As an observer of the recent census debacle, what do you see as the - - PowerPoint PPT Presentation

as an observer of the recent census debacle what do
SMART_READER_LITE
LIVE PREVIEW

As an observer of the recent census debacle, what do you see as the - - PowerPoint PPT Presentation

Poll 1 As an observer of the recent census debacle, what do you see as the key cause?: A. Technology failure B. Use of a third party service provider C. The threat landscape is too huge D. Ignorance / hubris A Revolution in Cyber Threats?


slide-1
SLIDE 1
slide-2
SLIDE 2
slide-3
SLIDE 3
slide-4
SLIDE 4
slide-5
SLIDE 5

Poll 1 As an observer of the recent census debacle, what do you see as the key cause?:

  • A. Technology failure
  • B. Use of a third party service provider
  • C. The threat landscape is too huge
  • D. Ignorance / hubris
slide-6
SLIDE 6

A Revolution in Cyber Threats?

Greg Austin Australian Centre for Cyber Security, UNSW Canberra Professorial Fellow, EastWest Institute, New York G.Austin@adfa.edu.au | gaustin@ewi.info

slide-7
SLIDE 7

States: Most Dangerous, Most Capable

Wikileaks releases 20,000 hacked DNC emails 22/7/2016 Trump “invites” Russia to hack Clinton 27/07/2016 White House: “we are in the midst of a revolution of the cyber threat—one that is growing more persistent, more diverse, more frequent and more dangerous every day” 26/7/2016

slide-8
SLIDE 8

PWC 2016 Global Economic Crime Report

slide-9
SLIDE 9

Eight Vectors of Attack

slide-10
SLIDE 10

Symantec 2016

slide-11
SLIDE 11

Threat Trend

Capability TECHNOLOGY CRIMINALS CORPORATES & CITIZENS GOV’T POLICY POLICE Time

slide-12
SLIDE 12

Q&A

Please submit your questions using Zeetings

slide-13
SLIDE 13

Poll 2 Cyber risks are a major concern for all businesses, where do you see the largest impact to your business from a cyber incident?:

  • A. Business interruption
  • B. Brand & reputation
  • C. Customer churn
  • D. All of the above
slide-14
SLIDE 14

Current Cyber Risk Legal Landscape Obligations and Opportunities...

Scott Thiel Partner, DLA Piper

slide-15
SLIDE 15

AsiaPac cyber & privacy regimes at a glance

Before (2011) At 2016

slide-16
SLIDE 16
slide-17
SLIDE 17

Continuing evolution of the Asian legal landscape

DLA Piper Cybertrak

slide-18
SLIDE 18

Australia Privacy Amendment (Notification of Serious Data Breaches) – Bill 2015

  • Imposes a compulsory notification mechanism upon entities when a

serious data breach occurs

  • Note – definition of "harm" and "real risk" is very broad and all-

encompassing

A serious data breach occurs if:

"unauthorised access to, or unauthorised disclosure of, any of personal information, credit reporting information, credit eligibility information, tax file number information “will result in a real risk of serious harm to any of the individuals to whom the information relates”, or any of that information is of a kind specified in the regulations", and; "there is a real risk of serious harm to the individual to whom the information relates as a result of the data breach"

slide-19
SLIDE 19

Current Regulatory Framework – China

Major Mandates

  • Combination of various laws, e.g. criminal law; civil law; tort law; and

constitution, with limited legal effect

  • Decision of the Standing Committee of the National People's Congress

for Enhancing the protection of Internet based Information

  • CIS Regulation and IT Banking Guideline

Security O

  • Data Controller must take appropriate technical and organizational

measures against unauthorized or unlawful processing and against accidental loss, destruction of, or damage to, personal data. Breach Notification O

  • No mandatory requirement
  • Yes for security breach notices to authorities may be required, as in the

following examples:

  • Public Security bureaus
  • Telecom authorities
  • China Banking Regulatory Commission
slide-20
SLIDE 20

Proposed cyber security laws in the PRC

  • Draft Cyber Security Law of the People's Republic of China
  • Second draft published in July 2016
  • National-level law exclusively devoted to cybersecurity and data privacy issues
  • App operation regulations

Imposes cybersecurity

  • bligations on network
  • perators (incl.

censorship requirements) Personal data privacy and data protection? Content control and censorship Data Localization

slide-21
SLIDE 21

Current Regulatory Framework – Hong Kong

Major Mandates

  • Personal Data (Privacy) Ordinance ("PDPO")
  • Sector-specific Codes and Guidelines
  • Hong Kong Monetary Authority (HKMA) - Supervisory Policy Manual
  • Securities and Futures Commission (SFC) - Circular to all licensed

corporations on Information technology management

  • Guidance for Government Agencies

Security O

  • Data users are required by law to take all practicable steps to protect

personal data

  • Where 3rd party processor is engaged  contractual / other means required

for security and period of retention Breach Notification O

  • No mandatory requirement under the PDPO
  • Yes for authorised institutions to notify HKMA of major security breaches
  • e.g. In 2012, HSBC was under global cyber-attacks and HSBC had

notified HKMA and prepared a report

slide-22
SLIDE 22

Current Regulatory Framework – Australia

Major Mandates

  • A mix of Federal and State/Territory legislation:
  • Federal Laws, e.g. Federal Privacy Act 1988 (Cth) ("Privacy Act"), Healthcare

Identifiers Act 2010, Personally Controlled Electronic Health Records Act 2012, etc.

  • State and Territory Laws, e.g. Information Act 2002 (Northern Territory),

Privacy and Personal Information Protection Act 1998 (New South Wales), etc.

  • Sector-specific requirements
  • Prudential Standards enforced by the Australian Prudential Regulation

Authority Security O

  • Appropriate security measures (ie 'take reasonable steps') to protect any personal

information it retains from misuse and loss and from unauthorised access, modification or disclosure

  • Reasonable steps to destroy or permanently de identify personal information if it is

no longer needed for the purpose(s) for which it was collected Breach Notification O

  • No mandatory requirement under the Privacy Act but note guidance issued by the

Office of the Australian Information Commissioner

  • Yes for Health sector and Finance Sector
slide-23
SLIDE 23

Current Regulatory Framework – Singapore

Major Mandates

  • Computer Misuse and Cybersecurity Act
  • Technology Risk Management (TRM) Guidelines and Notice
  • Personal Data Protection Act ("PDPA") formally enacted in January

2013 Security O Reasonable security arrangements Breach Notification O

  • No specific legislative requirements regarding data protection breaches
  • Financial institutions are required to notify the Monetary Authority of

Singapore (MAS) of a range of serious IT security incidents and malfunctions

slide-24
SLIDE 24

Current Regulatory Framework – Japan

Major Mandates

  • The Act on the Protection of Personal Information ("APPI") and various

sector specific guidelines regarding APPI

  • Act on the Prohibition of Unauthorized Computer Access
  • Cybersecurity Strategy and Ministry Guidelines addressing issues

related to the APPI and IT Measures Security O

  • Specific guidance set out in Ministry guidelines
  • These necessary and appropriate measures generally include

‘Systematic Security Control Measures’, ‘Human Security Control Measures’, ‘Physical Security Measures’ and ‘Technical Security Control Measures’. Breach Notification O

  • No general requirement under APPI, but specific ministry guidelines

provided for business operators

slide-25
SLIDE 25

Current Regulatory Framework – South Korea

Major Mandates

  • Act on the Protection of Information and Communications

Infrastructure

  • Combination of laws – Personal Information Protection Act ("PIPA",

effective 30/09/11)

  • The Act on Promotion of IC Network Utilization and Information

Protection (IC Network Act) Security O

  • Mandatory security arrangements, e.g.
  • establishment and implementation of an internal control plan for

handling Personal Data in a safe way

  • installation and operation of an access control device, such as a

system for blocking intrusion to cut off illegal access to Personal Data Breach Notification O

  • Yes, required in case of leakage/ intrusion/ theft of data (including

health care and financial information)

slide-26
SLIDE 26

Current Regulatory Framework – Thailand

Major Mandates

  • Combination of laws – Constitution of Thailand/ Thai Penal Code/ Child

Protection Act

  • Computer Crime Act
  • Electronic Transaction Act
  • Personal Information Protection Act (Drafting)

