Article June 6, 2016
Fish's Donna Balaguer Interviewed in Metropolitan Corporate Counsel Article, "Why Cybersecurity Is Your Board's Business"
- Person title
Donna Balaguer (Principal) and Gus Coldebella (Former Fish Principal) were recently interviewed by Metropolitan Corporate Counsel in the April 2017 article, “Why Cybersecurity Is Your Board's Business.”
MCC: You have interesting and different backgrounds. How do you work together to help clients protect themselves from cyberattacks?
Coldebella: When I was at DHS, part of my job was helping to lead the legal efforts to improve security of the federal government's computer networks, and to promote robust cyber information sharing between the government and the private sector. In private practice, I do the same for companies, both public and private, that either have experienced apparent cyber incidents or are planning for the inevitable attack. We help clients focus on what should happen before an attack occurs - or, as we like to say, "left of boom." Instituting good corporate governance practices and preparation - not only knowing the enemies and what they might be after, but understanding in advance the regulatory and law enforcement regimes that apply to your company and industry - can help mitigate a disaster.
Balaguer: I help clients take advantage of the incredible business opportunities created and facilitated by technology, while mitigating the risks of cyber attacks and data breaches. I served as in-house counsel in the technology sector and understand the pressures of managing the ever-changing landscape of cybersecurity regulations and best practices while at the same time responding to business needs. Everything is focused on understanding our clients' businesses so that we can evaluate specific risks and opportunities. We then create a comprehensive plan that not only helps the client protect itself in advance, but tells them what to do if an attack occurs.
MCC: Gus, as the acting general counsel at DHS, you were involved in setting cybersecurity policy at the federal level. Tell us about the potential cybersecurity actions that the new Trump administration may take, and the implications for the private sector.
Coldebella: There are some quick wins that the Trump team can achieve early in the administration. Since private-sector participation in key aspects of cybersecurity - like information sharing - is voluntary, the administration has to find ways to eliminate disincentives to participation, such as the risk of an agency enforcement action after reporting an attack. Companies that are hacked are victims of a crime, and should be treated that way by the government. However, there's a disconnect between the "help-the-victim" and the "blame the victim" agencies - a disconnect that the Trump administration should broker.
Also, companies that are compliant with a government-sanctioned standard like the National Institute of Standards and Technology cybersecurity framework, yet are victims of a sophisticated hack, should be afforded some level of liability protection from the government. This is a reasonable approach that both encourages better cybersecurity and recognizes that there is no such thing as perfect security.
MCC: Can you explain why cybersecurity isn't just a server room issue but also a boardroom issue?
Coldebella: It's one of the central enterprise risks that boards of directors and C-suite executives face. Since everything of value is now in digital form - from personal information to credit card numbers, to intellectual property and communications between senior executives about their corporate strategy - bad guys are finding more advanced ways to look at, manipulate and monetize it.
Cybersecurity is, and has to be, a boardroom issue not only because of the potentially devastating primary effects of a successful attack - losing control of one's data or information assets - but also because of the secondary effects, which could cause even more significant issues for the company: litigation, regulatory investigations, loss in stock price and the reputational hit that invariably follows. Boards are carrying out this obligation in different ways: establishing special committees to oversee the issue, assigning oversight to the audit committee - even adding "risk" to the committee's name. Experienced outside counsel can help the board create the appropriate tone at the top and document its record of oversight and compliance, both to help it in its stewardship of the company's security, and to protect the company in case the board's actions are reviewed later.
MCC: What steps should companies and their boards do right now to mitigate the risk of a cyberattack?
Coldebella: We urge clients to step back and think about cybersecurity in a strategic way. What are the assets that we have that are valuable? How are we protecting them? How quickly will we know if they're accessed, stolen, deleted or altered? Companies should use a risk-based approach in this analysis: What is most valuable? What is most likely to be targeted? What information assets would be devastating to the company or its customers if unlawfully manipulated? Once management answers those questions, the board should monitor and oversee the company's cyber work with questions like these: Do we have the right policies, procedures and personnel to make sure that our assets are secured? If an attack were to happen, would the company be resilient - including through implementation of an incident response plan that has been regularly exercised in mock attacks? Now that the Securities and Exchange Commission has issued guidance suggesting that companies disclose cybersecurity-related risks in their public filings, CEOs, CFOs, general counsel and boards of directors need to focus on whether the company has engaged in a robust process to understand and disclose its cyber risks. This is not a "one and done" board function; since the threat is dynamic, as are the company's systems and information, the analysis and oversight should be ongoing.
MCC: Donna, where do privacy and data security fit into the equation?
Balaguer: It's all about data. Cybersecurity is critical because of the important and sensitive data maintained in cyberspace. Most intruders are looking for data. Companies have their own confidential business data that they obviously want to protect. They may also have collected information from others, such as employees, patients and customers. Companies have additional responsibilities to explain how they will use this outside information and use it appropriately. Companies need to implement data security measures to prevent intruders from getting their hands on it. They must also implement data privacy measures that will govern how they use, share, maintain and destroy the information of others.
