial reasoning that have come before. While there are not many judicial opinions at this stage that provide concrete parameters around what constitutes a defensible cybersecurity program, there are several potential sources of guidance.
A good starting point is to identify the regulators most relevant to your business. If you are in the financial services sector, then the Securities and Exchange Commission (SEC), the Federal Reserve Board (FRB) and the Consumer Financial Protection Bureau (CFPB) will likely be on your list. If you are in the retail or hospitality sector, you should pay close attention to the Federal Trade Commission (FTC) as well as state-level consumer protection law enforcers. Once you’ve compiled your list of regulators, do some research to identify what they have been doing – and saying – about cybersecurity. In addition to looking at the regulations themselves and formal filings by the agencies, you will also find speeches, position papers and bulletins that can help clarify what regulators find most important when it comes to cybersecurity risk management. If you are a security professional blanching at the thought of this exercise, here’s a hint: Most lawyers love a task like this, and are actually quite good at it. But they’ll undoubtedly need your help in interpreting what they find and understanding its implications.
It is important to note that this is not a compliance exercise.
Attaining a defensible security posture goes beyond merely being able to pass an audit. Indeed, much of the “guidance” out there will not present hard-and-fast rules. Logic and judgment are required for you to settle on a defensible standard. Security pros will need to help their legal colleagues understand the reality that aggressive security measures tend to undermine convenience and practicality. A good example is encryption, which can be very effective in protecting sensitive data and meeting regulatory and judicial guidelines. But any IT professional will tell you that encryption technology is expensive and implementation can create operational delays and challenges that render it unfeasible. For instance, encrypting data at rest in a high-capacity data processing environment can grind processing operations to a halt. Finding the right balance between security and practicality is what achieving defensibility is all about.
Security and legal professionals have a lot more in common than you might think. Avoiding the many hidden traps and obstacles in building a cybersecurity program requires openness to collaboration and real creativity. Bringing together legal and cybersecurity practitioners is the surest path to achieving a defensible cybersecurity program.
Check out Jason's upcoming presentation on legal landmines around IT infrastructure, Wednesday, May 4, at Interop 2016 at the Mandalay Bay Convention Center, Las Vegas. Click here for pricing information and to register.Jason Straight<http://www.unitedlex.com/about-us/jason-straight.php> is the Senior Vice President and Chief Privacy officer at UnitedLex<http://www.unitedlex.com/>. He has more than a decade of experience assisting clients in managing information security risks, ... View Full Bio