SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
www.globalcyberconsultants.com
Who Are We and Why Are We Here?
Steven Schwartz
• TheCyberSteve
• CEO of Global Cyber Consultants
• Founding Board Member of Personal Data
Trade Association
• Co-Founder & Vice-Chairman of Clean Data
Institute
Harumi Urata-Thompson
• The Michelin 3-Star #FinChef
• Executive and Strategic Advisor
• President and Founding Board Member of
Personal Data Trade Association
Where to Start
First we need to acknowledge that we
are accelerating into this era of data
proliferation changing not only how
we evaluate business risk, but the
nature of the business’ operations as
well
1
Almost every company is shifting
towards becoming a “data” company
whether they are collecting data,
storing data, transacting data,
analyzing data, monetizing, etc
2
How Does This
Translate to
Cybersecurity?
Two Fold – for one, cybersecurity
is now and will increasingly be a
critical foundation. Trust is the
new currency
A company’s objective should be
to increase the business’ trust &
confidence in data and quality of
analytic insights that come from it.
Secondarily and really where the dynamic
is changing, is that cybersecurity is no
longer just another cost center item on
your balance sheet. It’s no longer
something to be done just for
compliance. Evaluating cyber risk is a data
driven exercise that is encapsulated
within you’re overall business strategy.
Requirement Impact & Potential Consequence Methods of Control
Confidentiality – Protection of
Information from Unauthorized
Exposure
- Disclosure of information
governed by privacy laws
- Loss of Intellectual Property
- Reputational Damage
- Legal repercussions
- Access Controls
- File Permissions
- Encryption
Integrity – Accuracy and
Completeness of Information
- Fraud
- Inaccurateness
- Erroneous Decisions
- Access Controls
- Logging
- Digital Signatures
- Hashes
- Encryption
Availability – The ability to access
information and resources
- Loss of Functionality
- Loss of Productivity
- Interference with Enterprise
Objectives
- Redundancy
- Backups
- Access Controls
Is there a Critical Foundation within Data & Cyber Security?
What is the
ROI?
So Where Do
We Start in
Quantifying
the Risk?
First we need to acknowledge that
cyber risk is business risk and must
speak the same language
The quality of the data will drive
the overall effectiveness of your
security program.
No Assumptions!
How do we
Define or
Decompose
Risks as it
Relates to
Cybersecurity?
• Let’s define Risk as the the probable magnitude
of future loss (an undertain event).
• Terminology and classification is critical in
translating the conversation towards business
strategy
Which of the
Following Are
Risks?
• Disgruntled Insiders?
• Internet facing web servers?
• Untested Recovery processes?
• Sensitive Customer Information?
• Weak Passwords?
• Cyber criminals?
None of Them
Are…
• They are all part of the risk landscape…
• Disgruntled Insiders = Threat Community
• Internet facing web servers = Asset
• Untested Recovery processes = Deficient Control
• Sensitive Customer Information? = Asset
• Weak Passwords? = Deficient Control
• Cyber criminals? = Threat Community
How Do We Start to Quantify Cyber Risk?
Loss Event Frequency
RISK
Loss Event Magnitude
Examples of Loss Events:
• A data center outage due to extreme weather
• A corrupted database
• An employee stealing intellectual property
• A hacker stealing sensitive customer information
Develop a Loss Flow
• Threat Agent
• Asset
• Stakeholder
• Primary
• Secondary
Loss Flow
1. Asset at risk
1. Personal Information
2. Operating System
3. Applications
2. Threat Actors
3. Threat Effect: Confidentiality, Integrity, Availability
Building a Cyber Risk Scenario
Where Does
Insurance
Come into
Play
Running through these scenarios moves from tactical
to strategic, evaluating multiple scenarios to provide
a probabilistic view of enterprise risk. Now that we’ve
identified our risk and mitigation controls, let’s assess
how much risk we want/need to transfer
When you understand the assets at risk, the threats
and the control mechanisms in place to prevent, you
can understand how much risk is mitigated
Then it’s a strategic decision on how much risk you
want to transfer
Cyber Insurance is “Your Last Line of Defense” when Technology Fails
A Cyberattack can burden your company with substantial time and costs that can put YOU out of BUSINESS if YOU’RE NOT PROTECTED.
Cyber Insurance covers a business’s liability for a data breach in which their customer’s information (PII, Tax Info, Health Info, etc.….)
is exposed or stolen by a criminal or someone with unauthorized use who has gained access to the company’s network.
Crisis
Management
Costs
Notification
Costs
Business
Interruption
Costs
Regulatory
Fines and
Penalties
Legal Liability
Reputational
Damage
Why Do You Need Cyber Insurance?
What Does Cyber Insurance Coverage?
What Does Cyber Insurance Coverage?
Company
# of Records
Breached
Costs Insurance
Root Cause
of the Breach
Notes
130 Million
$140M
to Date
$30M
SQL Injection code that
allowed Hackers into each
their systems for 6 months
Stock fell by 80%, resulting
in Shareholder Suits
110 Million $252M $90M
Malware was introduced
by a much smaller
corporate partner
46% drop in sales in the quarter that
the breach hit
70 Class Action Lawsuits
4 Shareholder Derivative Demands
94 Million
Approx.
$1.6B
No Evidence
Hackers broke into their wireless
network and stole the records in the 2nd
half of 2005 and throughout 2006
25 Class Action lawsuits following the
breach settlements
TJ Maxx paid out several hundred
million dollars
So How much do these Data Breaches Cost?
Company
# of Records
Breached
Costs Insurance
Root Cause
of the Breach
Notes
2.6 TB of Data;
11.5M Confidential
Documents;
4.8M Emails;
214K Offshore Entities
TBD –
Possible most in
Direct Losses
Loss of Reputation
NA
Outdated firewalls, antivirus, password
protection, encryption
Outside hacker
Offshore Holdings of
12 world leaders,
140 Political Leaders and
29 Forbes-listed Billionaires
78.8 Million
$142m
to Date
NA
State-Nation Cyber Attack, executing a
sophisticated attack to gain unauthorized
access
Post-Breach, Anthem spent $65M in
Cybersecurity Enhancements
in both 2015 and 2016
83 Million Estimates $1 Billion NA
Employee's Personal Computer was
injected with malware that stole login
credential
IT Spending expected to increase
additional $250M
Both this year and next year
So How much do these Data Breaches Cost?

