Our thinking

Cybersecurity: Legal implications and risk management

What's inside

In an increasingly interconnected world, cyber risk is firmly at the top of the boardroom agenda, and having an effective data breach response programme is no longer optional.

Cybersecurity crisis management

The internet knows no borders, neither do we. Our global team of cybersecurity response experts work across borders, combining data protection, privacy, regulatory, white collar and litigation expertise in order to deliver seamless crisis management and legal advice, whenever and wherever needed.

The digitalization and free flow of information has transformed global business. However, with increased opportunities have come new and increased risks, together with complex legislative regimes that can vary significantly by jurisdiction, and are constantly evolving. Even the most conscientious company can become the victim of a cybersecurity incident, such as the stealing of client or company information, or a ransomware attack. We work with a wide range of multinational companies to manage their cybersecurity risks, developing rapid response plans, providing time-critical crisis management advice, and working with clients to manage any resulting legal issues that may arise. 

Key issues

Why?

  • Reputation
  • Fines
  • Breach of contract
  • M&A due diligence
  • Insurance
  • Proprietary information
  • Litigation
  • Criminal offences
  • Negligence

Be prepared

Risk Assessment

  • Key Information
  • Assets
  • Key Systems
  • Threat Analysis
  • Security Measures

Toolkit

  • Scripts
  • Internal and 
    External
  • Communications
  • Employee contacts
  • Response Plan
  • Live Training
  • Business Continuity Plan

Key considerations

Customer/individual rights

  • Requests for data
  • Data Protection Authority Complaints
  • Group litigation orders
  • Resolution mechanisms

B2B relationships

  • Contractual obligations
  • Contractual liability
  • Tort

Reputation management

  • Media strategy
  • Customer interaction
  • Employee engagement

Commercial

  • Proprietary
  • Information/Trade Secrets
  • System Disruption

Regulatory issues

  • Data Protection Authority
  • Financial Regulators
  • Market authorities
  • Other regulators

Privacy & data protection

  • Jurisdictions involved
  • Reporting obligations
    • individuals
    • authorities

Evidence

  • Law Enforcement Involvement
  • Legal Privilege
  • Preservation of Evidence

Response

Crisis Team

  • Legal (internal and external)
  • IT/IT Forensics
  • PR
  • Regulatory
  • DPO
  • Executive committee
  • HR
  • Vendor manager

Key Actions

  • Work with forensic investigators to:
    • Identify and contain breach
    • Gather/preserve evidence
    • Maximise legal privilege coverage
  • Contact crisis team
  • Bring in external partners
  • Identify key risks and priorities based on nature of breach
  • Assess notification requirements
  • Communications
  • Regulatory notifications

 

Articles

2024

NYDFS Releases Artificial Intelligence Cybersecurity Guidance For Covered Entities

On October 16, 2024, the New York State Department of Financial Services (the "DFS"), under its Cybersecurity Regulation—23 NYCRR Part 500—issued a memorandum providing guidance on the risks posed by artificial intelligence ("Guidance Memo").

SEC Will Prioritize AI, Cybersecurity, and Crypto in its 2025 Examination Priorities

On October 21, 2024, the US Securities and Exchange Commission ("SEC") Division of Examinations ("Examination Division") announced its 2025 Examination Priorities ("Report"). Investment advisers and broker-dealers should ensure that policies, procedures and surveillance efforts related to these priorities address concerns outlined in the Report.

SEC Enforcement Heats up on Key Public Company Topics: Cyber Disclosure, Director Independence and Regulation FD

The U.S. Securities and Exchange Commission's ("SEC") Division of Enforcement has recently brought a spate of enforcement actions relating to key topics for public companies. These include enforcement actions related to cybersecurity incident disclosure, director independence and Regulation Fair Disclosure ("Reg FD") violations, which are described below, and actions based on Section 13 and 16 beneficial ownership filings, as discussed in our prior alert.

