SlideShare a Scribd company logo
1 of 9
Download to read offline
VivoSecurity Inc.,	
  Los	
  Altos,	
  CA.	
  Email:	
  ThomasL@VivoSecurity.com
Carl	
  Friedrich	
  Gauss	
  who	
  discovered	
  the	
  Normal	
  (Gaussian)	
  
distribution,	
   which	
  characterizes	
  random	
  events.
CYBER-­‐LOSS	
  MODEL
Calculate	
  Maximum	
  Financial	
  Loss	
  from	
  Data	
  Breach
Communicate	
  cyber-­‐exposure	
  to	
  the	
  board	
  and	
  senior	
  management;	
  Calculate	
  the	
  
value	
  of	
  incident	
  response;	
  Calculate	
  insurance	
  adequacy,	
  guide	
  insurance	
  coverage.
Simple	
  Question
It is a simple question—but hard to answer: how much money will your company lose in a large
data breach. The answer can inform the amount and kind of cyber insurance; it can demonstrate a
strong understanding of risk to the board of directors and senior management; it can justify
investments into security controls and incident response.
A Cyber-­‐Loss Model answers this question using factors that are predictive of the cost. Predictive
factors were discovered through a rigorous statistical analysis of historical industry data breaches.
6,600 10,000
$0
$500
$1,000
$1,500
$2,000
$2,500
$3,000
$3,500
$4,000
$4,500
$5,000
JB DT AA JS MK RS
Total	
  Breach	
  CostThousands
Six	
  Experts
Affected:220,000
Incident: Malicious	
  Outsider
Data: PII
Lawsuits:0
Expert	
   guess
(blue	
  bars)
Model	
  Prediction	
  
(green	
  line) Actual	
  Cost	
  
(red	
  line)
Expert	
   Average
Much research shows that people
are not good at estimating the
impact of rare events—and large
data breaches are rare events.
The graph to the right shows an
example from a study conducted
with Stanford University in which
we asked industry experts to
estimate the cost of known data
breaches. Experts consistently
guessed high, by an average of
2000%. This is compared with our
model which was within 40% on
average.
Six	
  experts	
  guess	
  at	
  the	
  cost	
  of	
  a	
  single	
  data	
  breach,	
  compared	
  with	
  the	
  
Cyber-­‐Loss	
  Model.	
  
Investigation
Notification
Call	
  center
Remediation
o Business	
  Loss
o Damage	
  to	
  personal	
  credit
o Theft	
  of	
  money	
  &	
  goods
o Credit	
  card	
  replacement	
  costs
Business	
  loss;	
  theft	
  of	
  
money	
  &	
  goods
Credit	
  monitoring	
  &	
  
privacy	
  insurance.
Fines &	
  settlements
Public	
  &	
  Other	
  BusinessesBreach	
  Company
Total	
  costs
Mitigate
Transfer	
  
via	
  suits
Costs	
  Covered	
  by	
  the	
  Cyber-­‐Loss	
  Model	
  
Response	
  CostsDamage	
  costs
Term Meaning
Investigation Cost of investigating what happened in a data breach including data
that was exposed. Costs of updating agencies of investigation
progress.
Remediation Cost to preventing future data breach.
Notification Legal costs of notifying various government agencies and people
affected by the data breach.
Call	
  Center Cost of hiring or expanding call centers to handle calls from people
affected by data breach.
Business	
  Loss,	
  theft	
  
of	
  money	
  &	
  goods
Loss of business and customers, fraud costs, cost of goods
purchased with stolen cards
Credit	
   Monitoring	
   &	
  