Security O

  • Specific Businesses – maintain level of security
  • Non-Specific businesses – prevention of unauthorized access

Breach Notification O

  • No requirement
slide-27
SLIDE 27

Cyber compliance as a competitive advantage

slide-28
SLIDE 28

General perception towards cyber security

  • 74% of US executives expressed in survey* that the main purpose of cyber security is to

reduce risk – rather than to enable growth

  • General perception:
  • Costly
  • Complex
  • Inefficient
  • Hinders productivity
  • Too difficult
  • Won't happen to me
  • However… What I will tell you is that cyber security is:
  • Not a "doom & gloom" matter
  • Much more than an "insurance policy" in IT
  • Think of it as something that helps your business grow
slide-29
SLIDE 29

Benefits:- Competitive Advantage

  • Reassuring from a customer's point of view
  • Cyber security is often one key area customers look out for
  • This is often brought up as a matter of importance in pitches and contracts
  • Transactions often involve large amounts of customer's private data
  • Customers will not want to take unnecessary risks
  • Being cyber secure is something you can proudly advertise in your portfolio
  • f strategic assets
  • Data analytics capability is a desirable attribute
slide-30
SLIDE 30

Benefits:- Cyber Intelligence

  • Compliance is a big driver in the adoption of cyber intelligence:-
  • Complying with relevant mandates is an important step in understanding

your data assets and data mining opportunities

  • Cyber compliance will often get attention and budget
  • Intelligence aids both regulatory and internal policy compliance by logging

and proactively monitoring diverse information across the enterprise in real time, providing accountability, transparency and measurability.

  • Become Data Aware….
slide-31
SLIDE 31

Benefits:- Productivity Enhancement

  • Results in cost savings and

productivity enhancements

  • Saves time (and therefore

manpower and cost) in troubleshooting service issues

  • Security tools can effectively isolate

faults and assist get back online much faster

slide-32
SLIDE 32
  • Enables mobile productivity
  • Workplace is no longer just restricted to servers,

workstations, or email accounts, but rather we need to consider mobile devices and the culture of BYOD

  • Increasingly important for entities to be able to allow

their employees to work anywhere, anytime, on mobile devices

  • With the adoption of enhanced security solutions,

you can enable enhanced mobile adoption and productivity whilst maintaining full security and compliance

Benefits:- Mobile Working Enabler

slide-33
SLIDE 33

Benefits:- Capacity Planning

  • Assists IT with capacity planning
  • Security is all about visibility into a network
  • With that visibility comes the added benefit of

gaining a handle on what resources are being used – essential for an informed decisions

  • n:-
  • Internal or external capacity management
  • Migration to offshore and cloud based

solutions

slide-34
SLIDE 34

DLA Piper CyberCert

slide-35
SLIDE 35

Q&A

Please submit your questions using Zeetings

slide-36
SLIDE 36

Poll 3 What do you see as the most important factor in mitigating cyber risk:

  • A. People, policies and procedures
  • B. Advanced defensive technologies
  • C. Ongoing assessments, audits and remediation
  • D. Incident response planning and ongoing

management

slide-37
SLIDE 37

Defending the Defender: Can I Insure My Way Out of Trouble?

Tim Fitzgerald Vice President / Chief Security Officer @ Tim_Fitzgerald1

slide-38
SLIDE 38

The Big Question: Can I Insure My Way Out of Trouble?

Security Risk Control Maturity

Advanced capabilities and incident readiness Basic security controls

slide-39
SLIDE 39

Five Trends That Are Converging

Data

Mobility

  • 7 billion phones by 2020 (Gartner)

Cloud – Apps & Data Center

  • 69% of all workloads will be in the cloud by 2017 (Cisco)
  • 500K new apps in the past three years. Over 1.8M global

apps; downloaded >10.9 B times (Gartner)

  • 33% of Symantec apps are cloud-based and growing; we’ve

deployed our first private cloud data center

Data – Structured & Unstructured

  • IDC estimates that 90% of big data is unstructured

Identities – Personal & Professional

  • Personal and professional identities are blurring
  • In “connected countries” there are between 24 - 30 digital identities

per person (IDC)

The Internet of Things

  • Will exceed 26 billion by 2020 (Gartner)

Mobility

Cloud Data Identities IoT

Security Challenge

slide-40
SLIDE 40

Threats are Increasing!*

  • Frequency and duration are increasing (1)
  • A large business attacked once in 2015 is now

likely to be attacked 3 more times

  • Symantec discovered more than 430 million new

unique pieces of malware in 2015, up 36 percent from the year before

  • 38% increase in detected information security

incidents in 2015 (1)

  • 56% increase in theft of “hard” intellectual

property in 2015 (1)

  • 2014 Verizon report on over 63,000 incidents:

almost every incident involved human error

  • Digital extortion on the rise (2)
  • 45x more people had devices held hostage in

2014

Threats Threats

slide-41
SLIDE 41

Symantec’s Global Security Office…

…Ensures Customer Trust in the Symantec Brand

Physical Security & Safety Security Architecture & Engineering Security Intelligence Operations Security Governance Risk & Compliance Security Strategy & Implementation Customer Integrity & Security

slide-42
SLIDE 42

Symantec Security Architecture

41

slide-43
SLIDE 43

Security Cycle – Management Communications

8

External Threats

Ongoing

  • Smarter
  • Stay longer
  • Do more damage
  • Change quickly

Security Strategy

  • Establish and deliver

strategic programs

  • Refine delivery models

and assess value

  • Socialize with critical

stakeholders

  • Know your employee

threats

Periodic

Foundational Elements

  • Policy / process
  • Risk management
  • Security technology and

control implementation

  • Monitoring and incident

response

  • Security architecture

Ongoing

  • Security Council

(Symantec senior leadership)

  • Validate security

program direction and investment strategies

  • As necessary, set

priorities

Management Oversight & Direction

Twice a quarter

  • Crystalize / up level

risk to the board

  • Answer these

questions: 1.What should your board be aware of 2.Concerned about and 3.Take action on

Board

  • f Directors

Every 6 months Periodic

Risk / Gap Analysis

  • Assess control

completeness and efficacy

  • Scorecard of how

we’ve done

  • Identify investment

strategies

slide-44
SLIDE 44

Strategic Initiatives

43

Source Code Protection Physical Security & Employee Safety Security Monitoring, Analysis & Response Cloud Security & Risk Management 2 1 4 3

slide-45
SLIDE 45

Terminology Gap Risk Communication Gap Understanding Gap

Managing and Communicating Security Risk

slide-46
SLIDE 46

The Big Question: Can I Insure My Way Out of Trouble?

45

Security Risk Control Maturity

Advanced capabilities and incident readiness Basic security controls

slide-47
SLIDE 47

Q&A

Please submit your questions using Zeetings

slide-48
SLIDE 48

Poll 4 Considering the cyber threat landscape is constantly evolving, what do you see as the next steps for risk reduction?:

  • A. Technology and professional services spend
  • B. Acquire cyber risk insurance
  • C. Tighten up existing policies and procedures
  • D. Invest in managed security services
  • E. None of the above
slide-49
SLIDE 49

Digital Transformations in Organisations

Kevin P. Kalinich, Esq. Aon Global Cyber Practice Leader

slide-50
SLIDE 50

Social Media Network security, privacy, and social engineering Phishing / Spear Phishing Australia and International Regulatory Environment IoT - The Internet of Things Smart workplaces Reliance on technology & increasing automation Cloud Computing / Big Data Analytics Increased use of outsourced service providers Cloud provider risk oversight/security Ransomware

  • Australia faces ‘unprecedented’

cyber threat (AUSTRAC) Aug. 2016

  • Australia Contracting Trends =

higher/no Contractual Limitation of Liability

  • AECOM Unit Pays $201 Million to

Settle Australia Toll-Road Lawsuit (A$1.68 billion lenders to RiverCity relied on forecasts) + $4.8 B Arup – Air Link

  • April 2015 Telstra acquisition of Pacnet

for $697 million + data breach

  • Australian Bureau of Statistics says

website attacked by overseas hackers (August 2016)