Judge Rejects SEC’s Aggressive Approach to Cybersecurity Enforcement

On July 18, 2024, a New York federal judge dismissed most of the US Securities and Exchange Commission's ("SEC") claims against SolarWinds Corp. ("SolarWinds" or the "Company") and its Chief Information Security Officer ("CISO"), Timothy G. Brown, in connection with the Company's cybersecurity practice.

NIS 2 Directive: Navigating the challenges of implementation, impact, and scope

The NIS 2 directive establishes a regulatory framework aimed at improving the level of cybersecurity across the EU.

SEC’s Corp Fin Director Issues Statement on Cybersecurity Incident Disclosures

On May 21, 2024, the SEC's Director of the Division of Corporation Finance issued a statement on cybersecurity incident disclosures in light of the SEC's new cybersecurity disclosure rules. Our summary of this statement and key take-aways from White & Case's survey of cybersecurity disclosures is below.

2023

The SEC’s Charges Against SolarWinds and its Chief Information Security Officer Provide Important Cybersecurity Lessons for Public Companies

On October 30, 2023, the US Securities and Exchange Commission ("SEC") announced that it filed charges against SolarWinds Corp. ("SolarWinds" or the "Company") and its Chief Information Security Officer ("CISO") in connection with the SEC Division of Enforcement's ("Enforcement Division") investigation of a cyberattack.

SEC Adopts Mandatory Cybersecurity Disclosure Rules

On July 26, 2023, the Securities and Exchange Commission ("SEC"), in a 3-2 vote, adopted rules that will require public companies to make prescribed cybersecurity disclosures.

Shaping the future of digital and cybersecurity governance

In this brief three-minute video, London-based partner Lawson Caisley, Chair of White & Case's Global Cyber Risk Committee, shares his insights on governing cyber risk at the corporate level and some of the challenges of cyber risk management in the boardroom. Filmed at the Digital Directors Network (DDN) Domino 2023 conference on digital and cybersecurity governance.

cybersecurity_square_800x800_4

Prioritizing cybersecurity at the corporate level

In this short three-minute video, Washington, DC–based partner F. Paul Pittman discusses the implications of the proposed new SEC rules on cybersecurity governance and what corporate boards can do now. Filmed at the Digital Directors Network (DDN) Domino 2023 conference on digital and cybersecurity governance.

digital mesh

Cybersecurity Developments and Legal Issues

The potential for cybersecurity threats and attacks looms large and the technology companies developing new products and services play a constant game of cat-and-mouse with hackers and cybercriminals for control of cyberspace. Here are six points to consider when analyzing cybersecurity risks and protections.

client alert image

Directors face personal liability over cybersecurity failures

In an article for The Times, White & Case partner Lawson Caisley discusses why it could become increasingly common for UK directors to "face personal liability and regulatory censure as a result of their company suffering or mishandling a cyberbreach".

wafer circuit detail

2022

Director liability for cyber breaches: transatlantic warning signs?

Two legal cases in the US in the past month suggest that regulators and prosecutors are becoming more determined to take personal action against directors and senior executives who fail to deal adequately with cyber security breaches.  

arrow

SEC Proposes Mandatory Cybersecurity Disclosure Rules

On March 9, 2022, the Securities and Exchange Commission ("SEC") proposed rules that would require public companies to make prescribed cybersecurity disclosures.

2021

Legal 500's In-House Lawyer Magazine Autumn - Commercial Litigation Focus (Germany)

In The Legal 500's newly released In-House Lawyer Magazine a group of White & Case lawyers has contributed a legal briefing on trends in German commercial litigation.

magazine pile

AAA plc & ors v Persons Unknown: Cyber Activism or Blackmail?

In recent years, demands for payments in cryptocurrencies have become the ransom of choice for cyber extortionists and other online frauds. As a result, the English Court's powers are increasingly being called upon.

orange background

Time to Revisit Risk Factors in Periodic Reports

Ninth Circuit Decision Highlights Importance of Updating Risk Factors to Address Material Developments, including those relating to Cybersecurity Risks.

