Cyber Insurance Collecting and Storing Cyber attack data using a Cyber Security Surveillance System (CS3) Presenter: Kasturi Balakrishnan.

Slides:



Advertisements
Similar presentations
Recommending a Strategy Ideas for Today and Tomorrow.
Advertisements

Economic Incentives to Increase Security in the Internet: the Case for Insurance Marc Lelarge (INRIA-ENS) Jean Bolot (SPRINT) IEEE INFOCOM, Rio 2009.
“ Strategic and Scenario Planning: Financial Considerations ” 2012 Winter Grazing Conference January 21 st, 2012 Barry Dunn South Dakota State University.
Example Case Analysis Western Chain Saw. Steps in Analyzing Case Analyze and Record the Current Situation –Threats, Opportunities –Strengths, Weaknesses.
Chapter 1: The Context of SA&D Methods
Western Chain Saw Case Analysis. Steps in Analyzing Case Analyze and Record the Current Situation –Threats, Opportunities –Strengths, Weaknesses Identify.
ORIGINAL SWISS ETHICAL HACKING Your texte here … © High-Tech Bridge SA, Geneva, Switzerland – Combating cybercrime: efficiency or.
Understanding the Security Vulnerability Assessment Copyright Jean Perois, CPP, PSP, FSyI.
Global Trends and Current Problems Natalia V. Kozykina, Ksenia G. Muratshina, Ural Federal University, chair of International Relations Theory and History.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
1 DHS Bioterrorism Risk Assessment Background, Requirements, and Overview DHS Bioterrorism Risk Assessment Background, Requirements, and Overview Steve.
AGSM 440 April 5 AnnouncementsAnnouncements HW#12 team peer review due today HW#12 team peer review due today Final draft of the Economic Analysis due.
SECURITY WG Paul Howell, Eric Boyd Internet2 © 2015 Internet2.
<Idea Title> Students : XXX, YYY (University)
Copyright © 2015 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Managing Risk BONUS CHAPTER C.
Reginald Greene II  Key goal of the Affordable Care Act – to decrease the number of the uninsured.   Major issue in this case – business L heard about.
People, Public, Private Partnership to Mitigate the Risk and Ensure Financial Security Alok Shukla.
Mark Estberg, John Howie Senior Directors Microsoft Corporation SESSION CODE: SIA317.
PAGE Intelligence Meets Vulnerability Management NYC ISSA January 24, 2013.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Manage Your Risk Utilizing Collaborative Partnerships to analyze, simplify, compare & strategize.
Insert: Title of Improvement Read Out Date:. 2 Objectives for Today’s Session Share results of improvement effort Demonstrate fact-base, analytical approach.
E-Privacy in the New Economy Conference, Hong Kong, 26 March PRIVACY IMPACT ASSESSMENT PIA: Some Approaches, Issues and Examples Blair Stewart Assistant.
Minion Problem Solving Oct- 7th. Write down 3 examples of problems you encounter in any aspect of life. Examples:  5(-3x - 2) - (x - 3) = -4(4x + 5)
Principles of Marketing Lecture-11. Summary of Lecture-10.
Problem Solving: Skill 5 – Make a Plan. 2 Problem Solving Skills Skill 1 – Stop and Think Skill 2 – State the Problem Skill 3 – Set a Goal and Gather.
Six Sigma Overview Presented by: >. Agenda What is Six Sigma? History of Six Sigma Six Sigma Methodology When to use Six Sigma? Different Six Sigma belts?
1 Problem Solving Skills PCBN Pacific Coast Business Networking July 8, 2015.
November 11, 2003 Cyber Hurricane The Current State Of Play The Current State Of Play Harrison Oellrich Harrison Oellrich Managing Director Managing Director.
Problem Solving: Application. 2 Homework Review Identify two problem situations Then identify your risk thoughts, feelings, and attitudes and beliefs.
Institutional affiliation Date.  Security is very important as it keeps your secret from other know.  An insecure network exposes a business to various.
Mgmt.101 ~ Introduction to Business Risk Management & Insurance.
Defense Security Service Joint Industrial Security Awareness Council March 20, 2015.
1 Sean Davin Cyber and Defence Director. Solution 2 Nemesis – a “SOC In A Box” Security Operations Centre as an offline service for SMEs.
The Scientific Method Applied to an Ecological Problem.
PROBLEM SOLVING. STEPS IN PROBLEM SOLVING  Problem Definition.  Problem Analysis.  Generating possible Solutions.  Analyzing the Solutions.  Evaluation:
Collaboration Network in Healthcare E-RISE 2011 By Yudistira Asnar, Federica Paci (UNITN) May 13, 2011.
PRESENTATION TOPIC TRACKING ENTERPRISE RISKS AND LEARNING BY TRACKING.
What Is Ethics Review. In Groups More than 33 million people today have HIV and risk contracting AIDS if they do not receive effective inhibitor medications.
CREATIVITY AND THE BUSINESS IDEA Chapter : 05 CREATIVITY AND THE BUSINESS IDEA
TruSTAR Sensitive & Proprietary Cloud CISC: Cyber incident exchange and collaboration February, 2016 “We cannot solve problems with the same thinking we.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Calgary Computer Security Solutions
Actuarial Review of Emerging Risks
Security: Reducing Risk
Learning in Design and Technologies
Fiduciary Liability Insurance Market Update April 28, 2004
Risk management Giovanni Seppia wwTLD meeting
<Project Name> <Name> SOLUTIONS / COUNTERMEASURES
Figure 3: TSN Analysis Methodology
Surveillance. Public Health Approach Surveillance What is the Problem ? Problem Risk Factor Identification : What Is the Cause ? Intervention Evaluation.
ESSENTIALS OF A PHYSICAL SECURITY SYSTEMS RISK ASSESSMENT
cyber insurance Tom Wilson Chief Risk Officer, Allianz SE
“Deep Dive” (your company name)
tick-tock taxi: uber disrupts the industry
Chapter 3.1 The Business Plan!.
THE SAFE HARBOR STATEMENT UNDER THE US PRIVATE
When do we make decisions?
3 questions = 4% of the exam
Final Conference 18 Set 2018.
Effective Risk Management in Decision Making Process
Health 10/29/18.
DEALING WITH PROBLEMS AND CONFLICTS
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Catastrophes Insurable vs. Non-Insurable Catastrophes
DEALING WITH PROBLEMS AND CONFLICTS
Ken Sochats/ Threat Potential Modeling
World-Leading Research with Real-World Impact!
CS 514 Class presentation template [Replace it with the title of your project] Xiaowei Yang.
Presentation transcript:

Cyber Insurance Collecting and Storing Cyber attack data using a Cyber Security Surveillance System (CS3) Presenter: Kasturi Balakrishnan

Problem Statement There is no silver bullet for security. All risks cant be mitigated by the best security measures. The lack of actual data for cyber attacks deters risk analysis of cyber threats. Consequently makes risks uninsurable and high premium.

Objective of Research Evaluate the collection of actual cyber attack data by a collaborative surveillance system for cyber threats on the lines of a Public Health Surveillance System(PHSS) Source:

Today’s Situation In the last decade the cyber insurance market had a slow growth but is picking up The increased frequency and sophistication of attacks makes risks inevitable Most models currently used as predictive in nature.

Proposed Solution Build a Cyber Security Surveillance System (CS3) collaboratively Solution evaluates 5 aspects of CS3  Need for a surveillance system  Data feed into a CS3  Potential sources of data  Issues in building a CS3  Recommendations for solving encountered issues