2016 Cyber Exposure Trends

slide-51
SLIDE 51

Selected Data Breach Incidents: 2013 – 2014

Date Company Incident Severity Estimated Cost/Loss August 2013 Toyota/Ford White hat demo hack of Toyota Prius and Ford Escape to wrest control of breaks, steering, and acceleration N/A N/A December 2013 Target Corp. Attacker leveraged access to a third party network of Target's 110M individuals affected $264M+ January 2014 Neiman Marcus A customer information database was hacked 1.1M individuals affected TBD January 2014 Michaels Stores Inc. Point-of-sale (POS) malware 2.6M individuals affected TBD February 2014 Wyndham Worldwide Intruders gained unauthorized access to Wyndham’s computer network 619,000 individuals affected TBD July 2014 JPMorgan Chase System was hacked 83M accounts and 7M small businesses affected $250M spent on cybersecurity September 2014 Home Depot Massive breach of credit card information for an intrusion first reported in April of 2014 56M individuals affected $232M+ November 2014 Sony Pictures Cyber extortion and hack potentially related to the release of “The Interview” 47,000 SSN information stolen $15M+ December 2014 Staples Cyber criminals stole customer card data from a subset of Staples locations 1.16M individuals affected TBD December 2014 German Steel Mill Massive physical damage to plant arising

  • ut of malware on system

Not disclosed TBD

slide-52
SLIDE 52

Selected Data Breach Incidents: 2015 – 2016

Date Company Incident Severity Estimated Cost/Loss February 2015 Anthem, Inc. Information technology system hacked 80M individuals affected $100M+ May 2015 IRS website Criminals used stolen data to file fraudulent tax returns 100K people affected $50M June 2015 Office of Personnel Management Hacker stole government data 21.5M records stolen TBD July 2015 Ashley Madison Users' data was stolen and threatened to be released >25 gigabytes of data TBD July 2015 Fiat Chrysler Recall over a vulnerability in dashboard computers 1.4M vehicles TBD July 2015 General Motors White hat hackers broke into GM OnStar system N/A N/A August 2015 Tesla White hat hackers implanted malware into the car’s central computer Patch of car computer software required N/A October 2015 T-Mobile Data breach at financial credit processing firm Experian 15M individuals affected TBD December 2015 Ukraine Power Grid Hackers implant operation-specific malicious firmware with coordinated DDoS attack against customer call centers 230,000 left without power for 6 hours Unknown April 2016 Mossack Fonseca (The Panama Papers) 11.5 million confidential documents (2.6 TB of data) containing information on >214,000 offshore companies. Anonymous source made data available in batches to German newspaper Süddeutsche Zeitung beginning in early 2015 11.5M confidential documents TBD

slide-53
SLIDE 53

Pokémon​ Inspired Family Tour to Australia & New Zealand

http://www.zicasso.com/luxury-vacation-australia-new-zealand-tours/pok-mon-inspired-family-tour-australia-new-zealand

slide-54
SLIDE 54

Evolving Threat of Cyber to Clients

Across all industries, our clients are continuing to invest in deploying digital technologies to stay competitive and drive quality and efficiency objectives Automation Connectivity

Technological Drivers Business Drivers Risk Drivers

Material Damage Business Interruption Product Liability Data Breach Media Liability I.P. Infringement

Evolving Cyber Equation

slide-55
SLIDE 55

Typical Client Cyber Requirements

Client Questions and Requirements

“What cyber exposures do we have?” “How bad could the risks be to the balance sheet?” “What coverage do we have / could we have?” “How can we mitigate cyber exposures?” “How can we

  • ptimise self-

retention?” “How can we expedite cyber claims payment?”

slide-56
SLIDE 56

Companies value PP&E Higher than Information Assets

$848 $815 $0 $100 $200 $300 $400 $500 $600 $700 $800 $900 Total value of PP&E Total value of information assets Extrapolated value ($millions)

slide-57
SLIDE 57

The PML value for PP&E and Information Assets

$617 $648 $0 $100 $200 $300 $400 $500 $600 $700 The value of the largest loss (PML) that could result from the theft and/or destruction of information assets The value of the largest loss (PML) that could result from damage or the total destruction of PP&E Extrapolated value ($millions)

slide-58
SLIDE 58

The Impact of Business Disruption to Information Assets and PP&E

$207 $98 $0 $50 $100 $150 $200 $250 Estimated loss to information assets Estimated loss to PP&E Extrapolated value ($millions)

slide-59
SLIDE 59

The percentage of PP&E and Information Assets Covered by Insurance

51% 12% 0% 10% 20% 30% 40% 50% 60% The percentage of potential loss to PP&E assets covered by insurance The percentage of potential loss to information assets covered by insurance

slide-60
SLIDE 60

Basis of Liability of Loss is different in Australia

I. CONTRACTS

  • A. Payment Card Industry (PCI DSS fines & penalties can be

considered contractual)

