Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Dealing with the Rising Tide of Systemic Cyber Risk April 29, 2014.

Slides:



Advertisements
Similar presentations
IBM’s Transformation to a Services Company and the Growth of Digital Trade Michael DiPaula-Coyle IBM Governmental Programs.
Advertisements

Page 1 Recording of this session via any media type is strictly prohibited. Page 1 EMP202: The Risk Manager’s Role in Mitigating Employment Practices Liability.
Freshfields Bruckhaus Deringer LLP Global investigations What to advise your board Marius Berenbrok Edward Braham Matthew Herman Melissa Thomas 29 February.
Hedge fund flows on pace to nearly double 2012
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Every Day is a School Day: Tips for the New Risk Professional.
New Realities in Handling a Crisis
Page 1 Recording of this session via any media type is strictly prohibited. Tech Time: Technology Advancements Impacting Risk Management Today.
© 2003 IBM Corporation Preparing for Privacy Society of Internet Professionals January 19, 2004 Nigel Brown Senior Privacy.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Mega Trends Part 1: Understanding the Mega Trends that are Reshaping.
1 Pertemuan 9 Department Organization Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 The Changing Face of Product Recall Insurance.
Corporate Ethics Compliance *
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 PROTECTING YOUR BRAND AND REPUTATION: UPDATE ON INSURANCE AND BEST PRACTICES.
Outsourcing Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Page 0 Recording of this session via any media type is strictly prohibited. Page 0 FOR016: EXCELLENCE IN RISK MANAGEMENT 11.
Internal Auditing and Outsourcing
Davis Tax Committee Carbon tax submission May
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Supply Chain Brain Avoiding Pitfalls of a Contingent Business Interruption.
Four tips to mitigate Mobile fraud in the future.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
September 2011 James Sinclair Taylor NALM LINks Corporate Structure Options.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Responsible CarE® Product Stewardship – Building Your Team David Sandidge Director, Responsible Care American Chemistry Council June 2010.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Risk Management Office ECO-IDB Workshop on Risk Management 4 March 2012.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 We Have a Plant There? u Managing International Property Insurance and.
Business Model for an Industrial development agency
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Megatrends Part 3: Natural Catastrophes and Climate Change - Stress.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Online banking security best practices Access via ‘transaction devices’
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 10 Endorsements You Should Consider Adding to Your Standard Policy RIMS:
© Grant Thornton LLP. All rights reserved. Next – Generation Outsourcing Kris Ruckman June 4, 2008.
Privacy-in-a-Suitcase Presentation. Introduction – Learning Objectives At the end of this Program, you will: Have a better awareness of privacy issues.
Climate Products Developing Insurance Products to Facilitate Adaptation and Mitigation to Climate Change Risks September 14, 2009 RIMS Canada The Importance.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Megatrends Part 4 – The Shift in Economic Power – M&A Implications for.
Risk Engineering Be prepared for OSHA! Patric E. McCon, CSP, CFPS, CHMM Sr. Risk Engineering Consultant Zurich Services Corporation.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
© 2010 The McGraw-Hill Companies, Inc. Managerial Accounting and the Business Environment Chapter 1.
Page 1 Recording of this session via any media type is strictly prohibited. Page 1 PROTECTING YOUR BRAND AND REPUTATION: UPDATE ON INSURANCE AND BEST PRACTICES.
Balance Between Audit/Compliance and Risk Management- Best Practices FIRMA 21 st National Training Conference Julia Fredricks, U.S. Chief Compliance Officer.
Jonathan McCoy Regional Property Underwriting Manager Zurich Energy Supply chain insurance and risk assessment Protecting profitability.
By Sanjay Chand.  What is a web server?  A web server is a program that, uses the client/server model and the World Wide Web’s HTTP.  My recommendation.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Aiia : voice of the digital economy ASR: voice of services in Australia Presented by Kaaren Koomen Director, Australian Services Roundtable Director (Alternate),
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
AIG Passport SM for Directors & Officers Liability Insurance Presented by: Hano Pak, AIG March 29, 2007.
Dolly Dhamodiwala CEO, Business Beacon Management Consultants
IoT – towards an eco-system economy Wim De Waele – Eggsplore.
Trade Compliance Considerations April 13, © 2016 KPMG LLP, a Delaware limited liability partnership and the U.S. member firm of the KPMG network.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
THE TOP FOUR BEST PRACTICES WHEN SELECTING A DALLAS DATA CENTER.
TOTAL POLICING LDSC: Protecting London’s Business Community. Presentation to.
Protecting Data, Sharing Information Graham Wakerley: Director
Draft - Enterprise Risk Management Risk Universe
Operations Start-up Manager
Information Security Program
ENTERPRISE RISK MANAGEMENT IN THE CASE OF THE FINANCIAL SERVICE SECTOR
UNLOCK THE POWER OF LEVERAGE
E-commerce and E-logistics Trends from an European perspective
The three-point system
Prepared by: Yazan Metwalli(148371) Moyad Habiballah(137535)
Cybercrime and Canadian Businesses
Fact: Standards Mean Business To industry, government and the bottom line
Neopay Practical Guides #2 PSD2 (Should I be worried?)
INFRASTRUCTURE & ACCESS 4TH JULY 2018
Optimize Recruitment and Retention through Resilience
Presentation transcript:

