Rachel Greenstadt October 17, 2016

Slides:



Advertisements
Similar presentations
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Advertisements

Cyber Insurance Today: Lots of Interest, Lots of Product Innovation, and Lots of Risk Richard S. Betterley, CMC Betterley Risk Consultants, Inc. Sterling,
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
© 2006 PCE Systems Ltd IT Systems Integrity Chris Nabavi BSc SMIEEE.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Oklahoma Chapter Information Systems Security Association Oklahoma Chapter, Tulsa Oklahoma City Chapter, OKC Student Chapter, Okmulgee Oklahoma Chapter,
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
To protect the confidential and proprietary information included in this material, it may not be disclosed or provided to any third parties without the.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
Insurance of the risk Policy covers & underwriting issues Stephen Ridley, Senior Development Underwriter.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Frontline Enterprise Security
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Click to edit Master title Information Security: A Discussion Wednesday, December 6, 2006 Bob Steadman Director, National IT Security Sobeys.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
BTS730 – Systems Analysis and Project Management Cost Management.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
Cyber Insurance Risk Transfer Alternatives
Cybersecurity as a Business Differentiator
Clients and Prospective Clients on the Threat of Cyber Crime
Law Firm Data Security: What In-house Counsel Need to Know
Cyber Security – An Existential Threat? (IIC, Singapore)
Hot Topics in the Financial Industry: Cybersecurity
Insurance Technology Forums: ‘IT Matters’ Forum
Cyber Insurance – FFs & CHBs
Responding to Intrusions
Impact of IT Consumerisation on Enterprise Security
Lecture 14: Business Information Systems - ICT Security
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
Chapter 3: IRS and FTC Data Security Rules
Unit 7 – Organisational Systems Security
Cyber Insurance: An Update on the Market’s Hottest Product
Information Security: Risk Management or Business Enablement?
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
I have many checklists: how do I get started with cyber security?
Security Threats Severity Analysis
Cyber Trends and Market Update
SMB practice development: Security play
Understanding Cyber Insurance NASCUS/CUNA Cybersecurity Symposium
Navigating Security Seas in a Small Ship with a Limited Crew
By Joseph Carnevale, CIP Partner & Director of Sales
Cybersecurity compliance for attorneys
SMB practice development: Security play
Keeping your data, money & reputation safe
Cybercrime and Canadian Businesses
Business Continuity Plan
Security Metrics That Don’t Suck
By: Dorian Lockhart Wilston Johnston
Strategic threat assessment
Cyber Security: What the Head & Board Need to Know
Guidelines for building security policies. Building a successful set of security policies will ensure that your business stands the best possible chance.
Lecture 15: Cybersecurity management
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Presentation transcript:

Rachel Greenstadt October 17, 2016 Lecture 6: Spending Rachel Greenstadt October 17, 2016

Cyber losses https://www.youtube.com/watch?v=SUxJqoZtXyw

Reminders CITI Training due Thursday before class Discussion on Thursday/Friday online Mini-Guest Lecture today Andrea Forte on qualitative research Feb 13 Midterm

Spending on Security 2016 numbers from SANS survey

Why Spend on Security?

Why Spend on Security? Avoid Loss How much loss? Will spending work?

Other reasons Reputation / Branding damage New business process Share price effect New business process Compliance with standards SOX, HIPAA in U.S. PIPEDA (Canada), EU data protection National security (defense contractors) Nonprofits – ethical not just business case

Individuals Theft prevention Privacy concerns

Non-reasons Forensics and attribution Hard and expensive Uh oh. Some state actor must have turned down the hot water pressure to my shower this morning. – Matt Blaze Hard and expensive

Non-reasons: Worms Fast spreading Internet worms How to 0wn the Internet in your spare time Incentives – fast spreading worms not that useful Though slow, subtle ones (Stuxnet)

More non-reasons History of non-spending Competitive advantage New CISO Fear / Guilt Competitive advantage Most businesses don’t develop in-house security, so other people can buy it too

How much security for software products? Argument for very little Customers think cost/speed/functionality more important Just enough to overcome claims of insecurity

How much security for software products? Argument for “top priority” Avoid competitive disadvantage “good enough” security Enhance other IT functions (monitoring/awareness)

How much to spend? “To avoid security incidents” negative goal, hard to measure Measurable goals might be better, but difficult

Spending approaches Wait and see, then recover Buy one of everything Externals measures What do consultants recommend? What is everyone else doing?

Price does matter (Let’s Encrypt)

Return on Investment (ROI) Size of investment / gain Gain = losses that didn’t happen ROI security measure – reduce losses Annual loss expected (ALE) Prob (loss event) * Cost(loss event) How to we get these numbers (esp Prob (loss event) Doesn’t account for possibility of failure or opportunity cost

Actuarial data

Cyberinsurance CLIC – Cyber liability insurance cover Available since early 2000s Now $2.5 billion, 80 carriers 2016 80% of companies with > 1,000 employees bought a policy-Insurance Business Improvement in underwriting

Policies First party – expenses occurred by company experiencing breach Third party – effect of breaches on other companies that affect you

Why insurance Cover cost of breaches Contractual obligations especially notifications Contractual obligations

Effect of Cyberinsurance Motivation for data on risks, measurable security

Fear as a motivator > 500 road fatalities per year caused by avoidance of air travel due to security screening procedures 1018 estimated additional road fatalities during the three months post 9/11

Big event High profile breach, worm infection No $$ - lots of $$$ Might be spent irrationally Boom/bust “Fighting the last war”

Security Tools Total cost of ownership (TCO) Hard for security because operational costs often exceed purchasing price SANS : most spending for in-house labor Survey respondent on the relationship between tools and skills: Do not overspend for tools that you do not have the personnel or expertise to use.

Vulnerability Scanning The more the better?

Dlp – data loss prevention IPS/UTM – Intrusion prevention system, unified threat management (fancy firewalls) Byod – bring your own device Mdm – mobile device management Nac – network access control

Spending questions Already have capability? Existing vendors will soon provide?

Security awareness training? Breaking security rule makes life easier Little company loyalty “Users are not the enemy” – most people who violated security rules were trying to get work done

Security policies Not a firing offense Most people don’t know company security policies Even if they did – either too detailed and technical or too abstract

Invest in Cyber Security Boom? HACK ETF – exchange-traded fund Various “cyber” companies

Invest in Cyber Security Boom? HACK ETF – exchange-traded fund Various “cyber” companies