SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Cyber Risk Assessment to Empower
Cyber Insurance Markets
Jay P. Kesan, Ph.D., J.D. Linfeng Zhang
Professor and H. Ross & Helen Workman Research Scholar
University of Illinois at Urbana-Champaign
Research Associate
University of Illinois at Urbana-Champaign
kesan@illinois.edu lzhang18@illinois.edu
Background:
What problems are we addressing?
• Lack of sound cyber risk assessment – data, analyses, and metrics
• Large understanding gaps between directors and managers within
organizations and between insured and insurers re. cyber risk
• Difficult for organizations to create optimal risk management plans or
consider cyber insurance as a feasible risk management solution
• Organizations are often underprepared for cyber incidents
• Development of cyber insurance market is hindered
Background (cont’d):
How are we approaching it, and what makes our approach unique?
• Gathering extensive public and private data regarding known cyber
incidents from multiple sources
• Performing extensive analyses on every important aspect of cyber
risk, such as economic, financial, reputational and legal impact, to get
more insights into cyber risk
• Uniqueness: Comprehensiveness of the multiple datasets we are
building. Allows us to carry out research on important topics like the
financial impact of cyber incidents that no prior studies have covered.
Background (cont’d):
Objectives/goals of the research:
• Develop data-driven cyber risk and resilience scoring metrics that
enable cyber insurance carriers to both measure and improve risk
and resilience associated with underwriting cyber liabilities
• Improve the resilience of infrastructure to known and unknown
cyber attacks through the expansion of insurance coverage, but
also by highlighting best practices for cyber risk mitigation as well
as developing insights into the assessment and perception of
cyber risks.
Cyber Risk Definition
• “operational risks to information and technology assets that have consequences
affecting the confidentiality, availability, or integrity of information or information
systems”.
• Leading to various types of Incidents caused by different perils
1. Cyber Extortion 9. IT - Configuration/Implementation Errors
2. Data - Malicious Breach 10. IT - Processing Errors
3. Data - Physically Lost or Stolen 11. Network/Website Disruption
4. Data - Unintentional Disclosure 12. Phishing, Spoofing, Social Engineering
5. Denial of Service (DDOS)/System Disruption 13. Privacy - Unauthorized Contact or Disclosure
6. Digital Breach/Identity Theft 14. Privacy - Unauthorized Data Collection
7. Identity - Fraudulent Use/Account Access 15. Skimming, Physical Tampering
8. Industrial Controls & Operations
Cybersecurity Concern
• Cybersecurity is tied to the health of the U.S. economy. Malicious cyberattacks
could throw the financial industry into chaos.
• The World Economic Forum (based on McKinsey Report) estimates that ineffective
cybersecurity may cost the world’s economy $3 trillion in aggregate impact by 2020
• Cybersecurity is also national security. Critical infrastructure systems, from
transportation to nuclear power, are vulnerable to cyberattacks.
• Hospitals and police departments have been targeted with ransomware that severs access to
vital information.
• Proper risk assessment and management can improve companies’ resilience
against cyber risks through market-based solutions
• The primary focus of our work is the private sector and on improving cyber
security in the private sector through market-oriented solutions.
Cyber Incident Analysis
Better understanding of cyber risk
Data
• Analyzing over 40,000+ cyber incident records drawn from public data
and private data (Advisen, Ltd., a leading provider of data for the
commercial property and casualty insurance market)
• Each record has:
• Timeline (first notice date, report data, etc.)
• Case characteristics (case type, causes, etc.)
• Legal information (juris trigger, court, etc.)
• Outcome (Loss amounts, injuries, etc.)
• Victim company information (name, sector, size, etc.)
• Detailed incident description from news media
Trends in Cyber Risk
0
1000
2000
3000
4000
5000
6000
Cyber incident Affected company
• During the 10-year period from 2005
to 2014:
1. Number of incidents have grown by
24.4% each year
2. Number of affected companies have
increased by 22.5% each year
3. Incident/Company ratio has
increased from 1.37 in 2005 to 1.59
in 2014, some companies are
becoming more frequently affected
by cyber incidents
Trends in Cyber Risk (cont’d)
• Investment in cybersecurity
does not necessarily reduce
the chance of having a
incident
• Microsoft Corporation spent
$1 billion in cybersecurity in
2015, but the number of
incidents it had in that year
did not go down
• Types of incidents are more
diversified
• More cyber risk derived from
people risk (phishing,
unintentional disclosure of
data)
0
2
4
6
8
10
12
14
2011 2012 2013 2014 2015
Microsoft’s Cyber Incidents
IT - Configuration/Implementation
Errors
Phishing, Spoofing, Social Engineering
IT - Processing Errors
Data - Unintentional Disclosure
Network/Website Disruption
Privacy - Unauthorized Data Collection
Privacy - Unauthorized Contact or
Disclosure
Data - Malicious Breach
Cyber Risk Factors
• Three attributes of cyber risk
• Hazards – what are the potential causes of incidents
• Frequency – How often do cyber incidents occur
• Severity – How large are the losses
• Hazards
• Firms in different industries face different cyber threats, and firms in the
same industry share similar risks
• Industries having valuable data (e.g., financial industry) experience more data
breaches
• Firms in the same industry are vulnerable to similar attacks because of similar
software or hardware setups (WannaCry and health care firms)
Cyber Risk Factors – Frequency
• Number of cyber incidents
experienced by a firm in a certain
time period
• Table shows data breach
frequency experienced by
individual firms from 2015 to
2017
• 1/10 of the firms had multiple
incidents during the 3-year period
• Some firms are more frequently
attacked than others
All Companies
Companies
with more than
1 incidents
Companies
with more than
2 incidents
Count 1977 177 44
