Back
Technology law
Why Cybersecurity Incident Response Isn’t Just an IT Function

September 3, 2015

Why Cybersecurity Incident Response Isn’t Just an IT Function
Some of the largest organizations in the world, with the most advanced security tools and highly qualified security personnel, haven’t been able to stop cybersecurity breaches. As a result, there are two realities that companies need to accept. First, it’s almost a foregone conclusion that your business will be victimized by a breach. If a sophisticated hacker decides to target your network, they’ll figure out a way to get past your defenses. Second, the breach itself won’t determine how much damage is done. The speed and effectiveness of your company’s response to the breach will determine whether it causes a relatively minor fender bender or a full-blown wreck. Because of the inevitability of a security breach, every organization needs an incident response plan – a documented strategy that first explains what kind of event qualifies as an incident, and then defines the process to follow to minimize the impact of the incident. The SANS Institute, a research and education organization that caters to security professionals around the world, identified the six phases of incident management: preparation, identification, containment, eradication, recovery, and lessons learned. A 2014 study from the SANS Institute found that only 9 percent of incident response professionals believe their incident response capabilities are “very effective.” 26 percent went so far as to call their capabilities “ineffective.” 43 percent say the lack of a formal incident response plan hampers their ability to manage incidents. These findings are reinforced by the 2015 Verizon Data Breach Report. Although a hacker can compromise a network in minutes, just 45 percent of organizations can detect a breach in “days or less.” Incident response isn’t just an IT function. The incident response team that develops and executes your plan typically involves IT, security, human resources, customer service, public relations and legal. After all, cybersecurity is as much a legal issue as a technical one. The patchwork of industry regulations and laws related to data security and privacy at the state and federal levels is difficult to navigate without an attorney. For example, if your company is the victim of a security breach and you have customers in all 50 states, you could very well have 50 different requirements for reporting the breach and notifying your customers. And when that notification becomes public record and reporters start digging for more information, wouldn’t you rather they call your attorney? Traditionally, an attorney would be called in to help manage the response to a cybersecurity incident, but modern threats have made an attorney a valuable resource during the planning stages. A lawyer can collaborate with representatives from other departments to develop specific processes, training and risk assessments. Because of the growing threat of private lawsuits, your incident response plan should anticipate potential litigation. In a data breach case involving Genesco and Visa, the court denied discovery requests for reports and communications with two of Genesco’s cybersecurity consultants, ruling that the information was protected by attorney-client privilege. This decision adds another reason why companies should consider having legal counsel lead cybersecurity initiatives. In the next post, we’ll discuss what you can do to maximize the effectiveness of your incident response plan and minimize your legal risk.

Follow Us

Related insights

How Florida’s CADRA Law Provides a Remedy for Insider Threats

March 18, 2016

The risk of a data breach has never been higher as sophisticated criminals have the expertise, organization and financial backing […]
View

Written Contracts for All Contractors. Period.

January 28, 2016

Suppose you decide to partner with an app development firm to create a mobile app for your company. You have […]
View

Wearables and mHealth: A Privacy Crisis Waiting to Happen?

December 21, 2015

Wearable technology usage has increased 500 percent during the past three years. Researchers from MarketsandMarkets expect this explosive growth to […]
View
Let’s protect your business. Schedule a consultation to get started.

Let’s protect your business. Schedule a consultation to get started.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.

What to expect:

  1. Use the form to schedule a consultation.
  2. You’ll talk with a real attorney about your business and needs and how we can help. Then, you’ll get an initial estimate.
  3. If you like what you hear, you’ll get an engagement letter and pay the deposit.
  4. We’ll get started protecting your business.
Let’s protect your business. Schedule a consultation to get started.

Let’s protect your business. Schedule a consultation to get started.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.

What to expect:

  1. Use the form to schedule a consultation.
  2. You’ll talk with a real attorney about your business and needs and how we can help. Then, you’ll get an initial estimate.
  3. If you like what you hear, you’ll get an engagement letter and pay the deposit.
  4. We’ll get started protecting your business.