Extra FSLS ViewPoints - Data Governance - FINAL - 9 January 2018 - Web
Extra FSLS ViewPoints - Data Governance - FINAL - 9 January 2018 - Web
• Cyber risk continues to grow as risk management and governance try to catch up (pages
24–39) . Cyber risk is not new, but it continues to grow and the nature of the risk changes
quickly. The consequences of a major breach could carry massive direct costs, and
potentially even worse indirect costs, including reputational damage. Boards are under
pressure to be sure that cyber risk is being effectively managed in their institutions. Risk
managers and directors are making progress toward better cyber governance, but it
remains a challenging objective.
What is GDPR?
The GDPR, which will come into force in May 2018, applies to any
company that processes the personal data of an EU subject,
regardless of the firm’s location. The regulation requires that
contracts governing consent to use data be clear and easy to
understand. It grants, or enshrines in law, new rights, including the
right to know whether and how a firm is using an individual’s data,
rights to data access and portability, and the “right to be forgotten,”
meaning the right to have individual data erased and no longer
disseminated. The law imposes a 72-hour mandatory breach-
notification requirement in cases where a breach is likely to “result
in a risk for the rights and freedoms of individuals.” 2 Penalties for
violations are stiff, as much as 4% of the firm’s annual global
revenue or €20 million, whichever is higher. 3
• Scope and cost. “We have millions of customers and vendors around the
“Despite efforts to world. How do you ensure you are storing data and obtaining consent
improve legacy appropriately? It is a mammoth task,” said one director. The large scope of
systems, I wonder the regulation will make compliance costly and requires additional
investments in systems, processes, and personnel. Participants noted that
how many firms
the same challenges that plagued efforts to digitize their enterprises,
know where all
namely issues related to fragmented and legacy systems, will hinder
this data is and compliance with new regulations.
can update their
processes?” • Readiness. Furthermore, readiness surveys suggest most firms are
underprepared. For example, a recent HM Government report suggested
– Director that a mere 6% of UK companies reported being completely ready to meet
their compliance requirements. 4 By some accounts, the financial sector
may be ahead of other sectors as a result of massive system
modernization efforts; however, most directors concede a lot of work
remains to be done. One director asked, “Despite efforts to improve
legacy systems, I wonder how many firms know where all this data is and
can update their processes?” Given these challenges, some participants
Cybersecurity regulations
Several new regulations specifically addressing cyber risk elevate the board’s
role in information security. As with GDPR, some in the industry have decried
these requirements as overly prescriptive, inflexible, costly, and difficult to
comply with. Others worry that they create the additional risk of regulatory
arbitrage. Still, others welcome the additional attention these regulations
bring to important issues. 6 One chief risk officer suggested that new
requirements might force greater attention to and maturation of cybersecurity
functions: “The New York [Department of Financial Services] regulation is
probably a wake-up call. There’s doing cybersecurity oversight well, and then
there's being able to prove it. Most companies are doing pretty well, but can
they prove it? Have corners been cut? A lot of things need to be sharpened
up, so in that sense it’s probably good.”
• Facial recognition. One participant said, “People put selfies on the internet
all the time. Do insurers have right to look at those and use facial
recognition in underwriting? How much information are people putting out
that they think doesn’t have any value?”
Emerging technology will shape the value and use of information assets 15
• Voice patterns. One summit participant noted, “There are start-ups doing
natural-language processing that can measure the tone of voice on
quarterly investor calls to find patterns that give clues about the next
quarter’s results.”
• Behavioral patterns. Some analysts are using the amount of time an
individual pauses over a blank on an online form before answering a
question as a behavioral indicator that could help assess credit or insurance
risk.
• Biometric data. One participant noted that firms are “experimenting with
building consumer wearables that measure three or four biometrics that tell
“The level of data
you a lot—heart rate, sweat, galvanic response. If a wearable is watching
is exploding … But
those signals that indicate an impulse purchase, it delays you. There are
the number of systems that alert people that their bodies are telling them that they don’t
people who know want to do something.”
what to do with it
These new types of data could have a significant impact on financial services
is not very many.”
organizations, but only if the organization can derive meaningful insights from
— Director the oceans of data available. As a participant from the insurance sector said,
“The level of data is exploding—it’s growing at two to three times a year, and
with the increase in computing power, the possibilities are endless. But the
number of people who know what to do with it—whether insurers or
regulators—is not very many.” Another participant said, “The only way to
extract value from data is to do something with it, by using it in some area of
the business.”
Emerging technology will shape the value and use of information assets 16
its actions when exposed to vast quantities of data. Indeed, it is that huge store
of data, along with massive increases in computing power and rapidly
declining data storage costs, that have driven advances in machine learning. 17
In essence, these systems train themselves without human intervention and
improve their ability to perform analysis and make decisions. By 2017, AI
algorithms had achieved or surpassed parity with humans in their ability to
recognize human language. 18 In a very recent breakthrough, a machine-
learning system programmed only with the rules of chess—no strategies or
recipes for winning or example games—achieved “superhuman” levels of play
simply by playing against a version of itself for 24 hours. 19
In the financial services sector, AI and machine learning have much to offer. As
“Anything that one participant noted, “Banks have had lots of data forever. Banking is based
on data.” The same could be said of insurance companies and other financial
involves
services organizations. Machine learning makes it possible to garner insights
identifying
from that information as well as to capitalize on new forms of information.
