San Francisco — RSA Conference 2015 — Examine the Ponemon Institute’s ‘2014 Cost of Data Breach Study’ and it becomes clear there is a vast difference in the costs of dealing with a data breach in different parts of the world.
According to the report, one of the main factors affecting cost differences comes down to the severity of the various data breach laws and regulations in each country and how well those rules are enforced.
This reality makes it critical for businesses to understand the laws in the various geographies they operate in. At the RSA conference, a panel of experts explained Thursday that ignorance of data breach laws can drive up costs and potentially open a business up to penalties that make the bad news of a data breach even worse.
“We are facing a three-headed monster,” Larry Clinton, president and chief executive officer of the Internet Security Alliance, told the crowd. “The system is getting inherently weaker, attacks are getting…more sophisticated, and we are being faced with an explosion of new regulations.”
And more regulations seem to be always on the way. For example, earlier this year the NY State Attorney General proposed a plan to toughen the state’s data breach laws. There is also the ongoing controversy about the proposed federal Data Security and Breach Notification Act.
But the situation can be even more complicated for businesses that are international in scope. Panelist Gene Fredriksen, chief information security officer at PSCU, recalled an incident at a company where a salesperson was laid-off following some merger and acquisition activity and responded by stealing proprietary information – including client lists. While uncovering the perpetrator was not difficult, he said, problems emerged when the situation was discovered to have impacted Germany, Spain, France and the U.K. as opposed to just the United States where executives felt they would have known what to do.
The executives were forced to rope in the legal staff to figure out how to handle the situation, which ultimately became a “laborious process,” he said.
James Halpert, a partner at international law firm DLA Piper and co-chair of its U.S. cyber-security practice, noted that different countries require different approaches. South Korea, for example, requires data notification up to “wazoo,” he said.
Studies have shown that moving too quickly in the aftermath of a breach can drive up costs, with organizations for example notifying too many people by mistake. Then there are the costs associated with fines and other expenses.
“You want to know this if you going about running your incident response,” said Halpert. “You want to know what information has been lost and does that trigger a notice in these countries.”
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023 | Regulations