Incident (Malicious data breach) Number Descriptive Statistics
Mean 1.1614 2.8023 5.2273
Standard Error 0.0216 0.2043 0.7107
Sample
Variance
0.9228 7.3868 22.2262
Kurtosis 423.7810 54.6692 15.1725
Skewness 17.8550 6.8904 3.8503
Minimum 1 2 3
Maximum 26 26 26
Cyber Risk Factors – Frequency (cont'd)
Estimate
Std.
Error
t value Pr(>|t|)
log(employee) 0.0350 0.0076 4.6130 0.0000 ***
(industry)11 0.8705 0.3594 2.4223 0.0155 *
(industry)21 0.7880 0.4762 1.6549 0.0981 .
(industry)22 0.7831 0.3384 2.3141 0.0208 ***
(industry)51 1.4723 0.0903 16.3083 0.0000 ***
(industry)52 0.9726 0.0775 12.5425 0.0000 ***
… …
R2 0.6094
Degrees of
Freedom
1929
• Dependent variable:
• Number of data breaches
experienced by individual firms
during the 3-year period from 2015
to 2017
• Independent variable:
• Firm size – log-scaled employee
number as proxy
• Industry fix effects – 2-digit NAICS
(North American Industry
Classification System) code
Cyber Risk Factors – Frequency (cont'd)
• Firm size variable has a statistically significant coefficient of 0.035
• In the same industry, larger firms experience cyber attacks more frequently
than smaller firms in a given period
• Because firm size variable is log scaled, the attack frequency for smaller firms
is more sensitive to firm size changes
• From 100 employees to 200 employees, 3-year incident number goes up 0.024
• From 1000 employees to 1100 employees, 3-year incident number goes up 0.003
• Coefficient varies across different industries
• Firms in some industries are more often attacked than the others
Industry Coefficient Standard Error
NAICS-51 Information 1.47 0.09
NAICS-52 Finance and Insurance 0.97 0.08
Cyber Risk Factors – Frequency (cont'd)
11 21 22 23 31 32 33 42 44 45 48 49 51 52 53 54 55 56 61 62 71 72 81
21 1
22 1 1
23 1 1 1
31 1 1 1 1
32 1 1 1 1 1
33 1 1 1 1 1 1
42 1 1 1 1 1 1 1
44 1 1 1 1 1 1 1 1
45 1 1 1 1 1 1 1 1 1
48 1 1 1 1 1 1 1 1 1 1
49 1 1 1 1 1 1 1 1 1 1 1
51 1 1 1 1 0.04 0.14 0.32 0.00 0.00 0.17 0.13 1
52 1 1 1 1 1 1 1 1 1 1 1 1 0.00
53 1 1 1 1 1 1 1 1 1 1 1 1 1.00 1
54 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1
55 1 1 1 1 1 1 1 1 1 1 1 1 1.00 1 1 1
56 1 1 1 1 1 1 1 1 1 1 1 1 0.01 1 1 1 1
61 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1
62 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1
71 1 1 1 1 1 1 1 1 1 1 1 1 0.98 1 1 1 1 1 1 1
72 1 1 1 1 1 1 1 1 1 1 1 1 0.01 1 1 1 1 1 1 1 1
81 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1 1
92 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1 1 1
• Further analysis on how
attack frequency varies
across different industries
• Method: Pairwise t-test
• Most industries do not have
different attack frequencies
except industry-51
(Information Industry)
• Firms in information industry
more often experience cyber
incidents than firms in many
other industries
Cyber Risk Factors – Severity
y = 0.1213x + 5.101
0
1
2
3
4
5
6
7
8
9
10
0 1 2 3 4 5 6 7
LossAmount(log10scale)
Number of Employees (log10 scale)
Severity vs. Firm Size
Cyber Risk Factors – Severity (cont'd)
• Data:
• 8,413 malicious data breach incidents from 2001 to 2017
• Dependent variable
• Severity – log10-scaled number of records breached in a data breach incident as proxy
• Independent variable
• Firms size – log10-scaled employee number
• Control for industry-year fixed effects
Estimate Std. Error t value Pr(>|t|)
log10(company_size) 0.1627 0.0144 11.322 0.0000 ***
R2 0.7047
Degrees of Freedom 8090
Cyber Risk Factors – Severity (cont'd)
• Firm size has a statistically
significant coefficient of
0.1627
• In the same year and same
industry, larger firms breach
more records
• Again, pairwise t-test
suggests that firms in
industry-51 (information
industry) experience more
severe data breaches than
firms in other industries
11 21 22 23 31 32 33 42 44 45 48 49 51 52 53 54 55 56 61 62 71 72 81
21 1
22 1 1
23 1 1 1
31 1 1 1 1
32 1 1 1 1 1
33 1 1 1 1 1 1
42 1 1 1 1 1 1 1
44 1 1 1 1 1 1 1 1
45 1 1 1 1 1 1 1 1 1
48 1 1 1 1 1 1 1 1 1 1
49 1 1 1 1 1 1 1 1 1 1 1
51 1 1 1 1 0.060.030.000.000.000.000.16 1
52 1 1 1 1 1 1 1 1 1 1 1 1 0.00
53 1 1 1 1 1 1 1 1 1 1 1 1 0.35 1
54 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1
55 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
56 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1
61 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1
62 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1
71 1 1 1 1 1 1 1 1 1 1 1 1 0.04 1 1 1 1 1 1 1
72 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1
81 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1 1
92 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1 1 1
Bridging Causes and Outcomes
Cyber Incident Outcomes
• Firms with certain characteristics are more vulnerable to some attacks, how does
it imply what outcomes to expect
• 15 types of cyber incidents caused by different perils
• Leading to various types of outcomes
First party losses
•Properties damaged or lost in cyber incidents
•Direct financial damages (e.g., paid ransom)
•Defense costs in lawsuits
•Fines and penalties, which are paid by the company for
violating regulations.
Third party liabilities
•Physical injuries
•Property damage
•Loss of assets other than property
•Loss of wages
•Loss of business income
•Loss of life
•Pain and suffering
•Plaintiff legal fees generated from lawsuits
More Foreseeable Outcomes
• Given the fact that although some incidents have different causes,
they are similar in terms of the types of losses that they result in, we
try to group together different incident types with such similarities
• Creating larger samples
• Very small sample sizes for some categories in original dataset, (e.g., only 8
records for DDoS incidents), is impractical for statistical analysis
• Generating a clearer path from cause of cyber incident to the
outcome
• Helping firms determining which cyber insurance coverages to buy
• Making losses more foreseeable for insurers
• First, we calculate the
frequencies of different
outcomes for each type of
incident
• As an example, for malicious data
breach incidents
• 57.10% of them cause financial
damages
• 0.63% of them cause 3rd party
property damages
• Etc.
Incident Type Clustering
Data - Malicious Breach
Outcomes Frequency
Financial damages 57.10%
Property 3rd party 0.63%