Alert 800x800

Cybersecurity Enforcement: New York Department of Financial Services issues first penalty under Cybersecurity Regulation

Consistent with its increasing activity in the cybersecurity enforcement space, in March 2021, the NYDFS issued its first penalty under the Cybersecurity Regulation. This client alert explores the settlement and offers takeaways on the areas of focus by the NYDFS in enforcement actions under the Cybersecurity Regulation.

Compensating non-material damages based on Article 82 GDPR

Is a data subject entitled to compensation from a controller or processor if the data subject's GDPR rights have been infringed, even if they have not suffered any kind of material damage? 

Corporate Boards Must Ask Key Cybersecurity Questions

Cybersecurity has been a mainstay of quarterly board agendas for years.

2020

Cybersecurity Risk: Top 5 strategies to build resilience

The fourth webinar in our 2020 Autumn Webinar Series covered crucial steps you should be taking to protect against cybersecurity threats and what you should do when disaster strikes.

Before the Dust Settles: The California Privacy Rights Act Ballot Initiative Modifies and Expands California Privacy Law

Hot on the heels of the California Attorney General's rulemaking process for the California Consumer Privacy Act ("CCPA"), California voters have passed a ballot initiative to expand and create new privacy rights for consumers.

stack of paper

US Cybersecurity Standards to Get Tougher and More Specific

In the past few years, cybersecurity has taken on increasing importance in the eyes of lawmakers and regulators.

Data Sharing Without Borders

UK law enforcement can now obtain an order against a person in or operating in the US for the production of or access to electronic data under a new ‘landmark’ US-UK data sharing agreement.

Alert 800x800

Responding to a cyber-incident

The COVID-19 crisis has exposed many companies to more cyber threats. Tim Hickman and John Timmons discuss what businesses need to do should a major incident occur.

Trending: Legal protection for cryptoasset stakeholders

Recent decisions in Singapore and New Zealand confirm that the courts are prepared to act to provide greater certainty and support to stakeholders in cryptoassets.

Recovering the ransom: High Court confirms Bitcoin status as property

The High Court has determined that Bitcoin (and other similar cryptocurrencies) can be considered property under English law, and could be the subject of a proprietary injunction. The Court granted the injunction to assist an insurance company to recover Bitcoin that it had transferred in order to satisfy a malware ransom demand.

2019

Navigating Privacy and Cyber Incident Notification and Disclosure Requirements

Organisations are facing increasing uncertainty in assessing global notification and disclosure obligations and making a determination of whether to notify or disclose a privacy violation or security incident in today's complex regulatory environment. This article offers six steps companies should consider when navigating this complex process.

Proposal on the Application of the NIS Regulations post-Brexit

This article examines the impact of the UK Network and Information Systems Regulations 2018 (SI 2018/506) (NIS Regulations) on organisations post Brexit and their obligations under applicable cybersecurity law.

Contacts

NYDFS Releases Artificial Intelligence Cybersecurity Guidance For Covered Entities

Alert
|
8 min read

On October 16, 2024, the New York State Department of Financial Services (the "DFS"), under its Cybersecurity Regulation—23 NYCRR Part 500—issued a memorandum providing guidance on the risks posed by artificial intelligence ("Guidance Memo"). The guidance is addressed to the entities within the DFS' jurisdiction, including entities regulated by the New York Banking Law, the Insurance Law and the Financial Services Law ("Covered Entities"), and clarifies that the Guidance Memo does not impose additional requirements on Covered Entities but rather illustrates how the Cybersecurity Regulation framework should be used to assess and address the cybersecurity risks presented by AI.

