1 e-Commerce Risk A Case Study CAS 2000 Annual Meeting David Fishbaum Enterprise Risk.

Slides:



Advertisements
Similar presentations
Copyright, 1996 © Dale Carnegie & Associates, Inc. BANK ON IT Money Smart Course Indiana Department of Financial Institutions.
Advertisements

Chapter 1 Business Driven Technology
Get Started in e-Business. Aim This presentation is prepared to support and give a general overview of the ‘How to Get Started in e-Business’ Guide and.
Crime and Security in the Networked Economy Part 4.
1 Quantifying e-Commerce Risk David Fishbaum, FSA Chuck McClenahan, FCAS MMC ENTERPRISE RISK CAS Seminar on Ratemaking - March, 2001.
1 Presenter Date How to Start Investing Ana Forssman.
INTRODUCTION AS (3.3) Apply business knowledge to address a complex problem in a given global business context.
Lockton Companies International Limited. Authorised and regulated by the Financial Services Authority. A Lloyd’s Broker. Protecting Your Business from.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Are You Prepared? Illinois Small Business Development Center at Harper College The ILSBDC at Harper College is funded in part through a cooperative agreement.
Presenting DFA Results to Decision Makers Spring 2008 Midwest Actuarial Forum.
CST 481/598 Many thanks to Jeni Li.  Potential negative impact to an asset  Probability of a loss  A function of three variables  The probability.
1 Chapter 12 Planning for Electronic Business: Resource and Implementation Issues.
IS Security Control & Management. Overview n Why worry? n Sources, frequency and severity of problems n Risks to computerized vs. manual systems n Purpose.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
1 Supply Chain Management Supplemental to Chapter 6 Partnership (TEC5133)
1 Chapter 12 Planning for Electronic Business: Resource and Implementation Issues.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Coverage for Loans Coverage for Loans Insurance Concepts.
Saving Your Business from a Data Loss Randy Clark.
Topic 5 Function, Purpose and Regulations of Financial Institutions.
Financial Analysis Fundamental
Back to Table of Contents
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Business Administration & Management Mr. Bernstein Insurance and Risk Reduction, pp June 5, 2015.
Commercial Insurance Underwriting University of Illinois Urbana – Champaign Finance 230.
26/08/2015 The Inventors. Companies Compete in 4 Markets… Other Suppliers Customers Capital Talent Company.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
Economics, Ms. Lipsitz. Key Terms ________ is anything that can be used to buy goods and services.
Copies of Presentation Available at
Insurance Coverage for IT Security Breaches International Technology Law Association San Francisco, CA – May 4, 2006 Steven Brower Stephan Oringher Richman.
Non Physical Business Interruption Malcolm Randles, Underwriter, Kiln Syndicate February 2011.
Lesson 13. Give examples of the three main types of business risk – economic, human, an natural Describe the elements of an effective risk prevention.
Revision Lecture Risk Management. Exam There will be 2 and a half questions from the topics operational risk, market risk, foreign exchange risk, interest.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Invitation to Computer Science 5th Edition
IGCSE®/O Level Economics
What to do “After” your IT guy gets hit by a truck! April 1, 2005.
Outsourcing Business Processes ( without In-sourcing the Associated Risks) Gregg Anderson – Crowe Horwath (risk manager) Doug Tripp – Crowe Dunlevy (outsourced.
The adjuster’s casebook What does this look like in practice - some cases to highlight the claims issues but from a perspective of commercial claims.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Overview of Financial Management. OVERVIEW OF FINANCIAL MANAGEMENT The Corporation Life Cycle Value Creation & Maximization Financial Institutions & Process.
Entrepreneurship Mr. Bernstein Identifying Business Risks, pp , and Dealing with Risks, pp January 8-9, 2015.
Why Businesses Fail & How To Avoid It  Recognizing the Warning Signals  Analyzing Your Critical Risks.
Overview: Electronic Commerce Electronic Commerce, Seventh Annual Edition.
The DR Datacentre - is there a more Cost-Effective way? Dennis Adams a s s o c i a t e s UK Oracle User Group Conference 2007 Dennis Adams 3rd December.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Management Information Systems, 3 rd Edition Effy Oz 1 Chapter 11 EDI, Supply Chain Management, and Global Information Systems.
ENTERPRISE RISK MANAGEMENT
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Financial Managers Gio Perazo. Job Description The duties of financial managers vary with their specific titles, which include controller controller treasurer.
Moderator Robert F. Wolf, FCAS, MAAA Principal, William M. Mercer, Incorporated/MMC Enterprise Risk Consulting Panelists: Moderator Robert F. Wolf, FCAS,
 RISK  Variety of meanings for risk in business and our day today life.  Risk is used to describe any situation where there is uncertainty about what.
The Business Research Company Technology. Technology Industry Taxonomy TBRC Business Research. All Rights Reseserved 2 Technology Computer Hardware &
Expectations of the Financial Service Sector “How is Social Responsibility reporting being tied to shareholder value, and with what success?” “How is Social.
Managing Your Money Saving Investing Insurance CHAPTER 12.
ENTERPRISE AS Business Studies. Business Activity... What is Business Activity? Meeting the “needs” of customers What is the “purpose” of business activity?
Slide 1 Software Construction Software Construction Lecture 3.
References: Supply Chain Saves the World. Boston, MA: AMR Research (2006); Designing and Managing the Supply Chain – Concepts, Strategies and Case Studies;
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Business Technology Mr. Bernstein Greene, pp : Insure Against Risks January 15, 2013.
Cyber Insurance Overview July 30, 2016 Wesley Griffiths, FCAS International Association of Black Actuaries.
BUSINESS CONTINUITY BY HUI ZHENG.
Identifying Business Risks, pp , and
Cyber Insurance Overview
Do You Need Home Business Insurance If Run Business from Home
Cyber Trends and Market Update
Managing International Business Risk
Forensic and Investigative Accounting
Presentation transcript:

1 e-Commerce Risk A Case Study CAS 2000 Annual Meeting David Fishbaum Enterprise Risk

2 The Problem zYou’re the risk manager of a financial institution with a new web site zYour insurance broker has provided you a quote for new e-commerce risk insurance coverage: $350,000 - $450,000 with low limits zYour not exactly sure what the risks of the web site are zWhat to do? Enterprise Risk

3 Background zThe financial institution provides community banks with a product portfolio of ancillary products such as: yinvestments (mutual funds and stock trading) yinsurance yother banking services zYou provide web sites for these community banks for investments, insurance and lending Enterprise Risk

4 What are the risks? zFailure of the web site yproblems with the surroundings, power failure, fire or flooding yfailure of the hardware yfailure of the software yattack through virus or computer hacker Enterprise Risk

5 Resultant damages are also varied zDelay in performing a service zLoss of brand value due to unreliability of service or transmission of computer virus zloss of value through failure to deliver yfor example, an uncompleted stock trade Enterprise Risk

6 Background: E-commerce insurance coverage zThere is an intensive application ythe problem is that you can’t figure out how complex or risky a web site you are running zA system audit is part of the insurance coverage ythere is a bias to find fault Enterprise Risk

7 How do you insure the high P/E ratio zIts 1999 and the price/earnings ratio of the e- commerce function seems to have broken down zThe unspoken issue is how do you insure the value lost if something happens to the web site? zNot sure this is an issue today Enterprise Risk

8 Why bring in Actuaries? zLooking for someone to quantify the risk zWe brought a multidisciplinary team of actuaries, economists and policy expert zThe actuaries provided the quantification and modeling skill sets Enterprise Risk

9 Methodology zModel the web site zStochastic testing zScenario testing Enterprise Risk

10 Model zMMC ER developed a computer program to model the economic performance of the e- commerce infrastructure zUsed company’s performance statistics zUsed a monte carlo simulation to produce expected revenue and branding values zBased on this quantification, valued the potential losses of a series of scenarios Enterprise Risk

11 Application Server/Firewall/Proxy Layer ISP Provider In our estimation of the probability of failure at the application host level, elements such as software outage, hardware outage, data base performance etc were considered. Flow of Information and quantification of failure probabilities

12 Assumptions zVisits per week zUsage over the week zRevenue zCustomer value zApplication acceptance zDowntime Enterprise Risk

13 Results-Base Case Enterprise Risk

14 The Scenarios zDenial of service zPhysical damage to hardware location zNew virus brings down complete system zMalicious employee zThreats/extortion zTheft of credit card numbers Enterprise Risk

15 The Scenarios zAttack causes a degradation of performance or loss of service to web site zNot covered under current coverage zModeling assumption: site down for 3 hours zIncome loss/Customer value loss Denial of service Enterprise Risk

16 The Scenarios zLocation of where hardware is kept is disabled zCovered under current insurance zModeling assumption: site down for 10 days zIncome loss/Customer value loss zClient bank’s lost revenue Physical damage to hardware location Enterprise Risk

17 The Scenarios zNot covered under current coverage zModel assumption: system down for 2 days zIncome loss/Customer loss New virus brings down complete system Enterprise Risk

18 The Scenarios zDestruction of important data or programs zCost of recovery process covered under current coverage zNot modeled zTheft of policyholder info or other intangible property zNot covered under current coverage Malicious Employee Enterprise Risk

19 The Scenarios zThreat to commit a computer crime or to use information gained from a computer crime in exchange for money, personal gain or to embarrass the company zWould be covered under current kidnap and ransom policies Threats/extortion Enterprise Risk

20 The Scenarios zCD universe and Salesgate (e-mall) zNo credit card numbers are stored Theft of credit card numbers Enterprise Risk

21 Results of analysis zBiggest risk business interruption zThird party loss is minimal at this time though in time the Internet will affect its client relationship Enterprise Risk

22 Conclusions zBetter quantification of risks zBetter able to make a purchase decision zOther risk management decisions zWhat isn’t at risk is also important Enterprise Risk

22 Postscript zThe Website is still in operation zStrategy has been proven successful Enterprise Risk

23 Causes for stock drops - MMC Research zInvestigated risk factors behind the 100 largest one month drops in shareholder value amongst Fortune 1000 companies between zFound top 100 stock drops zIdentified triggering event zDetermined causes of triggering event zCategorized primary cause zAnalyzed results and implications Enterprise Risk

24 Causes for stock drops - Fortune 1000 group % of top 100 Enterprise Risk Cost Overruns Accounting irregularities Manage- ment ineffective- ness Supply Chain Issues Competitive Pressure M&A Integration Problems Mis- aligned Products Customer Pricing Pressure Loss of Key Customer Supplier Problems R&D Delays Customer Demand Shortfall Regulatory Problems StrategicOperationalFinancialHazard Foreign Macro- Economic Issues Interest Rate Fluct- uation High Input Comm- odity Price Law- suits Natural Disasters 58%31%6%0% Risk Event Precipitating Stock Drop (# of Companies)