Loss of assets 2.37%
Loss of business income 2.37%
Other 14.83%
Other fines penalties 22.56%
Pain and suffering 0.16%
Plaintiff legal fees expenses 6.47%
Property 1st party 1.42%
Punitive exemplary damages 0.63%
Other expenses 0.00%
Other multiplied damages 0.00%
Defense costs 0.00%
Loss of life 0.00%
Loss of wages 0.00%
• We use k-means clustering
method based on Euclidean
distance
• We group together incident
types rather than incidents
themselves because we need to
preserve the cause information
• The elbow method suggests a
cluster number of 6 would be
sufficient
• 91% of within-cluster variance
explained (PoVE)
• Slow increase in PoVE after 6
Incident Type Clustering (cont'd)
0.00
0.39
0.66
0.79
0.85
0.91 0.93 0.95 0.96 0.97 0.98 0.99 1.00 1.00
0.00
0.10
0.20
0.30
0.40
0.50
0.60
0.70
0.80
0.90
1.00
1 2 3 4 5 6 7 8 9 10 11 12 13 14PercentageofvarianceExplained
Number of Clusters
6 Types of outcomes
• 5-level scale indicating likelihood of having the type of loss
Group Cause Financial Losses Fines and Penalties Plaintiff Legal Expenses Other
1
Privacy - Unauthorized Contact or Disclosure
High Low Low Very Low
Privacy - Unauthorized Data Collection
2
Denial of Service (DDOS)/System Disruption
High Very Low Very Low Low
Network/Website Disruption
3 Industrial Controls & Operations Low Very Low Very Low High
4
Cyber Extortion
Very High Very Low Very Low Very Low
Digital Breach/Identity Theft
Identity - Fraudulent Use/Account Access
Phishing, Spoofing, Social Engineering
Skimming, Physical Tampering
5
Data - Malicious Breach
Medium Low Very Low Very Low
Data - Physically Lost or Stolen
IT - Configuration/Implementation Errors
IT - Processing Errors
6 Data - Unintentional Disclosure Low Medium Low Very Low
Industry-wise Cyber Risk
Assessment
Maritime Industry
0
0.5
1
1.5
2
2.5
0
200
400
600
800
1000
1200
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
Incident/Firm Cyber incident number Affected firm number
Cyber Risk over Time
• Both number of cyber-incidents and number of affected firms are growing
• Incident/firm ratio is relatively stable over time (i.e. cyber risk within
individual firms is not increasing)
Cyber Incident Losses
• The average loss
amount of all cyber-
incidents is 2.15
million
• Around 1/3 (271/844)
of the cyber-incidents
in maritime industry
do not result in losses.
• The losses typically
range from 10
thousand to 10 million
• Losses can be as large
as 100 million
Cyber Incident Losses (cont'd)
• The maximum
possible loss in a
single cyber
incident is getting
higher in recent
years
• Average loss
remains low,
indicating that
incidents with small
losses are becoming
more frequent
0
20
40
60
80
100
120
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
Millions
Loss Amount per Incident
Average Loss Max Loss
Cyber Incident Types
• Malicious data breach
is the most common
cyber-incident type in
maritime industry, and
it causes an average
loss of 3.41 million per
incident, which is also
quite high compared to
other incident types
• IT processing errors has
a low occurrence
frequency, but can
cause large losses
2,744
761,427
8,208,625
737,586
2,213,283
862,388
1,836,229
521,836
1,916,667
772,981
125,342
2,205,123
3,410,871
0 5000000 10000000
0 1000 2000 3000 4000
Industrial Controls & Operations
Cyber Extortion
IT - Configuration/Implementation Errors
IT - Processing Errors
Privacy - Unauthorized Data Collection
Phishing, Spoofing, Social Engineering
Network/Website Disruption
Identity - Fraudulent Use/Account Access
Skimming, Physical Tampering
Undetermined/Other
Data - Unintentional Disclosure
Data - Physically Lost or Stolen
Privacy - Unauthorized Contact or Disclosure
Data - Malicious Breach
Incident Number Average Losses
Highlights of Cyber Risk in Maritime Industry
• From previous analyses of cyber risk in maritime industry, we find:
• More firms are being affected by cyber incidents
• Malicious data breach is the biggest threat to this industry in terms of loss
frequency and severity, and IT process errors can lead to very large losses
• The incident frequency of individual firms roughly remains the same over the
years, while the potential maximum loss from a single incident is getting
higher
• Implications:
• Firms in maritime industry should give data protection high priority when
managing cyber risk, and take extra care to prevent IT process errors
• Firms may want to transfer some risks (cyber insurance) since cyber risks are
becoming more unretainable
Insurance for Cyber Risk
Management
Cyber Insurance
• Cyber insurance is a risk transference vehicle
• Complement to cybersecurity enhancement
• Help insured businesses quickly recover from cyber incidents
• The market is still in its infancy
• U.S. penetration level of insureds is less than 15% (less than 1% in other
regions)
• Less than 5% of small and medium sized businesses purchase cyber insurance
in the U.S.
• The market is growing fast
• $1.7 billion written premium in 2015
• 30% annual growth rate since 2011
Issues with Cyber Insurance Market
Few buyers
Poor data Bad risk pooling
Complexity in products
(exclusions, limits)
Information Asymmetry
(Moral hazard, Adverse Selection)
High Premium
Insurer’s Portfolio Risk
Assessment
Loss Distribution
• 3,895 loss amounts are recorded in Advisen’s dataset
• About 1/3 (1273/3895 = 32.7%) of the cyber incidents do not result in any measurable losses
• The log10-scaled losses follows a normal distribution with mean 5.41 and standard deviation 1.25
0
100
200
300
400
500
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
5.5
6
6.5
7
7.5
8
8.5
9
9.5
10
10.5
11
11.5
12
More
Loss Distribution
Losses Sample from normal distribution
1273
2622
No loss Loss
Claim Rate Estimation
• Objective:
• Estimate the cyber incident rate in a group of companies (i.e., number of
cyber incidents per company in a given period)
• In an insurance setting, number of possible claims arising from a pool of
policyholders
• Assumptions:
• Every incident results in a claim
• Claims are all covered.
• Portfolios are static (not changing in different years)
• This analysis can be seen as the worst scenario; in actual insurer’s portfolio,
the rate is expected to be lower
Claim Rate Estimation (cont'd)
• Data:
• Generate a list of publicly traded companies in the U.S.