Más contenido relacionado

La actualidad más candente

Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityJoan Weber
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...Scalar Decisions
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramMatt Moneypenny
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesEthisphere
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021insightscare
 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityMT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityDell EMC World
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...Ken Lam
 
Where Is Your Sensitive Data Wp
Where Is Your Sensitive Data   WpWhere Is Your Sensitive Data   Wp
Where Is Your Sensitive Data Wptbeckwith
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015Scott Smith
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015John Budriss
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
 
Issp for Uadigitals 2019
Issp for Uadigitals 2019Issp for Uadigitals 2019
Issp for Uadigitals 2019Elena Peday
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Tracey Ong
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Universidad Cenfotec
 

La actualidad más candente (20)

A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
In the news
In the newsIn the news
In the news
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
How to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness ProgramHow to Establish a Cyber Security Readiness Program
How to Establish a Cyber Security Readiness Program
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Event Guide V8
Event Guide V8Event Guide V8
Event Guide V8
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Cyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data BreachesCyber Security, IP Theft, and Data Breaches
Cyber Security, IP Theft, and Data Breaches
 
10 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 202110 best cybersecurity companies in healthcare for 2021
10 best cybersecurity companies in healthcare for 2021
 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityMT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
 
Where Is Your Sensitive Data Wp
Where Is Your Sensitive Data   WpWhere Is Your Sensitive Data   Wp
Where Is Your Sensitive Data Wp
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015CISO_Paper_Oct27_2015
CISO_Paper_Oct27_2015
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
Issp for Uadigitals 2019
Issp for Uadigitals 2019Issp for Uadigitals 2019
Issp for Uadigitals 2019
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.
 

Similar a Quantifying Cyber Risk, Insurance and The Value of Personal Data

Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015sarah kabirat
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)OnRamp
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityKaryl Scott
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxJkYt1
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon BradyStarttech Ventures
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Accounting_Whitepapers
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsCommunity IT Innovators
 
Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511Stan Stahl, PhD
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensaakash malhotra
 

Similar a Quantifying Cyber Risk, Insurance and The Value of Personal Data (20)

Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015Cyber Security Privacy Brochure 2015
Cyber Security Privacy Brochure 2015
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptx
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015Cyber risk management-white-paper-v8 (2) 2015
Cyber risk management-white-paper-v8 (2) 2015
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511Cal cpa meeting infosec challenge - 160511
Cal cpa meeting infosec challenge - 160511
 
Untitled document.otd
Untitled document.otdUntitled document.otd
Untitled document.otd
 
Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 

Último

Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 

Último (20)

Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 

Quantifying Cyber Risk, Insurance and The Value of Personal Data

  • 2. Who Are We and Why Are We Here? Steven Schwartz • TheCyberSteve • CEO of Global Cyber Consultants • Founding Board Member of Personal Data Trade Association • Co-Founder & Vice-Chairman of Clean Data Institute Harumi Urata-Thompson • The Michelin 3-Star #FinChef • Executive and Strategic Advisor • President and Founding Board Member of Personal Data Trade Association
  • 3. Where to Start First we need to acknowledge that we are accelerating into this era of data proliferation changing not only how we evaluate business risk, but the nature of the business’ operations as well 1 Almost every company is shifting towards becoming a “data” company whether they are collecting data, storing data, transacting data, analyzing data, monetizing, etc 2
  • 4. How Does This Translate to Cybersecurity? Two Fold – for one, cybersecurity is now and will increasingly be a critical foundation. Trust is the new currency A company’s objective should be to increase the business’ trust & confidence in data and quality of analytic insights that come from it. Secondarily and really where the dynamic is changing, is that cybersecurity is no longer just another cost center item on your balance sheet. It’s no longer something to be done just for compliance. Evaluating cyber risk is a data driven exercise that is encapsulated within you’re overall business strategy.
  • 5. Requirement Impact & Potential Consequence Methods of Control Confidentiality – Protection of Information from Unauthorized Exposure - Disclosure of information governed by privacy laws - Loss of Intellectual Property - Reputational Damage - Legal repercussions - Access Controls - File Permissions - Encryption Integrity – Accuracy and Completeness of Information - Fraud - Inaccurateness - Erroneous Decisions - Access Controls - Logging - Digital Signatures - Hashes - Encryption Availability – The ability to access information and resources - Loss of Functionality - Loss of Productivity - Interference with Enterprise Objectives - Redundancy - Backups - Access Controls Is there a Critical Foundation within Data & Cyber Security?
  • 7. So Where Do We Start in Quantifying the Risk? First we need to acknowledge that cyber risk is business risk and must speak the same language The quality of the data will drive the overall effectiveness of your security program. No Assumptions!
  • 8. How do we Define or Decompose Risks as it Relates to Cybersecurity? • Let’s define Risk as the the probable magnitude of future loss (an undertain event). • Terminology and classification is critical in translating the conversation towards business strategy
  • 9. Which of the Following Are Risks? • Disgruntled Insiders? • Internet facing web servers? • Untested Recovery processes? • Sensitive Customer Information? • Weak Passwords? • Cyber criminals?
  • 10. None of Them Are… • They are all part of the risk landscape… • Disgruntled Insiders = Threat Community • Internet facing web servers = Asset • Untested Recovery processes = Deficient Control • Sensitive Customer Information? = Asset • Weak Passwords? = Deficient Control • Cyber criminals? = Threat Community
  • 11. How Do We Start to Quantify Cyber Risk? Loss Event Frequency RISK Loss Event Magnitude Examples of Loss Events: • A data center outage due to extreme weather • A corrupted database • An employee stealing intellectual property • A hacker stealing sensitive customer information Develop a Loss Flow • Threat Agent • Asset • Stakeholder • Primary • Secondary
  • 13. 1. Asset at risk 1. Personal Information 2. Operating System 3. Applications 2. Threat Actors 3. Threat Effect: Confidentiality, Integrity, Availability Building a Cyber Risk Scenario
  • 14. Where Does Insurance Come into Play Running through these scenarios moves from tactical to strategic, evaluating multiple scenarios to provide a probabilistic view of enterprise risk. Now that we’ve identified our risk and mitigation controls, let’s assess how much risk we want/need to transfer When you understand the assets at risk, the threats and the control mechanisms in place to prevent, you can understand how much risk is mitigated Then it’s a strategic decision on how much risk you want to transfer
  • 15. Cyber Insurance is “Your Last Line of Defense” when Technology Fails A Cyberattack can burden your company with substantial time and costs that can put YOU out of BUSINESS if YOU’RE NOT PROTECTED. Cyber Insurance covers a business’s liability for a data breach in which their customer’s information (PII, Tax Info, Health Info, etc.….) is exposed or stolen by a criminal or someone with unauthorized use who has gained access to the company’s network. Crisis Management Costs Notification Costs Business Interruption Costs Regulatory Fines and Penalties Legal Liability Reputational Damage Why Do You Need Cyber Insurance?
  • 16. What Does Cyber Insurance Coverage?
  • 17. What Does Cyber Insurance Coverage?
  • 18. Company # of Records Breached Costs Insurance Root Cause of the Breach Notes 130 Million $140M to Date $30M SQL Injection code that allowed Hackers into each their systems for 6 months Stock fell by 80%, resulting in Shareholder Suits 110 Million $252M $90M Malware was introduced by a much smaller corporate partner 46% drop in sales in the quarter that the breach hit 70 Class Action Lawsuits 4 Shareholder Derivative Demands 94 Million Approx. $1.6B No Evidence Hackers broke into their wireless network and stole the records in the 2nd half of 2005 and throughout 2006 25 Class Action lawsuits following the breach settlements TJ Maxx paid out several hundred million dollars So How much do these Data Breaches Cost?
  • 19. Company # of Records Breached Costs Insurance Root Cause of the Breach Notes 2.6 TB of Data; 11.5M Confidential Documents; 4.8M Emails; 214K Offshore Entities TBD – Possible most in Direct Losses Loss of Reputation NA Outdated firewalls, antivirus, password protection, encryption Outside hacker Offshore Holdings of 12 world leaders, 140 Political Leaders and 29 Forbes-listed Billionaires 78.8 Million $142m to Date NA State-Nation Cyber Attack, executing a sophisticated attack to gain unauthorized access Post-Breach, Anthem spent $65M in Cybersecurity Enhancements in both 2015 and 2016 83 Million Estimates $1 Billion NA Employee's Personal Computer was injected with malware that stole login credential IT Spending expected to increase additional $250M Both this year and next year So How much do these Data Breaches Cost?