The Guidance Memo emphasizes the significant impact AI has had on cybersecurity, both positively and negatively. While AI has enhanced the ability of entities to prevent cyberattacks, improve threat detection and bolster incident response, it has also introduced new mechanisms and opportunities for cybercriminals to commit crimes at greater scale and speed. The Guidance Memo outlines strategies to mitigate risks that will be essential for Covered Entities to follow but that will also be useful for businesses across sectors to consider as part of their cybersecurity compliance programs.

Key Cybersecurity Risks Posed by AI

The Guidance Memo highlights two key risks presented by threat actors' use of AI:

  • AI-Enabled Social Engineering. AI is increasingly being used to generate realistic audio, video and text ("deepfakes") that threat actors use to gain access to information systems with nonpublic information ("NPI") and to attempt to persuade employees to divulge sensitive information or take unauthorized actions. As an example, the Guidance Memo cites an instance of a finance worker being tricked into transferring $25 million to threat actors after a video call in which every participant, including the alleged Chief Financial Officer, was a video deepfake.
  • AI-Enhanced Cybersecurity Attacks. Because AI can quickly scan vast amounts of information, it can enable threat actors to find and exploit system vulnerabilities, accessing NPI and evading detection. The Guidance Memo also notes that "it is widely believed by cyber experts that threat actors who are not technically skilled may now, or potentially will soon, be able to launch their own attacks."

In addition, the Guidance Memo notes that an entity's own use of AI can expose it to new risks. For example, some AI products involve the storage of large quantities of NPI and sensitive data, such as biometric data, which is then vulnerable to attack from threat actors who may seek to obtain that data for financial gain. Companies are especially vulnerable to their data being compromised when being collected or processed by vendors and third-party service providers ("TPSPs") who are using AI platforms.

Guidance for Mitigating AI-Related Threats

The Cybersecurity Regulation requires Covered Entities to implement and maintain multiple layers of overlapping controls, so that if one control fails, others will be able to prevent or mitigate a cyberattack. Below, we summarize the key obligations of Covered Entities under the Cybersecurity Regulation and highlight the new DFS guidance for addressing AI-related risks.

Risk Assessments and Risk-Based Policies, Procedures and Plans

Covered Entities must perform cybersecurity Risk Assessments at least annually, or whenever a change in the business or technology introduces new material risks. Those Risk Assessments should address AI-related risks, including the threat of deepfakes; the entity's own use of AI; and AI-powered technology used by its vendors and TPSPs. Based on their cybersecurity Risk Assessments, Covered Entities must have programs, policies and procedures that address those risks, and any updates made to a Risk Assessment warrants a review of such programs, policies and procedures. Covered Entities must also design and test proactive measures to investigate and mitigate cybersecurity events so they are prepared for incident response, business continuity, and disaster recovery. Those measures should include preparation for possible AI-related cyberattacks.

The DFS emphasizes the "crucial role" that senior leadership plays in prioritizing cybersecurity. The Guidance Memo highlights that the Senior Governing Body (e.g., the board of directors) must have an adequate understanding of all cybersecurity-related matters, exercise authority over cybersecurity risk management, and receive and review regular reports that cover cybersecurity—including AI-related threats.

Vendor and Third-Party Service Provider Management

The DFS provides some specific recommendations for Covered Entities to follow when contracting with TPSPs, especially those that will access their information systems or NPI. These recommendations include to:

  • Create guidelines for due diligence on TPSPs
  • Implement TPSP policies and procedures that specify minimum requirements for access controls and encryption (see some access control recommendations below) at the TPSPs
  • Require TPSPs to provide timely notice of any cybersecurity event that impacts the Covered Entity's information systems or NPI
  • Consider including additional representations and warranties in contracts to ensure security of NPI if a TPSP is using AI

Access Controls

Starting in November 2025, the Cybersecurity Regulation will require Covered Entities to implement multifactor authentication ("MFA") for all authorized users accessing information systems or NPI, whether those users are employees, customers, or TPSPs. The Regulation allows flexibility to decide which authentication factors to use, based on the entity's Risk Assessment. But the DFS Guidance Memo emphasizes that "not all forms of authentication are equally effective" and recommends considering "factors that can withstand AI-manipulated deepfakes and other AI-enhanced attacks by avoiding authentication via SMS text, voice, or video, and using forms of authentication that AI deepfakes cannot impersonate, such as digital-based certificates and physical security keys." 