• We choose public companies because their information can be easily obtained, and we know
the population size
• Cyber insurance has a relatively higher penetration level among public companies, so in
actual insurer’s portfolios, we would expect to see lots of public companies as policyholders
• Further research will be carried out on whether public and private companies have different
risk characteristics in terms of cyber-security
• Exchanges we considered include Nasdaq, NYSE and AMEX
• 5,700+ companies in total after removing duplications
• Different classes of stock or different divisions from the same company are seen as
duplications.
• 6,600+ companies before removal
Claim Rate Estimation (cont'd)
• Methodology:
• Randomly sampling 1,000 companies from the list to form a portfolio of
policyholders
• Assuming each company has the same likelihood of purchasing cyber-insurance
• Repeat the process a 1,000 times to create 1,000 portfolios.
• Looking up the companies from each portfolios in the Advisen’s database to
see how many of them have cyber incidents in a given year
• We use data points from 2011 to 2014, since they have the best quality
• Recording the cyber incident number for each portfolio. Since we have 1000
portfolios in each year, we get a good distribution of portfolio risk in terms of
claim counts.
Claim Rate Estimation – Results
0
50
100
150
200
250
300
350
Frequency(outof1000portfolios)
Cyber Incident Rate in Each Portfolio
Cyber incident rate in different years
2011 2012 2013 2014
Claim Rate Estimation – Results (cont'd)
0
20
40
60
80
100
120
Frequency(outof1000portfolios)
Cyber Incident Rate in Each Portfolio
Cyber incident rate in different years
2011 2012 2013 2014
Claim Rate Estimation – Results (cont'd)
• Findings:
• Portfolios typically have normally distributed claim rate
• During the 4-year period from 2011 to 2014, the mean claim rate is 2.4% for
public companies, and the standard deviation is 0.53%
• The distribution is shifting to the right over time
• 2% claim rate in 2011 vs. 3% in 2014
• The variance is getting larger
• 0.4% in 2011 vs. 0.47% in 2014
• Insurer’s portfolio risk is getting higher
CIPAR
Cyber Insurance Portfolio Analysis of Risk
CIPAR
• A web-based cyber risk assessment tool built upon our data and analyses
• Giving firms from all market segments an easy way to estimate their exposure to
cyber risk
• Helping cyber insurance carriers manage portfolio risk more efficiently and
improve product pricing
• Cyber incident look-up
• Key features:
• Cyber incident lookup
• Cyber risk data visualization
• Cyber risk scores based on firm characteristics
• Demo
Cyber Incident and Corporate
Finance
Combined Database
• We link cyber incident data with Compustat, a database widely used in corporate
finance analysis
• Few studies try to explore the relation between cyber incidents and the
fundamentals of victim firms
• With the combined data, we are going to study a number of interesting research
questions
• What corporate financial factors affect the frequency of cyber incidents?
• Does it matter how a firm is positioned at the time of a cyber incident?
• How big is the impact of cyber incidents on firms?
• What are the types of impact – change in stock prices, loss of reputation, etc…
• Helping firms better prepare for cyber incidents and letting insurers better assess
insureds’ risks
Combined Database (cont'd)
• 4,820 records in data base
• Each record has:
• Cyber incident information
• All recorded quarterly financial statement items of the victim company
• Stock price information
• Each financial statement has two time stamps indicating:
1. If it is prior to the incident occurrence date
2. If it is prior to the first reported date of incident
• Ongoing research with the combined database:
• The reputational loss after a data breach takes place
Studies on Reputational Losses
• Data:
• 4,820 records in the combined database
• Time stamp 2 (the date when an incident was first known to the public) is
used
• Based on these dates, we search for the last quarterly earnings before the
incident, and subsequent quarterly earnings reports after the incident
(discarding the ones with missing quarterly reports)
• To have a better control on the length of time between the date of incident
and the date of next earnings, we divide these incidents into three groups:
• Taking place 2-3 months before the next earnings
• Taking place 1-2 months before the next earnings
• Taking place 0-1 months before the next earnings
Studies on Reputational Losses (cont'd)
• Methodology
• Goodwill as the proxy for reputation:
• Usually only has book value in mergers and acquisitions
• Represents the amount of money that buyer is willing to pay for a company’s good name
• But we try to estimate it with excess earnings method, a common practice in accounting
• Because we only care about the change value in goodwill, some issues with this method,
such as choosing a proper capitalization rate is negligible
• Other indicators as alternative references
• Earnings quality & Market to book ratio
• Control group – Other companies in the same industry which have similar
characteristics but do not have cyber incidents in the same period
• Industry-wise effects (e.g., holiday season in retail industry)
Future Research Topics
• How is a company’s financial performance related to characteristics of
the incident it experiences?
• Positive correlation between the number of employees a company has and
the magnitude of loss it suffers in a cyber incident.
• More factors like this from the combined database (assets, revenues, etc.) can
be examined
• How does a cyber incident affect a company’s financial performance?
• Changes in reputation, profitability, stock price and etc.
• Changes in company’s management style (risk management, investments in
cybersecurity)
• How long can the influence last
Recognizing the Team
Sachin Shetty (Co-PI)
Associate Professor, Virginia Modeling,
Analysis and Simulation Center, Old
Dominion University
Jay Kesan (PI)
Professor, Law & ECE,
University of Illinois
David M. Nicol (Co-PI)
Professor, ECE, University of Illinois
Carol Hayes
Postdoc, University of Illinois
Linfeng Zhang
Res. Associate, University of Illinois

