Blog & Articles

Articles and write ups in the industry about Duty of Care Risk Analysis (DoCRA)


NetDiligence® CYBER RISK SUMMIT

What is Reasonable Cyber Security

The panel provided an overview of the risk-based analysis process that substantiates the method, and presented the legal, regulatory, and security best-practice history that informs the method. Each participant presented why the method successfully substantiates the term “reasonable” in their work and provided anecdotes that illustrate how it has been used on their experience. The panel described a practical method that organizations can use for defining how the term “reasonable” applies to them, all attendees received an immediately applicable, and tangible benefit from the session.

DoCRA Council Board Chair, Chris Cronin, participated in the panel discussing reasonable security. The webinar provides a full perspective from legal, security, insurance, and regulatory views. The recording is now available at the NetDiligence website.

TOPICS:

  • Terms and Definitions
  • Various Standards of Reasonableness and Duty of Care
  • Risk-Based Analysis and Best Practices
  • Communicating to and Working with the Policyholder.

PANELISTS:

  • Andrew Maher (M), AXIS
  • Chris Cronin, HALOCK Security Labs
  • Doug Meal, Orrick LLP
  • Timothy Murphy, Office of Attorney General for the Commonwealth of Pennsylvania

A few key Q&As from the webinar:

Are there any risk frameworks which quantify risk in the way you’re describing?

CIS RAM by Center for Internet Security provides explicit instructions for how to do risk analysis to demonstrate balance and reasonableness. ISO 27005, NIST 800-30 imply or state that risk analysis should consider risk to self, interested parties, and mission (what courts may think of as “utility”).

Various carriers offer complementary risk engineering services, but insured’s rarely use the opportunity. If carrier’ make their terms subject to, there is push back saying that other markets are not requiring it. Do you think that carriers as a whole should push harder on requiring risk engineering to be completed?

Yes! As an information security practitioner I see regulators and customers respond very well when they see a focused effort on risk reduction over time. The NetDiligence report shows the majority of claims payouts going to liabilities. One of the things I love about insurance is that when it manages risk, everyone wins.

Does PA recognize CIS controls for assessment ?

Yes, PA listed CIS controls by name in a recent settlement along with other industry-appropriate control standards such as NIST and ISO 27001.

Are there cases I can review to better understand Reasonable security?

Pennsylvania’s settlement with Orbitz and Expedia,  https://www.attorneygeneral.gov/wp-content/uploads/2019/12/19-12-12-Orbitz-AVC-EFILING.pdf

I am in Medical Technology Cybersecurity. We follow NIST and CIS Controls within the hospitals risk appetite and budget. Less funds available due to Covid19 and reduced revenue.

It would be highly questionable whether “less funds available” would be considered a valid reason for not employing data security measure that would otherwise be considered “reasonable” under industry standards, applicable statutes/regulations, or cost-benefit analysis.

Additionally from Chris:

If you use CIS Controls, then also look at CIS RAM the risk assessment method. They show you how to do this risk analysis.

View the recording.


NATIONAL LAW REVIEW

HIPAA Risk Analysis 2.0: Duty of Care Risk Analysis [PODCAST]

In this episode, Foley Partner Jen Rathburn sits down with Terry Kurzynski, found of HALOCK Security Labs on the Duty of Care Risk Analysis, especially as it pertains to health care.


DARK READING

Defining “Reasonable” Security at (ISC)2 Security Congress 

Approaching Reasonable Security for Regulatory Requirements such as The SHIELD Act, CCPA, California’s Internet of Things (IoT) and more


DARK READING

How to Create Smarter Risk Assessments 

Executives and directors need quantitative measurements – such as likelihood of loss and hard-dollar financial impact – to make more informed decisions about security risks.  (CIS RAM)


SECURITY MAGAZINE

Who in an organization is responsible for a data breach?


CIS® (Center for Internet Security, Inc.)

CIS is a founding member of the DoCRA Council that maintains the risk analysis standard that CIS RAM is built upon. CIS RAM FAQs


MIDWEST CYBER SECURITY ALLIANCE

Presentation on Duty of Care Risk Analysis: Leveraging the New Risk Assessment Method to Reduce Liability

Duty of Care Risk Analysis: Leveraging the New Risk Assessment Method to Reduce Liability