The Changing Cyber Threat Landscape and Lessons Learned From Data Breaches

Paul Hastings LLP
Contact

Paul Hastings LLP

Last month, Paul Hastings sponsored the Cybersecurity Law Workshop at the Spring Privacy & Security Forum held at George Washington University in Washington, D.C. The Cybersecurity Law Workshop featured three panels of experts from both the public and private sectors who offered insight into the various cybersecurity issues companies face on a day-to-day basis.

The third panel, “Cyber Threat Landscape: Lessons From the Latest Data Breaches,” was moderated by Michelle Reed, partner at Paul Hastings, and featured panelists Carlos Pelayo, executive VP and chief legal officer at the Mr. Cooper Group, and James Perry, global vice president of digital forensics and incident response at CrowdStrike.

The discussion focused on the ever-changing cybersecurity threat landscape and ways for companies to enhance their current incident response and recovery processes.

The Profile of the Threat Actor is Changing

The panelists spoke about the new cybersecurity threat actors. While previously, the threat actors approached their attacks in a targeted and highly organized manner, they are now operating in a more dispersed structure, focusing on a few, high-profile, individualized attacks — instead of attacking 100 computers at one company, the target is now one computer at 100 different companies. The threat actors focus on the quality of the data they are able to exfiltrate and not necessarily the quantity of data. From impersonating help desk support to going through the process of applying for and successfully obtaining a remote developer job and having company equipment sent to a “laptop farm” to collect data, the threat actors are continuously finding vulnerabilities within the normal company systems and processes.

Incident Response and Recovery Must Be Practiced

In response to the changing threat actors, the panelists emphasized the heightened need for companies to train individuals on their incident response processes and to test both the response and recovery processes as a regular part of a company’s cybersecurity safeguards. In partnership with legal counsel and incident response service providers, the company should have the goal of ensuring that individuals understand their responsibilities within the incident response and recovery process, know the roles and responsibilities of the others on the incident response team and feel empowered by leadership to make critical decisions when needed. Testing of incident response processes should also include review of security tools to ensure they have been customized appropriately to the company, as well as a review of the data governance structure to ensure it is not overly burdensome or rigid and allows for uncertainty.

Vigilance Across the Company is Necessary

Finally, the panelists stressed the importance of individual employees remaining vigilant against cybersecurity threat actors. Employees should be skeptical of unsolicited emails and phone calls and should know where to go and how to report suspicious activities. Companies should be aware of the software and devices used by employees and ensure that patches are properly deployed in a timely manner, especially for edge and/or end-of-life devices. Ultimately, the goal should be to make it difficult and time consuming for the threat actor to breach company systems.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Paul Hastings LLP

Written by:

Paul Hastings LLP
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Paul Hastings LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide