MMC Cyber Handbook 2018
MMC Cyber Handbook 2018
HANDBOOK 2018
Perspectives on the next wave of cyber
FOREWORD
Cyber risk continues to grow as technology innovation increases and societal dependence on
information technology expands. A new and important turning point has been reached in the
struggle to manage this complex risk. In the war between cyber attackers and cyber defenders,
we have reached what Winston Churchill might call the end of the beginning.
Three characteristics mark this phase shift. First, global cybercrime has reached such a high
level of sophistication that it represents a mature global business sector illicit to be sure,
but one which is continually innovating and getting more efficient. In 2017 we have
experienced the widespread use of nation state-caliber attack methods by criminal actors.
Powerful self-propagating malware designed to destroy data, hardware and physical systems
have caused major business disruption to companies worldwide with an enormous financial
price. The number of ransomware attacks has also spiked significantly. More attack incidents have
impact extending beyond the initial victims with broad systemic ripple effects.
Second, business and economic sectors have high and growing levels of dependency on IT
systems, applications and enabling software. Growth in connectivity between digital and physical
worlds, and the acceleration in commercial deployment of innovative technologies like
Internet of Things (IOT) and Artificial Intelligence (AI) will expand potential avenues for
cyberattack and increase risk aggregation effects. These changes will make the next phase of
cyber defense even more challenging.
The third shift is the rising importance of coordination among institutions governments,
regulatory authorities, law enforcement agencies, the legal and audit professions, the
non-government policy community, the insurance industry, and others as a critical counter
to the global cyber threat. Cyber risk defense can only be effective if these groups share a
common understanding of the changing nature of the threat, their importance and increased
interconnected nature. Working individually and in concert, these groups can increase our
collective cyber resilience. We are beginning to see expectations converge in areas such as
increased transparency, higher penalties for failure to maintain a standard of due care in cyber
defense, improved incident response, and an emphasis on risk management practices over
compliance checklists. It will be vital for this trend to continue in the next phase.
Against this backdrop, the 2018 edition of the MMC Cyber handbook provides perspective
on the shifting cyber threat environment, emerging global regulatory concepts, and best
practices in the journey to cyber resiliency. It features articles from business leaders across
Marsh&McLennan Companies as well as experts from Microsoft, Symantec, FireEye and Cyence.
We hope the handbook provides insight which will help you understand what it takes to achieve
cyber resiliency in the face of this significant and persistent threat.
John Drzik
President, Global Risk and Digital
Marsh & McLennan Companies
WAKE UP TO THE SHIFTING
CYBER THREAT LANDSCAPE
CONTENTS Threat Trends on Major Attacks in 2017
p. 5
The Growing Waves of Cyber Regulation Deploying a Cyber Strategy Five Moves
Paul Mee and James Morgan Beyond Regulatory Compliance
p. 36 Paul Mee and James Morgan
p. 54
Regulating Cybersecurity in the New York
Financial Services Sector Quantifying Cyber Business
Aaron Kleiner Interruption Risk
p. 40 Peter Beshar
p. 60
The Regulatory Environment in Europe is About
to Change, and Profoundly Cybersecurity: The HR Imperative
FireEye | Marsh & McLennan Companies Katherine Jones and Karen Shellenback
p. 43 p. 61
Cybersecurity and the EU General Data Limiting Cyberattacks with a System Wide
Protection Regulation Safe Mode
Peter Beshar Claus Herbolzheimer
p. 46 p. 63
THREAT TRENDS ON
MAJOR ATTACKS
BREACHES RANSOMWARE
Average identities
exposed per breach Ransomware
805 K 466 K 927 K families
Breaches with 30 30 101
more than 10 million 11 13 15
identities exposed
Average
ransom
In the last 8 years more than amount
7.1 BILLION identities have $373 $294 $1,077
been exposed in data breaches
MOBILE CLOUD
Source: Symantec
5
MMC CYBER HANDBOOK 2018
INDUSTRIES IMPACTED
BY CYBERATTACKS
Percentage of respondents in industry that
have been victims of cyberattacks in the
past 12 months
6
MMC CYBER HANDBOOK 2018
EVOLUTION OF C
yberattacks have escalated in scale over the
last twelvemonths. The progression of events
has demonstrated the interconnectedness
SYSTEMIC
cyber insurance, then this years events have proven
the need for insurers to quantify and model their
exposure accumulations and manage tail risk.
EXPOSURES
These recent events have a different texture and
a broader impact/reach than the incidents we have
grown accustom to seeing over the past decade. A
certain trend towards awareness of systemic risk has
emerged among cyber insurance markets and their
George Ng and Philip Rosace regulators. Exposure modeling around accumulation
MMC CYBER HANDBOOK 2018 WAKE UP TO THE SHIFTING CYBER THREAT LANDSCAPE
exposures such as cloud infrastructure and widely used technologies is advancing. The 2017 Lloyds
Emerging Risk Report Counting the costs: Cyber risk decoded, written in collaboration by Cyence and
Lloyds, models losses from a mass cloud service provider outage to have potential for $53 billion
in ground up economic losses, roughly the equivalent to a catastrophic natural disaster like 2012s
Superstorm Sandy.
Cyences economic cyber risk modeling platform collects data to quantify systemic risks and assess
economic impact to portfolios of companies. It is essential to evaluate the variety of commonalities
among companies to identify any nonobvious paths of aggregation that could be a blind spot.
The Web Traffic by Sector chart shows a sector breakdown of internet usage. Software and technology
companies, unsurprisingly account for a majority of traffic.
But systemic risk also stems from joint usage of common services within an Internet Supply Chain
including ISPs, cloud service providers, DNS providers, CDN providers, among others. Understanding
the many permutations of these accumulation paths is critical for the insurance industrys enterprise risk
OCTOBER 21, 2016... FEBRUARY 28, 2017... MAY 12, 2017... JUNE 27, 2017...
Dyn Inc.s DNS provider Amazon Web Services An aggressive ransomware New variants of the Petya
services were interrupted by a suffered an outage oftheir campaign was deployed ransomware began spreading
Distributed Denial ofService S3 cloud storage service infecting hundreds ofthousands globally (dubbed NotPetya),
attack of unprecedented forapproximately 4 hours. The of endpoints around the world though most of activity was
strength fromthe Mirai botnet outage impacted some popular since. Theransomware named reported inthe Ukraine. Once
of compromised IoT devices. internet services, websites, WannaCry (AKAWannaCrypt, the malware first infected its
Theattack was said to have and other businesses utilizing Wana Cryptor, wcrypt) targeted host, it then tried to spread 2013
a flood rate of 1.2 Tbps from that infrastructure. The Wall unpatched Microsoft Windows further throughout the local
100,000 infected devices. Street Journal reported that machines using the EternalBlue network using the EternalBlue
Dyns 11-hour outage of their the outage was caused by exploit. Notable victims included exploit, which was used by
DNS lookup services caused human error an employee the National Health Service WannaCry a month prior.
availability issues for users of mistyped acommand causing (NHS) in the United Kingdom, Ukraines Chernobyl Nuclear
Amazon.com, Comcast, HBO, acascading failure that knocked Nissan Motor Manufacturing Power Plan went offline, Indias
Netflix, The New York Times, out S3 and other Amazon UK, andRenault. The Wall Street largest port was brought to
PayPal,Spotify, Verizon, The services. Cyence estimates Journal reported Cyences a standstill, and a number
Wall Street Journal, Yelp, among that companies in the S&P estimate of $8billion in potential of global companies were
many other platforms and 500 dependant on Amazons economic losses due to the impacted including A.P. Moller
services reliant upon Dyn as a services lost approximaterly event arising out of lost income Maersk, WPP, DLA Piper, Merck
DNS provider. $150 million as a result of and remediation expenses to & Co., FedEx, and others.
the outage. organizations withinfected or Reuters reported Cyences
vulnerable systems. $850million ground up loss
estimate from this event.
68% 10% 6% 4%
2%
Business services, Utilities, Hospitality, Manufacturing,
Publishing, Membership organizations
management. The Cloud Usage by Sector chart highlights cloud services usage by sector
and tells a different story than the first chart; We see more widespread and balanced usage THIS YEAR WE STARTED
across a variety of industries instead of one sector dominating. A detailed and thorough TO SEE EARLY VERSIONS
evaluation of these exposures in dollars and probabilities will be essential for re/insurers
OF CYBER HURRICANES
enterprise risk and capital management.
Just as our sea levels and weather patterns change over time, cyber temperatures are
OCCUR SOMETHING
rising and societys technological advances appear to have a hand in it. The last twelve THE MARKET HAS BEEN
months have proven that the types of cyber events observed can change dramatically over CONCERNED WITH FOR
a short period and create a new normal. A few years ago, we were all suffering from breach QUITE A FEW YEARS.
fatigue every week a new retailer, healthcare provider, or financial institution lost their
customers sensitive data. This year we started to see early versions of cyber hurricanes
occur something the market has been concerned with for quite a few years. Like a
natural disaster, these events affected wide swaths of enterprises by failures incommon
points of dependency.
CONCLUSION
So, what is on the horizon to be the next new normal for the cyber world? At Cyence, our
white hats are seeing a lot of new trends, but some areas we see evolving to include
increased exposure to Internet of Things (IoT) exposures, increased ransomware efforts,
and increased regulations. We believe there will be more attacks disrupting GPS and
other geo location systems to cause disruptions in the physical world from supply chains
and marine risks, to consumers reliant on GPS based products. As Bitcoin and other
cryptocurrencies become more widely adopted, we expect to see more frequent and
severe ransomware campaigns like WannaCry and NotPetya. Last, sovereign states
are increasingly seeking regulations on data storage locations to provide governments
with better control over their data. This control is desired for a variety of reasons including
privacy, censorship, and anti-terrorism; compliance will require operational change George Ng, based in San Mateo,
is the CTO and co-founder of Cyence.
by companies, but the variety of cloud resources available can simplify that transition Philip Rosace, based in San Mateo,
forthoseorganizations. is a Senior Solutions Manager at Cyence.
THE DRAMATICALLY
CHANGING CYBER THREAT
LANDSCAPE IN EUROPE
FireEye | Marsh & McLennan Companies
MMC CYBER HANDBOOK 2018 WAKE UP TO THE SHIFTING CYBER THREAT LANDSCAPE
E
urope is being forced to confront a growing warning of lax cybersecurity at nuclear facilities in a
cyber threat against physical assets. Hackers number of countries across Europe.
and purportedly nation states are increasingly Thus, cyberattacks against critical infrastructure,
targeting industrial control systems and networks dubbed a potential Cyber Pearl Harbor by US military
Power grids, chemical plants, aviation systems, officials, are no longer the fantasies of Hollywood
transportation networks, telecommunications systems, producers, conspiracy theorists or sci-fi aficionados,
financial networks andeven nuclear facilities. but are the reality that governments and businesses
In late 2014, the German Federal Office for across Europe must now confront.
Information Security (BSI) reported that a cyberattack
had caused massive damage to a German iron
plant. Utilizing acombination of spearphishing and WHAT EU COUNTRIES ARE BEING
social engineering, hackers gained access to the iron TARGETED WITH THE GREATEST
plants office network, moved laterally to control the FREQUENCY?
production network and then disabled the shut-off Cyber hackers are increasingly opportunistic Smart,
valves on the plants blast furnaces. In the parlance savvy, and innovative. Hackers are bypassing traditional
of the industry, this was a kinetic or physical attack defenses by continually engineering new methods
against hard assets. ofattack. Even sophisticated cybersecurity programs
In late 2015, hackers turned their focus to the are being thwarted, often by targeting weak links in
power industry. In one of the largest attacks of its the chain, including vendors and employees. Due to
kind, hackers shut off the power to hundreds of its advanced economies and important geopolitical
thousands of residents in Ukraine. According to public positioning, Europe is a prime target for these attacks.
reports, the attacks that caused the power outage were
accompanied by parallel cyber intrusions into Ukraines
train system and TV stations. TARGETING OF EU COUNTRIES
In October 2016, the head of the International Europes largest economies remain the top targets, but
Atomic Energy Agency at the United Nations, Yukiya the focus ranges broadly across the continent. Exhibit1
Amano, publicly disclosed for the first time that a shows targeted malware detections from January to
disruptive cyberattack had been launched against September 2016 for all EU nations except Turkey and
a nuclear facility in Germany. This report came on the Russia. (Nations not represented on this chart received
heels ofananalysis by the Nuclear Threat Initiative little or no malware assessments from FireEye). Had
Austria 4% Italy 7%
Denmark 4% Sweden 6%
Norway 4%
Source: FireEye|Marsh & McLennan Cyber Risk Report 2017 Cyber Threats: A perfect storm about to hit Europe?
Exhibit 2: TARGETED MALWARE DETECTION ACROSS EUROPE DURING JANUARY SEPTEMBER 2016
NUMBER OF EVENTS
60
45
30
15
0
Energy Entertainment Financial Government High-Tech Insurance Manufacturing Retail Service Service Telecom Transportation
Utilities Media Services Federal Provider Consulting
Hospitality
Q1 2016 Q2 2016 Q3 2016
Source: FireEye|Marsh & McLennan Cyber Risk Report 2017 Cyber Threats: A perfect storm about to hit Europe?
In addition, governments are a primary target for in Europe have infected approximately 40 different
hackers across Europe. Indeed, aggregating attacks machines in any given company during the length DWELL TIME UNTIL
against national, state and local governments into a oftheir cyber intrusions. A COMPROMISE IS
single category makes government the number one DETECTED
target in Europe.
To date, there has been an underreporting of cyber
incidents in the EU. Nonetheless, a handful of public
reports reveal significant cyber incidents across the
HOW ARE MOTIVES AND
TACTICS CHANGING?
Hackers come in many forms and differing degrees
469
Days in Europe
continent. In 2016, cyber hackers stole more than ofsophistication. In addition to attacks against critical
$75million from a Belgian bank and $50million
from an Austrian aircraft parts manufacturer through
fraudulent emails mimicking legitimate communications
infrastructure, EU cyber threats are dominated by two
distinct groups: hackers with political goals and hackers
with financial motives.
146
Days
to fool companies into transferring money to a Global Average
hackers account.
In sum, no sector of the economy is immune from IS POLITICALLY MOTIVATED HACKING
attack not industry, not government and not even the ON THE RISE?
not-for-profit sector. Accordingly, we need a mindset, In 2016, FireEye observed numerous nation-state or
particularly between government andindustry, that nation-sponsored intrusions against EU governments,
we are all in this together. and specifically against foreign or defense ministries of
member states. Recently, nation-state sponsored threat
actors have shown strong interest in extending these
COMPANIES IN EUROPE attacks into the political arena.
TAKE 3x LONGER TO DETECT In September 2016, politicians and employees of
CYBER INTRUSIONS political parties in Germany were targeted with a series
FireEye found that companies in the European Union of spear phishing e-mails, purportedly from NATO
take three times longer than the global average todetect headquarters, regarding a failed coup in Turkey and
a cyber intrusion. The regions mean dwelltime the the earthquakes that hit Italys Amatrice region. The
time between compromise anddetection was links to these spurious e-mails contained malware.
469 days, versus a global average of 146 days. Arne Schoenbohm, the head of the German BSI,
The delay in identifying intrusions has profound responded swiftly by warning political parties across
consequences. At a basic level, the notion that the spectrum in Germany that the country needed to
hackers are rooting around in companies networks learn the lessons from the recent elections in the
undetected for 15 months is sobering, as it allows UnitedStates.
ample opportunity for lateral movement within In December, the focus shifted to France. Frances
ITenvironments. National Cybersecurity Agency, known as the ANSSI,
Equally important, dwell times of this length summoned representatives of all political parties to
allow hackers the opportunity to develop multiple a detailed cyber briefing about the threat posed
entry andexit doors. When a company does detect by cyberattacks.
an intrusion, the natural first impulse is to shut
down itssystem to stop the bleeding. Numerous
stakeholders then press the organization and its
management team to get back online and operating.
In this dynamic, FireEye has found that hackers
compromised many organizations in Europe a second THE NOTION THAT HACKERS ARE ROOTING
time within months of the initial breach. Repeated AROUND IN COMPANIES NETWORKS
breaches most often result from the use of unsuitable UNDETECTED FOR 15 MONTHS ISSOBERING,
techniques to hunt initially for attacks within their
environment. Many companies still opt for a traditional
AS IT ALLOWS AMPLE OPPORTUNITY
forensic methodology, only analyzing a handful of FOR LATERALMOVEMENT WITHIN
machines or systems. On average, however, hackers ITENVIRONMENTS.
30%
25%
20%
15%
10%
5%
0%
January February March April May June July August September
2015 2016
Source: FireEye|Marsh & McLennan Cyber Risk Report 2017 Cyber Threats: A perfect storm about to hit Europe?
Prior to the recent attacks in the US, few would have instead contained malware. Victims are asked to pay
considered political parties and voting machines as the ransom to obtain a decryption key that will then
part of a nations critical infrastructure. With national unlock their systems. As more criminals successfully
elections looming in the Netherlands (March 2017), carry out ransomware attacks, others are enticed to
France (May 2017) and Germany (late 2017), however, try this growing type of malware attack. This form of
the risk posed to the integrity of the electoral process is attack has been particularly prevalent in the health care
all too real. space, with one report contending that 88 percent of
ransomware attacks target the healthcare industry1.
A
sia is 80 percent more likely to be targeted by EXPANDING SOURCES
hackers than other parts of the world. The OF VULNERABILITY
number of high profile cyber incidents has risen The rapid spread of internet-enabled devices
in recent years, although we assert that the public sees IoT enables new and more efficient modes of
only a sliver of the real impacts of such incidents. communications and information sharing. AsiaPacific,
Reasons for the relatively higher cyber threat in various aspects, leads in the IoT technology:
potential in Asia Pacific (APAC) are twofold: the growing SouthKorea, Australia, and Japan are among the top
speed and scope of digital transformation, and the five countries, reaping the most benefits from IoT,
expanding sources of vulnerability stemming from according to the 2016 International Data Corporations
increasing IoT connectivity. (IDC) Internet-of-Things Index.
Over time, IoT technology will create and add a
significant fleet of digitally-connected devices, most of
ACCELERATING DIGITAL them originating from APAC China, Japan, and South
TRANSFORMATION IN APAC Korea are constantly looking to smartify all possible
Digital transformation the connection of individuals, consumer electronics, for example.
companies, and countries to the Internet has However, higher interconnectivity through the
emerged among the most transformative means to plethora of IoT devices opened up new means of
ignite sustainable growth. This is most evident in APAC attack, according to William H. Sato, Special Advisor
where strong economic growth in recent years has to the Cabinet Office, Government of Japan. In October
been powered by the rapid adoption of Internet and 2016, one of Singapores main broadband networks
mobile technologies. suffered a severe Distributed Denial of Services (DDoS)
Across the region, a few emerging economies have attack, causing two waves of internet-surfing disruptions
accelerated their digital transformation so rapidly that over one weekend. Investigations revealed the security
they have bypassed certain various stages of technology vulnerability was exposed through compromised IoT
development just over the past few years many people devices, such as customer-owned webcams and routers.
across several Asian countries have leapfrogged from not Such smaller personal IoT devices areincreasingly
having any Internet access at homes to owning multiple targeted since they potentially provide a backdoor into
mobile devices and accessing the Internet. For example, more robust security systems.
estimates from The World Bank indicate 22percent of
Myanmar is now online, compared to less than 2percent
in 2013, opening abundant opportunities for the WEAKER CYBER RISK
domestic consumer market. MITIGATION EFFORTS
In Indonesia, meanwhile, mobile device subscription Despite the ever-present and ever-growing cyber threat
rates were estimated to be higher than the rest of potential in APAC, companies in the region appear less
Asia in 2015 (132 percent vs. 104 percent). The high prepared. A lack of transparency has resulted in low levels
subscription rate was one key driving force propelling of awareness and insufficient cybersecurity investments.
the domestic mobile-money industry annual
e-money transaction values in Indonesia grew almost
to Rp5.2 trillion ($409million) in 2015 from Rp520
billion ($54.7million) in 2009.
Unfortunately, there remains a huge gap in
SURVEY CONDUCTED BY ESET ASIA IN 2015
cybercrime legislations in these countries the lack of REVEALED THAT 78 PERCENT OF INTERNET
awareness and knowledge of basic security makes most USERS IN SOUTHEAST ASIA HAVE NOT
online transactions highly susceptible to digital theft. RECEIVED ANY FORMAL EDUCATION
While the breakneck speed of digital transformation
is generally good news, safeguards must be in place
ON CYBERSECURITY, HIGHLIGHTING
alongside to protect users and sustain the burgeoning THAT MOST PEOPLE IN THE REGION ARE
digital business. OBLIVIOUS TO THEIR CYBER VULNERABILITIES.