Weitere ähnliche Inhalte

Was ist angesagt?

SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds
 
Heidi
HeidiHeidi
Heidikategat
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...IBM Security
 
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds
 
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform -  Paul FenwickDelivering Security with the MAX RemoteManagement Platform -  Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform - Paul FenwickMAXfocus
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
 
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Citrin Cooperman
 
The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...Vincent O'Neil
 
Delivering Security with GFI MAX - Mark Petrie
Delivering Security with GFI MAX - Mark Petrie  Delivering Security with GFI MAX - Mark Petrie
Delivering Security with GFI MAX - Mark Petrie MAXfocus
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDoug Copley
 
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFERMA
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionThe Economist Media Businesses
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationChris Ross
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityMatthew Rosenquist
 

Was ist angesagt? (20)

SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
SolarWinds Federal Cybersecurity Survey 2017: Government Regulations, IT Mode...
 
Heidi
HeidiHeidi
Heidi
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
 
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform -  Paul FenwickDelivering Security with the MAX RemoteManagement Platform -  Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
 
The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...The Information Disruption Industry and the Operational Environment of the Fu...
The Information Disruption Industry and the Operational Environment of the Fu...
 
Delivering Security with GFI MAX - Mark Petrie
Delivering Security with GFI MAX - Mark Petrie  Delivering Security with GFI MAX - Mark Petrie
Delivering Security with GFI MAX - Mark Petrie
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
SolarWinds IT Pro Day 2017 Survey: Bet You Didn’t Know – Little-Known Facts A...
 
FORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for ITFORUM 2013 Cyber Risks - not just a domain for IT
FORUM 2013 Cyber Risks - not just a domain for IT
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
 
Ics white paper report 2017
Ics white paper report 2017Ics white paper report 2017
Ics white paper report 2017
 
Metrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in CommunicationMetrics & Reporting - A Failure in Communication
Metrics & Reporting - A Failure in Communication
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Effects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack IncidentsEffects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack Incidents
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 

Ähnlich wie Cyber Risk Assessment to Empower Cyber Insurance Markets

Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Jay Kesan
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsIvanti
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...SolarWinds
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards ComplianceDr. Prashant Vats
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon BradyStarttech Ventures
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityJoan Weber
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
A Case Study on the Effects of Cyber Attacks on Firms' Stock Price
A Case Study on the Effects of Cyber Attacks on Firms' Stock PriceA Case Study on the Effects of Cyber Attacks on Firms' Stock Price
A Case Study on the Effects of Cyber Attacks on Firms' Stock PriceShravan Chandrasekaran
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response ManagementDon Caeiro
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...James Fisher
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security indexsukiennong.vn
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of CybercrimeStephen Cobb
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsSolarWinds
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds
 

Ähnlich wie Cyber Risk Assessment to Empower Cyber Insurance Markets (20)

Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady4th Digital Finance Forum, Simon Brady
4th Digital Finance Forum, Simon Brady
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
A Case Study on the Effects of Cyber Attacks on Firms' Stock Price
A Case Study on the Effects of Cyber Attacks on Firms' Stock PriceA Case Study on the Effects of Cyber Attacks on Firms' Stock Price
A Case Study on the Effects of Cyber Attacks on Firms' Stock Price
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Cyber Security index
Cyber Security indexCyber Security index
Cyber Security index
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 

KĂźrzlich hochgeladen

如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxPKrishna18
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 

KĂźrzlich hochgeladen (20)

Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
A Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptxA Short-ppt on new gst laws in india.pptx
A Short-ppt on new gst laws in india.pptx
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 