Privacy	
  Insurance
Cost of providing credit monitoring such as Experian, insurance to
cover personal loss by people affected by the data breach.
Fines	
  &	
  Settlements Government fines, lawsuit awards and settlements, defense costs.
Glossary
The Cyer-­‐Loss Model calculates the cost of a data breach exposing custodial data. Custodial data is
any PII data which triggers reporting requirements of various government agencies (also known as
risk to confidentiality, in AppSec parlance). The model calculates Total Costs; below is a graphical
breakdown of costs included in Total Costs.
VivoSecurity	
  Inc,	
  1247	
  Russell	
  Ave,	
  Los	
  Altos	
  California;	
   Contact:	
   ThomasL@VivoSecurity.com,	
   (650)	
  919-­‐3050
What	
  is	
  a	
  Cyber-­‐Loss	
  Model?
The Cyber-­‐Loss Model is essentially a complex formula that can explain the variability in cost
of historical data breaches. It was trained upon a large set of data breaches and tested for
accuracy on a randomly selected set of validation cases. It was developed in the statistical
language R using standard statistical techniques such as linear regression and Bayesian
Model Averaging.
The Cyber-­‐Loss Model is deployed in an easy to use Excel Spreadsheet which requires a
small number of variable inputs that have been found to be predictive of cost. No
information is needed about a company’s security posture.
What is Model Validation? Federal Reserve has created guidance for model management
(SR11-­‐7 & SR15-­‐18). This guidance assures that models are developed following sound
statistical practices. Many banks have an internal validation process for establishing
compliance with Federal Reserves guidelines. Our Cyber-­‐Loss Model complies with the
Federal Reserve’s guidance and can pass a bank’s validation process.
The graphs below are a pro forma example of breach cost characterizations.
Possible data breach cost is break down by incident and data type. The model also
provides a probability distribution for the range of costs, and the probability of
lawsuits.
$0
$20
$40
$60
$80
$100
Mean	
  Data	
  Breach	
  Costs
Millions
Incident	
  &	
  Data	
  Type
0%
20%
40%
60%
80%
100%
0 >0 1 2 3 4 5
Probability
Number	
  of	
  Lawsuits
Model	
  Outputs
$0
$5
$10
$15
$20
$25
Likelihood
Breach	
  Cost
Millions
$19.8M
80%	
  Confidence	
  Interval
Value	
  of	
  Incident	
  
Response	
  Controls	
  
Most	
  companies	
  would	
  
experience	
  a	
  cost	
  of	
  
under	
  $5M.
$0
$10
$20
$30
$40
$50
$60
$70
Probability	
  of	
  Breach	
  Cost
Breach	
  Cost
Millions
For a given set of parameters, the cost follows a probability distribution, with the probability
declining exponentially with cost. The 80% and 90% confidence intervals mark cost points
where 80% and 90% of data breaches, will fall below. But the difference between 80% and 90%
is large and 10% of companies will experience costs which fall within this cost interval. This
extra cost is driven primarily by incident response and a large cost interval justifies investments
into incident response activities.
80%	
  Confidence 90%	
  Confidence
10%	
  of	
  breaches	
  fall	
  here.
Value	
  of	
  Incident	
  Response.
Investigation
Notification
Fines	
  &	
  settlements
Breach	
  Costs	
  affected	
  
by	
  Incident	
  Response
Turn	
  on	
  logs	
  to	
  capturing	
  
information	
  that	
  can	
  speed	
  
the	
  investigation.	
  Engaging	
  
a	
  security	
  firm	
  early	
  can	
  
save	
  millions.
Engage	
  a	
  law	
  firm	
  early,	
  
negotiate	
  costs	
  and	
  be	
  
prepared.
Reduce probability of a
lawsuit by engaging a law
firm to review contracts
and advertising promises.
What	
  Does	
  the	
  Cyber-­‐Loss	
  Model	
  Include?
VivoSecurity	
  Inc,	
  1247	
  Russell	
  Ave,	
  Los	
  Altos	
  California;	
   Contact:	
   ThomasL@VivoSecurity.com,	
   (650)	
  919-­‐3050
Included Detail
Deployment Models are deployed as an easy to use Excel Spreadsheet.
Training We provide training on the use of the spreadsheet, how to
think about confidence intervals, and how to guide insurance
purchases.
Documentation We provide complete model documentation in the bank’s own
format.1
Validation	
  Support We provide support for the bank’s model validation team,
including data turnover, troubleshooting R and SQL code, and
discussions on modeling methodology. 1
Quarterly	
  Maintenance We provide new data as it becomes available, model re-­‐
evaluation, all required validation documentation, validation
team support, re-­‐deployment, and evidence of testing. 1
1.	
  Required	
  by	
  banks	
  and	
  insurance	
  companies,	
  not	
  recommended	
  for	
  other	
  industries.
Evaluation
Bank receives themodel as an Excel spreadsheet and performs initial evaluation using approximate
model inputs. VivoSecurity provides training for how to use the model, how to think about
confidenceintervals and apply results to insurancepurchases.
Model	
  Owner
The owner (sponsor) of the risk model is decided. The owner might be, for example, the CFO or
CRO group. Themodel owner might draft documents to officially sponsor themodel as preparation
for model validation.
Validation	
  Support
Data	
  Owner
VivoSecurity produces SR11-­‐7 compliant validation documentation, following the bank’s format.
VivoSecurity then works with thebank’s validation team to support validateactivities.
Departments are identified that will produce validated numbers that will be entered into the
model. This might include creating and approving SQL to query systems and to generate the
numbers.
Insurance	
  Adequacy
The model owner receives validated numbers from data owners and performs a model based
evaluation ofinsuranceadequacy. Considerations aredocumented and approved.
Adjust	
  Insurance
Insurance coverage can be adjusted and premiums lowered using model based arguments and
historical industry data. Note that neither carriers nor brokers have models as rigorous as ours,
giving thebank an advantage in negotiations.
Document Considerations for insurance adequacy along with validated models and evidence of insuranceare
incorporated into regulator reporting documentation, e.g., FR Y-­‐14A.
Use	
  Case
The diagram below shows the process for a typical retail bank that uses the Cyber-­‐Loss Model in satisfying regulatory requirements. Activities
need not proceed sequentially. For example, after a model owner is determined, model validation (which takes themost time) can be performed
concurrently with other activities.
About	
  VivoSecurity
VivoSecurity	
  Inc,	
  1247	
  Russell	
  Ave,	
  Los	
  Altos	
  California;	
   Contact:	
   ThomasL@VivoSecurity.com,	
   (650)	
  919-­‐3050
VivoSecurity provides data analytics and statistical modeling to companies in the financial and
high tech industries. We are a Silicon Valley Startup since 2012, with PhD level scientists and
statisticians. We use advanced data analytic techniques to model the probability and cost of
cybersecurity events. We have strong cybersecurity domain knowledge, strong knowledge of
software applications, strong knowledge of operating systems and hardware and a strong
understanding of enterprise operations.
Model Description
Peer	
  Risk	
  Model Characterizes	
  cyber	
  risk	
  in	
  dollars	
  in	
  comparison	
  with	
  
peers.
Probability	
  for	
  Fraud, personal	
  customers Calculates	
  probability	
  for	
  a	
  cyber	
  attach	
  that	
  leads	
  to	
  
fraud.
Probability	
  for	
  Fraud,	
  corporate	
  customers Calculates	
  probability	
  for	
  a	
  cyber	
  attach	
  that	
  leads	
  to	
  
fraud.
3rd party	
  (vendor)	
  Risk Calculates	
  risk	
  in	
  dollars	
  posed	
  by	
  3rd party	
  partners.
Additional	
  Offerings

More Related Content

What's hot

Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
Using Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudUsing Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudCognizant
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisFraudBusters
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Cognizant
 
My blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industryMy blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industryKishore Jethanandani, MBA, MA, MPhil,
 
A safe approach to growing your loan book in wealth management
A safe approach to growing your loan book in wealth managementA safe approach to growing your loan book in wealth management
A safe approach to growing your loan book in wealth managementRockall Technologies
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...Security B-Sides
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1cGene Kim
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliantDivya Kothari
 
Frost&Sullivan Report: Business Analytics
Frost&Sullivan Report: Business Analytics Frost&Sullivan Report: Business Analytics
Frost&Sullivan Report: Business Analytics Judy Misbin
 
2017 Top Issues - Changing Business Models - January 2017
2017 Top Issues -  Changing Business Models  - January 20172017 Top Issues -  Changing Business Models  - January 2017
2017 Top Issues - Changing Business Models - January 2017PwC
 
financial exec final
financial exec finalfinancial exec final
financial exec finalAdam Ortlieb
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 
201206 Tech Decisions: Finding Profits
201206 Tech Decisions: Finding Profits201206 Tech Decisions: Finding Profits
201206 Tech Decisions: Finding ProfitsSteven Callahan
 

What's hot (20)

Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Using Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims FraudUsing Advanced Analytics to Combat P&C Claims Fraud
Using Advanced Analytics to Combat P&C Claims Fraud
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
 
My blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industryMy blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industry
 
Proactive IT management: eliminating mean time to surprise
Proactive IT management: eliminating mean time to surpriseProactive IT management: eliminating mean time to surprise
Proactive IT management: eliminating mean time to surprise
 
