SlideShare a Scribd company logo
1 of 24
Download to read offline
NotPetya cyber attack
June 2017
Reputation risk management / Crisis management / Cyber and data privacy communications
2
Background
3Source: The Economist - 2015, 2016
• The world’s no. 1 shipping company by volume
• But global shipping industry in crisis due to
weak economic growth, overcapacity,
localisation, shift to mail, etc
• Declining profitability, pressure to consolidate
and/or refocus
• Maersk seen as strong in shipping, terminals
and logistics; weaker in oil exploration and
drilling
• Pressure on Maersk to separate, spin-off or
sell oil businesses
• Maersk Line starting to focus on digitisation to
improve efficiencies and cut costs
AP Moller-Maersk – early 2017
4Source: AP Moller-Maersk Annual Report 2016
AP Moller-Maersk – financials (FY 2016)
5Sources: Brand Finance, 2018
AP Moller-Maersk – brand value (2017)
6Sources: Reputation Institute, 2016
AP Moller-Maersk – corporate reputation (2016)
7
Incident
Maersk cyber attack – overview
8
• Maersk infected via Ukrainian tax return vendor MeDoc
• Collateral damage from geo-political attack on Ukraine government, infrastructure
and financial system
• Full propagation of virus across whole company IT network within 7 minutes
• Affected all core business units
• 49,000 laptops destroyed, 1,200 apps instantly inaccessible and 1,000 destroyed,
incl. the company’s central booking website Maerskline.com
• Required immediate (within 2 hours) disconnection of global network
• Reverted to manual systems, resulting in 20% reduction in trading volumes
• Online bookings mostly resumed after 8 days
• 10 days to rebuild 4,000 servers and 45,000 PCs, and restore 2,500 applications
• Full IT network restored after four weeks
Maersk cyber attack – day one timeline
9
June 27 (GMT+1)
• 04.00 - Ransomware attack on Ukrainian banks, power companies etc
• 11.30 - Ukraine Central Bank confirms attack on IT systems
• 13.21 - Maersk publicly confirms IT systems are down
• 14.02 - Symantec confirms use of Petya ransomware for attacks
• 16.12 - Kapersky says NotPetya wiper destroys data, affects ~2,000 organisations
• 18.15 – German email provider Posteo confirms it blocked ransom email address
• 19.46 - Ukraine police confirm MeDoc is infected by NotPetya
• 21.03 - MeDoc denies responsibility for attacks
Maersk cyber attack – communications
10
• Opted for transparent communications
– Regular public updates via website, Twitter
– Media relations and customer communications via Whatsapp, personal email
– Constant internal communications across the world
– Consistent messaging across all channels and to all audiences
– All communications were fact-based as opposed to misleading speculative
• Led from the top
– CEO and senior leadership involved in communications response from the outse
– CTIO assumed control of crisis team after four days
• Apologised upfront
– And then focused on the fixing the hole and getting back to business as usual
11
12
13
14
Impact
Immediate financial impact
15
Six-month business and reputational impact
16
• Revenue (FY 2017): 30.9 bn (35.5 bn)
• Operating profit/loss: -USD 1.2 bn
(-1.9 bn)
• Underlying profit: USD 356 m (711 m)
• Market cap (after 1 year): -27%
• Cyberattack costs: USD 300-350m
• Global damages (est): USD 10bn+
• Brand value: +43%
Sources: AP Moller Maersk Annual Report 2017; Reputation Institute, March 2019; Brand Finance, Feb 2019
17
Strong relative share price performance
18
2018 share price collapse
19
Lessons
& Implications
Maersk cyber attack lessons – 1
20
• High quality response is essential
– Maersk moved quickly and decisively
– Top management involved from the outset
– Transparency and openness cushioned Maersk from regulators, suppliers,
employees, media, etc
• Ad hoc, flexible approach to crisis management can work
– Incl. business continuity, incident/crisis management, leadership and
other communications
– So long as the incident/crisis team is experienced, methodical, objective,
proactive, and decisive
Maersk cyber attack lessons – 2
21
• Total prevention is impossible
– Every organisation is exposed to cyber attacks and data breaches
– No organisation is exempt from nation state attacks, which tend to be
more damaging than other attacks
• Historic reputation counts
– Maersk’s reputation as a strong, successful industry leader helped it
weather the storm
• Financial impact of cyber attacks is mostly fairly limited
– Goodwill often exists due to volume and nature
Maersk cyber attack lessons – 3
22
• Learn from the incident
– At all levels of the organisation
– Be seen to be listening and learning from all relevant audiences on an
ongoing basis
– Document actions and impact carefully during and after the incident, collate
and examine thoroughly, and implement the learnings
Implications for Maersk
23
• Stronger, more comprehensive cyber protection
– Need for automated cyber detection and response
– Business continuity and crisis plans must be comprehensive (as opposed to
asset-based), global and up-to-date
– Keep business continuity and service resumption plans separate
– Need for regular cyber awareness updates and incident training
– Cyber insurance protection can help reduce incident costs
• Allow for ad hoc response
– Permit and be prepared to use non-official communications channels during an
incident/crisis when necessary
24
FURTHER INFO
+44 20 3856 3599
cp@charliepownall.com
linkedin.com/in/charliepownall
charliepownall.com