Cyber Risk Assessment to Empower Cyber Insurance Markets

  • 1. Cyber Risk Assessment to Empower Cyber Insurance Markets Jay P. Kesan, Ph.D., J.D. Linfeng Zhang Professor and H. Ross & Helen Workman Research Scholar University of Illinois at Urbana-Champaign Research Associate University of Illinois at Urbana-Champaign kesan@illinois.edu lzhang18@illinois.edu
  • 2. Background: What problems are we addressing? • Lack of sound cyber risk assessment – data, analyses, and metrics • Large understanding gaps between directors and managers within organizations and between insured and insurers re. cyber risk • Difficult for organizations to create optimal risk management plans or consider cyber insurance as a feasible risk management solution • Organizations are often underprepared for cyber incidents • Development of cyber insurance market is hindered
  • 3. Background (cont’d): How are we approaching it, and what makes our approach unique? • Gathering extensive public and private data regarding known cyber incidents from multiple sources • Performing extensive analyses on every important aspect of cyber risk, such as economic, financial, reputational and legal impact, to get more insights into cyber risk • Uniqueness: Comprehensiveness of the multiple datasets we are building. Allows us to carry out research on important topics like the financial impact of cyber incidents that no prior studies have covered.
  • 4. Background (cont’d): Objectives/goals of the research: • Develop data-driven cyber risk and resilience scoring metrics that enable cyber insurance carriers to both measure and improve risk and resilience associated with underwriting cyber liabilities • Improve the resilience of infrastructure to known and unknown cyber attacks through the expansion of insurance coverage, but also by highlighting best practices for cyber risk mitigation as well as developing insights into the assessment and perception of cyber risks.
  • 5. Cyber Risk Definition • “operational risks to information and technology assets that have consequences affecting the confidentiality, availability, or integrity of information or information systems”. • Leading to various types of Incidents caused by different perils 1. Cyber Extortion 9. IT - Configuration/Implementation Errors 2. Data - Malicious Breach 10. IT - Processing Errors 3. Data - Physically Lost or Stolen 11. Network/Website Disruption 4. Data - Unintentional Disclosure 12. Phishing, Spoofing, Social Engineering 5. Denial of Service (DDOS)/System Disruption 13. Privacy - Unauthorized Contact or Disclosure 6. Digital Breach/Identity Theft 14. Privacy - Unauthorized Data Collection 7. Identity - Fraudulent Use/Account Access 15. Skimming, Physical Tampering 8. Industrial Controls & Operations
  • 6. Cybersecurity Concern • Cybersecurity is tied to the health of the U.S. economy. Malicious cyberattacks could throw the financial industry into chaos. • The World Economic Forum (based on McKinsey Report) estimates that ineffective cybersecurity may cost the world’s economy $3 trillion in aggregate impact by 2020 • Cybersecurity is also national security. Critical infrastructure systems, from transportation to nuclear power, are vulnerable to cyberattacks. • Hospitals and police departments have been targeted with ransomware that severs access to vital information. • Proper risk assessment and management can improve companies’ resilience against cyber risks through market-based solutions • The primary focus of our work is the private sector and on improving cyber security in the private sector through market-oriented solutions.
  • 7. Cyber Incident Analysis Better understanding of cyber risk
  • 8. Data • Analyzing over 40,000+ cyber incident records drawn from public data and private data (Advisen, Ltd., a leading provider of data for the commercial property and casualty insurance market) • Each record has: • Timeline (first notice date, report data, etc.) • Case characteristics (case type, causes, etc.) • Legal information (juris trigger, court, etc.) • Outcome (Loss amounts, injuries, etc.) • Victim company information (name, sector, size, etc.) • Detailed incident description from news media
  • 9. Trends in Cyber Risk 0 1000 2000 3000 4000 5000 6000 Cyber incident Affected company • During the 10-year period from 2005 to 2014: 1. Number of incidents have grown by 24.4% each year 2. Number of affected companies have increased by 22.5% each year 3. Incident/Company ratio has increased from 1.37 in 2005 to 1.59 in 2014, some companies are becoming more frequently affected by cyber incidents
  • 10. Trends in Cyber Risk (cont’d) • Investment in cybersecurity does not necessarily reduce the chance of having a incident • Microsoft Corporation spent $1 billion in cybersecurity in 2015, but the number of incidents it had in that year did not go down • Types of incidents are more diversified • More cyber risk derived from people risk (phishing, unintentional disclosure of data) 0 2 4 6 8 10 12 14 2011 2012 2013 2014 2015 Microsoft’s Cyber Incidents IT - Configuration/Implementation Errors Phishing, Spoofing, Social Engineering IT - Processing Errors Data - Unintentional Disclosure Network/Website Disruption Privacy - Unauthorized Data Collection Privacy - Unauthorized Contact or Disclosure Data - Malicious Breach
  • 11. Cyber Risk Factors • Three attributes of cyber risk • Hazards – what are the potential causes of incidents • Frequency – How often do cyber incidents occur • Severity – How large are the losses • Hazards • Firms in different industries face different cyber threats, and firms in the same industry share similar risks • Industries having valuable data (e.g., financial industry) experience more data breaches • Firms in the same industry are vulnerable to similar attacks because of similar software or hardware setups (WannaCry and health care firms)
  • 12. Cyber Risk Factors – Frequency • Number of cyber incidents experienced by a firm in a certain time period • Table shows data breach frequency experienced by individual firms from 2015 to 2017 • 1/10 of the firms had multiple incidents during the 3-year period • Some firms are more frequently attacked than others All Companies Companies with more than 1 incidents Companies with more than 2 incidents Count 1977 177 44 Incident (Malicious data breach) Number Descriptive Statistics Mean 1.1614 2.8023 5.2273 Standard Error 0.0216 0.2043 0.7107 Sample Variance 0.9228 7.3868 22.2262 Kurtosis 423.7810 54.6692 15.1725 Skewness 17.8550 6.8904 3.8503 Minimum 1 2 3 Maximum 26 26 26
  • 13. Cyber Risk Factors – Frequency (cont'd) Estimate Std. Error t value Pr(>|t|) log(employee) 0.0350 0.0076 4.6130 0.0000 *** (industry)11 0.8705 0.3594 2.4223 0.0155 * (industry)21 0.7880 0.4762 1.6549 0.0981 . (industry)22 0.7831 0.3384 2.3141 0.0208 *** (industry)51 1.4723 0.0903 16.3083 0.0000 *** (industry)52 0.9726 0.0775 12.5425 0.0000 *** … … R2 0.6094 Degrees of Freedom 1929 • Dependent variable: • Number of data breaches experienced by individual firms during the 3-year period from 2015 to 2017 • Independent variable: • Firm size – log-scaled employee number as proxy • Industry fix effects – 2-digit NAICS (North American Industry Classification System) code
  • 14. Cyber Risk Factors – Frequency (cont'd) • Firm size variable has a statistically significant coefficient of 0.035 • In the same industry, larger firms experience cyber attacks more frequently than smaller firms in a given period • Because firm size variable is log scaled, the attack frequency for smaller firms is more sensitive to firm size changes • From 100 employees to 200 employees, 3-year incident number goes up 0.024 • From 1000 employees to 1100 employees, 3-year incident number goes up 0.003 • Coefficient varies across different industries • Firms in some industries are more often attacked than the others Industry Coefficient Standard Error NAICS-51 Information 1.47 0.09 NAICS-52 Finance and Insurance 0.97 0.08