A safe approach to growing your loan book in wealth management
A safe approach to growing your loan book in wealth managementA safe approach to growing your loan book in wealth management
A safe approach to growing your loan book in wealth management
 
My blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banksMy blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banks
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
Winning Tactics for Data Governance
Winning Tactics for Data GovernanceWinning Tactics for Data Governance
Winning Tactics for Data Governance
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliant
 
Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
Fraud Monitoring Solution
 
Frost&Sullivan Report: Business Analytics
Frost&Sullivan Report: Business Analytics Frost&Sullivan Report: Business Analytics
Frost&Sullivan Report: Business Analytics
 
The Next Generation of Submission Intake and Clearance
The Next Generation of Submission Intake and ClearanceThe Next Generation of Submission Intake and Clearance
The Next Generation of Submission Intake and Clearance
 
2017 Top Issues - Changing Business Models - January 2017
2017 Top Issues -  Changing Business Models  - January 20172017 Top Issues -  Changing Business Models  - January 2017
2017 Top Issues - Changing Business Models - January 2017
 
financial exec final
financial exec finalfinancial exec final
financial exec final
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
201206 Tech Decisions: Finding Profits
201206 Tech Decisions: Finding Profits201206 Tech Decisions: Finding Profits
201206 Tech Decisions: Finding Profits
 

Similar to Cyber loss model for all industries

Peer Risk Model for Cyber Security Risk
Peer Risk Model for Cyber Security RiskPeer Risk Model for Cyber Security Risk
Peer Risk Model for Cyber Security RiskThomas Lee
 
CIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalCIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalClaire Louis
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)ecommerce
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsJason Dover
 
How to prevent data breach risk from impacting capital ratios
How to prevent data breach risk from impacting capital ratiosHow to prevent data breach risk from impacting capital ratios
How to prevent data breach risk from impacting capital ratiosThomas Lee
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 
Predictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionPredictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionZensar Technologies Ltd.
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance reportBee_Ware
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report- Mark - Fullbright
 
Detect and Prevent Insurance fraud using Hexaware’s iFraudEngine
Detect and Prevent Insurance fraud using Hexaware’s iFraudEngineDetect and Prevent Insurance fraud using Hexaware’s iFraudEngine
Detect and Prevent Insurance fraud using Hexaware’s iFraudEngineHexaware Technologies
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016CBIZ, Inc.
 

Similar to Cyber loss model for all industries (20)

Peer Risk Model for Cyber Security Risk
Peer Risk Model for Cyber Security RiskPeer Risk Model for Cyber Security Risk
Peer Risk Model for Cyber Security Risk
 
CIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalCIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis Final
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant Environments
 
How to prevent data breach risk from impacting capital ratios
How to prevent data breach risk from impacting capital ratiosHow to prevent data breach risk from impacting capital ratios
How to prevent data breach risk from impacting capital ratios
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
Predictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detectionPredictive analytics solution for claims fraud detection
Predictive analytics solution for claims fraud detection
 
B crisis
B crisisB crisis
B crisis
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Cyber Brochure_2015
Cyber Brochure_2015Cyber Brochure_2015
Cyber Brochure_2015
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report
 
Detect and Prevent Insurance fraud using Hexaware’s iFraudEngine
Detect and Prevent Insurance fraud using Hexaware’s iFraudEngineDetect and Prevent Insurance fraud using Hexaware’s iFraudEngine
Detect and Prevent Insurance fraud using Hexaware’s iFraudEngine
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016
 

Recently uploaded

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 

Recently uploaded (20)

👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

Cyber loss model for all industries

  • 1. VivoSecurity Inc.,  Los  Altos,  CA.  Email:  ThomasL@VivoSecurity.com Carl  Friedrich  Gauss  who  discovered  the  Normal  (Gaussian)   distribution,   which  characterizes  random  events. CYBER-­‐LOSS  MODEL Calculate  Maximum  Financial  Loss  from  Data  Breach Communicate  cyber-­‐exposure  to  the  board  and  senior  management;  Calculate  the   value  of  incident  response;  Calculate  insurance  adequacy,  guide  insurance  coverage.
  • 2. Simple  Question It is a simple question—but hard to answer: how much money will your company lose in a large data breach. The answer can inform the amount and kind of cyber insurance; it can demonstrate a strong understanding of risk to the board of directors and senior management; it can justify investments into security controls and incident response. A Cyber-­‐Loss Model answers this question using factors that are predictive of the cost. Predictive factors were discovered through a rigorous statistical analysis of historical industry data breaches. 6,600 10,000 $0 $500 $1,000 $1,500 $2,000 $2,500 $3,000 $3,500 $4,000 $4,500 $5,000 JB DT AA JS MK RS Total  Breach  CostThousands Six  Experts Affected:220,000 Incident: Malicious  Outsider Data: PII Lawsuits:0 Expert   guess (blue  bars) Model  Prediction   (green  line) Actual  Cost   (red  line) Expert   Average Much research shows that people are not good at estimating the impact of rare events—and large data breaches are rare events. The graph to the right shows an example from a study conducted with Stanford University in which we asked industry experts to estimate the cost of known data breaches. Experts consistently guessed high, by an average of 2000%. This is compared with our model which was within 40% on average. Six  experts  guess  at  the  cost  of  a  single  data  breach,  compared  with  the   Cyber-­‐Loss  Model.  
  • 3. Investigation Notification Call  center Remediation o Business  Loss o Damage  to  personal  credit o Theft  of  money  &  goods o Credit  card  replacement  costs Business  loss;  theft  of   money  &  goods Credit  monitoring  &   privacy  insurance. Fines &  settlements Public  &  Other  BusinessesBreach  Company Total  costs Mitigate Transfer   via  suits Costs  Covered  by  the  Cyber-­‐Loss  Model   Response  CostsDamage  costs Term Meaning Investigation Cost of investigating what happened in a data breach including data that was exposed. Costs of updating agencies of investigation progress. Remediation Cost to preventing future data breach. Notification Legal costs of notifying various government agencies and people affected by the data breach. Call  Center Cost of hiring or expanding call centers to handle calls from people affected by data breach. Business  Loss,  theft   of  money  &  goods Loss of business and customers, fraud costs, cost of goods purchased with stolen cards Credit   Monitoring   &   Privacy  Insurance Cost of providing credit monitoring such as Experian, insurance to cover personal loss by people affected by the data breach. Fines  &  Settlements Government fines, lawsuit awards and settlements, defense costs. Glossary The Cyer-­‐Loss Model calculates the cost of a data breach exposing custodial data. Custodial data is any PII data which triggers reporting requirements of various government agencies (also known as risk to confidentiality, in AppSec parlance). The model calculates Total Costs; below is a graphical breakdown of costs included in Total Costs.
  • 4. VivoSecurity  Inc,  1247  Russell  Ave,  Los  Altos  California;   Contact:   ThomasL@VivoSecurity.com,   (650)  919-­‐3050 What  is  a  Cyber-­‐Loss  Model? The Cyber-­‐Loss Model is essentially a complex formula that can explain the variability in cost of historical data breaches. It was trained upon a large set of data breaches and tested for accuracy on a randomly selected set of validation cases. It was developed in the statistical language R using standard statistical techniques such as linear regression and Bayesian Model Averaging. The Cyber-­‐Loss Model is deployed in an easy to use Excel Spreadsheet which requires a small number of variable inputs that have been found to be predictive of cost. No information is needed about a company’s security posture. What is Model Validation? Federal Reserve has created guidance for model management (SR11-­‐7 & SR15-­‐18). This guidance assures that models are developed following sound statistical practices. Many banks have an internal validation process for establishing compliance with Federal Reserves guidelines. Our Cyber-­‐Loss Model complies with the Federal Reserve’s guidance and can pass a bank’s validation process.
  • 5. The graphs below are a pro forma example of breach cost characterizations. Possible data breach cost is break down by incident and data type. The model also provides a probability distribution for the range of costs, and the probability of lawsuits. $0 $20 $40 $60 $80 $100 Mean  Data  Breach  Costs Millions Incident  &  Data  Type 0% 20% 40% 60% 80% 100% 0 >0 1 2 3 4 5 Probability Number  of  Lawsuits Model  Outputs $0 $5 $10 $15 $20 $25 Likelihood Breach  Cost Millions $19.8M 80%  Confidence  Interval Value  of  Incident   Response  Controls   Most  companies  would   experience  a  cost  of   under  $5M.