patterns is better Banks and insurance companies can use AI systems to decide whether to offer
done by AI than credit or how to price an insurance policy, based on analyses that are not
by humans.” possible for human beings to perform. One participant described a Chinese
— Participant insurer that had deployed a mobile app to sign up new customers. The app
used facial recognition software powered by AI not only to verify a person’s
identity, but also to tell if a potential customer was lying on their application. If
the system detected a lie, it would require the applicant to come into the office
to apply in person. A recent study from the Financial Stability Board (FSB)
noted that machine learning is being used “to uncover non-linear relationships
among different attributes and entities, and to detect potentially complicated
behavior patterns of money laundering and the financing of terrorism not
directly observable through suspicious transactions filing from individual
entities.” 20
Summit participants had significant concerns about the implications of
deploying AI, however:
Emerging technology will shape the value and use of information assets 17
tasks such as document review, could be done faster and more accurately
by machines, reducing lawyers’ hours by as much as 13%. 21 The systematic
displacement of—according to some sources—up to 50% of existing tasks
raises questions not only for government policymakers but also for large
companies and their boards. 22
• Ethics and algorithmic decision making. Even putting aside the issue of
“We need to build
deliberate manipulation of data and algorithms, entrusting computers with
ethics into
decision-making authority raises questions. One privacy expert warned,
artificial
“With machine learning, there is also the issue of algorithmic discrimination.
intelligence. How should we think about technologies and what they produce that is not
Ethics should be already captured by legal systems?” An insurance industry leader told a
built in like the group of peers in 2017 that he would “be happy to wager with anybody
business here that any firm represented in this room will have a scandal in the next
objectives.” three years to do with an unethical algorithm. I’m sure it’s going to
happen.” 24 One summit participant said, “We need to build ethics into
— Executive
artificial intelligence. Ethics should be built in like the business objectives.”
• Regulation. Regulators are starting to address the issues associated with
reliance on AI. For example, in addition to prohibiting discrimination by
automated decision-making processes, the GDPR’s “right to explanation”
entitles EU citizens to an explanation if they are adversely affected by
decisions made about them by an algorithm. 25 This may be difficult to
enforce, however: because the algorithms train themselves, it is difficult to
determine why they make certain decisions. One participant asked, “When
processes are difficult to understand, how is discrimination hidden?”
Sometimes even programmers don’t know why algorithms make the
decisions they make, much less regulators and industry leaders. Observers
Emerging technology will shape the value and use of information assets 18
find it unsettling to contemplate machines that are beyond their creators’
understanding or control. 26
What is blockchain?
Emerging technology will shape the value and use of information assets 19
What is blockchain? contd.
All parties have access to the ledger at the same time, which means
that all parties have the same information. Some blockchains are
open or public, meaning anyone has access to them, and individuals
can add data to the ledger anonymously. Others, including most
implementations by financial services organizations, are private or
“permissioned,” meaning only certain parties have access to the
ledger, and the identity of those who add data is known.
Emerging technology will shape the value and use of information assets 20
the transaction is recorded on the blockchain and a smart contract goes
into force. The contract monitors the flight database for status of the flight,
and as soon as a delay is detected, a payment to the policyholder is
automatically triggered. 30
In banking, 22 of the world’s largest banks and fintech start-up R3 (itself a
consortium of some of the world’s biggest banks, launched in 2014)
announced in late 2017 an international payments system that would permit
real currencies—not just cryptocurrencies like bitcoin—to be transacted on
a blockchain. According to R3 and its partners, the elimination of manual
processing and authentication through intermediaries will make payments
faster and more efficient, to the point of enabling almost instantaneous
international payments. 31
• Security. One summit participant said, “It is very early days on this, but
security is really one of the things driving blockchain.” Referring to the
recent Equifax data breach, another participant said, “The critical flaw in
credit reporting agencies is putting all that information in one place.
Blockchain is distributed and decentralized, so no single loss would be
catastrophic.” But like many new technologies, blockchain raises security
risks even as it addresses existing ones. The most well-known
implementation of blockchain technology, bitcoin, has been hacked on
numerous occasions, including a hack in November 2017 in which hackers
stole nearly $70 million worth of bitcoin. 32 However, one participant
observed, “Blockchains have been hacked, but they are maturing and
getting more secure.”
• Reliability. A participant cautioned, “Blockchain relies on encryption, and
the math behind encryption is really solid, but the implementation is not
solid … With blockchain you are surrendering governance, so you need
perfect technology—how likely is that?”
• Fraud and integrity. Another director raised the question of “the integrity of
the data. Will parties put in less-than-authentic data? How can you trust the
data?” Other participants pointed out that the same potential for fraud
existed with older paper-based systems and that the speed of automated
transactions could make fraud easier to detect, while admitting that
blockchain would not eliminate “the need for due diligence.”
Emerging technology will shape the value and use of information assets 21
Application programming interfaces and “open access” to financial
systems
Increasingly, APIs are facilitating deeper collaboration between major
institutions and third parties, enabling both incumbents and challenger firms to
offer new and customized products and services. APIs are “hooks” built into
systems or software that allow other applications to access data or
functionality present in the system. In banking, APIs are typically built on top of
a provider’s internal applications, including legacy and third-party systems and
data. APIs may be open, providing data to a variety of external groups, or
closed, providing data only to select contracted parties or to the institution
itself. Financial institutions can use APIs for services such as reporting or to
meet customer demand for services such as product or price comparisons.
The growth of platform businesses is fueled in large part by APIs that can link
data between organizations.