  • 15. Cyber Risk Factors – Frequency (cont'd) 11 21 22 23 31 32 33 42 44 45 48 49 51 52 53 54 55 56 61 62 71 72 81 21 1 22 1 1 23 1 1 1 31 1 1 1 1 32 1 1 1 1 1 33 1 1 1 1 1 1 42 1 1 1 1 1 1 1 44 1 1 1 1 1 1 1 1 45 1 1 1 1 1 1 1 1 1 48 1 1 1 1 1 1 1 1 1 1 49 1 1 1 1 1 1 1 1 1 1 1 51 1 1 1 1 0.04 0.14 0.32 0.00 0.00 0.17 0.13 1 52 1 1 1 1 1 1 1 1 1 1 1 1 0.00 53 1 1 1 1 1 1 1 1 1 1 1 1 1.00 1 54 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 55 1 1 1 1 1 1 1 1 1 1 1 1 1.00 1 1 1 56 1 1 1 1 1 1 1 1 1 1 1 1 0.01 1 1 1 1 61 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 62 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 71 1 1 1 1 1 1 1 1 1 1 1 1 0.98 1 1 1 1 1 1 1 72 1 1 1 1 1 1 1 1 1 1 1 1 0.01 1 1 1 1 1 1 1 1 81 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1 1 92 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1 1 1 • Further analysis on how attack frequency varies across different industries • Method: Pairwise t-test • Most industries do not have different attack frequencies except industry-51 (Information Industry) • Firms in information industry more often experience cyber incidents than firms in many other industries
  • 16. Cyber Risk Factors – Severity y = 0.1213x + 5.101 0 1 2 3 4 5 6 7 8 9 10 0 1 2 3 4 5 6 7 LossAmount(log10scale) Number of Employees (log10 scale) Severity vs. Firm Size
  • 17. Cyber Risk Factors – Severity (cont'd) • Data: • 8,413 malicious data breach incidents from 2001 to 2017 • Dependent variable • Severity – log10-scaled number of records breached in a data breach incident as proxy • Independent variable • Firms size – log10-scaled employee number • Control for industry-year fixed effects Estimate Std. Error t value Pr(>|t|) log10(company_size) 0.1627 0.0144 11.322 0.0000 *** R2 0.7047 Degrees of Freedom 8090
  • 18. Cyber Risk Factors – Severity (cont'd) • Firm size has a statistically significant coefficient of 0.1627 • In the same year and same industry, larger firms breach more records • Again, pairwise t-test suggests that firms in industry-51 (information industry) experience more severe data breaches than firms in other industries 11 21 22 23 31 32 33 42 44 45 48 49 51 52 53 54 55 56 61 62 71 72 81 21 1 22 1 1 23 1 1 1 31 1 1 1 1 32 1 1 1 1 1 33 1 1 1 1 1 1 42 1 1 1 1 1 1 1 44 1 1 1 1 1 1 1 1 45 1 1 1 1 1 1 1 1 1 48 1 1 1 1 1 1 1 1 1 1 49 1 1 1 1 1 1 1 1 1 1 1 51 1 1 1 1 0.060.030.000.000.000.000.16 1 52 1 1 1 1 1 1 1 1 1 1 1 1 0.00 53 1 1 1 1 1 1 1 1 1 1 1 1 0.35 1 54 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 55 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 56 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 61 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 62 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 71 1 1 1 1 1 1 1 1 1 1 1 1 0.04 1 1 1 1 1 1 1 72 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1 81 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1 1 92 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1 1 1
  • 20. Cyber Incident Outcomes • Firms with certain characteristics are more vulnerable to some attacks, how does it imply what outcomes to expect • 15 types of cyber incidents caused by different perils • Leading to various types of outcomes First party losses •Properties damaged or lost in cyber incidents •Direct financial damages (e.g., paid ransom) •Defense costs in lawsuits •Fines and penalties, which are paid by the company for violating regulations. Third party liabilities •Physical injuries •Property damage •Loss of assets other than property •Loss of wages •Loss of business income •Loss of life •Pain and suffering •Plaintiff legal fees generated from lawsuits
  • 21. More Foreseeable Outcomes • Given the fact that although some incidents have different causes, they are similar in terms of the types of losses that they result in, we try to group together different incident types with such similarities • Creating larger samples • Very small sample sizes for some categories in original dataset, (e.g., only 8 records for DDoS incidents), is impractical for statistical analysis • Generating a clearer path from cause of cyber incident to the outcome • Helping firms determining which cyber insurance coverages to buy • Making losses more foreseeable for insurers
  • 22. • First, we calculate the frequencies of different outcomes for each type of incident • As an example, for malicious data breach incidents • 57.10% of them cause financial damages • 0.63% of them cause 3rd party property damages • Etc. Incident Type Clustering Data - Malicious Breach Outcomes Frequency Financial damages 57.10% Property 3rd party 0.63% Loss of assets 2.37% Loss of business income 2.37% Other 14.83% Other fines penalties 22.56% Pain and suffering 0.16% Plaintiff legal fees expenses 6.47% Property 1st party 1.42% Punitive exemplary damages 0.63% Other expenses 0.00% Other multiplied damages 0.00% Defense costs 0.00% Loss of life 0.00% Loss of wages 0.00%
  • 23. • We use k-means clustering method based on Euclidean distance • We group together incident types rather than incidents themselves because we need to preserve the cause information • The elbow method suggests a cluster number of 6 would be sufficient • 91% of within-cluster variance explained (PoVE) • Slow increase in PoVE after 6 Incident Type Clustering (cont'd) 0.00 0.39 0.66 0.79 0.85 0.91 0.93 0.95 0.96 0.97 0.98 0.99 1.00 1.00 0.00 0.10 0.20 0.30 0.40 0.50 0.60 0.70 0.80 0.90 1.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14PercentageofvarianceExplained Number of Clusters
  • 24. 6 Types of outcomes • 5-level scale indicating likelihood of having the type of loss Group Cause Financial Losses Fines and Penalties Plaintiff Legal Expenses Other 1 Privacy - Unauthorized Contact or Disclosure High Low Low Very Low Privacy - Unauthorized Data Collection 2 Denial of Service (DDOS)/System Disruption High Very Low Very Low Low Network/Website Disruption 3 Industrial Controls & Operations Low Very Low Very Low High 4 Cyber Extortion Very High Very Low Very Low Very Low Digital Breach/Identity Theft Identity - Fraudulent Use/Account Access Phishing, Spoofing, Social Engineering Skimming, Physical Tampering 5 Data - Malicious Breach Medium Low Very Low Very Low Data - Physically Lost or Stolen IT - Configuration/Implementation Errors IT - Processing Errors 6 Data - Unintentional Disclosure Low Medium Low Very Low
  • 26. 0 0.5 1 1.5 2 2.5 0 200 400 600 800 1000 1200 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 Incident/Firm Cyber incident number Affected firm number Cyber Risk over Time • Both number of cyber-incidents and number of affected firms are growing • Incident/firm ratio is relatively stable over time (i.e. cyber risk within individual firms is not increasing)
  • 27. Cyber Incident Losses • The average loss amount of all cyber- incidents is 2.15 million • Around 1/3 (271/844) of the cyber-incidents in maritime industry do not result in losses. • The losses typically range from 10 thousand to 10 million • Losses can be as large as 100 million
  • 28. Cyber Incident Losses (cont'd) • The maximum possible loss in a single cyber incident is getting higher in recent years • Average loss remains low, indicating that incidents with small losses are becoming more frequent 0 20 40 60 80 100 120 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 Millions Loss Amount per Incident Average Loss Max Loss
  • 29. Cyber Incident Types • Malicious data breach is the most common cyber-incident type in maritime industry, and it causes an average loss of 3.41 million per incident, which is also quite high compared to other incident types • IT processing errors has a low occurrence frequency, but can cause large losses 2,744 761,427 8,208,625 737,586 2,213,283 862,388 1,836,229 521,836 1,916,667 772,981 125,342 2,205,123 3,410,871 0 5000000 10000000 0 1000 2000 3000 4000 Industrial Controls & Operations Cyber Extortion IT - Configuration/Implementation Errors IT - Processing Errors Privacy - Unauthorized Data Collection Phishing, Spoofing, Social Engineering Network/Website Disruption Identity - Fraudulent Use/Account Access Skimming, Physical Tampering Undetermined/Other Data - Unintentional Disclosure Data - Physically Lost or Stolen Privacy - Unauthorized Contact or Disclosure Data - Malicious Breach Incident Number Average Losses
  • 30. Highlights of Cyber Risk in Maritime Industry • From previous analyses of cyber risk in maritime industry, we find: • More firms are being affected by cyber incidents • Malicious data breach is the biggest threat to this industry in terms of loss frequency and severity, and IT process errors can lead to very large losses • The incident frequency of individual firms roughly remains the same over the years, while the potential maximum loss from a single incident is getting higher • Implications: • Firms in maritime industry should give data protection high priority when managing cyber risk, and take extra care to prevent IT process errors • Firms may want to transfer some risks (cyber insurance) since cyber risks are becoming more unretainable