For biometric authentication, the Guidance Memo recommends that Covered Entities consider using technology with liveness detection or texture analysis, which can verify that the biometric input is from a live person. Other options to consider are combining one biometric input with another (for example both a fingerprint and iris recognition) or combining a biometric input with user keystrokes and navigational patterns.

Cybersecurity Training

Cybersecurity training, which, under the Cybersecurity Regulation, must be provided annually to all personnel, including senior executives and senior governing body members, should cover "risks posed by AI, procedures adopted by the organization to mitigate risks related to AI, and how to respond to AI-enhanced social engineering attacks." Training on social engineering is now a required element of the annual cybersecurity training. The Guidance Memo recommends providing deepfake simulation exercises and instructions on how to respond to unusual requests, such as requests for credentials, urgent money transfers or access to NPI.

Cybersecurity personnel should receive additional training on AI use in social engineering attacks, the use of AI in facilitating and enhancing cyberattacks, and how AI can improve cybersecurity.

If the Covered Entity plans to deploy AI internally, the relevant employees must be trained on how to design and deploy AI systems securely and how to defend them against cybersecurity attacks. Any users of those AI systems must be trained on how to avoid disclosing NPI.

Data Management

Data management can limit the amount of NPI that could be exposed in the event of a cybersecurity attack. Covered Entities are already required to have data minimization practices and to dispose of NPI that is no longer needed for business operations, including NPI used for AI purposes. Further, if an organization uses AI-powered products, it should put controls in place to secure the data those products use. It should also maintain an inventory of all such AI systems and prioritize implementing mitigation procedures for any AI systems that are business-critical.

Monitoring

Covered Entities are required by the Cybersecurity Regulation to monitor email and web traffic to block malicious content and have processes in place that can quickly identify security vulnerabilities in information systems. The Guidance Memo recommends that if a Covered Entity uses AI-enabled products or services or allows personnel to use AI applications such as ChatGPT, they should monitor for unusual query behavior that signals possible public exposure of NPI.

The Guidance Memo notes that AI can also assist with monitoring, including by reviewing security logs, analyzing behavior, detecting anomalies and predicting security threats.

Key Takeaways

Although the Guidance Memo reiterates current requirements under the NYDFS Cybersecurity Regulation, we highlight the following Key Takeaways for organizations to consider in evaluating and using AI in their business operations and as part of their cybersecurity tools:

  • Risk Assessments need to be updated to address new material risks presented by AI tools and providers. If a Covered Entity has a Risk Assessment that does not address AI-related threats, then it should revise that assessment—and update related policies and procedures accordingly.
  • Senior executives and senior governing body members should be closely involved in assessing AI use and ensure they receive and review reports on AI and cybersecurity compliance. In addition, organizations must provide training and craft policies relating to AI-related cybersecurity risks. Training should involve the review of specific use cases, such as the deepfake incident described in the Guidance Memo, and should be consistent with existing incident response procedures.
  • The Guidance Memo should be considered by companies that are not Covered Entities under the Cybersecurity Regulation. While certain threats may be unique to entities in the financial, banking or insurance industry, the overall need to address AI in cybersecurity risk assessments, policies, training, access controls, data management and monitoring applies across all industries.

White & Case means the international legal practice comprising White & Case LLP, a New York State registered limited liability partnership, White & Case LLP, a limited liability partnership incorporated under English law and all other affiliated partnerships, companies and entities.

This article is prepared for the general information of interested persons. It is not, and does not attempt to be, comprehensive in nature. Due to the general nature of its content, it should not be regarded as legal advice.

© 2024 White & Case LLP

Top