In the European Union and the United Kingdom, banks will be legally required
to provide third-party access to current accounts via APIs effective January
2018 under PSD2. Some aspects of the United Kingdom’s Open Banking
initiative, which aims to make data more available, are already in effect. 33 While
granting more third parties access to data and systems, PSD2 also includes
“strict security requirements for electronic payments and the protection of
consumers' financial data.” 34 In the United States, providers are increasingly
volunteering to open up their systems to outside groups to develop
complementary applications. 35
Open banking and data sharing through APIs raise both security concerns and
regulatory issues. Offering outsiders greater access to proprietary data and
systems creates many more interfaces that financial institutions and their
partners must secure. Unsurprisingly, this can prove difficult. In 2015, for
instance, a breach of a US Internal Revenue Service API enabled hackers to
steal sensitive tax information from about 100,000 US taxpayers. 36 Not only do
APIs and greater reliance on third parties create security challenges, they raise
thorny liability concerns as well. As one director put it, “If a customer says I
want X company to be my interface and they sign something passing the data
to them, and the company then doesn’t have proper protections and
something happens, who’s liable? In fact, the answer right now is likely the
bank.” Another insisted on the need for “a clear regulatory framework around
these third-party providers that we’re going have to give customer data to.
What obligations do they have?”
Emerging technology will shape the value and use of information assets 22
The new technologies may cause significant sectoral
disruption
The discussions of blockchain, AI, and APIs surfaced questions about the
disruptive potential of new technologies. “The question is who is going to be
the first to participate in the blockchain transformation. If it is fintech firms, how
is that going to impact existing institutions?” asked one participant. Participants
said that open banking with APIs presents a fundamental challenge to the
industry. “Unless we get to the point where we can use the data we have
stored smartly and innovatively, we risk being taken out of the process if third-
parties are better equipped to interface with customers. So actually getting the
data from the basement to the world-leading edge of data analytics is at the
top of the board’s agenda,” said one bank director.
Over the course of the summit, participants discussed other challenges raised
“Unless we get by emerging technology as well:
to the point • Disintermediation. One director noted, “There are clear winners and losers
where we can in this. It is changing the structure and business model of the industry.”
use the data we Another participant noted that in the insurance sector, “brokers will worry,
have stored because intermediaries are the first to get it … Brokers need to be providing
smartly and a valuable service if they want to maintain relevance. Where the broker is a
drag, they shouldn’t exist; where they provide a necessary service, they
innovatively, we
should flourish.”
risk being taken
out of the • Adverse selection and the challenge to risk pooling. Several emerging
process if third- technologies have the potential to help insurers better evaluate and price
parties are better risk, but have the downside of undermining the insurance business model.
One director observed, “When it comes to the pool for writing business,
equipped to
that's the way it started, helping each other if someone had a big loss. I can
interface with
do risk and asset management for one person, but this leads to the idea
customers.
that good risks will stay out and bad risks will be impossible to cover. That
goes against the whole insurance model of helping each other.”
— Director
• Removing friction from the system. Participants noted that emerging
technologies have the potential to lessen the friction created by information
asymmetries and other inefficiencies in the system. One director called that
information asymmetry, “the cornerstone on which banking and insurance
are built” and said that “the flow of information is changing the way
business models are working.” Another participant put it bluntly, saying,
“Taking friction out will decimate the insurance business model."
Emerging technology will shape the value and use of information assets 23
Cyber risk continues to grow as risk
management and governance try to
catch up
Virtually every summit participant said cyber risk is among the top three risks
for their firms. More than any other aspect of data governance, cyber risk and
information security are driving board activity around data and information.
During the last five years, companies and their boards have invested a
tremendous amount of time, energy, and financial resources in improving
cyber risk management. In 2016, some of the largest financial institutions spent
as much as $500 million on cybersecurity efforts, in some cases doubling
expenditures from prior years. 37 Despite this investment, one director spoke
for many when he admitted, “After all of this, I do not know that we are safer.”
No one yet thinks that cyber risk is effectively managed and governed. In fact,
“After all of this, I when asked who believed boards were managing cyber risk effectively, not
do not know that one summit participant raised their hand. Evidence suggests that directors are
right to remain vigilant. The financial services sector has been the most
we are safer.”
targeted sector for cyber attacks, 38 and the cost of attacks continues to climb.
– Director In 2017, some of the most damaging attacks succeeded in paralyzing large
global companies and governments resulting in individual company losses of
several hundred million dollars. 39 As the nature of the threats continues
evolving, so too do the potential vulnerabilities as financial institutions, their
suppliers, and their customers implement new technologies and increase the
surface area for attackers.
Summit participants outline three main causes for the uniquely challenging
nature of cyber risk:
Cyber risk continues to grow as risk management and governance try to catch up 24
• Governance of cyber risk remains a work in progress. Boards are still
trying to define their role in oversight of cyber risk. Stakeholders, including
regulators, are calling for improved cyber oversight—and boards want to
provide it: they would like to be sure their firms are doing everything
possible to protect customers’ money and information. To understand the
risk and their role better, boards are calling on experts and in some cases
creating specialized subcommittees. Yet, getting cyber risk management
and governance right is particularly challenging. When even minor
breaches can have unforeseen consequences, and when major breaches
can have massively damaging and even systemic impacts, how do firms set
a risk tolerance for cyber? And how do they measure and size the risk when
the reputational and other impacts could be greater than the impact of a
breach itself?
Cyber risk continues to grow as risk management and governance try to catch up 25
gang, or a ‘hacktivist’—a cyber villain intent not on theft or random damage,
but on promoting a political or social cause—and knowing at least something
“What risks are
we talking about? of the attacker’s motives will shed light on the attack method and on assets the
attacker may be pursuing. It can help inform where to focus security efforts
We tend to lump
and investment in capabilities. A participant said, “What risks are we talking
them together,
about? We tend to lump them together, but there are distinct threats. External
but there are adversaries in cyberspace, fraud, insider threats, physical security, business
distinct threats.” continuity, accidentally emailing firm information out.”
