The Economics of Cybersecurity Allan Friedman Research Director, Center for Technology Innovation Fellow, Governance Studies Brookings Institution

Slides:



Advertisements
Similar presentations
Institutional Investors and Long Term Investment Juan Yermo Financial Affairs Division Directorate for Financial and Enterprise Affairs.
Advertisements

Archiving research data in the cloud or in a local repository Michele Kimpton, CEO DuraSpace CNI Dec 2014.
The ROLE of the ACTUARY in INSURANCE PRUDENTIAL SUPERVISION Yangon, Myanmar 14 July 2014 Chi Cheng Hock, FFA.
Security, Privacy, and the Protection of Personally Identifiable Information Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
2003 ACSDA SEMINAR CREATING A STRENGTHENED, INTEROPERABLE GLOBAL CENTRAL SECURITIES DEPOSITORIES NETWORK WHICH MITIGATES RISK AND IMPROVES GOVERNANCE Johannesburg,
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Recent Trends and Insurance Considerations March 2015
Executive Summary: Combating Foreign Commercial Cyber Espionage Evan Morris George Mason University November 20, 2013.
1 Federal Communications Commission Public Safety and Homeland Security Bureau NARUC Summer Committee Meetings Dallas, Texas July 13, 2014 Clete D. Johnson.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
How to Do Well In This Class 1.Spend enough time on the assignments and articles so that you feel comfortable with the topic. - this does not necessarily.
Center for International Private Enterprise © 2003 Combating Corruption Anti-Corruption Initiatives from a Business View Point July 14, 2003 The Center.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
© 2003, EDUCAUSE/Internet2 Computer and Network Security Task Force Computer Access, Privacy and Security: Legal Obligations and Liabilities Rodney J.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
The Private Sector’s Role in Disasters: Leveraging the Private Sector in Emergency Management - Preparedness, Response, Recovery, and Mitigation. WEBINAR.
CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © 2014 CUNA Mutual Group, All Rights Reserved. Understanding Cyber Insurance.
Copyright© JSE Limited The Role of Technology in Market Development “African Capital Markets: The Next Investment Frontier” Accra, Ghana,
Goethe Business School Global Economic Environment Paul Bernd Spahn.
Todor Tagarev, Zlatogor Minchev, Nataliya Ivanova IT for Security Department, Institute of ICT, Bulgarian Academy of Sciences October 1-2, 2012 Sofia,
Cyber Security Nevada Businesses Overview June, 2014.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
© 2002 ̶ 2014 Herrmann Global, LLC Better Thinking. Better Performance. Better Results.
1 st Seminar Session on Risk and Security Issues Center for Risk and Security The George Perkins Marsh Institute Conference Room May 13 th, 2005.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Building a Workforce Development Community: A Practitioners’ Forum Investment, Accountability, and Impact Brian S. Lyght The Annie E. Casey Foundation.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
© ESD 2003 IRIS KYOTO Achieving Carbon Finance: Carbon Funds and key issues (Including European Emissions Trading Scheme) Jeremy Doyle ESD, UK European.
The Big Picture: Hospitals in a Volatile Healthcare Environment James Bentley, Ph.D. Senior Vice President for Strategic Policy Planning American Hospital.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
Final Exam Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed Closed book No calculator Students should show.
Insurance from a Corporate Perspective Chartered Institute of Management Accountants 28 July 2015.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
Matt Foushee University of Tulsa Tulsa, Oklahoma Cyber Insurance Matt Foushee University of Tulsa Tulsa, Oklahoma.
Information Warfare Playgrounds to Battlegrounds.
New A.M. Best Cyber Questionnaire
Weaving Security Blankets Make your own bespoke defensive toolkit Presentation by Max Cizauskas For BSides Toronto 2015.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Article 82 and Structural Remedies After Microsoft International Competition Forum St Gallen May, 2008 Dr Philip Marsden Director and Senior Research.
Implementation of Insurance Core Principles and FSAP Evaluations The Portuguese FSAP experience Gabriel Bernardino Instituto de Seguros de Portugal.
EMPIRICAL RESEARCH RELATED TO ECONOMIC ASPECTS OF CYBER/ INFORMATION SECURITY: Concerns and Potential Solutions by Dr. Lawrence A. Gordon E rnst & Young.
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
June 12, 2014 Morristown, New Jersey Melissa J. Krasnow, Partner, Dorsey & Whitney LLP and Certified Information Privacy Professional/US
The Community Cloud Don Welch Merit Network. Definitions l My Definition: Shared Services above the campus l Elastic demand can be very deliberate l Can.
Investment Funds, Markets Liquidity and the Investor Financial Risks International Forum Paris Europlace Institute of Finance 21 March 2016 David Lawton,
HCS 430 Week 1 Individual Article or Case Law Search Find an article or a current legal case that involves one of the following issues: · A critical regulatory.
Financial Services Laws General Amendment Bill
Cyber Insurance Risk Transfer Alternatives
Information Security Program
New A.M. Best Cyber Questionnaire
Liberty International Underwriters
French Port Cybersecurity Initiative
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
Software Assurance Security Issues
CSEC 620 Innovative Education--snaptutorial.com
David Sayago EU Research Funding Team Valorisation Centre.
سياسة الإفصاح والشفافية ببنك التنمية الصناعية
Cyber Risk & Cyber Insurance - Overview
6th Framework Programme
TRAILS TO 2°C FINANCIAL MARKETS
Chapter 1 Iron Law of Public policy? Types of government policies?
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
Technology Solutions Cybersecurity Report to the KCTCS Board of Regents March 14, 2019.
ECONOMIC SECURITY COMPONENT OF CIP: Roles of Industry and Government U
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

The Economics of Cybersecurity Allan Friedman Research Director, Center for Technology Innovation Fellow, Governance Studies Brookings Institution

1 Uh oh…

2 Topics discussed in Economist cover article Critical Infrastructure Economic Espionage Intelligence Community Cyber Terrorism Cyber Crime Military Strategy US Law & Policy International Law & Policy Technology Issues Distribution of paragraph by topic Economist, July

3 “cybersecurity”

4 “cybersecurity”

5 “cybersecurity”

6 “cybersecurity”

7 Need to disambiguate

8 Scale

9 Urgency

10 Risk Evaluation

11 Framing Matters

12

13

14 Who pays?

15 Asymmetric Information

16 Externalitie s

17 Insurance

18 Market demand for transparency “…not aware that investors have asked for more disclosure in this area”

19 Transparency vs. Accountability

20 Data Breaches

21 Network Effects

22 “Cloud computing”

23 The weakest link

24 Risk

Questions? Comments? Allan Friedman

26 Regulatio n Regulatory Spectrum Laissez Faire Mandated Standards Liability Standards & Practices Purchasin g Power