a security economics service platform for smart security
play

a Security ECONomics service platform for smart security investments - PowerPoint PPT Presentation

a Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 era SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions The 17th International Conference on Trust,


  1. a Security ECONomics service platform for smart security investments and cyber insurance pricing in the beyonD 2020 era SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions The 17th International Conference on Trust, Privacy and Security in Digital Business TrustBus2020 Virtual Event, 14-17 September 2020 Co-funded by the Horizon H2020 Framework Programme of the European Union under grant agreement no 823997.

  2. Motivation • Social media logins is available for $2.73 • Since COVID-19, the US FBI reported an increase of each in the Dark Web. 300% in reported cybercrimes. • Cybercrime damage may cost the world $6 trillion • For sale in the Dark Web annually by 2021. 20 billion passwords & emails . • 67% increase in security breaches in the last five years. • Cost of ransomware to businesses will top $20 billion in 2021. • A ransomware attack every 14 seconds . https://blog.s4rb.com H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 2

  3. Cyber Attacks • NotPetya, Worldwide, 2017 • Marriott Cyberattack, 2018 • Ransomware • Since 2014 • $300 to regain access on each computer • 500M guest records exposed • Mondelez: $100M • Reimbursements: $71M • Maersk: $300M • $120M fined under GDPR • Merck: $300M • Insurers had denied claims • Shen-attack scenario • Ransomware hypothesis • Cost of Cyber Attack on Asia-Pacific Ports https://industryanalysts.com Could Reach $110B. l Simon Weckert Causes Google Maps • 92% of all losses resulting from a cyber attack “Traffic Jams” By Carrying 99 Cell Phones, would not be insured February 2020 H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 3

  4. Challenges in Risk Mitigation • Allocate adequate budget • Security Team’s understanding • Motivation • Data sources • Infrastructure • Validation • Awareness • Quality • Methods • Speed • New Threats emerging • Correlation • Human error • Integrate security tools with the organization • Credibility www.mindthegap.ngo H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 4

  5. The SECONDO platform SECONDO proposes an Economics-of-Security-as-a-Service (ESaaS) platform that encompasses a comprehensive cost-driven methodology for: • estimating cyber risks based on a quantitative approach (on both technical and non-technical aspects) • recommending optimal investments in cyber security for efficient risk management • determining the residual risks and estimating the cyber insurance premiums www.massey.ac.nz H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 5

  6. The SECONDO platform Quantitative Risk Cyber Security Cyber Insurance Analysis Module Investment Module Coverage and Continuous Risk Premiums Module Monitoring Module Risk Analysis Ontology and Smart Econometrics Harmonisation Module Contracts Module Social Engineering Insurance Insurance Game Theoretic Assessment Module Ontology Estimation Module Asset Pricing Big Data Collection and Processing Module Optimal Security Enhanced Risk Cyber Insurance Investment Assessment Policies Estimation H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 6

  7. The SECONDO platform Blockchain Cyber Security Investment Module Quantitative Risk Analysis Module Cyber Insurance Coverage and Premiums Module Risk Assessment Metamodel Continuous Risk Monitoring Module Risk Assessment Existing Risk Smart Analysis Tools Risk Analysis Ontology and Contracts Costs Harmonisation Module Econometrics Module Social Engineering data Insurance Insurance External Sources Reports Ontology Social Engineering Assessment Module Estimation Game Theoretic Module Defending Strategies Pricing External Sources Analytics Asset Pricing Analytics Big Data Collection and Processing Module Risk related data (e.g. logs, external sources) Enhanced Risk Assessment Optimal Security Investment Cyber Insurance Policies Estimation H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 7

  8. SECONDO technologies Analyze Data Acquire Data • Python • Phishing • Pandas Library • SIEM • ELK stack 01 • Log files (Firewall, IDS) 02 • QORAS Method • Social Media • Nash Equilibria • ELK stack • Python • Apache Intelligence • Econometric Methods 04 • Optimal Decisions Continuous Risk Monitoring 03 • Premiums and Coverages • OLISTIC Enterprise Risk Management • Privacy-preserving smart contracts • Blockchain • Solidity • Ethereum private blockchain H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 8

  9. Use Cases • Use Case 1 – Human susceptibility to cybersecurity breaches in IoT- enabled smart home • “IoT devices typically attacked within 5 minutes.” NETSCOUT • Use Case 2 – Optimal Patching of Airport Cyber Infrastructures Assess 1. 66% of the airports have data exposed on the Dark Web 2. 97% of the airport websites have outdated web software 100 of the biggest international airports ImmuniWeb Refine • Use Case 3 – Cyber insurance for Innovative SME • “ 28% of data breaches in 2020 involve small businesses.” • Verizon Adapt • Use Case 4 – Cyber Risk Transfer in Maritime Industry • “400% increase in hack attempts since February 2020.” • Naval Dome H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 9

  10. SECONDO Application • Phase 1 : Cyber-physical Risk assessment • Identify assets, vulnerabilities and threats. Phase 1 • RAOHM : quantitatively compute the overall risk. • Phase 2 : Cyber-physical Risk management • Cyber-physical risk management utilizing the risk assessment results. • ECM & GTM : payoff functions and optimal controls selection strategies. Phase 2 • CISM : optimal ways to invest in cybersecurity controls. • Phase 3 : Insurance exposure estimation, coverage and premium calculation • CICPM : collect data and produce optimal insurance premium. Phase 3 • Optimal deal with policies of the agreement being stored as a smart contract on a blockchain. • CRMM : Continuously monitor for possible violation of the agreed policies. H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 10

  11. The SECONDO challenges 6. Adjust to organization topology 1. Optimal Risk Assessment 2. Smart Contracts 7. Accurate Data 3. Cyber Threat Mitigation 8. Continuous Risk Monitoring 4. Predict Attacking Scenarios 9. Detect-Prepare-Prevent-Protect 10. Reduce cyber security budget 5. Adapt to new changes and needs H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 11

  12. SECONDO 4 Universities and 4 SMEs University of Piraeus Research Center - Greece University of Surrey - United Kingdom Cyprus University of Technology - Cyprus University of Greenwich - United Kingdom Ubitech Limited - Cyprus LSTECH Espana SL - Spain KROMAR EPE, Greece Fogus Innovations & Services P.C., Greece H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 12

  13. Visit us for our latest news Find us on social media www.secondo-h2020.eu @H2020Secondo @ H2020Secondo SECONDO Project H2020 – Grant Agreement no. 823997 TrustBus, 14-17 September 2020 13

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend