Financier Worldwide Magazine
Given the increasing frequency of cyber attacks and the sophistication of cyber criminals, it is imperative that companies put measures in place to counteract bad actors. However, the cyber risk environment is becoming increasingly challenging for companies to navigate. The emergence of cloud computing, 5G, the internet of things (IOT) and other new technologies are increasing the threat vectors for many organizations.
Financier Worldwide Magazine canvasses the opinions of leading professionals around the world on the latest trends in cyber security and risk management. Our Marianne Bailey and Don Heckman share their insights in their latest 2020 in-depth feature.
The cyber risk environment for most organizations is becoming more complex and challenging, with remote operations being driven by the current COVID-19 pandemic and the addition of new technologies like 5G, the internet of things (IoT), and the medical IoT (MIoT). These new technologies expand the attack surface of enterprise IT for organisations at an exponentially increasing pace, making it difficult for cyber security teams to protect organisations. With an uncertain global economic outlook for most countries, cyber criminals will increasingly target financial institutions and expand their activities in other sectors, including healthcare, energy and transportation. Phishing and ransomware attacks continue to be successful and are expected to become even more sophisticated as they employ automation and artificial intelligence (AI). Data and privacy breaches will continue to be a major issue despite the increased legislation and regulations, public scrutiny and C-suite focus.
Currently, in the US, there is no central, federal privacy law like the EU’s General Data Protection Regulation (GDPR). However, there are several federal privacy laws such as the Privacy Act of 1974, as well as a new generation of consumer-oriented privacy laws coming from multiple states, most notably the California Consumer Privacy Act (CCPA), which constitutes the broadest and most comprehensive privacy law in the US to date. The CCPA imposes significant demands on cyber security and data privacy teams for protecting and maintaining personal data, ensuring its accuracy and significantly reducing times for breach reporting. It is very challenging to maintain regulatory compliance for multiple varying standards with respect to customer privacy and data protection. A recent International Association of Privacy Professionals study found 43 percent of organisations are currently working to comply with from two to five data privacy laws. This leads to significant complexity, operational cost and process inefficiencies as companies try to design and implement data protection and privacy programs.
Consistent with recent studies, a 2019 IBM-Ponemon Institute study found it took organisations over 200 days to identify a breach, on average, and they spent over $3m on breach costs. These averages will only get worse as advanced persistent threat actors become more sophisticated. Compounded by the significant increase in the number of smart devices enabled by 5G and the IoT, non-harmonized cyber security and privacy regulations, and the expansion of remote operations driven by the COVID-19 pandemic, organisations’ cyber security resources, both human and financial, have been stretched very thin. These factors are driving organisations to implement more mature incident response programs utilizing automated detection and response capabilities.
There are foundational cyber security practices that every organization should implement to manage cyber-related risk. First, companies must know their environment. You cannot protect what you do not know needs protecting. Identify your high-value assets, data and devices. Second, make sure every device is configured correctly and up to date on security patches. Patch promptly when new patches are released. Third, utilize strong multi-factor authentication for every user on the system and implement least-privileged principles. Monitor and audit privileged users using a privileged access management system. Fourth, implement a strong vulnerability management program with regular scanning and remediation. Fifth, create robust incident response and business continuity plans based on privacy and business impact assessments and exercise them regularly. Finally, participate in cyber security threat intelligence sharing and adjust corporate preventive controls based on current threats.
Insurance providers offering cyber insurance are just getting started. To date, insurance is focused on legal costs and identity protection. Some of the challenges they are facing in providing cyber insurance are related to the uncertainty around pricing and claims provisions due to lack of historical data. Additionally, they are not able to predict the new risk arising from emerging technologies and to determine or quantify the monetary impacts. And last but certainly not least, the threat that insurers are most worried about remains a catastrophic cyber event that could cause extensive losses, leading the insurance provider to insolvency. Ultimately, it is hard to place a dollar value on the reputational damage and costs due to lost consumer confidence done by some of the more recent high-profile cyber attacks and data breaches.
There are two primary cyber insurance coverage considerations, legal fees and expenses for impacted customers, and business impact fees and lost revenues, that companies should evaluate. The first is errors and omissions (E&O) coverage, which includes negligence or breach of contractual obligations due to cyber incidents, and indemnification legal defense costs resulting from a lawsuit or dispute with customers or the public at large. The second is network security coverage in the event of business systems failure due to ransomware, malware, insider threats, employee negligence OR third-party data breaches. Both are equally important, but the E&O coverage tends to get the most focus due to the high-profile media coverage of impacted customers.