– Participant A CISO further described what boards should know about their attackers:
What do I expect you as a board to understand? Number one, who
are your adversaries? Are nation-state actors going after you?
They have more sophistication, time, and resources. If you worry
about theft—it’s the old story of I don’t have to outrun the bear I
“I don't care have to outrun the person next to me. If they are after money, you
about the only have to be better than your peers. But, if they are after
answer—just that something particular, you have to outrun the bear. You should ask
management has management, ‘What are top three-to-five criminal gangs after us,
an answer and and what are their techniques?’ I don't care about the answer—just
that management has an answer and that they've thought about it.
that they've
Finally, information about hacktivists and potential insider
thought about it.”
weaknesses in the firm. You want that kind of information into
– CISO what you are facing.
The first six months of 2017 did little to allay director concerns about
cybersecurity, and many experts suggest that the world is entering a
more destructive phase. The headline-grabbing attacks originated in
new locations and used new methods. They tended to be viral, rather
than focused, creating greater potential for collateral damage. Some
used state-sponsored technology that is among the most sophisticated
available. In several cases the intention was to destabilize entire
political systems rather than simply to steal secrets or to harm specific
entities. Appendices A and B provide more detail on recent attacks and
evolving and worrisome features of the current environment.
Cyber risk continues to grow as risk management and governance try to catch up 26
Advanced methods are spreading contd.
Cyber risk continues to grow as risk management and governance try to catch up 27
Advanced methods are spreading contd.
Cyber risk continues to grow as risk management and governance try to catch up 28
Regulators are putting additional pressure on boards
As noted in the first section of this ViewPoints, regulators have been pressing
“If we as for greater board attention, in some cases via formal rulings, like those from
the New York Department of Financial Services, or the rules jointly proposed
regulators try to
by the Federal Reserve, OCC, and FDIC in the US. Some supervisors are
prescribe the way
calling for greater attention to cyber risk management at the board via
to tackle these
supervisory letters, including in the UK. Some participants welcome the
things we will fail, attention and the benefit of having to demonstrate what firms are doing to
… We should be protect themselves. Others worry that regulatory attention may create more of
focusing on a distraction, leading to “long checklists” that add little value. The standards
outcomes” demonstrate a new focus for regulators: a participant noted, “Previously, cyber
regulation was all about prevention. This is about governance models.” A
– Regulator director said, “Everyone is investing a lot, communicating with security
agencies, participating in industry initiatives. As a director, what more can I
really do than continue to press management to be sure we are doing
everything we reasonably can?”
One summit participant observed, “As soon as something pops up as part of
the regulatory regime, the half-life of the related control goes down
dramatically. Attackers become aware of the regulatory requirement, so you
have to do something more and look for unique and unexpected capabilities.”
A regulator acknowledged, “If we as regulators try to prescribe the way to
tackle these things we will fail, we don't have the expertise. What we should be
focusing on outcomes … If we focus on a compliance approach, we will all fail.”
Cyber risk continues to grow as risk management and governance try to catch up 29
tolerance or acceptance that you are willing to take … This allows you to
“If you want to make better decisions. If you want to reduce risk in half are you willing to
reduce risk in half double your investment? At some point, it is not worth doubling the
expense to halve the risk. So, how do you know where to draw line
are you willing to
between mitigation and acceptance?”
double your
investment? How A CISO outlined how boards might go about establishing a cyber risk
do you know appetite: “There are two ways you can approach risk appetite. One is to roll
up cyber risks to create a strategic metric. The second is to create granular
where to draw
tactical metrics. There are benefits to that approach, because they are fully
line between
quantitative. I've never seen a strategic metric without a heavy dose of
mitigation and
subjectivity, and with that much subjectivity it loses value. I would rather
acceptance?” have granular, tactical metrics and appetites bound to those metrics. It
doesn’t give you a complete picture, but if you get a little bit more clarity, it
– Participant
can be enough to drive change.”
• Prioritizing security efforts. Because cyber breaches are inevitable, and
there are limits to the prevention investment that firms can make, many
firms are shifting from zero tolerance to the notion of acceptable losses,
which requires a clear hierarchy of information assets. Industry leaders
increasingly recognize the need to prioritize which risks must be prevented,
acknowledging that some need to be accepted, mitigated, or transferred
through insurance. 43 One CRO described this as moving down from the
crown jewels to the areas where, “while you don’t want to get attacked, it is
more acceptable from a tolerance perspective to have vulnerabilities.” The
CRO continued with an analogy: “Suppose there is a fence around your
house. Can they get through the fence? The locked front door? The safe in
the basement? Getting through the fence may happen every day, but they
“In 2014, boards
should never get into the safe.”
were taking on
oversight of the • Understanding the long-term investment needed. A director asked, “How
risk and they do you determine whether to spend the next $100 or $200 million? What
wrote a blank difference does it make? Or is it a management decision where they can try
check. Now they to define, ‘if I spend x, it would dramatically improve our posture?’” An
executive observed, “If you go back five years, a lot of large financial
wonder when
institutions acquired major capabilities in cybersecurity. They spent a lot of
they get to close
money. Yet, there are still a lot of data breaches. Why? The capabilities
the wallet”
were not mature, and they were implemented in silos. A lot of the
interconnectivity is where we see weaknesses. It created new avenues for
– Executive
attackers.” Another expert said, “In 2014, boards were taking on oversight
of the risk and they wrote a blank check. Now they wonder when they get
to close the wallet, but there are two things to remember: one, we are
Cyber risk continues to grow as risk management and governance try to catch up 30
dealing with 20 years of underinvestment, and two, the bad guys are
evolving as fast as we are, so you have to run faster just to stand still.” The
result, another participant said, is that, “financial institutions need to spend
as much as they can manage financially,” and boards need to accept that
there will be some waste in that investment, but some trial and error is
needed.
