Mapping Unknown Risk

There used to be a “lurking” threat to our cyber security. It is no longer just lurking; companies and cyber attackers are now in an ongoing war. Its scale is enormous, and the techniques deployed by those fighting it are incredibly intricate.

The challenges it presents will be a part of everyday life for all individuals, entities, corporations and governments in the coming decades. However, even in this “new reality,” there are ways we can protect ourselves. In fact, there are ways in which we can “win.”

Cyber security is an issue born of the Internet-age. As the connectivity revolution creates tremendous opportunities for industry and economic development, it also poses new challenges for risk managers and insurers. With between ten and 20 billion devices currently connected to the internet (estimated to rise to 40 to 50 billion by 2020), there are tens of billions of access points at which cyber criminals can potentially enter a business’ enterprise system, an individual’s private information store or any government’s sensitive databases.

It is no surprise that Bristsh Prime Minister David Cameron set out an emphasis on cyber security in the government’s Strategic Defence and Security Review in November. His allocation of an extra £1.9 billion to be spent on cyber security should be a strong signal to all governments and corporations that this issue is centre-stage. It should be squarely on the agenda of every CEO and every Board across all industries. We must address it now or otherwise face severe consequences.

Cyber extortion and hacking have become significant challenges for companies. As criminals infiltrate company systems and charge a ransom for the return of sensitive information they are often not only harming the company’s reputation, damaging shareholder value and undermining the company’s work, but also affecting the lives of millions of consumers. With objects and devices increasingly connected there is also a high risk of hacking imperiling physical property and assets, even lives.

Earlier this year two hackers were able to infiltrate a Jeep Cherokee through its radio and remotely access its transmission, air conditioning and other systems. This caused the recall of 1.4 million vehicles, and isn’t the only instance of hackers gaining control of vehicles. Cyber security researchers found six flaws in Tesla’s Model S cars that made them vulnerable to hacking. These “white hat” hackers were able to manipulate the car’s speedometer to show the wrong speed, lock and unlock it, turn it on and off and bring it to a stop while driving.

This is particularly worrying given that Tesla is well regarded for having less vulnerable software than other automakers. The company has since issued a security patch preventing these breaches. These problems that were inconceivable half a decade ago are no longer science fiction; they are a business fact.

Increasingly companies should be concerned with covering the income lost through cyberattacks, not just with remedying data breaches.

What can companies do to prepare for unknowable future risk? The implications of the threat are so far-reaching that a vigilant attitude towards cyber security must be embedded within the culture of an organisation. This should be driven, led and prioritised by its Board and senior executives.

Risk managers must work with other key stakeholders across their organisation and with their insurance advisers to build a comprehensive cyber security strategy. This should include insurance cover that helps when hacking occurs, and access to education and tools that enhance existing security practices already developed by IT departments. The cyber-attack threat is changing and growing, but so is the protection and education provided by insurers, insurance advisers and cyber security experts.

Detailed scenario planning is essential. Organisations must highlight gaps, vulnerabilities and potential impacts on the business and plan what to do if the worst does happen. Good advice to any organisation is: do everything possible to improve your cyber-security, but also prepare to respond when a cyber-attack comes. Your company will be much better positioned to recover quickly.

Prospect: http://bit.ly/1nO005U

« Three Reasons To Revise Your Cyber Security Plans
Cybersecurity Un-Safe Investments in 2015 »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Immersive

Immersive

Immersive unifies Cyber Drills, Exercises, Sims, Ranges, and Training into one single, adaptive platform. One Platform. Total Cyber Resilience.

ReliaQuest

ReliaQuest

ReliaQuest’s GreyMatter solution connects existing technology, people, and process – then equips security teams with unified, actionable insights across their entire environment.

SevenShift

SevenShift

SevenShift is a security consulting firm with a wealth of experience in the worlds of Cybersecurity and Internet of Things (IoT).

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

LinkShadow

LinkShadow

LinkShadow is a next-generation cybersecurity solution that provides unparalleled detection of even the most sophisticated threats.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

Intigriti

Intigriti

Intigriti is Europe's leading bug bounty and vulnerability disclosure platform, connecting organizations with a global community of ethical hackers to enhance cybersecurity through continuous testing.

Datastream Cyber Insurance

Datastream Cyber Insurance

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

Harbottle & Lewis

Harbottle & Lewis

Harbottle & Lewis is a leading UK-based law firm focused on the Private Client and Technology, Media and Entertainment sectors.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

CyberTest

CyberTest

CyberTest offers cybersecurity consulting and penetration testing services that helps organizations and businesses securing their assets.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.

RedLattice

RedLattice

RedLattice are at the cutting edge of tool development and AI-assisted vulnerability research in cybersecurity.