12/03/2024 | News release | Distributed by Public on 12/03/2024 08:45
As General Counsel you hold a pivotal role in strengthening enterprise-wide cybersecurity. While technical measures often fall under the purview of the Chief Technology Officers (CTOs) and Chief Information Security Officers (CISOs), your legal expertise and authority present very real opportunities to improve a company's cybersecurity posture and resilience.
Below are 15 Top Cybersecurity Priorities for General Counsel in 2025,¹ falling into three overarching categories: Governance, Validation and Drilling.
Governance: At the heart of every General Counsel's role, governance encompasses related policies, procedures, laws and regulations. It also includes engagement with senior management, the board of directors and third parties as well as contract management, insurance coverage and reporting.
Validation: General Counsels are not expected to step into the shoes of the CTO, CISO or CFO or Human Resources or Vendor Management. It is a General Counsel's responsibility to understand how their duties impact the company and the GC's own responsibilities when it comes to cyber risk management. Lean in and apply that important measure of accountability, not just across these functions but over your company's entire enterprise.
Drilling: Often overlooked or underdeveloped, drilling is critical within the technical areas but also in building organizational resilience. Exercising and drilling are the difference between incidents that dictate the victim company's actions and a company that systematically works through the incident as a Complete Cyber Crisis Team.
The hallmarks are strong cultures, resilience at the technical and non-technical / senior management levels, incident-agnostic restoration and recovery, understanding the interplay with third parties, including regulators, law enforcement, insurers, the media and public and evolving and maturing toward the next exercise, drill or…incident.
Top Cybersecurity Priorities for General Counsel
1. A Complete Cyber Crisis Team.
2. Drilling I: General Incident Response and Recovery.
3. Drilling II. Ransomware Resilience.
4. Drilling III. PII Breach Resilience.
5. Mandatory Reporting.
6. Cybersecurity Insurance.
7. Important and Critical Vendors.
8. Data Retention - Policy & Enforcement.
9. Board of Director and Executive Engagement.
10. Cybersecurity Culture.
11. Cybersecurity Policies.
12. BYOD Management.
13. User Access and Entitlements.
14. Technical Tests, Drills and Exercises.
15. A Qualified CISO.
1. A Complete Cyber Crisis Team.
Incident Response Teams (IRTs) lean too heavily on the Information Technology (CTO) and Cybersecurity (CISO) subject matter experts when the company's full suite of executives each has critical roles in establishing robust Cybersecurity Resilience. Play your part as Chief Counsel, ensuring that your company's major constituents are sitting at the table before, during and after any incident.
A Complete Cyber Crisis Team has three parts: Senior Leadership, the Technical Team, and External Support.
Aside from the General Counsel, Senior Leadership includes the Chief Executive Officer, COO, Chief Financial Officer and Human Resources. Each corporate makeup is different, but it also cuts across Compliance, Risk Management and Public Relations. Where Boards of Directors exist, their involvement is vitally important.
The CTO and CISO bridge this team with Technical Leadership, which is further comprised of security engineers and analysts. External Support includes your company's insurance carrier, outside legal counsel and forensic and cybersecurity experts. This Complete Cyber Crisis Team must practice, practice, practice its resilience. Accordingly, three cybersecurity priorities involve drilling where General Counsels should be familiar.
2. Drill I: General Incident Response and Recovery.
Resilient cybersecurity practices tend to be incident-agnostic. Scenarios bring incident-specific risks, such as navigating permissibility and sanctions during ransomware demands. But, General Counsels should be fluent with basic Incident Response and Recovery.
First, know what the CISO, CTO and Technical Leadership are focused on:
General Counsels should move beyond hearing about these processes to knowing what to do with the results and updates that come from them - during tests, desktop drills and incident response exercises - so they are nimble come incident time. During such times, focus on:
Mandatory reporting and your ability to comply with the nuanced requirements will benefit from this full slate of information. Accordingly, General Counsels should know in advance how communication, engagement and coordination take place with:
Finally, General Counsels must pay attention to the highest value-add under their remits - physical and digital evidence preservation and attorney-client privilege - when and how to deploy each. Take note: Evidence preservation may challenge or even run counter to containment, eradication and recovery. General Counsels must confirm, well before any incident, that all employees and related vendors know not to delete, destroy or alter data.
