Posted on Sep 26, 2019
Many organizations recognize that SecurityScorecard is a highly effective weapon in the cybersecurity toolkit for a Chief Information Security Officer (CISO), but the link to the legal and compliance departments is often less well understood. With the proliferation of state, federal and international regulations involving cybersecurity and data privacy, SecurityScorecard also enables companies to align their policies and procedures to maintain a robust cybersecurity compliance stance. In addition, the cybersecurity-related risks of civil litigation, regulatory investigations, and congressional inquiries have expanded dramatically.
Cybersecurity is no longer simply an IT department’s problem and, in fact, cannot be the responsibility of any single department. Regulators have repeatedly stressed the importance of an enterprise-wide approach to creating an effective cybersecurity program as a matter of corporate governance. As such, a corporation’s senior management need to provide oversight and support the program with sufficient resources and funding.
Such programs need coordination and communication across multiple internal departments. When establishing a cybersecurity program, organizations must include relevant legal and compliance professionals as early as possible in the risk assessment process. This team-based model allows the various stakeholders to holistically leverage their expertise, which will make the cybersecurity program that much more robust.
Moreover, disparate stakeholders often view cybersecurity risks through very different lenses and speak about those risks in different ways. Without a programmatic and governance-based approach that includes the wide variety of internal stakeholders, a cybersecurity program may end up with significant gaps in understanding risks and/or lack the appropriate measures to mitigate them, which increases the severity of cyber-related harm that an organization may suffer.
As companies expand their cyber-related preparations, legal and compliance professionals can add value in many different ways.
A company in-house and/or outside counsel’s responsibilities should include a variety of legal and compliance actions to ensure the program’s robustness. For example, legal counsel’s responsibilities may include, but are not limited to:
Meanwhile, contract attorneys for a corporation can also negotiate key data privacy and security provisions in vendor contracts regarding the access, use, storage, and sharing of data. In fact, a number of companies are requiring their vendors to maintain a minimum acceptable security score during the term of the contract based on a company’s use of SecurityScorecard’s vendor risk monitoring. A company’s contracts may also create obligations to notify customers of a cybersecurity event or to maintain certain cybersecurity measures.
In addition, effective cybersecurity and privacy lawyers can help craft a narrative of how a corporation establishes a defensible cyber program in response to civil lawsuits, such as those that will be permitted under the forthcoming California Consumer Privacy Act (“CCPA”) which will become effective on January 1, 2020. The CCPA imposes a duty on companies to “implement and maintain reasonable security procedures and practices.” While the new law does not provide detail or guidance for how courts should unpack what is “reasonable,” organizations should assume that, at a minimum, continuous monitoring over their key security controls will be required. SecurityScorecard will be helpful to show that the company took a cyber-focused approach toward the due diligence of both itself and its vendors.
Unfortunately the days of “dabbling” in cybersecurity and data privacy are over. Given the increasing risks involving cybersecurity and data privacy, companies simply cannot afford to have in-house counsel working on these issues off the side of their desks.
Even the American Bar Association (ABA) has begun to recognize cybersecurity’s importance. Although released in 2017, the Vendor Contracting Project: Cybersecurity Checklist remains a fundamental cybersecurity resource on the ABA’s website. On the list of required actions, the ABA notes the importance of:
Embedded within these three key segments are a variety of suggestions including security program management and business continuity/resilience programs.
Corporate counsel needs to be able to identify risks and understand mitigation strategies both as part of the company’s cybersecurity program and its vendor risk management program.
The daily changes in both technology and the law require that attorneys are specializing in these areas so they can provide meaningful assistance and practical solutions. Ideally, at least one in-house counsel should be exclusively focused on cybersecurity and data privacy and closely partnering with their CISO.
Again, it is very dangerous for companies to wait until a material breach has occurred to involve external counsel.
Any major corporation should already have retained cybersecurity counsel to advise them globally. Increasingly the extraterritorial nature of data security and privacy laws focuses less on an organization’s geographic location but on the data owner’s location. Reviewing the General Data Protection Regulation (GDPR), CCPA, and New York Stop Hacks and Improve Electronic Data Security (NY SHIELD) Act shows a trend toward holding companies responsible for data security and privacy based on the data owner’s residence, not the organization’s place of incorporation or offices.
Among other things, counsel can advise on cross-border data concerns to address compliance with data being shared or transferred outside of the United States. Some concerns that a cybersecurity-focused outside counsel can help with include, but are not limited to:
Outside counsel can answer these and many other questions to better advise in-house counsel and the CISO.
While too many outside counsel claim to have cybersecurity and data privacy expertise, few have truly risen to the top of this new cottage industry. New York’s Avi Gesser, a Davis Polk partner and publisher of an excellent cyber blog (for which the author is particularly grateful for research support to this article) and Washington, DC-based Luke Dembosky from Debevoise and a former cybercrimes prosecutor, are both outstanding practitioners in this space.
Increasingly, organizations recognize that data breaches are no longer a matter of “if” but of “when.” According to the 2019 Symantec Internet Security Threat Report:
In short, malicious actors continue to evolve their threat methodologies faster than organizations can secure their ecosystems.
In the event of a breach, external counsel will be invaluable. At a minimum, counsel provides an independent perspective to both senior management and its board of directors.
Specifically, counsel can help
In particular, counsel should advise on whether a particular cyber event triggers a legal requirement to notify one or more of the company’s customers, regulators, insurers, auditors, vendors, or even the market itself. All 50 states have breach notification laws, including standards at the federal and international levels. However, the legal framework surrounding notifications is a mess because there are different requirements as to what triggers notification, what the notification must say, and the deadlines involved.
However, if counsel is not brought in until after the breach, it will be very expensive for a company given the amount of work that counsel will need to handle in a very accelerated time frame. Waiting to hire counsel until an actual incident occurs leaves the company vulnerable to legal liability and reputational harm. On the other hand, bringing in counsel early will mitigate that risk, and allow time for having a greater familiarity with a company’s network infrastructure and forming sound working relationships with the CISO and the legal/compliance teams.
With SecurityScorecard’s continuous monitoring capabilities and security ratings system that uses an A-F scale, our platform enables corporate counsel and outside counsel to help protect against cyber attacks. Additionally, the long-tail data we collect provides documentation that can assist legal counsel when looking for evidence that proves control effectiveness.
Our platform enables organizations to engage with internal stakeholders across the enterprise, providing a common language for discussing risk and security posture. Using our detailed reporting capabilities, organizations can gain insight into their own risks as well as potential vendor risks. For example, organizations with a D or F rating are five times more likely to experience a data breach. Legal counsel can use these ratings to proactively address risks and mitigate legal or compliance-based liabilities.
Moreover, in-house counsel should formulate contractual language aligning with our ten groups of factors and use the risk ratings as key performance indicators for vendor contracts. By using our factors as part of vendor contracts, corporate or outside counsel can more effectively meet the ABA vendor contract requirements.
Finally, organizations using our Atlas platform can better manage the complex compliance requirements necessary for proving a robust cybersecurity program. Our machine-learning capabilities align vendor questionnaire responses to the publicly available information gathered by our platform to provide immediate verification of controls, alerting organizations to potential risks arising from vendor control weaknesses.
Check out our list of 3 top third party risk management (TPRM) challenges, and the actions you can take to bolster your program. Learn more.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
Co-founder and CEO, Alex Yampolskiy, speaks about the importance of measuring and acting on key indicators of cybersecurity risk.
You’ve invested in cybersecurity, but are you tracking your efforts? Check out our list of 20 cybersecurity KPIs you should track. Read more.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.