MCC: Which business sectors are most vulnerable to cyberattacks and why?
Balaguer: No business sector should feel immune. Any company that holds data is vulnerable, but we can look at which data is the most valuable to an intruder. Financial data is obviously valuable. The financial sector holds this data, but so do companies that collect payment data from consumers. This is why we've seen an increase in attacks on consumer-oriented companies like Home Depot. We've seen a dramatic increase in breaches in the health care sector because of the sensitive data it holds, and those are likely to continue. With the growing internet of things, I expect to see more breaches in the manufacturing industry as well.
MCC: What are five questions every CEO should ask about cybersecurity?
Balaguer: Who are the employees in charge of cybersecurity at our company? What are our cybersecurity risks? What are our policies and procedures to manage those risks? How do we manage related risks, such as data privacy? And how do we ensure that our policies and procedures are followed companywide?
MCC: What types of claims can result after a cyber breach, and who can sue?
Coldebella: We have seen cases involving allegations of personally identifiable information being lost in an attack. For public companies, plaintiffs have brought 10b-5 stock-drop cases - securities fraud actions that allege that the company's public disclosures did not tell the whole truth about the state of its cybersecurity risk. We've also seen - and this is of particular interest to corporate directors - claims for breach of fiduciary duty, alleging that a board of directors ignored the red flags of this type of attack potentially happening.
The other area is regulatory investigations. The FTC has been the big dog in the junkyard, bringing cybersecurity actions against companies that have experienced attacks. But the SEC is also beginning to flex its cyber muscles. The SEC has regulatory authority over public companies' disclosure obligations, and it's been using that authority with increased vigor to try to raise the cybersecurity game of those companies that are within its regulatory ambit. I imagine that, soon enough, if the SEC Enforcement Division believes that a hacked company's cybersecurity disclosures were subpar, it will test its enforcement powers against that company.
MCC: Donna, can you explain why cybersecurity is an issue that needs buy-in from every employee in a company?
Balaguer: You can have the best cybersecurity intentions and practices, but they won't mean anything unless the entire company is on board. Employees are critical to cybersecurity. We've seen even sophisticated government employees fall for phishing emails that resulted in the loss of very valuable information, as well as public embarrassment. Intruders will look for the weakest link, so cybersecurity must be instilled throughout the company.
MCC: How can companies instill a corporate culture of compliance?
Balaguer: The culture must flow down from the top. The company executives must make it clear that cybersecurity is an important company value and is part of the company's core identity. In terms of training, cybersecurity is not a once-a-year issue. Engage in ongoing interactions with employees about cybersecurity, including telling them about the newest devious methods that hackers are using. Make the training engaging and maybe even fun with drills and exercises. Don't take a one-size-fits-all approach; instead, tailor training according to employees' job responsibilities. The bottom line is that cybersecurity awareness should be made a routine part of every employee's workday.
To download the PDF version of this article, click here.
The opinions expressed are those of the authors on the date noted above and do not necessarily reflect the views of Fish & Richardson P.C., any other of its lawyers, its clients, or any of its or their respective affiliates. This post is for general information purposes only and is not intended to be and should not be taken as legal advice. No attorney-client relationship is formed.
Article January 28, 2016
Corporate Counsel Whitepaper: Survey Shows Companies Struggling to Prepare for Cyberbreaches
Blog February 18, 2015
Privacy Concerns for Individuals When State Governments Release Data
Blog January 13, 2015
FCC Enforcement Update: 2014 Year in Review
Blog August 19, 2013
FCC Enforcement Update: August 2013
Blog December 4, 2023
Amended FRE 702 on Expert Testimony Effective December 1, 2023
Blog December 1, 2023
ITC Monthly Wrap-Up: November 2023
Blog November 27, 2023
Minnesota Patent Litigation Wrap-Up: Q3 2023
Blog November 15, 2023
ITC Monthly Wrap-Up: October 2023
Blog November 9, 2023
Legal Alert: FTC Challenges More Than 100 Patents as Improperly Listed in Orange Book
Blog November 3, 2023
District of Delaware Finds Allergan Patents Invalid for Lack of Written Description and Obviousness-Type Double Patenting in Allergan v. MSN Labs
Blog October 31, 2023
Texas Patent Litigation Monthly Wrap-Up: October 2023
Blog October 30, 2023
District of Delaware Finds Non-Orange Book-Listed Patents Subject to the Same Pleading Standard as Listed Patents in ANDA Infringement Suit
Blog October 11, 2023
ITC Monthly Wrap-Up: September 2023
Blog September 25, 2023
Federal Circuit Evaluates Enablement for Antibody Claims for the First Time Since Amgen v. Sanofi in Baxalta Inc. et al. v. Genentech, Inc.