  • $125 MM Heartland
  • $143 MM Global Payments
  • $19 MM Target – Raytheon (April 2015)
  • B. Breach of Implied Contract

(See Schnucks v. First Data Merchant Services) II. TORT

  • A. Asia less litigious (e.g. Japan “Double Derivative

shareholder litigation)

  • B. EMEA Less Litigious

(see Google v. Videll-Hall: Damages under Data Protection Act of 1998 for non-pecuniary losses

  • C. U.S. (customers, 3rd parties, shareholders)

Spokeo v. Robbins (US Supreme Court) ($10 MM settlement in Target Class Action)

  • 1. Negligence
  • 2. Strict Liability
  • 3. Negligent Misrepresentation

III. STATUTORY (lack of uniform IT Security Standards)

 Asia - Pacific (Mandatory & non-mandatory regulations)  EMEA

  • Upcoming EU Data Protection Amendments
  • 4% worldwide revenue fine & 24 HR notice
  • Various Country Data Protection Authorities

 U.S.

  • A. HIPAA, 42 U.S.C. Section 1320d-5/HITECH
  • B. FTC Act, 15 U.S.C Section 45 (a)
  • C. FCC ($25 MM Fine against AT & T in 2015)
  • D. 47 State Breach Laws & Attorney’s General
  • E. GLBA/FINRA
  • F. SEC
  • IV. FIRST PARTY
  • A. Incident/Event Management
  • 1. Forensics
  • 2. Investigations
  • 3. Breach Notification
  • 4. Public Relations
  • B. Business Interruption (Proof of Loss challenges)
  • C. Cyber Extortion
  • D. Extra Expense
  • 1. External vs. Internal Costs
  • 2. Remediation vs. Upgrade
slide-61
SLIDE 61

Australia Cyber Value Proposition

Industry Knowledge

slide-62
SLIDE 62

2016 Aon Captive Cyber Benchmarking Survey

Source: 2016 Aon Captive Cyber Benchmarking Survey by Industry Cyber—The Fast Moving Target: Benchmarking views and attitudes by industry: http://www.aon.com/risk-services/cyber.jsp

slide-63
SLIDE 63

Cyber Loss Spectrum

1st Party 3rd Party Financial Tangible Cyber Loss Spectrum

Any major cyber event will result in

  • PR, response, and continuity costs
  • Immediate and extended revenue loss
  • Restoration expenses
  • Defense costs

Third parties will seek to recover

  • Civil penalties and awards
  • Consequential revenue loss
  • Restoration expenses

Physical damage is possible

  • 1st party property damage
  • 1st party bodily injury

Physical damage may cascade to others

  • 3rd party property damage
  • 3rd party bodily injury
slide-64
SLIDE 64

Scope of Cyber Insurance Coverage

Expense / Service Sections First Party Sections Liability Sections

  • Failure of Network Security
  • Failure to Protect /

Wrongful Disclosure of Information, including employee information

  • Privacy or Security related

regulator investigation

  • All of the above when committed

by an outsourcer

  • Wrongful Collection of

Information (some policies)

  • Media content infringement /

defamatory content

  • Network-related Business

Interruption

  • Extra Expense
  • System Failure Business

Interruption (some policies)

  • Dependent

Business Interruption (some policies)