  • 6. $0 $10 $20 $30 $40 $50 $60 $70 Probability  of  Breach  Cost Breach  Cost Millions For a given set of parameters, the cost follows a probability distribution, with the probability declining exponentially with cost. The 80% and 90% confidence intervals mark cost points where 80% and 90% of data breaches, will fall below. But the difference between 80% and 90% is large and 10% of companies will experience costs which fall within this cost interval. This extra cost is driven primarily by incident response and a large cost interval justifies investments into incident response activities. 80%  Confidence 90%  Confidence 10%  of  breaches  fall  here. Value  of  Incident  Response. Investigation Notification Fines  &  settlements Breach  Costs  affected   by  Incident  Response Turn  on  logs  to  capturing   information  that  can  speed   the  investigation.  Engaging   a  security  firm  early  can   save  millions. Engage  a  law  firm  early,   negotiate  costs  and  be   prepared. Reduce probability of a lawsuit by engaging a law firm to review contracts and advertising promises.
  • 7. What  Does  the  Cyber-­‐Loss  Model  Include? VivoSecurity  Inc,  1247  Russell  Ave,  Los  Altos  California;   Contact:   ThomasL@VivoSecurity.com,   (650)  919-­‐3050 Included Detail Deployment Models are deployed as an easy to use Excel Spreadsheet. Training We provide training on the use of the spreadsheet, how to think about confidence intervals, and how to guide insurance purchases. Documentation We provide complete model documentation in the bank’s own format.1 Validation  Support We provide support for the bank’s model validation team, including data turnover, troubleshooting R and SQL code, and discussions on modeling methodology. 1 Quarterly  Maintenance We provide new data as it becomes available, model re-­‐ evaluation, all required validation documentation, validation team support, re-­‐deployment, and evidence of testing. 1 1.  Required  by  banks  and  insurance  companies,  not  recommended  for  other  industries.
  • 8. Evaluation Bank receives themodel as an Excel spreadsheet and performs initial evaluation using approximate model inputs. VivoSecurity provides training for how to use the model, how to think about confidenceintervals and apply results to insurancepurchases. Model  Owner The owner (sponsor) of the risk model is decided. The owner might be, for example, the CFO or CRO group. Themodel owner might draft documents to officially sponsor themodel as preparation for model validation. Validation  Support Data  Owner VivoSecurity produces SR11-­‐7 compliant validation documentation, following the bank’s format. VivoSecurity then works with thebank’s validation team to support validateactivities. Departments are identified that will produce validated numbers that will be entered into the model. This might include creating and approving SQL to query systems and to generate the numbers. Insurance  Adequacy The model owner receives validated numbers from data owners and performs a model based evaluation ofinsuranceadequacy. Considerations aredocumented and approved. Adjust  Insurance Insurance coverage can be adjusted and premiums lowered using model based arguments and historical industry data. Note that neither carriers nor brokers have models as rigorous as ours, giving thebank an advantage in negotiations. Document Considerations for insurance adequacy along with validated models and evidence of insuranceare incorporated into regulator reporting documentation, e.g., FR Y-­‐14A. Use  Case The diagram below shows the process for a typical retail bank that uses the Cyber-­‐Loss Model in satisfying regulatory requirements. Activities need not proceed sequentially. For example, after a model owner is determined, model validation (which takes themost time) can be performed concurrently with other activities.
  • 9. About  VivoSecurity VivoSecurity  Inc,  1247  Russell  Ave,  Los  Altos  California;   Contact:   ThomasL@VivoSecurity.com,   (650)  919-­‐3050 VivoSecurity provides data analytics and statistical modeling to companies in the financial and high tech industries. We are a Silicon Valley Startup since 2012, with PhD level scientists and statisticians. We use advanced data analytic techniques to model the probability and cost of cybersecurity events. We have strong cybersecurity domain knowledge, strong knowledge of software applications, strong knowledge of operating systems and hardware and a strong understanding of enterprise operations. Model Description Peer  Risk  Model Characterizes  cyber  risk  in  dollars  in  comparison  with   peers. Probability  for  Fraud, personal  customers Calculates  probability  for  a  cyber  attach  that  leads  to   fraud. Probability  for  Fraud,  corporate  customers Calculates  probability  for  a  cyber  attach  that  leads  to   fraud. 3rd party  (vendor)  Risk Calculates  risk  in  dollars  posed  by  3rd party  partners. Additional  Offerings