Page 1 Recording of this session via any media type is strictly prohibited. Page 1 Dealing with the Rising Tide of Systemic Cyber Risk April 29, 2014

Page 2 Recording of this session via any media type is strictly prohibited. Presenters Lori Bailey, Global Head of Management & Professional Liability; Zurich Jason Healey, Director, Cyber Statecraft Initiative; The Atlantic Council

Page 3 Recording of this session via any media type is strictly prohibited. What to Expect After attending this session, you will be able to: 1.Understand the seven (7) aggregations of cyber risk; 2.Recognize their impact and potential implications on managing cyber risk; 3.Assess the recommendations and apply them within your organization;

Page 4 Recording of this session via any media type is strictly prohibited. Seven Aggregations of Cyber Risk DescriptionExamples Internal IT enterprise: Risk associated with the cumulative set of an organization’s (mostly internal) IT Hardware; software; servers; and related people and processes Counterparties and partners: Risk from dependence on, or direct interconnection (usually non-contractual) with an outside organization University research partnerships; relationship between competing/cooperating banks; corporate joint ventures; industry associations Outsourced and contract: Risk usually from a contractual relationship with external suppliers of services, HR, legal or IT and cloud provider IT and cloud providers; HR, legal, accounting, and consultancy; contract manufacturing Supply chain: Both risk to supply chains for the IT sector and cyber risks to traditional supply chains and logistics Exposure to a single country; counterfeit or tampered products; risks of disrupted supply chain Disruptive technologies: Risks from unseen effects of or disruptions either to or from new technologies, either those already existing but poorly understood, or those due soon Internet of things; smart grid; embedded medical devices; driverless cars; the largely automatic digital economy Upstream infrastructure: Risks from disruptions to infrastructure relied on by economies and societies, especially electricity, financial systems and telecommunications Internet infrastructure like internet exchange points and submarine cables; some key companies and protocols used to run the internet (BGP and Domain Name System); internet governance External shocks: Risks from incidents outside the system, outside of the control of most organizations and likely to cascade Major international conflicts; malware pandemic

Page 5 Recording of this session via any media type is strictly prohibited. Relationship of Hazard and Control Every year, technology and business processes push us further up and to the right Supply Chain Counterparties and Partner Internal Enterprise External Shocks Disruptive Tech Outsourced and Contract Upstream Infrastructure Mitigated by risk management, resilience contracts, SLAs, MOUs Mitigated government action, resilience, standards, regulations Highest Hazard Lowest Hazard Most Control Least Control

Page 6 Recording of this session via any media type is strictly prohibited. Recommendations System-wide risk: System-wide risk recommendations for governments and organizations with systemic impact: Expand cyber-risk management to make it system-wide, similar to financial markets, and improve system-wide resilience and incident response Cautiously expand authority to include third-party providers Provide targeted grants Consider other measures including ‘Stability Board’, and recognition of ‘G-SIFIs’. Local Risk: Recommendations apply mainly to individual organizations: Basic actions are often simple but often ignored and relevant for everyone Advanced measures for more sophisticated companies include expanding their view of risk management Resilience to bounce back from disruptions and make them as short as possible offer the best defense.

Page 7 Recording of this session via any media type is strictly prohibited. Questions? Lori Bailey Global Head of Management & Professional Liability Zurich General Insurance 100 High Street, Ste Boston, MA Jason Healey Director, Cyber Statecraft Initiative The Atlantic Council th Street NW, 12 th Floor Washington, DC Please complete the session survey on the RIMS14 mobile application.

Page 8 Recording of this session via any media type is strictly prohibited. The information in this publication was compiled from sources believed to be reliable for informational purposes only. All sample policies and procedures herein should serve as a guideline, which you can use to create your own policies and procedures. We trust that you will customize these samples to reflect your own operations and believe that these samples may serve as a helpful platform for this endeavor. Any and all information contained herein is not intended to constitute legal advice and accordingly, you should consult with your own attorneys when developing programs and policies. We do not guarantee the accuracy of this information or any results and further assume no liability in connection with this publication and sample policies and procedures, including any information, methods or safety suggestions contained herein. Moreover, Zurich reminds you that this cannot be assumed to contain every acceptable safety and compliance procedure or that additional procedures might not be appropriate under the circumstances The subject matter of this publication is not tied to any specific insurance product nor will adopting these policies and procedures ensure coverage under any insurance policy. © 2014 Zurich American Insurance Company