a reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats,...

44

Upload: truongkhue

Post on 10-May-2018

222 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,
Page 2: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

A reinsurer’s perspective on cyber threats, cyber resilience, insurance and data taxonomy

Mark Coss

Quelle: Verw endung unt er der Lizenz von Shut t ers t ock.com

Page 3: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Agenda

1. Cyber Security Taxonomy: From threats to an insured loss

2. Cyber Attack Life Cycle – how does a targeted attack look like?

3. Information Security & Systems Control Risk Management framework

4. Cyber Insurance- available risk transfer and residual business risk

5. Data Taxonomy-what data needs to be fed into a industry database and recorded

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 4: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

From threats to an insured loss

1

Page 5: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Security Taxonomy From Threats to an insured Loss

Workstations

OS, Applications, Browsers

Servers

Network devices

Telephone

Cloud provider

Persons

Processes

Information

Assets

Assets

Source: http://cambridgeriskframework.com/getdocument/3913-Oct-16

A reinsurer’s perspective on cyber-Mark Coss

Page 6: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Security Taxonomy From Threats to an insured Loss

Buffer overflows

SQL injection

Cross-Site-Scripting (XSS)

Privilege escalation

Unencrypted data

Untrained personnel

Misconfiguration

Inadequate policies

Cyber Vulnerabilities

Vulnerabilities

Source: https://www.riskbasedsecurity.com/2015/12/our-new-year-vulnerability-trends-prediction//13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Assets

Page 7: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

A reinsurer’s perspective on cyber-Mark Coss

Cyber Security Taxonomy From threats to Insured Loss

Threats

Vulnera-bilities

Assets

Denial of Service (DoS)

Phishing

Social Engineering

Ransomware

Virus/Trojan/Worms

(Malware)

Espionage

Botnets

Zero-Day Exploits

Identity theft

Cyber Threats2015 World Map of Malware & Threats by Sophos

Source: © Sophos GmbH

Banking Trojan Remote Access Trojan (RAT)

Password Stealers

Download-Malware

Ransomware Spambots Others

Bootkits

Viruses

Worms

Scandinavia

RussiaCanada

USA

Columbia

Brazil

South Africa

Great Britain

Dach

Italy

Turkey

Saudi Arabia

China Japan

Australia

Hong Kong

Philippines

India

Malaysia

Singapore

Vulnerabilities

Assets

13-Oct-16

Page 8: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Security Taxonomy From Threats to an insured Loss

Threats

Vulnerabilities

Assets

Actors

Threat-

Matrix

Cybercrime Cyberkid Cyberwar and

Cyberspionage

Cyber-Terrorist Hacktivist

Motivation Money Fun, curiosity Strategic Ideologie/Religion Politics, Ethic

Choice of

targets

Individual, by

chance or

directly aimed

By chance,

political reasons

Individual,

collateral

ideological, anti-

western, collateral,

media-effected

Ideological and

political targets

Organisation Strongly

pronounced

Partially Perfect Regional Structured

Competence High Low-high Very high Low-high (external

help)

Middle-high

Source: https://www.europol.europa.eu/content/eu-serious-and-organised-crime-threat-assessment-socta

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 9: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Security Taxonomy From Threats to an insured Loss

Threats

Vulnerabilities

Assets

Actors

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 10: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Attack Life Cycle

2

Page 11: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Myth- Each cyber attack is different hence

prevention is impossible

• Old attacks (successful) used repeatedly

• Re-use of code amongst criminals

• Cyber attack process is exactly the same

• Recent examples

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 12: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Attack ProcessSource: Cyber kill chain-Intelligence driven cyber defense-Lockheed Martin

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 13: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Attack How does a targeted attack look like?

13-Oct-16

Espionage

Recon

Lure

A reinsurer’s perspective on cyber-Mark Coss

Page 14: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Attack How does a targeted attack look like?

13-Oct-16

Espionage

Recon

Lure

Intrusion

Redirect

Exploit

A reinsurer’s perspective on cyber-Mark Coss

Page 15: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Attack How does a targeted attack look like?

13-Oct-16

Espionage

Recon

Lure

Intrusion

Redirect

Exploit

Evolution

Dropper

Call Home

A reinsurer’s perspective on cyber-Mark Coss

Page 16: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Attack How does a targeted attack look like?

13-Oct-16

Espionage

Recon

Lure

Intrusion

Redirect

Exploit

Evolution

Dropper

Call Home

A reinsurer’s perspective on cyber-Mark Coss

Page 17: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Attack How does a targeted attack look like?

13-Oct-16

Espionage

Recon

Lure

Intrusion

Redirect

Exploit

Evolution

Dropper

Call Home

Attack

Data Theft

Denial-of-Service

Manipulate data

A reinsurer’s perspective on cyber-Mark Coss

Page 18: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Attack How does a targeted attack look like?

13-Oct-16

Espionage

Recon

Lure

Intrusion

Redirect

Exploit

Evolution

Dropper

Call Home

Attack

Data Theft

Denial-of-Service

Manipulate data

A reinsurer’s perspective on cyber-Mark Coss

Page 19: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Cyber Attacks on the world of finance

Bangladesh, March 2016: Central Bank Theftof USD$101 Million

Page 20: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

3 Information Security Risk Management

13-A reinsurer’s perspective on cyber-

Page 21: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Accept- Cyber Attacks are a real threat

• Same risk irrespective of business size

• Increasing Board recognition of cybersecurity & privacy due to high profile

incidents e.g Target

• Increasing focus from regulators

• Cybersecurity incidents –YOY 34% growth & attacks average 200 days before

discovery

WHY?• Cultural : Acceptance no system is secure and consumer privacy concerns

• Technological: Cloud security and IoT

Source: 2015 TrustWave global security report: State of cybersecurity ISACA report 2015

Ponemon/IBM data breach study 2015

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 22: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

• Australia ranked 3rd for malicious URL’s/phishing attacks & 4th

globally for botnet infections (Source: Ponemon 2015)

• Average loss incurred by security breaches <US$3mio but figure is

for direct costs such as forensics, PR &legal. Third party liability

and damages would increase losses four fold.

• Time for businesses to discover a sophisticated cyber attack is

between 200 and 280 days

• 38% of mobile users have experienced cybercrime (Source:

Symantec 2014)

• In 2013, cyber attacks affected 5 million Australians at an

estimated cost of $1.06 billion (Source: Symantec 2013)

• 71% of incidents go undetected (Source: Trustwave 2014)

• 60% of SME’s close their doors <6 months of a cyber attack

(Source Experian, 2015)

Cyber Risk Landscape

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 23: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Security FrameworkNIST- a comprehensive cyber security framework used by ASIC Report 429

13-Oct-16

Iden

tify •Asset management

•Risk Assessment

•Governance & Compliance

•Responsibilities

•Risk Management

•Procurement

•Working with external partners

•Recruitment

Pro

tect •User access control

•Awareness & Training

•Data Security

•Processes and Procedures

•Encryption

•Patch & change management

Det

ect •Security Incident Event

Monitoring (SIEM)

•Anti-Virus

Res

po

nd

& R

eco

ver •Incident Management

•Emergency Management

•Backup

•Disaster Recovery

•Business Continuity Management

A reinsurer’s perspective on cyber-Mark Coss

Page 24: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Security FrameworkNIST-a comprehensive cyber security framework used by ASIC Report 429

13-Oct-16

Iden

tify •Asset Management

•Risk Assessment

•Governance & Compliance

•Responsibilities

•Risk Management

•Procurement

•Working with external partners

•Recruitment

Pro

tect •User access control

•Awareness & Training

•Data Security

•Information protection processes and procedures

•Protection technologies

•Encryption

•Patch & change management

Det

ect •Security Incident Event

Monitoring (SIEM)

•Anti-Virus

Res

po

nd

& R

eco

ver •Incident Management

•Emergency Management

•Backup

•Disaster Recovery

•Business Continuity Management

A reinsurer’s perspective on cyber-Mark Coss

Page 25: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Security FrameworkNIST-a comprehensive cyber security framework used by ASIC Report 429

13-Oct-16

Iden

tify •Asset Management

•Risk Assessment

•Governance & Compliance

•Responsibilities

•Risk Management

•Procurement

•Working with external partners

•Recruitment

Pro

tect •User access control

•Awareness & Training

•Data Security

•Information protection processes and procedures

•Protection technologies

•Encryption

•Patch & change management

Det

ect •Detection processes

•Security Incident Event Monitoring (SIEM) & anomalies

•Security continuous monitoring

Res

po

nd

& R

eco

ver •Incident Management

•Emergency Management

•Backup

•Disaster Recovery

•Business Continuity Management

A reinsurer’s perspective on cyber-Mark Coss

Page 26: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Security FrameworkNIST- a comprehensive cyber security framework used by ASIC Report 429

13-Oct-16

Iden

tify •Asset management

•Risk Assessment

•Governance & Compliance

•Responsibilities

•Risk Management

•Procurement

•Working with external partners

•Recruitment

Pro

tect •User access control

•Awareness & Training

•Data Security

•Information protection processes and procedures

•Protection technologies

•Encryption

•Patch & change management

Det

ect •Detection processes

•Security Incident Event Monitoring (SIEM) & anomalies

•Security continuous monitoring

Res

po

nd

& R

eco

ver •Incident Management

•Emergency Management

•Backup

•Disaster Recovery (DRP)

•Business Continuity Management (BCP)