• Focusing on response and resiliency. One expert said that boards, after
reading about a breach occurring elsewhere, often ask, “Are we
protected?” when they should be asking, “How do we assess the risk if that
were to happen to us and what are our capabilities to deal with that risk?
The question is not, are we protected, but what is the risk and what are our
competencies to deal with it?” A critical part of security frameworks and
regulatory rules is an emphasis on resilience and recovery. One participant
pointed out, “Security and resiliency are two different things … There’s
prevention, like protecting the crown jewels, and then there’s if you have a
system outage, making sure you have redundancy, etc. That’s really
important—how fast can your systems come back up?” Many boards now
have contingency plans, setting out the steps their firms need to take in the
event of a breach.
A participant pointed out, “With [the breach at] Equifax, the real damage
was in how they responded.” One expert suggested that boards need to
“The question is
clarify their response goals before an attack takes place: “What is your
not, are we
objective in incident response? Is it to do right by the customer? Catch the
protected, but
bad guys? Reduce the likelihood of disclosure? This is an important board-
what is the risk level conversation.” There are important tradeoffs for boards to consider.
and what are our Another participant said, “The longer you wait to inform stakeholders about
competencies to a breach, the more you may be able to find out about the attack, but boards
deal with it?” need to monitor and understand the tradeoff between gaining a more
complete picture and responding quickly.” Following a significant attack,
– Participant the board has a valuable role to play in helping to determine what
information should be released to the public and when, and to be sure the
interests of the customer are prioritized. A participant observed, “The
calculus on what you say or not is complicated, but the evidence suggests
that doing right by customer leads to the better outcome in the long run.” A
director noted, “In the situations where the customer was poorly informed
by the company about what had happened, the boards had little
involvement and were themselves poorly informed.”
Cyber risk continues to grow as risk management and governance try to catch up 31
Refining the ability to measure and monitor cyber preparedness
Conversations with directors and executives from across financial services
reveal a widespread desire for better tools—frameworks, checklists,
dashboards, or lists of questions—to help boards provide effective oversight of
cyber risk. A director described the fundamental challenge they are trying to
address: “What is the scorecard so that the board can see whether we are
getting ahead of the bad guys or behind?” Commonly used tools include: The
Framework for Improving Critical Infrastructure Cybersecurity of the National
Institute of Standards and Technology (the NIST Framework) and the 27000
family of standards from the International Organization for Standardization and
the International Electrotechnical Commission. However, these standards are
highly detailed, technical, and aimed at management and cybersecurity
professionals rather than board directors.
Despite a number of frameworks targeting boards in recent years, directors
“We are choosing still describe a lack of concrete guidance on how to satisfactorily discharge
their duties and what constitutes good practice in the context of complex
tactical metrics
financial institutions. A recent EY study concluded that board members “find
that we think have
that their prime [cybersecurity] challenge is obtaining relevant, objective and
strategic reliable information, presented in business-centric terms. This affects board
implications members’ ability to understand the risks facing their organizations and
because we don’t evaluate management’s response to these risks.” 44 One CISO acknowledged,
have good “There are no widely used strategic metrics, only fairly tactical ones. This is
strategic metrics.” part of the work that needs to be done. We are choosing tactical metrics that
we think have strategic implications because we don’t have good strategic
– CISO metrics.”
Several ideas emerged regarding the kind of metrics and information boards
need:
• Attempts to quantify, without missing the forest for the trees. A CISO
said, “What I give my board is some subjective math on vulnerabilities—the
number and potential severity, how many security updates have we not
finished, and I assign a weight that is subjective and I can tweak. It is not a
risk score, but a vulnerability score compared to how valuable the asset is.”
Another expert suggested that boards push management to use simple
ratings: “You can ask them to assign the risk a score of 1 to 10, then map
that to capabilities measured from 1 to 5. That allows you to look at how
they pair up and assess what we need to invest in order to move from 3 to
4.” These risk indicators can be helpful, but a participant cautioned against
boards and security teams becoming too focused on metrics: “When board
Cyber risk continues to grow as risk management and governance try to catch up 32
members ask a question about a metric like that, that's where all the energy
goes, so if you ask about those metrics, you are impacting the
organization’s focus. And there are other things that need to be done.
Those metrics suggest actions that need to be taken. You risk over
indexing the security team.”
• A range of indicators that can inform board questions. A director noted,
“Boards have to know what the right questions are and to make sure what
“I need users to
they are being presented with is focused enough to address the right risks.
be sensors
This means having the right questions to probe one level below what you
rather than are being presented. What we need is something really specific. We are all
bricks in a wall. I getting reporting, but the question is, are we getting the right report?”
just need one to Participants listed some indicators of broader preparedness for boards.
report it.” Among them: how quickly systems are being patched to ensure they are up
to date; how many “pipes” or points of connection the company has to the
– CISO internet; the frequency and effectiveness of internal training; the results of
tests to see what percentage of users click on phishing emails and the
percentage that report it. As a CISO said, “I care less about the percentage
that clicks than the group that reports. I need users to be sensors rather
than bricks in a wall. I just need one to report it.” Other indicators include
the results and frequency of independent penetration testing; and internal
audit findings and the time it takes to address them.
• Data that shows trends rather than snapshots. One director said, “For
every new meeting, I don't really care to see a dashboard that shows what
we've blocked, how many attacks we've gotten. That measure is not as
important as the trend line or if we are seeing more hacks.” Unfortunately,
even trend data can be difficult to interpret. One executive reported that his
company was pleased that his firm was improving on measures related to
phishing attacks—until their internal testing team crafted a better email that
tricked a far greater number of employees.
