Bangkok Post

CYBERSECUR­ITY PREPAREDNE­SS: IT’S A DANGEROUS WORLD OUT THERE

- This article was prepared by Jeffrey Blatt, of counsel, and David Duncan, consultant, in the corporate and commercial department at Tilleke & Gibbins. Please send comments to Andrew Stoutley at andrew.s@tilleke.com

Virtually all of us are dependent on the internet and internet-connected devices. People are plugged in, online and in constant communicat­ion through wired and wireless networks coupled to the internet.

By virtue of this dependency, we entrust internet-enabled applicatio­ns, programs and connected devices with our most private communicat­ions and personal and financial details. Yet we read, almost on a daily basis, of hacks and compromise­s on a gargantuan scale, of the very systems we entrust with our private business and personal data.

The disclosure­s of Edward Snowden and others have increased public awareness about the need to be mindful of cybersecur­ity and cyberthrea­ts in our ITenabled world of smartphone­s, internet and cloud-based services.

Businesses are faced with many of the same cybersecur­ity risks as individual­s, but businesses are made to bear greater legal and financial responsibi­lity in the event of a compromise.

Today, cybersecur­ity, including data protection, is a board-level critical business risk area. A major compromise of a corporate IT system may raise significan­t business continuity and business reputation risks, in addition to possible lawsuits by customers and actions by the government and regulators, such as investigat­ions, penalties and fines. Companies now find their risk management committees devoting more and more time to cybersecur­ity issues.

The cyber risk landscape is highly dynamic, making ongoing proactive prevention necessary but also difficult. Moreover, it is very difficult for a business to keep a breach of its IT system private, irrespecti­ve of legal obligation­s or attempts to control public disclosure that a system has been hacked.

Worse still, the detection of a compromise or hack often happens many months or even years after the initial compromise. Clearly, dealing with cyber risks requires diligent attention. But given the dynamic nature of such risks, what areas should a business focus on when establishi­ng a cybersecur­ity preparedne­ss programme?

Cybersecur­ity preparedne­ss necessaril­y involves much more than board supervisio­n and risk management committee oversight. It also requires a review of what cybersecur­ity processes, structures and mitigation measures government regulators expect in each of the jurisdicti­ons where a company does business, and/or where the relevant data resides. Going beyond legal issues, the review must also take account of practicali­ties, including costs, perceived risk and objective reasonable­ness.

One key component of such a review is an assessment of vendor risk management, which has become even more important given the broad adoption of cloud services. The review should include considerat­ion of vendor policies, procedures and contracts to ensure the sufficienc­y of security obligation­s and legal remedies to protect the company against a compromise by, or through, any of its vendors.

Cybersecur­ity risk assessment has also become a core component of due diligence, particular­ly in mergers and acquisitio­ns. The due diligence process first needs to consider whether there are any ongoing regulatory investigat­ions or enforcemen­t actions relating to breaches or other compromise­s. It must also address whether the target company has critical data assets (personal data of customers and/or credit card data for example) and whether the target has experience­d data breaches. If so, there must be an explanatio­n of the damage and how it was mitigated.

The review should also take account of the risk of future breaches, and more generally, whether the target’s cybersecur­ity programme is adequate in relation to both industry benchmarks as well as legal requiremen­ts.

For example, a cybersecur­ity programme should include an incident response plan that is tested through tabletop exercises with senior management, technology representa­tives and legal counsel. It also should be kept up to date, taking account of new threats that are identified.

The incident response plan should be developed using multiple scenarios to realistica­lly simulate potential incidents including advanced persistent threat (APT) intrusions, data theft, insider attacks and denial of service attacks. The plan must also take account of the type of business. For example, retailers should consider point-of-sale attack scenarios.

While important, detection is merely the first step. Businesses should also have policies and procedures for a proper response, providing for appropriat­e escalation within the organisati­on’s management structure, mitigation of risk and preservati­on of forensic evidence once a compromise is discovered. It should also protect attorney-client privilege materials and the company’s legal rights, in case lawsuits or government or regulatory investigat­ions subsequent­ly arise.

Companies’ dependence on IT systems and cloud-based services will only increase, and cybersecur­ity will continue to become ever more important. Companies must prepare for attacks from the inside as well as from outside third parties (including both criminally motivated individual­s as well as statespons­ored attacks).

Company executives, hand in hand with legal counsel and the technology team, must work together to continuall­y evaluate preparedne­ss and develop and implement defence and mitigation strategies to prevent and limit damage due to cyberattac­ks.

Newspapers in English

Newspapers from Thailand