  • 31. Insurance for Cyber Risk Management
  • 32. Cyber Insurance • Cyber insurance is a risk transference vehicle • Complement to cybersecurity enhancement • Help insured businesses quickly recover from cyber incidents • The market is still in its infancy • U.S. penetration level of insureds is less than 15% (less than 1% in other regions) • Less than 5% of small and medium sized businesses purchase cyber insurance in the U.S. • The market is growing fast • $1.7 billion written premium in 2015 • 30% annual growth rate since 2011
  • 33. Issues with Cyber Insurance Market Few buyers Poor data Bad risk pooling Complexity in products (exclusions, limits) Information Asymmetry (Moral hazard, Adverse Selection) High Premium
  • 35. Loss Distribution • 3,895 loss amounts are recorded in Advisen’s dataset • About 1/3 (1273/3895 = 32.7%) of the cyber incidents do not result in any measurable losses • The log10-scaled losses follows a normal distribution with mean 5.41 and standard deviation 1.25 0 100 200 300 400 500 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 10 10.5 11 11.5 12 More Loss Distribution Losses Sample from normal distribution 1273 2622 No loss Loss
  • 36. Claim Rate Estimation • Objective: • Estimate the cyber incident rate in a group of companies (i.e., number of cyber incidents per company in a given period) • In an insurance setting, number of possible claims arising from a pool of policyholders • Assumptions: • Every incident results in a claim • Claims are all covered. • Portfolios are static (not changing in different years) • This analysis can be seen as the worst scenario; in actual insurer’s portfolio, the rate is expected to be lower
  • 37. Claim Rate Estimation (cont'd) • Data: • Generate a list of publicly traded companies in the U.S. • We choose public companies because their information can be easily obtained, and we know the population size • Cyber insurance has a relatively higher penetration level among public companies, so in actual insurer’s portfolios, we would expect to see lots of public companies as policyholders • Further research will be carried out on whether public and private companies have different risk characteristics in terms of cyber-security • Exchanges we considered include Nasdaq, NYSE and AMEX • 5,700+ companies in total after removing duplications • Different classes of stock or different divisions from the same company are seen as duplications. • 6,600+ companies before removal
  • 38. Claim Rate Estimation (cont'd) • Methodology: • Randomly sampling 1,000 companies from the list to form a portfolio of policyholders • Assuming each company has the same likelihood of purchasing cyber-insurance • Repeat the process a 1,000 times to create 1,000 portfolios. • Looking up the companies from each portfolios in the Advisen’s database to see how many of them have cyber incidents in a given year • We use data points from 2011 to 2014, since they have the best quality • Recording the cyber incident number for each portfolio. Since we have 1000 portfolios in each year, we get a good distribution of portfolio risk in terms of claim counts.
  • 39. Claim Rate Estimation – Results 0 50 100 150 200 250 300 350 Frequency(outof1000portfolios) Cyber Incident Rate in Each Portfolio Cyber incident rate in different years 2011 2012 2013 2014
  • 40. Claim Rate Estimation – Results (cont'd) 0 20 40 60 80 100 120 Frequency(outof1000portfolios) Cyber Incident Rate in Each Portfolio Cyber incident rate in different years 2011 2012 2013 2014
  • 41. Claim Rate Estimation – Results (cont'd) • Findings: • Portfolios typically have normally distributed claim rate • During the 4-year period from 2011 to 2014, the mean claim rate is 2.4% for public companies, and the standard deviation is 0.53% • The distribution is shifting to the right over time • 2% claim rate in 2011 vs. 3% in 2014 • The variance is getting larger • 0.4% in 2011 vs. 0.47% in 2014 • Insurer’s portfolio risk is getting higher
  • 43. CIPAR • A web-based cyber risk assessment tool built upon our data and analyses • Giving firms from all market segments an easy way to estimate their exposure to cyber risk • Helping cyber insurance carriers manage portfolio risk more efficiently and improve product pricing • Cyber incident look-up • Key features: • Cyber incident lookup • Cyber risk data visualization • Cyber risk scores based on firm characteristics • Demo
  • 44. Cyber Incident and Corporate Finance
  • 45. Combined Database • We link cyber incident data with Compustat, a database widely used in corporate finance analysis • Few studies try to explore the relation between cyber incidents and the fundamentals of victim firms • With the combined data, we are going to study a number of interesting research questions • What corporate financial factors affect the frequency of cyber incidents? • Does it matter how a firm is positioned at the time of a cyber incident? • How big is the impact of cyber incidents on firms? • What are the types of impact – change in stock prices, loss of reputation, etc… • Helping firms better prepare for cyber incidents and letting insurers better assess insureds’ risks
  • 46. Combined Database (cont'd) • 4,820 records in data base • Each record has: • Cyber incident information • All recorded quarterly financial statement items of the victim company • Stock price information • Each financial statement has two time stamps indicating: 1. If it is prior to the incident occurrence date 2. If it is prior to the first reported date of incident • Ongoing research with the combined database: • The reputational loss after a data breach takes place
  • 47. Studies on Reputational Losses • Data: • 4,820 records in the combined database • Time stamp 2 (the date when an incident was first known to the public) is used • Based on these dates, we search for the last quarterly earnings before the incident, and subsequent quarterly earnings reports after the incident (discarding the ones with missing quarterly reports) • To have a better control on the length of time between the date of incident and the date of next earnings, we divide these incidents into three groups: • Taking place 2-3 months before the next earnings • Taking place 1-2 months before the next earnings • Taking place 0-1 months before the next earnings
  • 48. Studies on Reputational Losses (cont'd) • Methodology • Goodwill as the proxy for reputation: • Usually only has book value in mergers and acquisitions • Represents the amount of money that buyer is willing to pay for a company’s good name • But we try to estimate it with excess earnings method, a common practice in accounting • Because we only care about the change value in goodwill, some issues with this method, such as choosing a proper capitalization rate is negligible • Other indicators as alternative references • Earnings quality & Market to book ratio • Control group – Other companies in the same industry which have similar characteristics but do not have cyber incidents in the same period • Industry-wise effects (e.g., holiday season in retail industry)
  • 49. Future Research Topics • How is a company’s financial performance related to characteristics of the incident it experiences? • Positive correlation between the number of employees a company has and the magnitude of loss it suffers in a cyber incident. • More factors like this from the combined database (assets, revenues, etc.) can be examined • How does a cyber incident affect a company’s financial performance? • Changes in reputation, profitability, stock price and etc. • Changes in company’s management style (risk management, investments in cybersecurity) • How long can the influence last
  • 50. Recognizing the Team Sachin Shetty (Co-PI) Associate Professor, Virginia Modeling, Analysis and Simulation Center, Old Dominion University Jay Kesan (PI) Professor, Law & ECE, University of Illinois David M. Nicol (Co-PI) Professor, ECE, University of Illinois Carol Hayes Postdoc, University of Illinois Linfeng Zhang Res. Associate, University of Illinois