  • Intangible Asset damage
  • Crisis Management
  • Breach-related

Legal Advice

  • Call Center
  • Credit Monitoring, Identity

Monitoring, ID Theft Insurance

  • Cyber Extortion

Payments Defense Costs + Damages + Regulator Fines Insured’s Loss Expenses Paid to Vendors

slide-65
SLIDE 65

Optimal Cyber Program

Optimal Program

Insurable Risks Contractual Requirements Budget Risk Tolerance Maximum Probable Loss Peer Purchasing Data Scope of Coverage / Control Market Limitations

slide-66
SLIDE 66

Q&A

Please submit your questions using Zeetings

slide-67
SLIDE 67

Morning Tea Break

Please reconvene in respective panel session room after the break

slide-68
SLIDE 68
slide-69
SLIDE 69

Understanding your cyber risk profile / alignment to risk transfer strategies

Panel Session

slide-70
SLIDE 70

Cyber risk profiling – where do we start?

What can go wrong? How bad can it be? How am I protected? Will our insurance respond?

Exposure Assessment Tailored Solution Design Mitigation & Maturity Scenario Quantification

Identify

  • Key stakeholders

engaged

  • Identification of key

Cyber scenarios

  • Prioritise key risks for

further analysis

Measure

  • Matching Cyber Scenarios

to business impacts / consequences

  • Detailed quantitative

assessment of business impacts

  • Risk modelling

Mitigate

  • Audit of controls,

procedures

  • Evaluation of effectiveness
  • f risk mitigation processes

and procedures

  • Determination of maturity of

control environment

Transfer

  • Analysis of insurability of

identified cyber scenarios

  • Review of gaps vs.

current insurances

  • Design a tailored “stand-

alone” solution

slide-71
SLIDE 71

Tools to support the analysis: what are the key vulnerabilities? 1

NSP / CYBER RISK MAPPING Identify sources of risk, causes and consequences with key stakeholders

HEAD OF IT SECURITY & CIO RISK MANAGER CFO & INTERNAL AUDIT BRAND & COMMUNICATIONS TEAM LEGAL COUNSEL & PRIVACY OFFICER

2

RISK MANAGEMENT ANALYSIS Recommendations as to risk control, process and mitigation techniques

3

GAP ANALYSIS Evaluation of inherent risks against current insurance program

4

TAILORED RISK TRANSFER SOLUTIONS: Enhance current portfolio with new and extended coverage to protect your organisation

slide-72
SLIDE 72

Will mandatory data breach notification legislation change things?

  • The length of time between the event, the fall in share price and the capitulation of senior executives is reducing
  • Publicly traded companies have come to expect class actions will ensue post a significant data breach incident
  • It remains to be seen if Australian Mandatory Data Breach Notification laws will result in a similar outcome to the US

experience

  • Data breach response planning is becoming even more critical
slide-73
SLIDE 73

Cyber event insights: sources of losses

slide-74
SLIDE 74

Property General Liability Crime/ Bond K&R PI Cyber 1st Party Data Protection Privacy Risks Network Interruption Cyber Extortion Data Restoration, Recollection, Recreation (Determination and Action) Employee sabotage of Data Virus/ Hacker damage to Data Denial of Service attack Physical damage to Data Only 3rd Party Data Protection Privacy Risks Breach of Personal Information Breach of Corporate Information Outsourcing Liability / Vicarious Liability Contamination of Third Party Data by any unauthorised software, computer code or virus Denial of access to third party data Theft of an access code from the Company’s premises Destruction, modification, corruption, damage or deletion of Data Physical theft of the Company’s hardware Data disclosure due to a Breach of Data Security Costs and expenses for legal advice and representation in connection with an Investigation Data Administrative Fines Repair of Company / Individuals Reputation Media Content Liability (IP, Plagiarism, defamation, trespassing) Notification Costs Monitoring Costs (with identity theft education and credit file or identity monitoring

Coverage Provided This is an example only Coverage Possible No Coverage

Testing key scenarios against the insurance programme

slide-75
SLIDE 75

OAIC guide to developing a data breach response plan “Your actions in the first 24 hours after discovering a data breach are

  • ften critical to the success of your

response…” “You should create and test your plan before a data breach

  • ccurs…”

“Response team membership: ensure that the relevant staff, roles and responsibilities are identified and documented…”

slide-76
SLIDE 76

QUESTIONS?

slide-77
SLIDE 77

Summary

Global Threats Legal Influences Technology Risk transfer

slide-78
SLIDE 78