In 2015/2016 In 2020
Greater interconnectivity
among 4G mobile devices 1 BN
connections
4.7 BN
almost (49%) of the
increase attributed to APAC
Top broadband
(internet) speed 5.6 Mbps
global average
27 Mbps
South Korea
Exponential growth in
IoT market revenue $656 BN $1.7 TN
APAC accounts for the largest
share of traffic (47%)
China and Japan alone account for a quarter of global revenue, followed by the US
TAIWAN
16 ATM thieves installed three
different malware programs
into ATMs to steal more
than $2 million
VIETNAM
Introduced the Law on Cyber Information
MALAYSIA Security in July 2016, although there are
Introduced Personal Data Protection questions about what constitutes compliance
Regulations in 2013 but only came for many of the standards
into effect in December 2015,
with penalties of up to US$70,000
INDONESIA
No general law on data protection, although
discussions of a draft bill have been in progress
SINGAPORE for over a year
Introduced the Personal Data Protection Act
(PDPA) in 2014 that has a penalty of up to
$800,000
Singapores central bank, the Monetary AUSTRALIA
Authority of Singapore, requires that financial The Privacy Amendment (Notifiable
institutions notify it of any adverse Data Breaches) Bill 2016 was enacted
development Events that could lead in February 2017
to prolonged service failure or disruption,
or any breach of customer information Australian organizations will now have
New standalone Cybersecurity Act to publicly disclose any data breaches,
to be enacted in 2017 to report with penalties ranging from $360,000
incidents and proactively secure for responsible individuals to $1.8 million
critical information infrastructure for organizations
CYBER RISK
ASIA-PACIFIC IN NUMBERS
THE SEVERITY RECENT EXAMPLES IN ASIA
OF CYBERATTACKS
stolen from cyberattack
$81
Hackers are 80% MILLION on a bank in Bangladesh
more likely to attack in May 2016
organizations in Asia
Philippine government
Cyberattacks are ranked 5th 68 websites simultaneously
among Asian top risks and 6th hacked in July 2016
Asian firms spent 47% less on Primary insurers are reluctant to provide
information security single coverage above $100 million
than North American firms
20
MMC CYBER HANDBOOK 2018
D
oes the Equifax data breach mean that existing processes for confirming the
identity of customers no longer work? Equifax, a leading US credit bureau, has IF ORGANIZATIONS
announced that it suffered a data breach resulting in the exposure of critical FAIL TO PROTECT THEIR
personal and financial data for 143 million Americans. The implications for the affected
consumers are profound. While their credit cards can be re-issued with new numbers, their
CUSTOMERS, THEY WILL
legal names, addresses, social security numbers, and birthdates cannot. EXPOSE THEMSELVES
Equally profound are the implications forcompanies who use information stored by TO LEGAL ACTION AS
credit bureaus as a mechanism for confirming the identity of new andreturning customers. WELL AS POTENTIALLY
At many companies, standard procedures for confirming customer identity involve asking
PUNITIVE RESPONSES
for the last four digits of a social security number (SSN). The safety of this procedure is now
in question and it is reasonable to assume that all these SSNs are now in circulation among
FROMREGULATORS.
fraudsters and for sale on the dark web.
Other standard procedures for confirming identity require the consumer to answer
challenge questions based on the content of their credit files. For example, a consumer
may be asked whether or not they took out an auto loan during the last six months; and if so,
for what type of vehicle. Or, they might be asked to confirm aprior address. These methods
are now far less safe as the underlying information has been hacked. In fact, there is a real
question as to which commonly used identity-confirmation processes are still viable.
Banks, mortgage companies, insurance companies, asset managers, telecommunication
companies, medical and health companies, hospitals and other organizations hold critical
information on their customers, and often their money. These organizations arguably
have a moral and fiduciary obligation to prevent fraudsters from obtaining data and using
it to takeover accounts or open new accounts fraudulently. If organizations fail to protect
their customers, they will expose themselves to legal action as well as potentially punitive
responses fromregulators.
In this challenging new world, we see three imperatives for chief risk officers, chief
security officers, heads ofcompliance and line of business leadership.
regarding data breaches, even this approach could be challenged, especially in light of
ongoing innovation by fraudsters and other bad actors. A COMPREHENSIVE
Another complexity and practical challenge is that many organizations only encrypt REEVALUATION OF
and protect key data items such as SSNs in their systems, and dont protect the information
that they will now need to use to confirm identity. A comprehensive reevaluation of what
WHAT INFORMATION
information is deemed sensitive and critical across databases and customer support IS DEEMED SENSITIVE
systems needs to be performed and the means determined to protect this information from AND CRITICAL ACROSS
leakage or unauthorized access. DATABASES AND
Today, many organizations use two-factor authentication as a mechanism to protect
against account takeover attempts, phishing, and other fraudulent activities. The most
CUSTOMER SUPPORT
common approach is to leverage a customers mobile phone and a text message to SYSTEMS NEEDS TO BE
confirm identity. It is worth noting that the information that was likely released in the PERFORMED AND THE
Equifax breach (and others) could also be in use supporting identity processes by mobile MEANS DETERMINED
phonecompanies.
TO PROTECT THIS
Using text messages has always been of dubious merit. Mobile phone companies have
themselves had difficulty preventing fraudsters from getting control of their customers
INFORMATION
phones. Given the Equifax breach, the use of text messages to support two-factor FROM LEAKAGE OR
authentication processes needs to be re-examined and alternative approaches implemented. UNAUTHORIZED
One potential new tool that companies can leverage to confirm identity are biometrics, ACCESS.
although their use as a primary mechanism to confirm identity is still in question given the
numerous examples of mobile phone fingerprint readers being spoofed by fakes. Emerging
capabilities to perform facial recognition and iris scanning via mobile phones are worth
watching to see how they can be leveraged but wont address immediate challenges of
confirming identity.
LESSONS FROM
WANNACRYPT AND
NOTPETYA
Tom Burt
MMC CYBER HANDBOOK 2018 WAKE UP TO THE SHIFTING CYBER THREAT LANDSCAPE
O
n May 12th, 2017, the world experienced the entire software platform, including constant updates to
malicious WannaCrypt cyberattack. Starting our Advanced Threat Protection service to detect and
first in the United Kingdom and Spain, the disrupt new cyberattacks. With respect to WannaCrypt
WannaCrypt malware quickly spread globally, blocking and NotPetya, Microsoft released security updates
users from their data unless they paid a ransom. The in March of 2017 that addressed the vulnerability
antecedents of this attack occurred when criminals exploited by the attacks. But we have not stopped
used exploits reportedly stolen from the U.S. National there. Microsoft has been assessing their characteristics
Security Agency (NSA) to develop this malware. By the with the help of automated analysis, machine learning,
first week, 45,000 attacks in nearly 100 countries were and predictive modeling, and then using those
attributed to WannaCrypt, with 45 British hospitals and lessons to constantly improve the security for all of our
other medical facilities being some of the hardest hit. customers.
On June 27th, 2017 just six weeks after These attacks also demonstrate the degree to which
WannaCrypt the NotPetya cyberattack began in the cybersecurity has become a shared responsibility
Ukraine and quickly spread globally by exploiting between technology companies and customers. In
the same stolen vulnerability used in the WannaCrypt particular, WannaCrypt and NotPetya are powerful
attack. This new attack, which in the guise of reminders that information security practices like
ransomware hid malware designed to wipe data from keeping systems current and patched must be a high
hard drives, also had worm capabilities which allowed responsibility for everyone, and it is something every
it to move laterally across infected networks, with top executive should support. Millions of computers
devastating consequences. In Ukraine, for example, were running terribly outdated software or remained
workers at the Chernobyl nuclear plant were forced unpatched months after Microsoft released its March
to manually monitor nuclear radiation when their updates, leaving them vulnerable. In fact, over
computers failed. 10percent of the computers that were successfully
attacked were running Windows XP which was
originally released in 2001. And, no fully-up-to-date
THREE KEY LESSONS TO SURVIVE Windows computer was successfully penetrated. As
THE NEXT WANNACRYPT cybercriminals become more sophisticated, there is
There are three lessons from WannaCrypt and NotPetya simply no way for customers to protect themselves
with relevance for technology companies and their against threats unless they update their systems.
customers, as well as our technology-dependent Finally, these attacks provide additional proof of
societies. First, technology providers like Microsoft why the stockpiling of vulnerabilities by governments
must continue to improve our own capabilities and is such a problem. This was an emerging pattern
practices to protect our customers against major in 2017. As an example, vulnerabilities stored by
cyberattacks. Second, technology companies and intelligence agencies were showing up on WikiLeaks,
their customers must understand that cybersecurity and vulnerabilities reportedly stolen from the NSA have
is a shared responsibility, and that each stakeholder affected technology users around the world. Exploits in
must take the actions necessary to improve security the hands of governments have leaked into the public
in the online ecosystem. Finally, governments must domain and caused widespread damage, including
come together, along with technology companies the most-recent example of an NSA contractor who
and civil society groups, to pave the way for a new compromised sensitive hacking tools by placing
Digital Geneva Convention that will establish information on his home computer. As Microsofts
new international rules to protect the public from
peacetime nation-state threats in cyberspace.
Technology companies have an increasing
responsibility to strengthen their customers TECHNOLOGY PROVIDERS MUST CONTINUE
security. Microsoft is no exception. With more than
3,500 security engineers, Microsoft is working
TO IMPROVE OUR OWN CAPABILITIES AND
comprehensively to address cybersecurity threats. PRACTICES TO PROTECT OUR CUSTOMERS
This includes new security functionality across our AGAINST MAJOR CYBERATTACKS.
President, Brad Smith, explained immediately after the and governments to investigate cyberattacks and
WannaCrypt attack, the theft of a nationstate cyber identify those behind them, it must be independent
weapon can lead to economic devastation even more and trustworthy. Trusted, credible attribution of
significant than theft of a conventional weapon, and cyberattacks would give governments not just the
when critical facilities such as hospitals or power grids jurisdiction where a particular victim resides expert
are hacked, can put just as many human lives at risk. information to determine whether to take further action
against the perpetrators. As with other complex and
organized criminal networks, multiple jurisdictions may
WANNACRYPT IS A WAKE UP CALL have information or a stake in uncovering the overall
Clearly, governments of the world should treat crime. Cybercrime is transnational and complex. To
WannaCrypt, NotPetya, and other nation-state this end, the technology sector should work together,
sponsored cyberattacks as a wake-up call. Nationstate and seek the support of other experts in non-profit
conflict which started on the land, moved to the groups, academia, and elsewhere, to create such
sea and found its way into the air has moved to an organization to help deter nation state attacks
cyberspace with governments increasingly using the incyberspace and protect our customers.
internet to hack, spy, sabotage and steal and most
recently, to simply impose economic destruction. This
battle is waged on private property: in the datacenters, CONCLUSION
cables and servers of private companies like Microsoft, WannaCrypt and NotPetya were just two of the major
and on the laptops and devices owned by private cyberattacks this past year, but their origins and
citizens. And increasingly, private companies and impacts should train our attention to more urgent
individuals are finding themselves in the crosshairs. collective action. With help from nation-states,
Nation-states need to take a different approach and attackers are becoming more sophisticated and better
adhere in cyberspace to the same rules applied to funded. Confronting future nation-state sponsored
conventional weapons in the physical world. We need attacks will only become more difficult, and that is
governments to consider the damage to civilians why the tech sector, customers, and governments
that comes from hoarding these vulnerabilities, must work together. In this sense, the WannaCrypt
inadequate protection of them from theft and the use and NotPetya attacks are a wake-up call for all of us.
of these exploits. This is one reason Microsoft called in Microsoft recognizes the responsibility to help answer
February2017 for a new Digital Geneva Convention this call, and is committed to doing its part.
to address these issues, including a new requirement
for governments to report vulnerabilities to vendors,
rather than stockpile, sell, or exploit them.
