ILMA Compoundings – March 2019 - 24
lengthened the incident by hours. The client didn't have a
list of whom to call if a cybersecurity incident was suspected,
which made the phone number of the cybersecurity adviser
the only number anyone thought to use. What if he had been
unavailable when this took place?
In a nutshell, the company didn't have its act together, and
it showed. After an incident occurs, your company will be
judged on the following criteria:
1. Before the incident, did your company take all actions
to prevent the incident that one would expect of a
prudent organization?
2. Did your company respond to the incident using
procedures that one would expect of a prudent
organization?
3. Are there any ways that the media could portray
your actions around steps 1 and 2 to make your
company appear to be culpable or incompetent? If so,
expect that they will. It attracts more readers to their
publications.
A robust playbook that includes the CEO, chief legal
counsel and all other senior leaders will do immeasurable
good in your ability to respond to an incident. An incident
response playbook needs several key elements to be effective.
It must:
* Identify who in your organization has the authority to
declare a cybersecurity incident. Who can initiate the
playbook?
* Spell out how much money that person can authorize
to be spent to have an incident investigated or
remediated.
* List the the types of scenarios that the playbook
is designed to cover. Examples include the loss of
sensitive data, a ransomware attack, the loss of a
critical system, natural disasters, law enforcement
contacting your organization about a warrant or
subpoena, and the loss of the use of one or more of
your sites because of a natural disaster or other issues
(such as a crime taking place in the building and the
police barring employees from entering the premises).
* Have a call tree that includes which people or groups
to call when an incident takes place.
* Define the people or groups responsible for making
the decision on when to bring in law enforcement.
* List the people authorized to speak to the media about
a cybersecurity incident and what those who are not
authorized to speak to the media should say if they are
approached by a reporter.
Manufacturing Continues to Be a Target of Cyber Criminals
A
ccording to the 2018 NTT Security report,
cyberattacks are down for manufacturers in the
Americas, but manufacturing remains one of
the top five attacked industry sectors worldwide. With
the average cost of a cyber data breach at $7.5 million,
according to the U.S. Securities and Exchange Commission,
the news is not good for those companies targeted.
Insurance firm Chubb reports that half of the
manufacturing losses in 2018 resulted from phishing
attacks - in which an attacker poses as a trusted source to
convince someone it's safe to open an email, instant message
or text message - indicating that people working in
manufacturing are susceptible to this type of cybercriminal.
A few of the more high-profile malware attacks
targeting manufacturing recently occurred at the Taiwan
Semiconductor Manufacturing Co., Merck and Mondelez
24
MARCH 2019
| COMPOUNDINGS | ILMA.ORG
International (the maker of treats such as Oreos, Chips
Ahoy cookies and Cadbury Creme Eggs).
Taiwan Semiconductor made the news when a thirdparty vendor shipped software that was infected with the
WannaCry ransomware to the chipmaker without prescreening it. An engineer at Taiwan Semiconductor then
installed the software without scanning it, and, once on the
company's operating system, the virus spread.
The New York Times reported that in 2017, both
Mondelez and Merck suffered significant losses from the
NotPetya attack. In its annual report for 2017 filed with the
U.S. Securities and Exchange Commission (SEC), Mondelez
stated that the "malware affected a significant portion of
our global sales, distribution and financial networks." The
net revenue loss, the company said, was less than 1 percent
of the company's global net revenues, which amounted to
http://www.ILMA.ORG
ILMA Compoundings – March 2019
Table of Contents for the Digital Edition of ILMA Compoundings – March 2019
Letter From the Ceo
Inside Ilma
What’s Coming Up
Industry Rundown
In the Know
International Insight
Market Report
Points on a Recycling Continuum
How Are You Regulated?
My Cybersecurity Playbook
Business Hub
Counsel Compound
Washington Landscape
In Network
Member Connections
ILMA Compoundings – March 2019 - Cover1
ILMA Compoundings – March 2019 - Cover2
ILMA Compoundings – March 2019 - 1
ILMA Compoundings – March 2019 - 2
ILMA Compoundings – March 2019 - Letter From the Ceo
ILMA Compoundings – March 2019 - Inside Ilma
ILMA Compoundings – March 2019 - 5
ILMA Compoundings – March 2019 - 6
ILMA Compoundings – March 2019 - 7
ILMA Compoundings – March 2019 - 8
ILMA Compoundings – March 2019 - 9
ILMA Compoundings – March 2019 - What’s Coming Up
ILMA Compoundings – March 2019 - In the Know
ILMA Compoundings – March 2019 - International Insight
ILMA Compoundings – March 2019 - 13
ILMA Compoundings – March 2019 - Market Report
ILMA Compoundings – March 2019 - Points on a Recycling Continuum
ILMA Compoundings – March 2019 - 16
ILMA Compoundings – March 2019 - 17
ILMA Compoundings – March 2019 - How Are You Regulated?