3. Drill II. Ransomware Resilience.
In the painful event of ransomware, General Counsels must understand and have taken part verifying the ransomware incident playbook. In addition to the general steps noted, appreciate the Technical Leaders' ransomware checklist, including:
Create and be fluent with your own Legal / Litigation Checklist, which beyond Mandatory Reporting and internal and external communication, includes:
4. Drill III. PII Breach Resilience.
Breaches that impact Personal Identifying Information (PII) bring specific protocols tied to the types of data and volume compromised. Given the high prevalence of PII in most breaches, it is incumbent on General Counsels to be familiar with:
5. Mandatory Reporting.
Mandatory Reporting are the legal obligations imposed on organizations to report certain types of cybersecurity incidents or breaches to relevant authorities or stakeholders within a specified timeframe. It also includes annual attestations and program reporting in, e.g., financial services and publicly traded companies. Incident reporting is designed to ensure timely notification and transparency when an organization experiences an incident that could potentially harm customers, employees, individuals, partners or critical infrastructure. Failure to comply with reporting requirements can result in fines, civil actions, penalties and other legal consequences. General Counsels should pay attention to the following:
6. Cybersecurity Insurance.
General Counsels should play a major role ensuring their companies are sufficiently covered by cybersecurity insurance. In addition to working with proven insurance brokers and carriers, General Counsels should take the time to understand the extent and limitations of coverage. Key practices include:
7. Important and Critical Vendors.
Earlier this year, CrowdStrike, the cybersecurity company, caused global IT outages due to a failed update to one of its programs on computers with Microsoft Windows. Among the many victims, Delta Airlines reported $500 million in losses due to the error. Around the same time, U.S. car dealerships lost more than $1 billion as a result of a ransomware attack on software provider CDK Global.
General Counsels play a critical role managing such third-party risks given the contractual nature of services and the control they have so that outsourced performance meets company risk management, risk tolerance and regulatory requirements:
A material factor that led to the CrowdStrike and CDK Global incidents - concentration risk - is something General Counsels participating on Information Security Committees should challenge given the black swan possibilities. Ensure that the CIO and CISO teams have a plan, not only in place but also part of your company's periodic Tests, Drills and Exercises.
8. Data Retention - Policy & Enforcement.
Breaches, when they inevitably occur, must not exploit a larger data environment, or "threat surface," than necessary. Here, some considerations:
9. Board of Director and Executive Engagement.
Typically serving as corporate secretaries, General Counsels play a unique role with Boards of Directors, CEOs and Senior Management. Companies of even modest size or complexity should have an Information Security Committee or equivalent body into which the CISO reports. As General Counsel, embrace the value you bring to this committee, your board and executive stakeholders.
Boards and committees should receive material information necessary to uphold their responsibilities. Reports should focus on strategic, business-aligned information, allowing members to appreciate risks, discuss and make informed decisions around investments and connect your company's cybersecurity risk tolerance with its goals. General Counsels should also help CISOs refine their reporting, avoiding information overload.
The CISO or CTO owns the creation and delivery of this reporting, but General Counsels can provide support so that this includes:
10. Cybersecurity Culture.
Similar to terms born from and embraced after 9/11 and compliance failures in the early 2000s - If you see something, say something, Tone at the Top and Culture of Compliance - Cyber Risk Management needs a cultural movement beyond the technical operators and into the corporate bloodstream enterprise-wide.
Destigmatizing victims is top of the list, and raising awareness remains priority number one. This means building up a company's employee base when it comes to both identifying trolling, phishing and malware behaviors and conducting one's self with sound cyber street smarts. General Counsels and their departments can lead by example - strong passwords, embracing multi-factor authentication, engaging in proper social media behaviors, avoiding unsecure networks and clickbait and complying with clean desk and clean desktop policies.
As cybersecurity leaders, General Counsels can also verify that training and policy enforcement addresses:
11. Cybersecurity Policies.
Cyber-related policies are expansive and fall under various functional leaders - IT, Information Security, Compliance, Human Resources and Legal. It starts with the Risk Assessment, an Information Security Framework (e.g., NIST, ISO 27001) and overall Information Security Policy. Technical aspects include Cloud Computing, Encryption, Identity and Access Management, Network, Systems and Application Security, Patch Management, Software Development and Threat Intelligence. General Counsels can support CISOs, ensuring such policies are communicated, managed, updated and enforced.
Zeroing in, General Counsels can lend credible weight to a program's effectiveness by educating themselves and enforcing similarly important hallmarks and reporting involving:
Mindful there are standards and regulations specific to your industry too numerous to list, as lawyers for the company, General Counsels should have a full inventory of applicable laws. Some more well-known state, federal and international regulations beyond the CCPA, GDPR, HIPAA, NYSDFS Part 500 and SEC include:
12. BYOD Management.
A host of challenges come with using personal devices (e.g., smartphones, laptops and tablets) in corporate settings:
For General Counsels, establish a clear Bring Your Own Device (BYOD) policy with your CISO and CIO and ensure your Third-Party Risk Management program includes both service providers and mobile applications. Look for how your company utilizes Mobile Device Management (MDM), encryption and virtual private networks (VPNs) to secure remote connections as well as enable remote wipe capabilities.
13. User Access and Entitlements.
One of the more technical controls, User Access and Entitlements occupies a top spot in root causes when it comes to insider threats and breaches via service providers. General Counsels must play a robust second-line-of-defense role, calling for periodic reports at the board and committee levels that related controls are operating as intended.
Best practices translate to users having appropriate access to systems and data based on their role, while minimizing risks tied to unauthorized or overly broad access. Additional controls to understand the basics of include:
14. Technical Tests, Drills and Exercises.
While enterprise-wide drills involving non-technical executives, boards of directors and service providers occur, technical tests, drills and exercises should also be taking place and on a more frequent basis. This includes various scenarios (e.g., phishing, human and third-party error, DDOS, ransomware and data breaches) and through the stages of an incident lifecycle - Identification, Detection, Protection, Response and Recovery - and the imperative step of timely addressing deficiencies.
As General Counsel and senior cybersecurity stakeholder, appreciate the scope of these tests and be sure they are reported to management, particularly their results, gaps and action plans, and include tests of mission critical third parties. Technical tests include:
15. A Qualified CISO.
A company that does not have a CISO or receive material information security services from a qualified vendor plays a dangerous game. The General Counsel can fulfill a critical role ensuring its company has assessed its size, complexity and the nature and scope of its activities and, at a minimum, begun incorporating commensurate controls.
A CISO and his/her Information Security Program should demonstrate the hallmarks described here and more. The CISO develops the program and in overseeing it:
Conclusion
General Counsels play an essential and unique role in advancing organizational cybersecurity. Your connectivity with the Board and senior-most management, your duties as chief legal officer for the company and the cross-functional dependencies with the CISO, CTO, CFO and other major players in the event of a cybersecurity incident reinforce the impact of establishing strong governance, validating even the more technical cyber-related controls and practicing, testing, drilling and maturing.
Paul Caulfield heads Ruddy Gregory's Financial Regulation and Cybersecurity Practice. In addition to his legal work, Paul has held positions in foreign financial services as Chief Risk Officer, Chief Compliance Officer, COO and Board Member. His cybersecurity work includes establishing global information security programs, implementing NYSDFS Part 500, compliance with Bank of Israel Directive 361, cross-border risk management with China's Personal Information Protection Law (PIPL) and Anti-Espionage Law and working with publicly traded companies in compliance with the Security and Exchange Commission's Cybersecurity Disclosure Rules. Paul is certified in Information Systems Security (CISSP) and Anti-Money Laundering (CAMS), holds his Series 24, 7 and 66 licenses and is an Adjunct Professor at Fordham University School of Law.
Contact:
Paul Caulfield
+1-212-495-9506