More Related Content

What's hot

Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

What's hot (20)

Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Client-Side Penetration Testing Presentation
Client-Side Penetration Testing PresentationClient-Side Penetration Testing Presentation
Client-Side Penetration Testing Presentation
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 

Similar to Maersk Notpetya Crisis Response Case Study

1973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_151973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_15
shed59
 

Similar to Maersk Notpetya Crisis Response Case Study (20)

Cyber Crisis Management - Technology Risk Management Forum
Cyber Crisis Management - Technology Risk Management ForumCyber Crisis Management - Technology Risk Management Forum
Cyber Crisis Management - Technology Risk Management Forum
 
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat Reports
 
The Moroccan Experiences with the OECD Review Process, Aziz AJBILOU
The Moroccan Experiences with the OECD Review Process, Aziz AJBILOUThe Moroccan Experiences with the OECD Review Process, Aziz AJBILOU
The Moroccan Experiences with the OECD Review Process, Aziz AJBILOU
 
Crisis Communications
Crisis CommunicationsCrisis Communications
Crisis Communications
 
YUDU - Managing a Breach (LDSC Cyber Themed Evening)
YUDU - Managing a Breach (LDSC Cyber Themed Evening)YUDU - Managing a Breach (LDSC Cyber Themed Evening)
YUDU - Managing a Breach (LDSC Cyber Themed Evening)
 
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και ΝαυτιλίαMaritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
Maritime Cyber Security-Κυβερνοασφάλεια και Ναυτιλία
 
Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
 
Maritime Cyber Security Education
Maritime Cyber Security EducationMaritime Cyber Security Education
Maritime Cyber Security Education
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014
 
MASC RMA Cyber presentation by Belton Zeigler
MASC RMA Cyber presentation by Belton ZeiglerMASC RMA Cyber presentation by Belton Zeigler
MASC RMA Cyber presentation by Belton Zeigler
 
1973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_151973-16 Tackling the challenges of cyber security_19_03_15
1973-16 Tackling the challenges of cyber security_19_03_15
 
Managing Security Risks in Manufacturing
Managing Security Risks in ManufacturingManaging Security Risks in Manufacturing
Managing Security Risks in Manufacturing
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
 
Cybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafelCybersecurity op de bestuurstafel
Cybersecurity op de bestuurstafel
 
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdfGramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
Gramax-Cybersec-Role of Cybersecurity in Maritime A high-risk sector.pdf
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
DFS22_Main Stage_David Cox_Mastercard_041022
DFS22_Main Stage_David Cox_Mastercard_041022DFS22_Main Stage_David Cox_Mastercard_041022
DFS22_Main Stage_David Cox_Mastercard_041022
 
Will the next systemic crisis be cyber?
Will the next systemic crisis be cyber?Will the next systemic crisis be cyber?
Will the next systemic crisis be cyber?
 

More from Charlie Pownall

More from Charlie Pownall (20)

Transparent AI
Transparent AITransparent AI
Transparent AI
 
TalkTalk Data Breach Case Study
TalkTalk Data Breach Case StudyTalkTalk Data Breach Case Study
TalkTalk Data Breach Case Study
 
Risky Business: The Whys and Hows of Effective Reputational Risk Management
Risky Business: The Whys and Hows of Effective Reputational Risk ManagementRisky Business: The Whys and Hows of Effective Reputational Risk Management
Risky Business: The Whys and Hows of Effective Reputational Risk Management
 
GDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and CommunicationsGDPR: Data Breach Notification and Communications
GDPR: Data Breach Notification and Communications
 
Plans Are Useless - Preparing for & Responding to a Crisis in the Digital Age
Plans Are Useless - Preparing for & Responding to a Crisis in the Digital AgePlans Are Useless - Preparing for & Responding to a Crisis in the Digital Age
Plans Are Useless - Preparing for & Responding to a Crisis in the Digital Age
 