Moreover, industry must also play a role in enabling
a more secure Internet. Therefore, in the coming
months Microsoft will continue to work across the
technology sector to discuss a set of principles that can
create the foundation for an industry accord outlining
what, as an industry, we will do and what we wont do
all to protect our customers and help law enforcement.
One principle that resonates strongly within the tech
sector is a commitment to assist and protect customers
everywhere, and never to assist in attacking them.
All the norms, rules and agreements in the world
will not matter if attackers cannot be held accountable.
That needs to start with attributing an attack to the
perpetrator, even if it is a state or a state-sponsored Tom Burt serves as
group. While attribution could be collaborative Vice President,
Deputy General
between the public and private sector, drawing Counsel of Digital
on the strengths of both technology companies Trust at Microsoft.
W
e are entering a new era for global insurers, monitoring, and connected vehicles is another key
where business interruption claims are no development. Estimates vary that anywhere from 20 to
longer confined to a limited geography, 200 billion everyday objects will be connected to the
but can simultaneously impact seemingly disconnected internet by 2020. Security is often not being built into
insureds globally. This creates new forms of systemic the design of these products with the rush to get them
risks that could threaten the solvency of major insurers to market.
if they do not understand the silent and affirmative Symantecs research on IoT security has shown the
cyber risks inherent in their portfolios. state of IoT security is poor:
On Friday, October 21st, a distributed denial of 19 percent of all tested mobile apps used to control
service attack (DDoS) rendered a large number of the IoT devices did not use Secure Socket Layer (SSL)
worlds most popular websites inaccessible to many connections to the cloud
users, including Twitter, Amazon, Netflix, and GitHub. 40 percent of tested devices allowed unauthorized
Theinternet outage conscripted vulnerable Internet of access to back-end systems
Things (IoT) devices such as routers, DVRs, and CCTV 50 percent did not provide encrypted firmware
cameras to overwhelm DNS provider Dyn, effectively updates, if updates were provided at all, IoT devices
hampering internet users ability to access websites usually had weak password hygiene, including
across Europe and North America. The attack was factory default passwords; for example, adversaries
carried out using an IoT botnet called Mirai, which works use default credentials for the Raspberry Pi devices
bycontinuously scanning for IoT devices withfactory to compromise devices
default user names and passwords. The Dyn attack compromised less than one percent of
The Dyn attack highlights three fundamental IoT devices. By some accounts, millions of vulnerable
developments that have changed the nature of IoT devices were used in a market with approximately
aggregated business interruption for the commercial 10 billion devices. XiongMai Technologies, the
insurance industry: Chinese electronics firm behind many of the webcams
compromised in the attack, has issued a recall for many
1.The proliferation of systemically of its devices.
important vendors Outages like these are just the beginning. Shankar
The emergence of systemically important vendors Somasundaram, Senior Director, Internet of Things
can cause simultaneous business interruption to large at Symantec, expects more of these attacks in the
portions of the global economy. near future.
The insurance industry is aware about the potential
aggregation risk in cloud computing services, such 3.Catastrophic losses due to cyber risks are
as Amazon Web Services (AWS) and Microsoft Azure. not independent, unlike natural catastrophes
Cloud computing providers create potential for A core tenant of natural catastrophe modeling is that
aggregation risk; however, given the layers of security, the aggregation events are largely independent. An
redundancy, and 38 global availability zones built earthquake in Japan does not increase the likelihood of
into AWS, it is not necessarily the easiesttarget for an earthquake inCalifornia.
adversaries to cause a catastrophic event for insurers. In the cyber world consisting of active adversaries,
There are potentially several hundred systemically this does not hold true for two reasons (which require
important vendors that could be susceptible to an understanding of threat actors).
concurrent and substantial business interruption.
This includes at least eight DNS providers that service
over 50,000 websites, and some of these vendors
may not have the kind of security that exists within
providers like AWS. THERE ARE POTENTIALLY SEVERAL
HUNDRED SYSTEMICALLY IMPORTANT
2.Insecurity in the Internet of Things (IoT) built
into all aspects of the global economy
VENDORS THAT COULD BE SUSCEPTIBLE
The emergence of IoT with applications as diverse TO CONCURRENT AND SUBSTANTIAL
asconsumer devices, manufacturing sensors, health BUSINESS INTERRUPTION.
34% China
9% Russia
6% Germany
5% Netherlands
5% Ukraine
As well as long tail of adversaries from Vietnam, the UK, France, and South Korea.
Source: Symantec
First, an attack on an organization like Dyn will often Develop and hire cybersecurity expertise internally,
lead to copycat attacks from disparate non-state especially in the group risk function, to understand
groups. Symantec maintains a network of honeypots, the implications of cyber perils across all lines
which collects IoT malware samples. Proactively understand whether basic IoT security
Groups, such as New World Hacking, often replicate hygiene is being undertaken when underwriting
attacks. Understanding where they are targeting their companies using IoT devices
time and attention, and whether there are attempts to Partner with institutions that can provide
replicate attacks, is important for an insurer to respond a multidisciplinary approach to modeling
to a one-off event. cybersecurity for insurer including:
Second, a key aspect to consider in cyber modeling Hard data (for example, attack trends across the
is intelligence about state-based threat actors. It is kill chain by industry)
important to understand both the capabilities and Intelligence (such as active adversary monitoring)
the motivations of threat actors when assessing the Expertise (in new IoT technologies and key
frequency of catastrophic scenarios. Scenarios where we points of failure)
see a greater propensity for catastrophic cyberattacks
are also scenarios where those state actors are likely
attempting multiple attacks. Although insurers may CONCLUSION
wish to seek refuge in the act of war definitions that Symantec is partnering with leading global insurers
exist in other insurance lines, cyberattack attribution to develop probabilistic, scenario-based modeling
to statebased actors is difficult and in some cases to help understand cyber risks inherent in their
not possible. standalone cyber policies, as well as cyber as a peril
across all lines of insurance. The Internet of Things
opens up tremendous new opportunities for consumers
WHAT DOES THIS MEAN FOR and businesses, but understanding the financial
GLOBAL INSURERS? risks inherent in this development will require deep
The Dyn attack illustrates that insurers need to pursue collaboration between the cybersecurity and cyber
new approaches to understanding and modeling cyber insurance industries.
risk. Recommendations for insurers are below:
This article first appeared in the
Recognize that cyber as a peril expands far beyond Symantic Thought Leadership Blog
cyber data and liability from a data breach and
could be embedded in almost all major commercial Pascal Millaire serves as Vice President and General Manager,
insurance lines Cyber Insurance, for Symantec.
W
hen Danish shipping giant A.P. Moller-Maersks computer system was
attacked on June 27 by hackers, it led to disruption in transport across the
planet, including delays at the Port of New York and New Jersey, the Port of
Los Angeles, Europes largest port in Rotterdam, and Indias largest container port near
Mumbai. Thats because Maersk is the worlds largest shipping company with
600 container vessels handling 15 percent of the worlds seaborne manufactured trade.
It also owns port operator APM Terminals with 76 port and terminal facilities in 59
countries around the globe.
For the transportation and logistics (T&L) industry, the June 27 cyberattack is a clarion
call to elevate cybersecurity to a top priority. Besides Maersk, press reports said other
transportation and logistics industry giants were affected including German postal and
logistics company Deutsche Post and German railway operator Deutsche Bahn, which
was also a victim of the WannaCry ransomware hack in May.
While up until now hackers have seemed more preoccupied penetrating computer
systems at banks, retailers, and government agencies places where a hacker can find
access to lots of money and data and create substantial disruption the most recent
ransomware attacks demonstrate that the transportation and logistics industry is now on
hackers radars.
ARE MANUFACTURING
FACILITIES AS SECURE AS
NUCLEAR POWER PLANTS?
Claus Herbolzheimer and Richard Hell
W
ith 100,000s of non-Internet IP addresses, But that is only true if classic cybersecurity principles
cybersecurity means more than internet developed for the IT world are transferred into the
security. As companies leverage more and industrial automation and cyber-physical systems
more intelligent sensors and cyberphysical systems world of production and control systems. If, say,
to aggregate data for algorithms that will control and a manufacturing plants system is breached and
maneuver machines, they increase the level of cyber negative events begin to cascade, you need a
risk. Physical machines and tools or robots that were control mechanism that will either disconnect the
once confined by the four walls of a manufacturing plant, system or put you in a safe mode so you can
are now vulnerable to outside forces. continue to operate at a reduced level until the
Imagine if a malevolent outsider were to find a way problem is isolated and corrected. Just like a nuclear
to change the value of one or more sensor devices, power plant.
triggering a chain reaction. In a chemical plant, it could Going forward, engineers need to change the way
change temperature or pressure settings and spark a they develop products, and physically embed security
cascade of negative events, possibly an explosion. In in product design. Imagine producing and installing
an automotive plant, it could force robots to go wild, hundreds of thousands of vulnerable devices in
or, even worse, covertly embed malware during the cars. What does it mean, from an architectural or
automated flashing process into autonomous vehicles. infrastructure perspective, to make a sensor or any
other IP device, secure? What is the next level of
data security?
MANUFACTURING PLANTS Companies need to manage the transition from
ARE VULNERABLE a physically controlled environment to a digital
Nuclear power plants and utility grids have layer environment. They need to develop policies to protect
upon layer of cyber measures in place, including air and monitor their systems, and to react and minimize
pockets with neither direct nor indirect internet damage when they are breached. They need to apply
connections, and defense mechanisms that shut or decentralized resilience to standards and rules so
slow down activity if any abnormality is detected. But that intelligent systems stop connecting with each
corporate manufacturing plants typically dont think in other and lock into safe mode when abnormalities
those terms, even though they may now have hundreds are detected.
of thousands of potentially insecure, nonInternet IP Claus Herbolzheimer
addresses that are susceptible to hackers. is a Berlin-based
The more open the ecosystem, of course, the greater CONCLUSION partner in
Oliver Wymans
the danger. Manufacturers of autonomous vehicles, Given the proliferation of non-internet IP addresses in
Digital practice.
for example, are unleashing products designed to the manufacturing world, private-sector companies Richard Hell is
interact with other vehicles and a variety of connected should transfer the classic principles of multiple, a Munich-based
roadside devices into an open environment more redundant safety mechanisms and cybernetic control Vice President in
Oliver Wymans
susceptible to hacking than a more closed ecosystem systems of high-resiliency industries to the field of Manufacturing
like the manufacturing plant itself, at least in theory. cybersecurity in manufacturing. Industries practice.
PERCENTAGE OF
RESPONDENTS AT EACH
LEVEL OF GDPR COMPLIANCE
We asked these questions
1. What progress has your organization made toward GDPR compliance/readiness?
2. Does your organization conduct the activities listed above in the European Union
or otherwise process personal data of European Union citizens (e.g., names, unique
IDs, email addresses or credit card information of customers or employees in the
European Union)?
57%
8% 11%
21%
3%
I do not know Other
Source: 2017 Marsh | Microsoft Global Cyber Risk Perception Survey
35
MMC CYBER HANDBOOK 2018
THE GROWING I
n the recent past, there have been
three major cyber-related regulatory
developments in the US these
Scope breadth Scope of Non Public Information (NPI) still unclear, but can be interpreted as significantly
and depth broader than Non Public Personal Information
REGULATING
CYBERSECURITY IN THE
NEW YORK FINANCIAL
SERVICES SECTOR
Aaron Kleiner
MMC CYBER HANDBOOK 2018 PREPARE FOR EMERGING REGULATIONS
R
egulation of cybersecurity practices is a to craft cybersecurity regulations. Specifically, three
challenging process, especially when local areas of the Departments focus should inform the
regulations can have global ramifications. development and growth of cybersecurity regulations:
There is a strong argument that prescriptive mandates First, the Departments emphasis on having
can interfere with security professionals agility in appropriate organizational infrastructure in-place
a highly-dynamic environment, or slow the pace of to manage cybersecurity risk on an ongoing basis;
innovation and negatively impact economic growth. Next, the Departments recognition of how a
However, there is a compelling counterargument that risk-informed approach enables appropriate
certain standards should be followed and minimum cybersecurity investments; and
requirements set so that organizations meet a baseline Finally, the Departments reliance on a narrow
level of cybersecurity protection, which can help protect set of proven cybersecurity tools as mandatory
societal values surrounding consumer protection and requirements to protect regulated entities and
even public safety. their customers.
The essence of the regulatory challenge is not Building an organizational infrastructure for
to choose sides, but rather how to make progress cybersecurity risk management means more than
against several goals concurrently: empowering protecting a network perimeter or investing in
security practitioners and supporting innovation while cutting-edge tools. Having effective leaders positioned
ensuring baseline protections and advancing societal in appropriate roles is equally as important as the
goals. Regulators have recently demonstrated an processes they implement or technologies they
increased understanding and willingness to embrace leverage, and the Departments approach reflects this
this approach, often in collaboration with stakeholders reality. For example, the Departments requirement
from within regulated communities and others who that organizations have a Chief Information Security
would support their compliance. These regulatory Officer with responsibility for the organizations
development processes bear some characteristics of Cybersecurity Program, as well a mandate to inform the
the multistakeholder model that has underpinned Board of Directors, reflects a vision for cybersecurity
Internet governance dialogues for many years, in which risk management that is inherent to the organizations
a diverse group of representative communities engage internal functions. In addition, the Department
collaboratively to address shared issues. appropriately emphasizes keeping cybersecurity
professionals current with trends and best practices by
requiring organizations to provide ongoing education.
NEW TEMPLATE FOR The Departments approach also reinforces the
CYBERSECURITY REGULATION centrality of a risk-informed approach to cybersecurity.
The cybersecurity regulation issued by the New York The regulation positions an organizational Risk
Department of Financial Services (the Department) was Assessment as a key input into the Cybersecurity
developed through an open consultative process and, Program, and further mandates risk assessments
as a result, has the potential to create an appropriate when engaging Third Party Service Providers.
level of cybersecurity readiness without compromising However, the regulation does not prescribe a
security professionals agility or organizational particular model or framework to assess risk,
capacity for innovation. Microsoft provided input which empowers organizations to make their own
to the Department when the regulation was under determinations about their risk appetite. Given the
development as part of our ongoing engagement
with global financial services regulators to share
perspectives on cloud computing and best practices for
cybersecurity risk management. With implementation
now underway across regulated institutions, Microsoft HAVING EFFECTIVE LEADERS POSITIONED
continues to partner with organizations to support IN APPROPRIATE ROLES IS EQUALLY AS
compliance and determine the best approaches to IMPORTANT AS THE PROCESSES THEY
address regulatory requirements.
There are several elements of the Departments
IMPLEMENT OR TECHNOLOGIES THEY
rule that should serve as examples, or at least helpful LEVERAGE, AND THE DEPARTMENTS
reference points, for other regulators considering how APPROACH REFLECTS THIS REALITY.
Copyright 2017 Marsh & McLennan Companies 41
MMC CYBER HANDBOOK 2018 PREPARE FOR EMERGING REGULATIONS
THE REGULATORY
ENVIRONMENT IN EUROPE
IS ABOUT TO CHANGE,
AND PROFOUNDLY
FireEye | Marsh & McLennan Companies
W
hile the front pages of the Wall Street EU GENERAL DATA
Journal, USA Today and the New York PROTECTION REGULATION
Times regularly feature reports of Jan Philipp Albrecht, a member of the European
breaches against US-headquartered companies, Parliament from Germany and the Rapporteur for the
the situation appears on the surface to be blissfully GDPR, captured the awesome aspirations of European
different in Europe. It is exceedingly rare that Der policymakers in approving this new regulation:
Spiegel, Le Monde or Corriere della Sera carry The GDPR will change not only the European Data
accounts of high-profile breaches against large protection laws but nothing less than the whole world
European companies. as we know it.
Why is that? The fundamental difference in the Albrechts comment reflects the strength of the
two continents is that in the United States, more than belief in Europe that privacy constitutes a fundamental
50 federal, state and local laws mandate disclosure of human right.
cyber breaches to regulators or affected consumers. With the growth of Internet-related technology,
Until recently, the regulatory regime in Europe was companies have accumulated troves of personal data.
far different. Business procedures have typically been focused on
That is about to change profoundly. With the aggregating broad categories of data gleaned from
recent passage of the European Unions General Data consumers. Fearing the impact to the privacy rights
Protection Regulation (GDPR), companies will soon be of individuals, the European authorities are now
required to publicly disclose data breaches to national strengthening privacy law to control, limit and
data protection authorities and, where the threat of expose the sweeping collection and use of data by
harm is substantial, to affected individuals. Failure to many organizations.
do so could result in fines of as much as four percent
of a companys global turnover a staggering sum.
This sea of change in the public reporting obligations
of companies will carry significant ramifications for
governments, businesses and consumers across THE GDPR WILL CHANGE NOT ONLY THE
Europe. In addition, the Network Information Security
Directive, adopted by the EU in July 2016, will place
EUROPEAN DATA PROTECTION LAWS BUT
further demands on governments and the operators NOTHING LESS THAN THE WHOLE WORLD
of critical infrastructure. AS WE KNOW IT.
Jan Philipp Albrecht
MMC CYBER HANDBOOK 2018 PREPARE FOR EMERGING REGULATIONS
Once implemented in May 2018, the GDPR will In practice, the broad jurisdictional provisions signal
introduce a seismic shift in how companies retain a clear hope that the GDPRs complex regulations will
and utilize personal data of individuals subject to have a global impact.
the EUs jurisdiction. To prepare for implementation,
companies must begin assessing the current state of
their operations and the sweeping breadth of the PRIVACY IMPACT ASSESSMENTS
new requirements. Businesses can expect both regulatory authorities and
While the regulation is nearly 90 pages long, there individuals to make inquiries about how data is being
are four broad themes that are worth emphasizing: processed. Individuals can object to any data collection
Individuals will have enhanced rights. made without an adequate basis and can demand
Companies will be forced to reassess the manner in correction of inaccurate information. Organizations
which they process and retain data. must perform so-called data impact assessments
Companies will need to review their contractual prior to collecting data. The GDPR provides guidance
arrangements with a host of third parties. on practices to protect data, such as de-linking data
Companies will be held to far stricter accountability from identities (pseudonymisation), encryption,
and sanctions. regular assessments of technical controls, and incident
response plans that account for maintaining the
confidentiality and integrity of data.
SWEEPING JURISDICTION
The GDPR purports to extend its reach far beyond the
borders of the European Union to any organization AFFIRMATIVE CONSENT AND THE
that might collect or process personal data of an RIGHT TO BE FORGOTTEN
individual subject to EU jurisdiction (known as EU The GDPR makes clear that no company may collect
data subjects). Extending data protection beyond personal data without first notifying users of how their
EU borders reflects the EUs view that data privacy data will be stored, protected and shared with third
protections should apply wherever data may travel. parties. In order to collect data, the company must first
ENFORCEMENT
fines as high as 4%
of global revenue
CYBERSECURITY AND
THE EU GENERAL DATA
PROTECTION REGULATION
Peter Beshar
MMC CYBER HANDBOOK 2018 PREPARE FOR EMERGING REGULATIONS
T
he countdown has begun. In less than a year, tough new rules on data protection
will come into effect in the European Union. For the first time, companies will be
required to notify regulatory authorities, and potentially consumers, in the event
of a significant cyber breach. In elevating the rights of consumers, the EU General Data
Protection Regulation (GDPR) represents a sea of change in how companies will have to
operate and many are not ready.
strategic advice. These translators need to be able to understand both the reputational
risk to the companys brand and the technical requirements of the companys systems.
yy Implement best practices. Senior management cannot afford to be detached from
their companys cybersecurity plans any longer. A vital lesson from WannaCry is the
importance of developing consistent protocols for patching known software flaws.
Executives should engage directly with their IT teams around emerging best practices
like multifactor authentication, encryption tools, and penetration testing.
yy Start communicating with customers and shareholders now. Companies should
prepare their stakeholders for an era of greater transparency and disclosure and the
almost inevitable day when cyber intrusions occur. Help your customers understand
how you collect and use their personal data. Nothing will be worse for your company
or your customers than over-promising and under-delivering on cybersecurity.
yy Make up for lost time. The penalties for non-compliance with the GDPR are severe up
to 4% of a companys total turnover. For companies with annual revenues of $12billion
for example, potential fines will run up to $500 million. Companies should test their
cyber incident response plans through drills or simulations, and develop cross-
department muscle and relationships of trust that will be needed in the event of a
serious breach. Executives should also reach out to regulators, law enforcement
authorities, and policymakers not so much to lobby but rather to share insight,
information, and help shape the rules as they evolve. No one has all the answers.
CONCLUSION
Sound practices and sheer chance ultimately stopped the WannaCry malware and saved
countless institutions from even worse breaches. It is unlikely the unprepared will be so
lucky next time. Corporate leaders must act today to ensure their companies can adapt and
excel in a world of growing risk, opportunity, and significant new regulations.
CYBERATTACKS
AND LEGISLATION:
A TIGHTROPE WALK
Jaclyn Yeo
MMC CYBER HANDBOOK 2018 PREPARE FOR EMERGING REGULATIONS
T
he increasingly worrying global cyber risk trend
has prompted lawmakers in many countries to ARE OUR CURRENT CYBER LEGAL SYSTEMS
either introduce or update their data privacy AGGRESSIVE ENOUGH TO TAKE ON
laws. This is a first step to ensuring better management,
security and data control, which ultimately builds
EVER-GROWING AND EVER-PRESENT
cyber resilience. CYBER ADVERSARIES?