Cyber risk continues to grow as risk management and governance try to catch up 33
meeting those goals and, more importantly, whether they are the right goals
in the first place.
Cyber risk continues to grow as risk management and governance try to catch up 34
One executive said, “If you have a cyber expert in the second line, the most
value comes from a focus on quantification and prioritization among risks. Line
two is strong on quantification of risks, which traditional cyber has been weak
on. Having done that for line two, you can drive more changes of behavior
from the business side.” Having some cyber risk management outside the
direct reporting line to the CIO offers some benefits: “It is fine to have the CISO
report to the CIO, but someone else who is accountable for information
security should not report to the CIO. You need an alternative avenue for
information to go up the chain. There are examples of CISOs reporting to the
general counsel, the CFO, the CRO, or the COO. It partly depends on the
culture of the organization.”
Spreading reporting and accountability can also allow for better delineation of
responsibilities. An executive illustrated the challenge in defining the role of
“You can have this
the cybersecurity function, saying, “Let me tell you some risks under my
whole
purview or that we’ve discussed being under my purview: Fraud, business
conversation
continuity, someone accidentally emailing firm information to the wrong
without ever recipient, etc.” While some participants argued that the CIO should ultimately
mentioning be accountable for cybersecurity, since IT ultimately creates cyber risk, most
technology. It’s a financial institutions are integrating cyber into the three lines of defense model
risk management as well.
discussion.”
Adapting board committee structures and accessing additional
expertise
– Participant
An ongoing debate in network discussions involves board composition and
expertise, particularly related to technology. A cyber expert was blunt, “My
advice to the board: You’re never going to understand this stuff, you need to
get expertise on the board.” Some boards have brought on directors with
technical, or in some cases, even highly specialized cybersecurity expertise,
for example one bank added the former deputy director of the National
Security Agency to their board. In contrast participants generally share the
concern expressed by one who said, “It is very dangerous to rely on one
person, you think to yourself ‘who am I to question them?’ And they end up
being the only person in the room with a viewpoint.” As one director put it,
“We are not experts in a lot of things, and we manage to figure it out. So, you
just have to get educated.” Another participant said, “Boards should not be
despondent. You can have this whole conversation without ever mentioning
technology. It’s a risk management discussion.” Most boards are adding
limited technical expertise, but relying more on third parties to share
information on a regular basis.
Cyber risk continues to grow as risk management and governance try to catch up 35
Boards are engaging third party cybersecurity experts on a regular basis.
Some are experimenting with bringing cybersecurity advisers into special
committees or creating advisory committees to the board. In some cases,
experts are now permanent members of board subcommittees dedicated to
the topic or to related technology issues. A director asserted, “You can’t have
a different board member to understand every technological development. It is
more about having access to experts.” In some cases, different experts from
different outside organizations are brought to provide directors with a broader
view. In others, firms have agreements with specific cybersecurity firms or
experts who regularly advise the board. One executive said, “If you are on a
board, how do you know if you are industry leading in this area? The best
answer is a third-party assessment. The evaluation can tell you where the
institution is and where it came from. Then you ask, what is the next frontier?”
For some boards, the structure of cybersecurity oversight is still evolving.
“We will never While the overall responsibility for managing cybersecurity falls on the entire
solve it … We board, boards organize themselves in a variety of ways to get the job done.
Among participants, responsibility for in-depth review varies among the audit,
manage risks to
risk, or technology committees, where they exist, or some combination of
an acceptable
these committees. Some boards have established subcommittees of the board
level. We are not
focused exclusively on cybersecurity or on related aspects of technology risk.
there now, but
A recent study of US boards found that most boards assign primary oversight
the goal is not
of cyber risk to the audit committee, while 11% assign responsibility to the risk
zero.”
committee. 46 Those who entrust the audit committee with the task often say
– Executive that audit’s familiarity with oversight of controls gives it the right tools and
perspective to oversee cyber risk. “In the audit committee, what we do is all
about process and controls, so our mind-set and day-to-day work is such that
cyber fits well—because it’s always about process,” said one director. One
director reported that her board “shares oversight between the audit
committee and the risk committee. A lot of things cross over, and we pass
information. It’s pretty fluid. When the audit committee starts getting into risk
issues, we park it and pick it up with the risk committee. On cyber, a lot of
issues will be shared between risk and audit.” Increasingly, the range of issues
involving technology is causing more boards to create technology committees,
which will often meet with the risk committee for discussions on cybersecurity.
Cyber risk continues to grow as risk management and governance try to catch up 36
***
An executive reminded summit participants, “We will never solve it, like crime,
or spying. We manage risks to an acceptable level. We are not there now, but
the goal is not zero.” The Summit discussions demonstrated that while cyber
risk has been on board agendas for years, risk management and governance
are still relatively immature and will continue to evolve. The focus over the
course of the summit on a broader set of issues related to data governance,
including privacy and the implications of emerging technologies also suggest
the focus on information security in all its forms will continue to be a priority for
boards. A director said, “All signs point to more focus on cyber risk and more
investment. When your business is digital, your risks are digital.”
Cyber risk continues to grow as risk management and governance try to catch up 37
Appendix A: Notable recent cyber attacks
• Equifax. In September, Equifax, the credit reporting firm, announced that 143 million people
in the US may have had personal financial data stolen in a cyber breach. According to one
analysis, that “accounts for well more than half of all US residents who rely the most on
bank loans and credit cards,” who “are now at a significantly higher risk of fraud and will
remain so for years to come.” 47 This demonstrates that the risk is not just from direct
breaches of financial institutions, but that financial institutions can be exposed to fraud and
financial crime indirectly as the result of breaches elsewhere in the ecosystem, raising
questions
• WannaCry. In May, this ransomware strain spread to more than 100 countries, affecting
public entities, including hospitals, and resulting in an estimated $8 billion in cost. 49 US
intelligence agencies concluded that WannaCry was the work of North Korean hackers. The
attack exploited a Microsoft vulnerability that had a patch, though many organizations had
not applied the patch at the time of the attack.
• NotPetya/Nyetya. A month later, another attack spread around the globe. This attack
significantly damaged Ukrainian infrastructure, caused business interruptions in a number
of sectors, and resulted in hundreds of millions of dollars of damage. While designed to
look like the ransomware, NotPetya was a DeOS attack that wreaked havoc in public and
private systems. 50 One chief information security officer noted, “It was new and a scary
level of risk because it was nation-state technology and it was not controlled. In a situation
like this, it is far easier to be subject to collateral damage, whereas before you had to be
the target. In addition, in a remote-controlled attack, you have two opportunities to get the
attackers: when they enter and when they phone home. Now they may not call home, so
you’ve lost that opportunity.” Ukraine has suggested Russia is behind the attack, given the
targeting of Ukrainian assets and the timing on the eve of Constitution Day, which
celebrates the country’s split from the Soviet Union. 51
• WireX. This network, comprising tens of thousands of Android mobile devices across more
than 100 countries, was used to launch a number of cyber attacks. 52 It relied on
approximately 300 different free mobile apps available via Google’s Play store that
mimicked innocuous programs.
• SWIFT. In 2016, criminals with suspected links to North Korea compromised the SWIFT
financial institution messaging servers, resulting in the theft of US $81 million from the
central bank of Bangladesh 53
• Advancing Cyber Resilience: Principles and Tools for Boards (World Economic Forum,
2017).
• Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers
(Palo Alto Networks and the New York Stock Exchange, 2015).
Directors
• Homaira Akbari, Non-Executive • Scott Moeller, Risk Committee Chair,
Director, Santander JPMorgan Securities
• Joan Amble, Non-Executive Director, • Nathalie Rachou, Risk Committee Chair,
Zurich Société Générale
• Mike Ashley, Audit Committee Chair, • Dorothy Robinson, Risk and
Barclays Compliance Committee Chair, TIAA
• Norman Blackwell, Chair of the Board • Alexandra Schaapveld, Audit and
and Nomination & Governance Internal Control Committee Chair,
Committee Chair, Lloyds Banking Société Générale
Group • Bob Scully, Non-Executive Director,
• Jan Carendi, Senior Advisor, SOMPO Chubb & UBS
• Kathleen Corbet, Lead Director, • Ted Shasta, Non-Executive Director,
MassMutual Chubb
• Nick Donofrio, Non-Executive Director, • Kory Sorenson, Audit Committee Chair,
Liberty Mutual SCOR
• Dina Dublon, Risk Committee Chair, • Eric Spiegel, Audit Committee Chair,
Deutsche Bank Liberty Mutual
• John Fitzpatrick, Risk and Capital • Doug Steenland, Chair of the Board,
Committee Chair, AIG AIG
• Tim Flynn, Non-Executive Director, • Kate Stevenson, Corporate
JPMorgan Chase Governance Committee Chair, CIBC
• Sheila Hooda, Non-Executive Director, • Katie Taylor, Chair of the Board, RBC
Mutual of Omaha • Joan Lamm-Tennant, Non-Executive
• Olivia Kirtley, Risk Management Director, Hamilton Insurance
Committee Chair, US Bancorp
• Eileen Mercier, Audit Committee Chair,
Intact Financial
1
Regulation 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural
Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing
Directive 95/46/EC, 2016 O.J. (L119).
2
“GDPR Key Changes,” GDPR Portal, accessed December 14, 2017.
3
“GDPR Key Changes,” EU GDPR Portal. For more information on the GDPR, see EY, GDPR: Demanding New
Privacy Rights and Obligations Perspectives for Non-EU Financial Services Firms (London: EYGM Limited, 2017).
4
HM Government, FTSE 350 Cyber Governance Health Check Report 2017 (London: Department for Digital,
Culture, Media, and Sport, July 21, 2017).
5
See, for example, Duncan Tucker, “Latin America’s Complex Data Protection Laws Not Cause for US Firms to
Reshore,”Nearshore Americas, April 21, 2015; Melanie Bates, “Droit À L’Oubli: Canadian Perspective on the Global
‘Right to Be Forgotten’ Debate,” Future of Privacy Forum (blog), April 25, 2017; Julie Seaman, “Latin American Data
Export Governance,” Information Accountability Foundation (blog), August 2, 2017; Martin Abrams, “Europe Sets
the Standard—Other Regions Follow,” Information Accountability Foundation (blog), July 19, 2017.
6
See Lalita Clozel, “Regulators Doing ‘More Harm Than Good’ on Cybersecurity: The Clearing House,” American
Banker, June 2, 2017, and Shaun Waterman, “Accountants Join Pushback on Feds’ Cyber Rules for Banks,”
Cyberscoop, January 24, 2017.
7
Keith Button, “New Financial Services Cyber Laws Lay Responsibility on Boards,” Agenda, August 7, 2017.
8
Cybersecurity Requirements for Financial Services Companies, N.Y. Comp. Codes R. & Regs. tit. 23, § 500 (2017).
9
NAIC, “NAIC Passes Insurance Data Security Model Law,” news release, October 24, 2017 and Gloria Gonzalez,
“NAIC Cyber Security Model Law Hews to New York State’s Standard,” Business Insurance, September 4, 2017.