Boxing Clever: How to Safeguard your Company's Reputation Online
Boxing Clever: How to Safeguard your Company's Reputation OnlineBoxing Clever: How to Safeguard your Company's Reputation Online
Boxing Clever: How to Safeguard your Company's Reputation Online
 
Building Trust and a Healthy Reputation from the Get-go
Building Trust and a Healthy Reputation from the Get-goBuilding Trust and a Healthy Reputation from the Get-go
Building Trust and a Healthy Reputation from the Get-go
 
An Introduction to The New Crisis Communications
An Introduction to The New Crisis CommunicationsAn Introduction to The New Crisis Communications
An Introduction to The New Crisis Communications
 
Managing Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social MediaManaging Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social Media
 
No Time to Think. How to Respond to Negative Situations Using Social Media
No Time to Think. How to Respond to Negative Situations Using Social MediaNo Time to Think. How to Respond to Negative Situations Using Social Media
No Time to Think. How to Respond to Negative Situations Using Social Media
 
Issues Management In The Digital Age
Issues Management In The Digital AgeIssues Management In The Digital Age
Issues Management In The Digital Age
 
Social Media for Crisis Communications
Social Media for Crisis CommunicationsSocial Media for Crisis Communications
Social Media for Crisis Communications
 
Online Community Engagement For Government
Online Community Engagement For GovernmentOnline Community Engagement For Government
Online Community Engagement For Government
 
How To Develop Social Media Strategy
How To Develop Social Media StrategyHow To Develop Social Media Strategy
How To Develop Social Media Strategy
 
Safeguarding Corporate Reputation In Social Media
Safeguarding Corporate Reputation In Social MediaSafeguarding Corporate Reputation In Social Media
Safeguarding Corporate Reputation In Social Media
 
Top Social Media #Fails in Asia - 2013
Top Social Media #Fails in Asia - 2013Top Social Media #Fails in Asia - 2013
Top Social Media #Fails in Asia - 2013
 
Social Media for Thought Leadership
Social Media for Thought LeadershipSocial Media for Thought Leadership
Social Media for Thought Leadership
 
How to Minimise Social Media Marketing Risks
How to Minimise Social Media Marketing RisksHow to Minimise Social Media Marketing Risks
How to Minimise Social Media Marketing Risks
 
Digital Influence: Communications Nirvana?
Digital Influence: Communications Nirvana?Digital Influence: Communications Nirvana?
Digital Influence: Communications Nirvana?
 
Social Engagement. 15 Tips From The Trenches
Social Engagement. 15 Tips From The TrenchesSocial Engagement. 15 Tips From The Trenches
Social Engagement. 15 Tips From The Trenches
 

Recently uploaded

Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
Nimot Muili
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
SandaliGurusinghe2
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Riyadh +966572737505 get cytotec
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
AllTops
 

Recently uploaded (14)

Marketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docxMarketing Management 16th edition by Philip Kotler test bank.docx
Marketing Management 16th edition by Philip Kotler test bank.docx
 
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professionalW.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
W.H.Bender Quote 62 - Always strive to be a Hospitality Service professional
 
digital Human resource management presentation.pdf
digital Human resource management presentation.pdfdigital Human resource management presentation.pdf
digital Human resource management presentation.pdf
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot ModelGautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Gautam Buddh Nagar Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime SiliguriSiliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
Siliguri Escorts Service Girl ^ 9332606886, WhatsApp Anytime Siliguri
 
Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.Persuasive and Communication is the art of negotiation.
Persuasive and Communication is the art of negotiation.
 
The Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard BrownThe Psychology Of Motivation - Richard Brown
The Psychology Of Motivation - Richard Brown
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
internship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamrainternship thesis pakistan aeronautical complex kamra
internship thesis pakistan aeronautical complex kamra
 
How Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptxHow Software Developers Destroy Business Value.pptx
How Software Developers Destroy Business Value.pptx
 
Information Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docxInformation Technology Project Management, Revised 7th edition test bank.docx
Information Technology Project Management, Revised 7th edition test bank.docx
 