China will officially roll out its new Cybersecurity
Law on June 1, signifying the governments intent
to strengthen cyber regulations. Up to this point,
China only had some general directives and localized for the wrong reasons. Additional barriers to trade
guidelines for a secure and controllable internet. and innovation, greater complexity and higher-risk
This new national law, however, is a head-turner for concerns for foreign companies doing businesses
everyone doing business with China and will have in China are some criticisms of the law by foreign
implications on those business operations. business communities.
However, the recent global extortion cyberattack
may significantly shift these negative mindsets and
SIGNIFICANT PROVISIONS OF THE change perspectives on the new law.
CYBERSECURITY LAW Massive ransomware cyberattacks hit critical
This law is the first legislation at the national level to information infrastructures around the world on
establish legal principles for data privacy, and the May 12, ranging from the UKs National Health Service
financial penalties for data breach incidents are to a Spanish telecom giant and one of the worlds
severe. In the event of a compromise to personal largest international courier services companies
data, companies can be charged penalties of up headquartered in the United States. The unprecedented
to RMB1 million ($150,000) or ten times the illegal cyberattack over that weekend affected more than
income, while penalties for individuals directly in 200,000 computers across 150 countries, according to
charge can be up to RMB100,000. Europol, with the numbers expected to increase in the
In terms of data localization, the new Cybersecurity aftershocks ahead.
Law will require critical information infrastructure Asia-Pacific countries were not spared either.
(CII) facilities to store personal information and other According to Chinas official Xinhua News Agency,
important business data collected or generated in more than 29,000 educational institutions were
China to be stored physically in China. CII operators affected by similar attacks. Other infected computers
must have government approval to transfer this data were detected at railway stations, hospitals, office
outside the country if it is truly necessary. Companies buildings, retail malls and government agencies. Over
that do not localize their data face potential financial the next few days, more reports of similar attacks
penalties, including possibly losing their ability to surfaced, impacting dozens of other countries,
conduct business in mainland China. including Singapore, Japan and Australia.
Furthermore, network operators are required to In the face of this unprecedented scale of ransomware
provide technical support to security authorities for the cyberattack, tighter cybersecurity legislation has
purposes of upholding national security and conducting been cast in the limelight. Are our current cyber legal
criminal investigations under the data residency clause. systems aggressive enough to take on these ever-
Finally, for data security purposes, both CII facilities growing and ever-present cyber adversaries? Are
and network operators in China are needed to comply our cybersecurity protection schemes and cyber risk
with national standards and mandatory requirements management frameworks comprehensive enough
such that equipment and products are safety-certified to minimize and mitigate future attacks of similar or
by inspection. greater scale?
While the financial and economic impacts are
still being assessed in the aftermath of events, the
A MUCH-NEEDED MINDSET SHIFT extent of psychological implications could be far more
Since its announcement in late 2016, Chinas substantial. This rude wakeup call might just be what is
Cybersecurity Law has received much attention required right now. The need for transparency through
CYBER PREPAREDNESS
ACROSS INDUSTRIES
AND REGIONS
Percentage of respondents who are confident
in their organization's ability to ...
Understand Mitigate and Manage, respond,
(identify and assess) prevent its and recover from
its cyber risk cyber risk a cyber incident
(N=1312) (N=1312) (N=1312)
Do not know
3% 4% 6%
Source: 2017 Marsh | Microsoft Global Cyber Risk Perception Survey
53
MMC CYBER HANDBOOK 2018
DEPLOYING A CYBER
STRATEGY FIVE MOVES
BEYOND REGULATORY
COMPLIANCE
Paul Mee and James Morgan
MMC CYBER HANDBOOK 2018 CYBER RESILIENCY BEST PRACTICES
F
inancial institutions are acutely aware that cyber While this paper is US-centric, especially with regard
risk is one of the most significant perils they face to regulation, these points are consistent with global
and one of the most challenging to manage. trends for cyber risk management. Further, we believe
The perceived intensity of the threats, and Board level that our observations on industry challenges and the
concern about the effectiveness of defensive measures, steps we recommend to address them are applicable
ramp up continually as bad actors increase the across geographies, especially when considering
sophistication, number, and frequency of their attacks. prioritization of cyber risk investments.
Cyber risk management is high on or at the top
of the agenda for financial institutions across the
sector globally. Highly visible attacks of increasing FIVE STRATEGIC MOVES
insidiousness and sophistication are headline news The current environment poses major challenges
on an almost daily basis. The line between criminal for Boards and management. Leadership has to fully
and political bad actors is increasingly blurred with understand the cyber risk profile the organization faces
each faction learning from the other. In addition, with to simultaneously protect the institution against ever-
cyberattack tools and techniques becoming more changing threats and be on the front foot with regard
available via the dark web and other sources, the to increasing regulatory pressures, while prioritizing
population of attackers continues to increase, with the deployment of scarce resources. This is especially
recent estimates putting the number of cyberattackers important given that regulation is still maturing and it
globally in the hundreds of thousands.1 is not yet clear how high the compliance bars will be
Cyber offenses against banks, clearers, insurers, set and what resources will need to be committed to
and other major financial services sector participants achieve passing grades.
will not abate any time soon. Looking at the velocity and With this in mind, we propose five strategic moves
frequency of attacks, the motivation for cyberattack upon which we believe, based on our experience, will help
financial services institutions can be several hundred institutions position themselves well to address
times higher than for non-financial services organizations. existing cyber risk management challenges.
Observing these developments, regulators are
prescribing increasingly stringent requirements for 1.Seek to quantify cyber risk in terms of capital
cyber risk management. New and emerging regulation and earnings at risk
will force changes on many fronts and will compel firms Boards of Directors and all levels of management
to demonstrate that they are taking cyber seriously in all intuitively relate to risks that are quantified in economic
that they do. However, compliance with these regulations terms. Explaining any type of risk, opportunity, or
will only be one step towards assuring effective tradeoff relative to the bottom line brings sharper focus
governance and control of institutions CyberRisk. to the debate.
In this paper, we explore the underlying challenges For all financial and many non-financial risks,
with regard to cyber risk management and analyze the institutions have developed methods for quantifying
nature of increasingly stringent regulatory demands. expected and unexpected losses in dollar terms that
Putting these pieces together, we frame five strategic can readily be compared to earnings and capital.
moves which we believe will enable businesses to Further, regulators have expected this as a component
satisfy business needs, their fiduciary responsibilities of regulatory and economic capital, CCAR, and/or
with regard to cyber risk, and regulatory requirements:
Seek to quantify cyber risk in terms of capital and
earnings at risk.
Anchor all cyber risk governance through
risk appetite. LOOKING AT THE VELOCITY AND FREQUENCY
Ensure effectiveness of independent cyber risk OF ATTACKS, THE MOTIVATION FOR
oversight using specialized skills. CYBERATTACK UPON FINANCIAL SERVICES
Comprehensively map and test controls, especially
for third-party interactions.
INSTITUTIONS CAN BE SEVERAL HUNDRED
Develop and exercise major incident TIMES HIGHER THAN FOR NON-FINANCIAL
management playbooks. SERVICES ORGANIZATIONS.
1 Joint Chiefs of Staff
Business Units Assess cyber risks associated with activities of the business unit on an ongoing basis
(e.g., IT, Ops) Ensure that cyber risk information is shared in a timely manner with senior
management, including the CEO
Office of the CISO Ensure operations are consistent with cyber risk management framework
Identify, measure and monitory cyber risks and notify the CEO, board
and CRO accordingly
Risk Management Maintain sufficient independence, stature, authority, resources and access to board
function Be will integrated with enterprise-level strategic risk management function
Maintain linkages to key elements of internal and external dependency management
such as policies, standards, roles and responsibilities
Further independent risk oversight and audit is Given the new and emerging regulatory requirements,
clearly needed as part of the Third Line of Defense. firms will need to pay closer attention to the ongoing
Defining what oversight and audit means becomes assessment and management of third parties. Third
more traceable and tractable when specific parties need to be tiered based on their access and
governance mandates and metrics from the Board interaction with the institutions high value assets.
down are established. Through this assessment of process, institutions need
Institutions will also need to deal with the practical to obtain a more practical understanding of their ability
challenge of building and maintaining Cyber talent that to get early warning signals against cyber threats. In a
can understand the business imperatives, compliance number of cases, a firm may choose to outsource more
requirements, and associated cyber risk exposures. IT or data services to third party providers (e.g., Cloud)
At the leadership level, some organizations have where they consider that this option represents a more
introduced the concept of a Risk Technology Officer attractive and acceptable solution relative to the cost or
who interfaces with the CISO and is responsible for talent demands associated with maintaining Information
integration of cyber risk with operational risk. Security in-house for certain capabilities. At the same
time, the risk of third party compromise needs to be fully
4.Comprehensively map and test controls, understood with respect to the overall risk appetite.
especially for the third party interactions
Institutions need to undertake more rigorous and more
frequent assessments of cyber risks across operations,
technology, and people. These assessments need to
INSTITUTIONS NEED TO UNDERTAKE
test the efficacy of surveillance, the effectiveness of
protection and defensive controls, the responsiveness
MORE RIGOROUS AND MORE FREQUENT
of the organization, and the ability to recover in a ASSESSMENTS OF CYBER RISKS ACROSS
manner consistent with expectations of the Board. OPERATIONS, TECHNOLOGY, AND PEOPLE.