A reinsurer’s perspective on cyber-Mark Coss

Page 27: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

4 Cyber Insurance

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 28: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Insurance role is secondary to cyber

resilience

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

• First Party-reputational expenses, customer support for customer notification, advertising &credit card monitoring, data recovery, businessinterruption, investigation and legal costs, cyber extortion, clean-up of leaked data

• Third Party- technology professional services, multimedia liability, security and privacy liability, personal data liability, corporate data liability, civil & some criminal penalties, outsourcing risk

• Benefits- access to expert panel to manage cyber event and mitigate losses

• Loss of or damage to reputation/trust/brand

• Betterment costs to address vulnerabilities

• Physical Hardware loss/damage

• Loss of customers and jobs

• Loss in competitive advantage and

markets

• CBI from service interruption of critical infrastructure

• Under & uninsured losses (+policy

exclusions)

• Specific Intellectual Property e.g Patents

Risks Transferred & Service Benefits

Business and Residual Risk

Page 29: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber ClaimsData Breaches and insured costs

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 30: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Insurance Risk Transfer Solutions for SME’sStandalone cyber product to be main source of liability cover as exclusions in traditional policies become

more commonplace

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Cyber insurance policy

3rd party Cyber Liability

Privacy Disclosure/Liability

Access Failure

Security Failure Intellectual Property

InternetCommunication and Media

Liability

Legal Counsel

Forensics

Notification Costs

Credit Monitoring

Cri

sis

Co

nsu

ltin

g

1st party Cyber Expenses

Business Interruption

IT Vandalism

Network Extortion

Electronic Theft

Internal Network Interruption

Administrative Fines

Page 31: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

I.

Loss or Theft of

Data Coverage

(1st party)

II.

Confidentiality

Breach Liability

Coverage

(3rd party)

III.

Privacy Breach

Protection

Coverage

(1st party)

IV.

Privacy Breach

Liability Coverage

(3rd party)

V.

Payment Card

Industry Data Security

Standard (PCI-DSS)

Coverage

(1st party)

VI.

Business

Interruption

Coverage

(1st party)

VII.

Cyber

Extortion Coverage

(1st party)

VIII.

Network

Security Liability

Coverage

(3rd party)

IX.

Reputational Risks

Coverage (1st

party)

Munich Re modular wordingOverview of coverage elements

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 32: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

PRICING CYBER RISK PROBLEMATIC AT

PRESENT• Key problem is scarcity of data. While there are markets for assessments regarding loss

frequencies due to cyber related threats this is not the case for loss severities.

• The same holds for cyber related threats which are well covered by various parties (commercial as well as non-commercial). However, to turn knowledge about threats into the ability to quantify loss potential, historic threats and losses have to be matched systematically. As of today, this kind of data appears to be not available.

• external pricing models unavailable, no “buy” option -(RMS, AIR, Symantec, Cambridge…)

• MOTIVATION FOR DATA BASE PROJECT (NAIC for industry codes, Veris for cyber losses in US)

• Presently no mandatory requirements by ISA/APRA and unable to identify cyber experience in NCPD

• Presently mostly pragmatic methods used for pricing single cyber risk (i.e ROL, benchmarking)

• Mainly non-experienced based pricing methods used globally so far

• GIVEN VERY DYNAMIC TRENDS IN CYBER LOSSES AND RISK OF CHANGE PRICING PROFITABILITY IS NOT YET ENSURED

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 33: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

There are a number of threat modelling frameworks, designed to help

organisations understand cybersecurity risks in a formal, standardized way

Frameworks:

• STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of

Service, Elevation of Privilege)

• DREAD (Damage, Reproducibility, Exploitability, Affected users, Discoverability)

• OCTAVE (Operationally Critical Threat, Asset and Vulnerability Evaluation)

• CVSS (Common Vulnerability Scoring System)

• PASTA (Process for Attack Simulation & Threat Analysis)

Threat modelling frameworks

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 34: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Veris Cyber data framework

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 35: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

APRA NCPDExisting industry data inputs not relevant to cyber incidents

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 36: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

QUESTIONS & ANSWERS

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 37: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Just follow-up with us @ your convenience

Mark Coss

Page 38: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Threats and Loss data for Accounting

Services Sector

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 39: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber threats and loss data for Accounting

Services Sector(Source : Hiscox & Advisen)

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 40: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Threats and Loss data for Accounting

Services Sector(Source: Hiscox & Advisen)

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 41: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Threats and Loss data for Accounting

Services Sector(Source: Hiscox & Advisen)

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 42: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Threats and Loss data for Accounting

Services Sector(Source: Hiscox & Advisen)

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 43: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,

Cyber Threat and Loss data for Accounting

Services Sector(Source: Advisen)

13-Oct-16A reinsurer’s perspective on cyber-Mark Coss

Page 44: A reinsurer’s perspective on cyber threats, cyber reinsurer’s perspective on cyber threats, cyber ... Myth- Each cyber attack is different hence prevention is impossible ... Bangladesh,