Maersk Notpetya Crisis Response Case Study

  • 1. NotPetya cyber attack June 2017 Reputation risk management / Crisis management / Cyber and data privacy communications
  • 3. 3Source: The Economist - 2015, 2016 • The world’s no. 1 shipping company by volume • But global shipping industry in crisis due to weak economic growth, overcapacity, localisation, shift to mail, etc • Declining profitability, pressure to consolidate and/or refocus • Maersk seen as strong in shipping, terminals and logistics; weaker in oil exploration and drilling • Pressure on Maersk to separate, spin-off or sell oil businesses • Maersk Line starting to focus on digitisation to improve efficiencies and cut costs AP Moller-Maersk – early 2017
  • 4. 4Source: AP Moller-Maersk Annual Report 2016 AP Moller-Maersk – financials (FY 2016)
  • 5. 5Sources: Brand Finance, 2018 AP Moller-Maersk – brand value (2017)
  • 6. 6Sources: Reputation Institute, 2016 AP Moller-Maersk – corporate reputation (2016)
  • 8. Maersk cyber attack – overview 8 • Maersk infected via Ukrainian tax return vendor MeDoc • Collateral damage from geo-political attack on Ukraine government, infrastructure and financial system • Full propagation of virus across whole company IT network within 7 minutes • Affected all core business units • 49,000 laptops destroyed, 1,200 apps instantly inaccessible and 1,000 destroyed, incl. the company’s central booking website Maerskline.com • Required immediate (within 2 hours) disconnection of global network • Reverted to manual systems, resulting in 20% reduction in trading volumes • Online bookings mostly resumed after 8 days • 10 days to rebuild 4,000 servers and 45,000 PCs, and restore 2,500 applications • Full IT network restored after four weeks
  • 9. Maersk cyber attack – day one timeline 9 June 27 (GMT+1) • 04.00 - Ransomware attack on Ukrainian banks, power companies etc • 11.30 - Ukraine Central Bank confirms attack on IT systems • 13.21 - Maersk publicly confirms IT systems are down • 14.02 - Symantec confirms use of Petya ransomware for attacks • 16.12 - Kapersky says NotPetya wiper destroys data, affects ~2,000 organisations • 18.15 – German email provider Posteo confirms it blocked ransom email address • 19.46 - Ukraine police confirm MeDoc is infected by NotPetya • 21.03 - MeDoc denies responsibility for attacks
  • 10. Maersk cyber attack – communications 10 • Opted for transparent communications – Regular public updates via website, Twitter – Media relations and customer communications via Whatsapp, personal email – Constant internal communications across the world – Consistent messaging across all channels and to all audiences – All communications were fact-based as opposed to misleading speculative • Led from the top – CEO and senior leadership involved in communications response from the outse – CTIO assumed control of crisis team after four days • Apologised upfront – And then focused on the fixing the hole and getting back to business as usual
  • 11. 11
  • 12. 12
  • 13. 13
  • 16. Six-month business and reputational impact 16 • Revenue (FY 2017): 30.9 bn (35.5 bn) • Operating profit/loss: -USD 1.2 bn (-1.9 bn) • Underlying profit: USD 356 m (711 m) • Market cap (after 1 year): -27% • Cyberattack costs: USD 300-350m • Global damages (est): USD 10bn+ • Brand value: +43% Sources: AP Moller Maersk Annual Report 2017; Reputation Institute, March 2019; Brand Finance, Feb 2019
  • 17. 17 Strong relative share price performance
  • 20. Maersk cyber attack lessons – 1 20 • High quality response is essential – Maersk moved quickly and decisively – Top management involved from the outset – Transparency and openness cushioned Maersk from regulators, suppliers, employees, media, etc • Ad hoc, flexible approach to crisis management can work – Incl. business continuity, incident/crisis management, leadership and other communications – So long as the incident/crisis team is experienced, methodical, objective, proactive, and decisive
  • 21. Maersk cyber attack lessons – 2 21 • Total prevention is impossible – Every organisation is exposed to cyber attacks and data breaches – No organisation is exempt from nation state attacks, which tend to be more damaging than other attacks • Historic reputation counts – Maersk’s reputation as a strong, successful industry leader helped it weather the storm • Financial impact of cyber attacks is mostly fairly limited – Goodwill often exists due to volume and nature
  • 22. Maersk cyber attack lessons – 3 22 • Learn from the incident – At all levels of the organisation – Be seen to be listening and learning from all relevant audiences on an ongoing basis – Document actions and impact carefully during and after the incident, collate and examine thoroughly, and implement the learnings
  • 23. Implications for Maersk 23 • Stronger, more comprehensive cyber protection – Need for automated cyber detection and response – Business continuity and crisis plans must be comprehensive (as opposed to asset-based), global and up-to-date – Keep business continuity and service resumption plans separate – Need for regular cyber awareness updates and incident training – Cyber insurance protection can help reduce incident costs • Allow for ad hoc response – Permit and be prepared to use non-official communications channels during an incident/crisis when necessary
  • 24. 24 FURTHER INFO +44 20 3856 3599 cp@charliepownall.com linkedin.com/in/charliepownall charliepownall.com