Search
Close this search box.
Search
Close this search box.

A CEO Blueprint: What to Do if Your Company Is Cyberattacked

Since the Target breach more than a year ago, we at Chief Executive have gone to great lengths to make it clear to CEOs that cybersecurity is now their responsibility. We’ve emphasized that they need to be fully up to speed on their company’s protective capabilities and emergency response plan, to ensure the systems are strong enough to keep hackers out and to ensure that they themselves can adequately answer all questions on the topic from board members, shareholders and the media, both during quiet times as well as after an attack. This article is a thorough blueprint that can help fulfill both those goals by fast-tracking CEOs’ cybersecurity learning process.

What other steps should you take to maximize the chances of catching the perpetrator?
Preserve the evidence – Gather the evidence of the intrusion or, at a minimum, stop any automated systems from overriding it. Instruct your information technology staff to preserve IP logs and records of system log-ins and log-outs. Records of access and swipe cards, and closed-circuit camera logs, in particular, often have short re-record times, so be sure to preserve this evidence. Also, if the perpetrator was a company insider, revoke his or her system credentials before taking any employment action, lest that person retaliate by seeking to destroy evidence.

Interview your staff – Interview your IT staff and others with knowledge of the systems through which the intrusion or data theft occurred. No one knows your company’s computer systems better than your staff does. Taking this step will help you identify the best witnesses to offer to the government to make your case effectively.

“Gather all evidence of the intrusion or, at a minimum, stop any automated systems from overriding it.”

Put a bow on it – Counsel can help you sort through the evidence of the breach and create a “prosecution memo” to share with law enforcement that is similar to what the prosecutor will ultimately have to create when seeking internal authorization for criminal charges. This document would lay out the evidence of the crime, connect that evidence to the suspect, and chart a pathway for successful prosecution, including by suggesting the particular statutes violated and anticipated punishments. Using outside counsel for your investigation also maximizes the protections of the attorney-client privilege, in the event that information is gathered as part of your internal investigation that you do not want disclosed to the government.

Create a single point of contact – Have one person, either within the company or at outside counsel, who law enforcement can call to provide an update on the investigation or from whom law enforcement can request information. Empower that point of contact to interview and gather documents in response to the government’s requests.

How should you plan for the next time?
Incorporate an analysis of if, when, and how to contact law enforcement into your company’s overall data breach response plan. In doing so, identify the person or department within the company that will have the authority to make the decision to contact law enforcement and what the basis for that decision should be.

And in the event that law enforcement contacts your company before you have decided whether to call them, identify in your company’s response plan who will have the authority to speak with them on such a call, along with what the initial steps will be to assist and respond to the inquiry.

Lastly, consider reaching out to law enforcement in non-crisis times. State, local, and federal agencies charged with preventing cybercrime often have industry liaisons whose jobs are to work with companies in a particular region or industry to educate employees on how to prevent and respond to cybercrime and to foster public-private cooperation. Corporate counsel, security staff, or experienced outside counsel may be able to arrange for such a meeting.

John E. Clabby
John E. Clabby
Joseph Swanson
Joseph Swanson

John E. Clabby and Joseph W. Swanson are of counsel in Carlton Fields Jorden Burt’s Tampa office, where they defend companies and officers in government investigations and securities and corporate governance litigation.  Both are former criminal Assistant U.S. Attorneys and Computer Hacking and Intellectual Property (“CHIP”) prosecutors, who specialized in gathering and assessing electronic evidence and investigating computer crimes.  Clabby can be reached at [email protected].  Swanson can be reached a [email protected].


MORE LIKE THIS

  • Get the CEO Briefing

    Sign up today to get weekly access to the latest issues affecting CEOs in every industry
  • upcoming events

    Roundtable

    Strategic Planning Workshop

    1:00 - 5:00 pm

    Over 70% of Executives Surveyed Agree: Many Strategic Planning Efforts Lack Systematic Approach Tips for Enhancing Your Strategic Planning Process

    Executives expressed frustration with their current strategic planning process. Issues include:

    1. Lack of systematic approach (70%)
    2. Laundry lists without prioritization (68%)
    3. Decisions based on personalities rather than facts and information (65%)

     

    Steve Rutan and Denise Harrison have put together an afternoon workshop that will provide the tools you need to address these concerns.  They have worked with hundreds of executives to develop a systematic approach that will enable your team to make better decisions during strategic planning.  Steve and Denise will walk you through exercises for prioritizing your lists and steps that will reset and reinvigorate your process.  This will be a hands-on workshop that will enable you to think about your business as you use the tools that are being presented.  If you are ready for a Strategic Planning tune-up, select this workshop in your registration form.  The additional fee of $695 will be added to your total.

    To sign up, select this option in your registration form. Additional fee of $695 will be added to your total.

    New York, NY: ​​​Chief Executive's Corporate Citizenship Awards 2017

    Women in Leadership Seminar and Peer Discussion

    2:00 - 5:00 pm

    Female leaders face the same issues all leaders do, but they often face additional challenges too. In this peer session, we will facilitate a discussion of best practices and how to overcome common barriers to help women leaders be more effective within and outside their organizations. 

    Limited space available.

    To sign up, select this option in your registration form. Additional fee of $495 will be added to your total.

    Golf Outing

    10:30 - 5:00 pm
    General’s Retreat at Hermitage Golf Course
    Sponsored by UBS

    General’s Retreat, built in 1986 with architect Gary Roger Baird, has been voted the “Best Golf Course in Nashville” and is a “must play” when visiting the Nashville, Tennessee area. With the beautiful setting along the Cumberland River, golfers of all capabilities will thoroughly enjoy the golf, scenery and hospitality.

    The golf outing fee includes transportation to and from the hotel, greens/cart fees, use of practice facilities, and boxed lunch. The bus will leave the hotel at 10:30 am for a noon shotgun start and return to the hotel after the cocktail reception following the completion of the round.

    To sign up, select this option in your registration form. Additional fee of $295 will be added to your total.