Blue Pill/Red Pill: How Officers and Board Members Can Swallow the Red Pill and See the Real World of Cybersecurity

26 May 2015 Health Care Law Today Blog

The answer is out there and it is looking for you. It will find you if you want it to. In the 1999 movie The Matrix, Morpheus gives Neo a simple choice: take the blue pill, and Neo can go on believing whatever he wants to believe. Take the red pill, and Neo stays in Wonderland and gets to see just how deep the rabbit-hole goes. What Morpheus is colorfully offering is the opportunity for Neo to free his mind from the computer-generated dream world created by the Matrix, and to use his eyes for the first time to see reality.

It is no surprise that when it comes to information security most directors and officers want to take the blue pill. Cybersecurity can be confusing stuff – whether you are an M.D. who knows every human body part in Latin and maybe a few other languages; a CPA who really understands the complicated transactions involved in mortgage backed securities; or an Electrical Engineer that knows how to take the Laplacian of the Gaussian before complex convolution with the Fast Fourier Transform, the language of cybersecurity is a unique language unto its own. It’s filled with terms like PKI, XML, IDS, website cross scripting, Javascript, SQL injection, AES, Distributed Denial of Service (DDOS) attacks, hash functions, and APT. Trying to understand how a hacker thinks can twist your brain around – while you normally think about how to make something work or why something is not working, hackers think how to get something to work in ways that it is not supposed to. Despite your every instinct to take the blue pill, courts and regulatory agencies have made it clear – officers and directors have fiduciary obligation to monitor and minimize their organization’s information security risks. They have to take the red pill and see the real world of cybersecurity.

So How do You Take the Red Pill?

A spoon full of sugar may help make it go down easier but of course, the truth is that there is no spoon. Here are a few other suggestions to help swallow that cybersecurity red pill that you can do to walk through that door:

  • Get educated on information security and the risks your organization faces. Build a relationship with, and consult with, your IT Security manager (even if it seems like he/she keeps talking about something called a “franastat”) or hire a reputable security expert to teach you the key terms and evaluate your organization’s risks.
  • Establish an Information Security committee to oversee data security issues and to manage the organization’s responses to data security incidents. The committee should meet regularly to obtain updates on new threats and risks, and issue regular reports that document what issues they have considered and what risks mitigation strategies they have decided to enact. When a breach occurs, convene this committee more often during the incident investigation and response.
  • Review your written information security policies (or create them if they do not already exist) to ensure they properly address the risks and that they are consistent with your organization’s culture and the security systems and controls currently implemented by your organization. Reassess these policies at least once a year to respond to new risks.
  • Provide the appropriate amount of resources to combat information security threats, considering the size of your organization and the magnitude of the particular risks your organization faces. Prioritize your resources towards the highest risks first.
  • Plan and test your response for when a data security incident occurs. Know the actions to take and who will lead the response and mitigation efforts before a breach occurs so when it does, you can react quickly and appropriately. Perform a dry run of your response plan (much like you probably do with fire drills) to identify and correct any deficiencies.

You may have been living in the self-created dream world where you were not aware of the matrix of cyberthreats your organization faces. Officer and directors have to free their mind and let it all go – cast aside fear, doubt, and disbeliefs about their obligations to oversee their organization’s information security posture. They have to take the red pill and awaken their minds to the desert of the real – the real world of cybersecurity.

Download the white paper, Taking Control of Cybersecurity: A Practical Guide for Officers and Directors, now to help prepare your organization.

This blog is made available by Foley & Lardner LLP (“Foley” or “the Firm”) for informational purposes only. It is not meant to convey the Firm’s legal position on behalf of any client, nor is it intended to convey specific legal advice. Any opinions expressed in this article do not necessarily reflect the views of Foley & Lardner LLP, its partners, or its clients. Accordingly, do not act upon this information without seeking counsel from a licensed attorney. This blog is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Communicating with Foley through this website by email, blog post, or otherwise, does not create an attorney-client relationship for any legal matter. Therefore, any communication or material you transmit to Foley through this blog, whether by email, blog post or any other manner, will not be treated as confidential or proprietary. The information on this blog is published “AS IS” and is not guaranteed to be complete, accurate, and or up-to-date. Foley makes no representations or warranties of any kind, express or implied, as to the operation or content of the site. Foley expressly disclaims all other guarantees, warranties, conditions and representations of any kind, either express or implied, whether arising under any statute, law, commercial use or otherwise, including implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Foley or any of its partners, officers, employees, agents or affiliates be liable, directly or indirectly, under any theory of law (contract, tort, negligence or otherwise), to you or anyone else, for any claims, losses or damages, direct, indirect special, incidental, punitive or consequential, resulting from or occasioned by the creation, use of or reliance on this site (including information and other content) or any third party websites or the information, resources or material accessed through any such websites. In some jurisdictions, the contents of this blog may be considered Attorney Advertising. If applicable, please note that prior results do not guarantee a similar outcome. Photographs are for dramatization purposes only and may include models. Likenesses do not necessarily imply current client, partnership or employee status.

Related Services

Insights

RCE PTA Carve-Out Resumes After Interference
18 September 2019
PharmaPatents
The Ninth Circuit Expected to Rule that Doctors Can Be Wrong in the Winter v. Gardens False Claims Act Case
18 September 2019
Legal News: Government Enforcement Defense & Investigations
Upcoming Webinar: Maximizing Solar Tax Credits - Navigating the Start of Construction Rules (Part 1)
17 September 2019
Renewable Energy Outlook
When Birds Finally Find a Nest
17 September 2019
Dashboard Insights
Lacktman, Ferrante Cited in mHealth Intelligence About Ryan Haight Act
19 September 2019
mHealth Intelligence
Tinnen Discusses How Viewpoint Diversity Helps Businesses Thrive
18 September 2019
InsideTrack
Vernaglia Comments on AHA v Azar Decision
18 September 2019
MedPage Today
Lach Comments on Launch of New Group
16 September 2019
BizTimes Milwaukee
MedTech Impact Expo & Conference
13-15 December 2019
Las Vegas, NV
Review of 2020 Medicare Changes for Telehealth
11 December 2019
Member Call
BRG Healthcare Leadership Conference
06 December 2019
Washington, D.C.
CTeL Telehealth Fall Summit 2019
04-06 December 2019
Washington, D.C.