ILMA Compoundings – March 2019 - 19
ILMA Compoundings – March 2019 - 20
ILMA Compoundings – March 2019 - 21
ILMA Compoundings – March 2019 - My Cybersecurity Playbook
ILMA Compoundings – March 2019 - 23
ILMA Compoundings – March 2019 - 24
ILMA Compoundings – March 2019 - 25
ILMA Compoundings – March 2019 - Business Hub
ILMA Compoundings – March 2019 - 27
ILMA Compoundings – March 2019 - Counsel Compound
ILMA Compoundings – March 2019 - 29
ILMA Compoundings – March 2019 - Washington Landscape
ILMA Compoundings – March 2019 - 31
ILMA Compoundings – March 2019 - In Network
ILMA Compoundings – March 2019 - 33
ILMA Compoundings – March 2019 - 34
ILMA Compoundings – March 2019 - 35
ILMA Compoundings – March 2019 - Member Connections
ILMA Compoundings – March 2019 - Cover3
ILMA Compoundings – March 2019 - Cover4
https://www.nxtbook.com/ygsreprints/ILMA/G127535ILMA_vol71_no7
https://www.nxtbook.com/ygsreprints/ILMA/G126213ILMA_vol71_no6
https://www.nxtbook.com/ygsreprints/ILMA/G125546_ILMA_vol71_no5
https://www.nxtbook.com/ygsreprints/ILMA/G124996_ILMA_vol71_no4
https://www.nxtbook.com/ygsreprints/ILMA/G123886_ILMA_vol71_no3
https://www.nxtbook.com/ygsreprints/ILMA/G123315_ILMA_vol71_no2
https://www.nxtbook.com/ygsreprints/ILMA/G122980_ILMA_vol71_no1
https://www.nxtbook.com/ygsreprints/ILMA/G121540_ILMA_vol70_no11
https://www.nxtbook.com/ygsreprints/ILMA/G120882_ILMA_vol70_no10
https://www.nxtbook.com/ygsreprints/ILMA/G120035_ILMA_vol70_no9
https://www.nxtbook.com/ygsreprints/ILMA/G121XXX_ILMA_vol70_no8
https://www.nxtbook.com/ygsreprints/ILMA/G120XXX_ILMA_vol70_no7
https://www.nxtbook.com/ygsreprints/ILMA/G119XXX_ILMA_vol70_no6
https://www.nxtbook.com/ygsreprints/ILMA/G118112_ILMA_vol70_no5
https://www.nxtbook.com/ygsreprints/ILMA/G117382_ILMA_vol70_no4
https://www.nxtbook.com/ygsreprints/ILMA/G116888_ILMA_vol70_no3
https://www.nxtbook.com/ygsreprints/ILMA/G115555_ILMA_vol70_no2
https://www.nxtbook.com/ygsreprints/ILMA/G114774_ILMA_vol70_no1
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no12
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no11
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no10
https://www.nxtbook.com/ygsreprints/ILMA/g109884_ILMA_vol69_no9
https://www.nxtbook.com/ygsreprints/ILMA/g109284_ILMA_vol69_no8
https://www.nxtbook.com/ygsreprints/ILMA/g108494_ILMA_vol69_no7
https://www.nxtbook.com/ygsreprints/ILMA/g107507_ILMA_vol69_no6
https://www.nxtbook.com/ygsreprints/ILMA/g106483_ILMA_vol69_no5
https://www.nxtbook.com/ygsreprints/ILMA/g105803_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/g104743_ILMA_vol69_no3
https://www.nxtbook.com/ygsreprints/ILMA/g103647_ILMA_vol69_no2
https://www.nxtbook.com/ygsreprints/ILMA/g102869_ILMA_vol69_no1
https://www.nxtbook.com/ygsreprints/ILMA/g101930_ILMA_vol68_no12
https://www.nxtbook.com/ygsreprints/ILMA/g100836_ILMA_vol68_no11
https://www.nxtbook.com/ygsreprints/ILMA/g99200_ILMA_vol68_no10
https://www.nxtbook.com/ygsreprints/ILMA/g98468_ILMA_vol68_no9
https://www.nxtbook.com/ygsreprints/ILMA/g97711_ILMA_vol68_no8
https://www.nxtbook.com/ygsreprints/ILMA/G96767ILMA_vol68_no7
https://www.nxtbook.com/ygsreprints/ILMA/G95397ILMA_vol65_no6
https://www.nxtbook.com/ygsreprints/ILMA/G94323ILMA_vol68_no5
https://www.nxtbook.com/ygsreprints/ILMA/G93127_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/G91785_ILMA_vol68_no3
https://www.nxtbook.com/ygsreprints/ILMA/G90956_ILMA_vol68_no2
https://www.nxtbook.com/ygsreprints/ILMA/G89146_ILMA_vol68_no1
https://www.nxtbook.com/ygsreprints/ILMA/G87981_ILMA_vol67_no12
https://www.nxtbook.com/ygsreprints/ILMA/G85409_ILMA_vol67_no11
https://www.nxtbook.com/ygsreprints/ILMA/G83595_ILMA_vol67_no10
https://www.nxtbook.com/ygsreprints/ILMA/G81672_ILMA_vol67_no9
https://www.nxtbook.com/ygsreprints/ILMA/G80238_ILMA_vol7_no8
https://www.nxtbook.com/ygsreprints/ILMA/G79388_ILMA_vol7_no7
https://www.nxtbook.com/ygsreprints/ILMA/G78361_ILMA_vol7_no6
https://www.nxtbook.com/ygsreprints/ILMA/G77448_ILMA_vol7_no5
https://www.nxtbook.com/ygsreprints/ILMA/G75899_ILMA_vol67_no4
https://www.nxtbook.com/ygsreprints/ILMA/G75036_ILMA_vol67_no3
https://www.nxtbook.com/ygsreprints/ILMA/G72720_ILMA_vol67_no2
https://www.nxtbook.com/ygsreprints/ILMA/G72220_ILMA_vol67_no1
https://www.nxtbook.com/ygsreprints/ILMA/G70970_ILMA_vol66_no12
https://www.nxtbook.com/ygsreprints/ILMA/G69813_ILMA_vol66_no11
https://www.nxtbook.com/ygsreprints/ILMA/G67522_ILMA_vol66_no10
https://www.nxtbook.com/ygsreprints/ILMA/G66343_ILMA_vol66_no9
https://www.nxtbook.com/ygsreprints/ILMA/G64859_ILMA_vol66_no8
https://www.nxtbookmedia.com