Exhibit 2: KEY CYBER CONTROL TESTS, ALIGNED TO THE NIST CYBERSECURITY FRAMEWORK
1. IDENTIFY 2. PROTECT
THIRD PARTY SOFTWARE DEVELOPMENT IMPACT ANALYSIS
CYBER RISK OVERALL TECHNICAL
SECURITY REVIEWS LIFECYCLE (SDLC) OF PATCHES
ASSESSMENT SECURITY ASSESSMENT
SECURITY TESTING
Baseline assessment Assessment of technical Assessment of Assessment of the security Assessment of internal and
of threat profile, security effectiveness third party security control functionality against third patch impact on security
and expected loss capabilities security requirements and functionality of the
application environment
3. DETECT
APPLICATION VULNERABILITY SCANS NETWORK PHYSICAL RED TEAM EXERCISES
SECURITY TESTING PENETRATION TESTING PENETRATION TESTING
Independent assessment Periodic scans of Assessment to identify Assessment to identify Stealth assessment of
of security capabilities internally and externally vulnerabilities in vulnerabilities in organizations digital
of an application facing servers for network security physical security infrastructure and defenses
known security issues
and vulnerabilities
4. RESPOND 5. RECOVER
TABLETOP EXERCISES SIMULATION/WAR GAMING BC/DR TABLETOP TESTING REMEDIATION
Assessment of incident Dynamic simulation of a threat Assessment of stakeholders response Initiation of action plans and
response capabilities facilitated by a third party preparedness and effectivenee of mobilization of resources to
across pre-determined to assess incident response business continuity plan remediate following a cyber incident
threat scenarios readiness and effectiveness
5.Develop and exercise incident exercise, key stakeholders walk through specific
management playbooks attack scenarios to test their knowledge of response
A critical test of an institutions cyber risk readiness strategies. This exercise provides an avenue for
is its ability to quickly and effectively respond when exposing key stakeholders to more tangible aspects
a cyberattack occurs. As part of raising the bar on of cyber risk and their respective roles in the event
cyber resilience, institutions need to ensure that of a cyberattack. It also can reveal gaps in specific
they have clearly documented and proven cyber response processes, roles, and communications that
incident response plans that include a comprehensive the institution will need to address.
array of attack scenarios, clear identification of Last but not least, incident management plans
accountabilities across the organization, response need to be reviewed and refined based on changes
strategies, and associated internal and external in the overall threat landscape and an assessment
communication scenarios. of the institutions cyber threat profile; on a yearly
Institutions need to thoroughly test their incident or more frequent basis depending on the nature
response plan on an ongoing basis via table top and volatility of the risk for a given business line
exercises and practical drills. As part of a table top or platform.
QUANTIFYING
CYBER BUSINESS
INTERRUPTION RISK
Peter Beshar
A
s we prepare for the next global pandemic preselected range based on enterprise risk appetite
cyberattack, one clear lesson is that the and tolerance considerations.
technological infrastructure on which we rely Identifying mitigation options. Depending on
is more fragile than is often appreciated. The WannaCry the significance of an organizations Cyber BI
attack reinforced the need for businesses to address exposures, risk mitigation options could include
the growing risk and financial consequences of Cyber changing business processes, re-architecting IT
Business Interruption (Cyber BI). infrastructure to improve resilience, enhancing IT
Although historical data can be relied on to estimate restoration capabilities, or strengthening technical
the impacts of data breaches, Cyber BI costs can be cybersecurity controls. To properly evaluate these
more difficult to determine because every companys choices and identify the strategies that will have the
IT systems, infrastructure, and exposures differ. How greatest impact, its important to have a credible
much an event costs will depend on several factors, estimate of potential Cyber BI exposure.
including the organizations business operations Evaluating risk transfer options. Cyber BI is
model, incident response capabilities, actual time to often underinsured or uninsured because many
respond, and the associated insurance coverages. By businesses do not fully quantify their risk prior
undertaking a Cyber BI risk quantification analysis, to suffering a loss. But insurers are increasingly
you not only gain a better understanding of the status offering broader coverage for these exposures
quo and associated costs, but a foundation for making in both cyber policies and traditional property
more informed risk mitigation and transfer investment all-risk policies. A scenario-based cyber BI risk
decisions and improving cyberattack resiliency. quantification analysis can support the proper
To more accurately quantify Cyber BI risk, structuring of these insurance options, including
businesses can use scenario-based analyses. In the selecting appropriate limits.
wake of the WannaCry incident, potential disruption
scenarios should be reconsidered to include complex
ransomware events and their second- and third-order
consequences, such as supply chain disruptions or
physical damage.
A scenario-based analysis should focus on
three factors:
Estimating the severity and likelihood of a
Cyber BI event. Using realistic scenarios can This article is an
allow organizations to more accurately quantify excerpt from the
the potential financial loss from a cyber BI event. Marsh Insight entitled
Peter Beshar, based in New York, is the #WannaCry:
Equally important is to scope these scenarios such Executive Vice President and General Counsel Lessons Learned and
that their likelihood of occurrence falls within a for Marsh & McLennan Companies, Inc. Implications
CYBERSECURITY:
THE HR IMPERATIVE
Katherine Jones, Ph.D., and Karen Shellenback
MMC CYBER HANDBOOK 2018 CYBER RESILIENCY BEST PRACTICES
C
ybersecurity is a shared responsibility: it is a board-level concern, an executive
concern and a mandate for all employees. Every organization today must plan for
when not for if a cybersecurity breach happens. Companies and roles of all
industries, types, and sizes are targets. With the enormity of this issue, data breaches are
no longer solely the bailiwick of IT.
HR also has an important dual role to play when it comes to cybersecurity: creating and
managing a cybersecure enterprise comprising the entire workforce and working to ensure
the hiring, retention, and development of cybersecurity professionals.
7% 43% 48% 2%
Assist with creating a corporate rizk tolerance strategy
9% 45% 36% 9%
Develop contingency plans for addressing a breach of employee data (risk mitigation)
7% 35% 48% 9%
Understand and action plan around current cyber team engagement levels
7% 35% 49% 9%
Leverage strategic workforce planning metrics to understand talent flows, bench strength/skills inventory, talent pipeline issues and future hiring
needs, etc.
or accidentally open the backdoor for ransomware or malware to enter and put the
computer network at risk. Innocence, however, is not universal. Malicious employees may
enter corporations with an agenda to sabotage. Here, diligent hiring practices, enforced
system access controls, and sentiment-monitoring can combat the issue.
INSIDER ATTACKS
FINDING AND FOSTERING CYBERSECURITY PROFESSIONALS USUALLY FALL UNDER
It is critical to create a comprehensive cyber risk mitigation strategy, provide awareness ONE OF THE FOLLOWING
training, and understand risky employee behaviors, but protecting your organization THREE CATEGORIES:
against the ongoing barrage of daily hacks requires a cohort of talented and energized
cyber professionals. There is a severe cybersecurity workforce shortage, with onemillion
ACCIDENTAL,
unfilled cybersecurity jobs in 2016 anticipated to grow to an expected shortfall of RENEGADE, OR
1.5million by 2019, according to Cybersecurity Ventures. Mercer Select Intelligence MALICIOUS
surveyed senior cybersecurity leaders on their view of HRs role in cybersecurity , and the
results showed that HR can do more to help the organizations cyber risk functions attract, PROBLEMS
train, and retain cyber professionals. FACED BY HR
WHEN HIRING
CYBERSECURITY
STAFF
KEY ISSUES CITED IN HIRING CYBERSECURITY STAFF
46%
Our research shows that while approximately 90% of senior cybersecurity leaders report
that HR helps them recruit from diverse labor pools and 62% report that their HR recruiting
team partners with universities to access potential new hires, only a little over a half (54%)
Failure to locate
report that HR actively recruits from military communities, and only 35% report that HR
talent with the
works with them to use crowdsourcing and other innovative strategies to attract the best right educational
and the brightest (see Exhibit 2). credentials
Exhibit 2: HRS ACTIVITY IN CYBER TALENT RECRUITMENT AND RETENTION STRATEGIES: WHAT CYBER LEADERS TELL US
9% 29% 53% 9%
Partner with universities to open access to potential new hires through curriculum challenges, networking opportunities, co-ops, and
internship opportunities
5% 5% 65% 24%
Recruit from diverse labor pools in terms of gender, race and other protected groups
1% 5% 71% 20%
Recruit from diverse labor pools in terms of experience and education
8% 54% 37% 2%
Build line of business experience by providing opportunities for cyber staff in areas such as: business strategy, pragmatic negotiations,
legal considerations, delivering impactful communications, and developing trusting relationships with line of business executives
8% 44% 40% 8%
Provide mentorship, sponsorship and/or and visibility opportunities for female cyber talent
for cyber staff (hackathons, for example) and only 42% focus on creative career growth
opportunities for these strategic staff members (see Exhibit 3).
Understanding the current talent pool for cyber, the future capabilities that will be needed,
and the best methods for addressing the cyber talent teams professional needs is a priority.
HR has the capabilities and resources to help cybersecurity leaders attract, retain, and build
the cyber workforce of the future. The imperatives of cyber risk mitigation, corporate boards,
executive leadership teams and internal risk management departments should encourage
HR to bolster the capabilities and retention of their cyber risk staff as a business priority.
CONCLUSION
Cybercrime is growing at a furious pace, costing organizations trillions globally with an
expected increase to $6 trillion annually by 2021, according to DarkReading. The chance
of avoiding an attempted breach is almost nonexistent, but the odds of preventing a
successful breach will increase with HR's attention to areas discussed in this report.
We suggest that organizations ascertain their own risk tolerance and plan a
cybersecurity strategy accordingly. Educating employees enterprise-wide, hiring right, and
fostering cyber staff development are critical for HR professionals who face the growing
cybercrime challenge.
LIMITING CYBERATTACKS
WITH A SYSTEM WIDE
SAFE MODE
Claus Herbolzheimer
MMC CYBER HANDBOOK 2018 CYBER RESILIENCY BEST PRACTICES
C
yberattacks cost companies an estimated half a trillion dollars in damages every
year. The main reason they can harm companies to such a staggering degree is
that todays cybersecurity systems use centralized monitoring, with little beyond
their main firewalls to protect the rest of an organization. As a result, when companies are
hacked, it can take days for information technology teams to isolate infected systems,
remove malicious code, and restore business continuity. By the time they identify, assess,
and resolve the incident, the malicious code has usually proliferated, almost without limit,
across any connected or even tangentially related systems, giving hackers even more time
to access sensitive data and to cause malfunctions.
To stay ahead of new intrusion techniques, companies need to adopt decentralized
cybersecurity architectures, armed with intelligent mechanisms that will either
automatically disconnect from a breached system or default to a safe mode that
will enable them to operate at a reduced level until the effects of cyberattacks can
be contained and corrected. Like the general security systems at high-risk sites such
as nuclear power plants, companies require multiple layers of redundant safety
mechanisms and cybernetic control systems. The goal should be to create air pockets,
with neither direct nor indirect internet connections, that can protect critical equipment
and internet-connected devices.
Every companys cybersecurity program will have unique attributes, but there are
several fundamentals to this decentralized architecture that can help companies shift the
balance of power away from the attackers.
DETECTION
Even the most expertly designed cyber architecture is useless if it cant detect and
understand the threats it faces. Companies are experiencing more cyber viral outbreaks
because they often cant even detect them until it is too late. Todays cybersecurity
systems have been built to detect previously identified malicious codes and malware. But
cyberattacks are morphing so fast that threat patterns are unpredictable.
To identify and mitigate evolving new attack scenarios, security systems need to
search for anomalies, analyze the probability that they are hostile acts, and incorporate
them into a continually expanding list of possibilities. This level of detection should be
carried out by components on many different levels to cover the multitude of devices
and system components connected to the internet and physical environments. Together,
these form several layers of cybernetic systems that can identify unknown and new forms
of attacks by comparing what they understand to be their normal, uncompromised state
both on their own and in combination with other systems.