10
Enhanced Cyber Risk Management Standards, 82 Fed. Reg. 8172 (proposed October 19, 2016) (to be codified at
12 C.F.R. 30 and 364) and EY, Enhanced Cyber Risk Management Standards for Financial Institutions, Financial
Services Regulatory Alert (London: EYGM Limited, 2017).
11
EY, Enhanced Cyber Risk Management Standards for Financial Institutions, 4.
12
For more information on critiques of large technology, data, and platform companies, see, for example, Tony
Romm, “Tech Companies Fear Repercussions from a New Bill in the U.S. Congress to Combat Human Trafficking”
Recode, August 1, 2017; Times Editorial Board, “Facebook’s Lab Rats, A.K.A Users,” Los Angeles Times, June 30,
2014; Jennifer Rankin, “EU to Find Ways to Make Google, Facebook and Amazon Pay More Tax,” Guardian,
September 21, 2017.
13
Navin Suri, “A Bank Is a Data Company,” LinkedIn (blog), August 28, 2017.
14
“Legitimate Interest,” GDPREU.org, accessed December 17, 2017.
16
David Reinsel, John Gantz, and John Rydning, Data Age 2025: The Evolution of Data to Life-Critical (Framingham,
MA: IDC, 2017), 7.
17
Financial Stability Board, Artificial Intelligence and Machine Learning in Financial Services: Market Developments
and Financial Stability Implications (Basel: Financial Stability Board, 2017), 8.
18
Dave Gershgorn, “The Data That Transformed AI Research—and Possibly the World,” Quartz, July 26, 2017; Emil
Protalinski, “Google’s Speech Recognition Technology Now Has a 4.9% Word Error Rate,” VentureBeat, May 17,
2017; Matt Weinberger, “Microsoft's Voice-Recognition Tech Is Now Better Than Even Teams of Humans at
Transcribing Conversations,” Business Insider, August 21, 2017; Alison DeNisco Rayome, “Why IBM's Speech
Recognition Breakthrough Matters for AI and IoT,” TechRepublic, March 13, 2017.
Endnotes 44
19
David Silver et al., Mastering Chess and Shogi by Self-Play with a General Reinforcement Learning Algorithm
(Cornell, NY: Cornell University Library, 2017).
20
Financial Stability Board, Artificial Intelligence and Machine Learning in Financial Services: Market Developments
and Financial Stability Implications, 23.
21
Steve Lohr, “A.I. Is Doing Legal Work. But It Won’t Replace Lawyers, Yet,” New York Times, March 19, 2017.
22
James Manyika, Michael Chui, Mehdi Miremadi, Jacques Bughin, Katy George, Paul Willmott, and Martin
Dewhurst, A Future that Works: Automation, Employment, and Productivity (McKinsey & Company, 2017), vii.
23
For more information on algorithmic hacking, see Kira Radinsky, “Your Algorithms Are Not Safe from Hackers,”
Harvard Business Review, January 5, 2016.
24
“Discriminatory Algorithms 'A Scandal Waiting to Happen,’” InsuranceERM, November 15, 2017.
25
Bryce Goodman and Seth Flaxman, “EU Regulations on Algorithmic Decision-Making and a ‘Right to
Explanation,’” (paper, 2016 ICML Workshop on Human Interpretability in Machine Learning, New York, NY, June
28, 2016).
26
Will Knight, “The Dark Secret at the Heart of AI,” MIT Technology Review, April 11, 2017.
27
Financial Stability Board, Artificial Intelligence and Machine Learning in Financial Services: Market Developments
and Financial Stability Implications, 26.
28
Martin Arnold and Jane Wild, “Suits Join the Hoodies with Blockchain Push,” Financial Times, August 24, 2016.
29
EY, Better-Working Insurance: Moving Blockchain from Concept to Reality (London: Ernst & Young LLP, 2017), 4.
30
Maria Terekhova, “AXA Turns to Smart Contracts for Flight-Delay Insurance,” Business Insider, September 15,
2017. See also “How Smart Contracts Work,” IEEE Spectrum, October 2017, 34–35.
Roger Aitken, “R3's 'Blockchain-Inspired' Payments Solution Poised to Interact with Central Bank Digital
31
Endnotes 45
44
EY Center for Board Matters, The Evolving Role of the Board in Cybersecurity Risk Oversight (London: EYGM
Limited, 2017), 3.
45
For an analysis of the application of 3LoD to cybersecurity, see EY, Cyber Risk Management Across the Lines of
Defense (London: EYGM, 2017).
46
Larry Clinton, Cyber-Risk Oversight, NACD Director’s Handbook Series (Washington, DC: National Association of
Corporate Directors, 2017), 10.
47
Dan Goodin, “Why the Equifax breach is very possibly the worst leak of personal info ever,” ArsTechnica,
September 8, 2017.
48
Hannah Kuchler, “Hackers infiltrate systems of energy companies,” Financial Times, September 6, 2017.
49
Suzanne Barlyn, “Major Cyber Attack Could Cost Global Economy $53 Billion: Lloyd’s.” Insurance Journal, July 17,
2017.
50
Andy Greenberg, “Petya Ransomware Epidemic May Be Spillover from Cyberwar,” Wired, June 28, 2017.
51
Ibid.
52
Brian Krebs, “Tech Firms Team Up to Take Down ‘WireX’ Android DDoS Botnet.”
53
Aruna Viswanatha and Nicole Hong, “U.S. Preparing Cases Linking North Korea to Theft at N.Y. Fed,” Wall Street
Journal, March 22, 2017.
Endnotes 46