Rather than reacting to a defined set of indicators, these systems detect and react
to irregularities in data flows, involving anything from the amount, type, origination,
or timing of data. For example, to determine whether someone should be locked out THE GOAL SHOULD BE TO
of an online bank account, some banks cybersecurity systems are starting to use
CREATE AIR POCKETS,
artificially intelligent technology to compare how a person normally types or uses their
computer mouse.
WITH NEITHER DIRECT
NOR INDIRECT INTERNET
CONNECTIONS, THAT
HARM REDUCTION CAN PROTECT CRITICAL
The next step is to make sure that decentralized, intelligent systems minimize the impact of
attacks by independently starting a protocol that takes potentially compromised systems
EQUIPMENT AND
offline, disconnects them from other critical equipment, or locks them into a safe mode. INTERNET-CONNECTED
Current cybersecurity systems usually trigger an alert if they have identified a specific DEVICES.
attack. But they continue to operate and communicate with other systems until information
technology teams shut them down and correct the malfunction.
SECURE-BY-DESIGN
Finally, all companies products will eventually have to become secure-by-design. So far,
it seems that companies pay little heed to cybersecurity during product development.
That needs to change. Hackers have remotely accessed and controlled everything from
network-connected electricity smart meters to security cameras. In 2015 Chrysler
announced vehicles after a pair of cybersecurity researchers demonstrated that they
could remotely hijack a Jeeps digital systems over the internet. In Germany, nearly one
million homes suffered brief internet outages in 2016 after criminals gained access to
and remotely shut down their internet routers. The U.S. Food and Drug Administration
warns that medical devices connected to hospital networks, other medical devices and
smartphones such as implantable heart monitors are now at risk of remote tampering
that could deplete devices batteries or result in inappropriate pacing or shocks.
Companies need to build kill switches, safe modes, and encryptions into their
products during development. This will protect not only the companies systems but also
their customers. Apple, for example, installs layers of data encryption into its products
and will permit customers to run only Apple-approved software programs on their
devices. Such practices need to become standard operating procedure across
all industries.
CONCLUSION
Stopping cyberattacks will never be cheap or easy. Developing decentralized, intelligent
cybersecurity systems will likely happen in fits and starts as devices learn through trial and
error not to react to false positives or to go into safe mode more often than is necessary.
Managers will have to show leadership, since most customers remain unaware of the extent
that cyber risks now pose a threat to the products in their possession, and so are likely to be
impatient with glitches and delays. The good news is that the technology exists to make
good cybersecurity a reality. Decentralized, intelligent systems can significantly decrease
the risk of cyberattacks and minimize their damage. The savings will be enormous.
RECOGNIZING THE
ROLE OF INSURANCE
Wolfram Hedrich, Gerald Wong, and Jaclyn Yeo
MMC CYBER HANDBOOK 2018 CYBER RESILIENCY BEST PRACTICES
A
key role of insurance is risk transfer. Having grow over 15 percent per annum till 2019. Munich
recognized that cyber risk cannot be Re expects Asian market volumes for cyber covers to
eliminated; companies must be prepared for grow to $1.5billion by 2020, while AIG estimates cyber
a cyberattack. The challenge with cyber risk is that it insurance penetration in Singapore could increase to
has the potential to be a tail risk to data, reputation, or 40percent in 2020 from 9 percent today.
the ability to do business. A 2016 study by Ponemon There are key insurability challenges that need to
found that the average total cost of a breach is $4 be addressed so insurers can fully capture the growing
million, up 29 percent since 2013 and persistently market share, while the insured are adequately
rising. The magnitude of a potential, sudden loss protected at fair prices.
forces firms to scrutinize their ability to withstand such
impact, and after rigorous analysis, part of the solution
almost always involves looking to insurance as a way of CHALLENGE #1: HIGH SPECIFICITY
transferring the risk away. AND STRICT LIMITATIONS IN CYBER
The role of cyber insurance is also useful in INSURANCE PRODUCT OFFERINGS
quantifying the price of cyber risk. Insurance premiums The scope of cyber insurance coverage remains
can serve as benchmarks to the risk modeling output highly specific as the characteristics of cyber threats
and should be used as part of profitability analyses across geographical locations, industries, and size of
to determine the financial feasibility of a project, or corporations vary widely. With little standardization
executing cyber risk mitigation efforts. For instance, across the products offered, companies need to
if a cybersecurity feature costs less than the net have a deeper understanding of their own cyber risk
present value (NPV) of the resulting reduction in cyber exposures to determine the appropriate type and
insurance premiums, it is a worthwhile endeavor. amount of coverage required based on their own
Prompted by the wave of high profile attacks and risk tolerances. However, 49 percent of respondents
new data protection rules introduced around the world, surveyed by Marsh admitted that they possess
annual gross written cyber insurance premiums have insufficient knowledge about their own risk
grown by 34 percent per annum over the last seven exposures to assess the insurances available.
years, from $500 million in 2009 to $3.9 billion in 2016. Thus, even corporations with some form of cyber
Strong and long-term growth is expected in the global insurance may be unprotected against indirect
cyber insurance market, which is projected to reach losses that cannot be measured (reputational losses,
$9billion by 2020.
However, the cyber insurance market remains
heavily skewed towards the US: Insurance take-up rate Exhibit 1: GLOBAL CYBER INSURANCE MARKET
was 55 percent in the US in 2016, compared to 36 and
2016 INSURANCE PREMIUMS
30percent in the UK and Germany respectively. The $3.9 BILLION GLOBAL FIGURES
take-up rate in APAC was even lower even though data PERCENT
is scarce. The distribution is worse for cyber insurance 100
premiums, which was again largely dominated by the US.
90%
The US is expected to continue dominating the
global cyber insurance market over the next few
years. A key driving force is the mandatory breach
notification laws, the first of which was enacted in
California in 2002. Today, 47 out of the 50 US states 50
have enacted the legislation, following the basic
tenets of Californias original law.
Despite the proliferation of technology and
cyberattacks in APAC, there lies significant
opportunities for insurers here since APACs cyber 4% 6%
insurance market share remains negligible. 0
This suggests strong growth potential and Europe Rest of World United States
including APAC
significant opportunities for insurers in the region
the cybersecurity market in APAC is projected to Source: Oliver Wyman
Intellectual Loss of value of an IP asset, expressed in terms of loss of revenue as a result of reduced market share
property(IP) theft
Business Lost profits or extra expenses incurred due to the unavailability of IT systems or data as a results of
interruption cyberattacks or other non-malicious IT failures
Data and The cost to reconstitute data or software that has been deleted corrupted
software loss
Cyber extortion The cost of expert handling for a extortion incident, combined with the amount of the ransom payment
Cybercrime/ The direct financial loss suffered by an organization arising form the use of computers to commit fraud or
cyber fraud theft of money, securities or other property
The cost to investigate and respond to a privacy breach event, including IT forensics and notify affected
Breach of data subjects
privacy event
Third-party liability claims arising for the same incidents. Fines from regulators and industry associations
Network failure Third-party liabilities arising from certain security events occurring within the organizations IT network
liabilities or passing through it in order to attack a third party
Impact of Loss of revenues arising from an increase in customer churn or reduced transaction volumes, which can
reputation be directly attributed to the publication of a defined security breach event
Physical asset First-party loss due to the destruction of physical property resulting from cyberattacks
damage
Death and Third-party liability for death and bodily injuries resulting from cyberattacks
bodily injury
Incident Direct losses incurred in investigating and closing the incident and minimizing post-incident losses.
investigation and Applies to all the other categories/events
response costs
This report may not be sold, reproduced or redistributed, in whole or in part, without the prior written permission of Marsh & McLennan Companies, Inc.
This report and any recommendations, analysis or advice provided herein (i) are based on our experience as insurance and reinsurance brokers or
as consultants, as applicable, (ii) are not intended to be taken as advice or recommendations regarding any individual situation, (iii) should not be
relied upon as investment, tax, accounting, actuarial, regulatory or legal advice regarding any individual situation or as a substitute for consultation
with professional consultants or accountants or with professional tax, legal, actuarial or financial advisors, and (iv) do not provide an opinion
regarding the fairness of any transaction to any party. The opinions expressed herein are valid only for the purpose stated herein and as of the date
hereof. We are not responsible for the consequences of any unauthorized use of this report. Its content may not be modified or incorporated into or
used in other material, or sold or otherwise provided, in whole or in part, to any other person or entity, without our written permission. No obligation
is assumed to revise this report to reflect changes, events or conditions, which occur subsequent to the date hereof. Information furnished by
others, as well as public information and industry and statistical data, upon which all or portions of this report may be based, are believed to be
reliable but have not been verified. Any modeling, analytics or projections are subject to inherent uncertainty, and any opinions, recommendations,
analysis or advice provided herein could be materially affected if any underlying assumptions, conditions, information, or factors are inaccurate
or incomplete or should change. We have used what we believe are reliable, up-to-date and comprehensive information and analysis, but all
information is provided without warranty of any kind, express or implied, and we disclaim any responsibility for such information or analysis or to
update the information or analysis in this report. We accept no liability for any loss arising from any action taken or refrained from, or any decision
made, as a result of or reliance upon anything contained in this report or any reports or sources of information referred to herein, or for actual results
or future events or any damages of any kind, including without limitation direct, indirect, consequential, exemplary, special or other damages, even
if advised of the possibility of such damages. This report is not an offer to buy or sell securities or a solicitation of an offer to buy or sell securities. No
responsibility is taken for changes in market conditions or laws or regulations which occur subsequent to the date hereof.
ABOUT THE GLOBAL RISK CENTER
Marsh & McLennan Companies Global Risk Center addresses the most critical challenges facing enterprise and societies around the
world. The center draws on the resources of Marsh, Guy Carpenter, Mercer, and Oliver Wyman and independent research partners
worldwide to provide the best consolidated thinking on these transcendent threats. We bring together leaders from industry,
government, non-governmental organizations, and the academic sphere to explore new approaches to problems that require shared
solutions across businesses and borders. Our Asia Pacific Risk Center in Singapore studies issues endemic to the region and applies an
Asian lens to global risks. Our digital news services, BRINK and BRINK Asia, aggregate timely perspectives on risk and resilience by and
for thought leaders worldwide.
Marsh & McLennan Companies (NYSE: MMC) is a global professional services firm offering clients advice and solutions in the areas
of risk, strategy, and people. Marsh is a global leader in insurance broking and risk management; Guy Carpenter is a global leader in
providing risk and reinsurance intermediary services; Mercer is a global leader in talent, health, retirement, and investment consulting;
and Oliver Wyman is a global leader in management consulting. With annual revenue of $13 billion and approximately 60,000
colleagues worldwide, Marsh & McLennan Companies provides analysis, advice and transactional capabilities to clients in more than
13 0 countries. The Company is committed to being a responsible corporate citizen and making a positive impact in the communities
in which it operates.
Visit www.mmc.com for more information and follow us on LinkedIn and Twitter @MMC_Global
Copyright 2017 Marsh & McLennan Companies, Inc. All rights reserved.