A Field Guide to Insider Threat Helps Manage the Risk

Size: px
Start display at page:

Download "A Field Guide to Insider Threat Helps Manage the Risk"

Transcription

1 SESSION ID: HUM-T10R A Field Guide to Threat Helps Manage the Risk Tim Casey Senior Strategic Risk Analyst Intel Corp.

2 How do you think of insider threat? 2

3 The problem is becoming more complex Logos and trademarks are the property of their respective owners 3

4 The Field Guide to Threat Reckless Untrained/ Distracted Outward Sympathizer Vendor Partner Irrational Individual Thief Disgruntled Activist Terrorist Organized Crime Competitor Nation State Accidental leak Espionage Financial fraud Misuse Oportun. data theft Physical theft Product alteration Sabotage Violence

5 Characterizing Threat

6 Definitions Threat is the potential for a current or former employee, contractor, or business partner to accidentally or maliciously misuse their trusted access to harm the organization s employees and customers, assets, or reputation. A Threat Agent is a representative class of people who can harm an organization, intentionally or accidentally, and identified by their unique characteristics and behaviors. 6

7 Threat Agents Reckless Outward Sympathizer Untrained/ Distracted Hostile/ Partner Supplier Hostile Activist Competitor Disgruntled Irrational Individual Nation State Organized Crime Terrorist Thief OR Hostile Hostile 7

8 Attack Types Accidental leak Espionage Financial fraud Misuse Opportunistic data theft Physical theft Product alteration Sabotage Violence 8

9 Attack Types Accidental leak Espionage Financial fraud Misuse Opportunistic data theft Physical theft Product alteration Sabotage Violence Ooops Ongoing, targeted IP extraction Exiting employees 9 IP & Data Loss

10 Threat-Consequence Vector Matrix Attack Type Intent Reckless Untrained/ Distracted Outward Sympathizer /Hostile Vendor Partner Irrational Individual Thief Disgruntled Activist Hostile Terrorist Organized Crime Competitor Accidental leak X X X X X X X Espionage X X X X X X X X Financial fraud X X X X X Misuse X X X X X X X X Opportunistic data theft X X X X X X X X Physical theft X X X X X X Product alteration X X X X X X X X X Sabotage X X X X X X Violence X X X Nation State Analysis by Intel s Threat Agent Analysis Group 10

11 Applying the Field Guide

12 Demonstrate the scope of the problem Attack Type Intent Reckless Employee Untrained/ Distracted Outward Sympathizer /Hostile Vendor Partner Irrational Individual Thief Disgruntled Activist Hostile Terrorist Organized Crime Competitor Accidental leak X X X X X X X Espionage X X X X X X X X Financial fraud X X X X X Misuse X X X X X X X X Opport. data theft X X X X X X X X Physical theft X X X X X X Product alteration X X X X X X X X X Sabotage X X X X X X Violence X X X Nation State 60 separate Threat vectors Are you prepared for all of them? 12

13 Prioritizing Protection to Optimize Resources Accidental leak Espionage Financial fraud Misuse Opport. data theft Physical theft Product alteration Sabotage Violence Food Manufacturer (example) Intent /Hostile Untraind Outward Reckless Irrational Disgruntled Distractd Sympathiz Vendor Partner Thief Individual er Attack Type Accidental leak X X X X X X X Activist Hostile Terrorist Organized Crime Competitor Espionage X X X X X X X X Financial fraud X X X X X Opportunistic data theft Misuse X X X X X X X X X X X X X X X X Physical theft X X X X X X Product alteration X X X X X X X X X Sabotage X X X X X X Violence X X X Nation State 13

14 Prioritizing Protection to Optimize Resources Accidental leak Espionage Financial fraud Misuse Opport. data theft Physical theft Product alteration Sabotage Violence Food Manufacturer (example) Intent /Hostile Untraind Outward Reckless Irrational Disgruntled Distractd Sympathiz Vendor Partner Thief Individual er Attack Type Accidental leak X X X X X X X Activist Hostile Terrorist Organized Crime Competitor Espionage X X X X X X X X Financial fraud X X X X X Opportunistic data theft Misuse X X X X X X X X X X X X X X X X Physical theft X X X X X X Product alteration X X X X X X X X X Sabotage X X X X X X Violence X X X Nation State 14

15 Minimize the Threat Attack Type Intent Reckless Untrained/ Distracted Outward Sympathizer /Hostile Vendor Partner Irrational Individual Thief Disgruntled Activist Hostile Terrorist Organized Crime Competitor Accidental leak X X X X X X X Espionage X X X X X X X X Financial fraud X X X X X Misuse X X X X X X X X Opportunistic data theft X X X X X X X X Physical theft X X X X X X Product alteration X X X X X X X X X Sabotage X X X X X X Violence X X X Nation State 15

16 Provide context for your data Example incidents $15M in lawsuits Lost market lead in key product Intent Reckless Untrained/ Distracted Outward Sympathizer /Hostile Vendor Partner Irrational Individual Thief Disgruntled Activist Hostile Terrorist Organized Crime Competitor Attack Type Accidental leak X X X X X X X Espionage X X X X X X X X Financial fraud X X X X X Misuse X X X X X X X X Opportun. data theft X X X X X X X X Physical theft X X X X X X Product alteration X X X X X X X X X Sabotage X X X X X X Violence X X X Nation State 3% annual shrinkage 2-day factory downtime 16

17 Customize for your threat landscape The model is open-ended and you can extend & tailor it to your environment 17

18 How the Guide Can Help You Having a Field Guide helps you manage risk by: Establishing a common framework and language for managing insider threat throughout the organization and community Prioritizing threats and optimizing the use of limited resources Identifying threats for mitigation A framework to describe and manage your unique threat landscape 18

19 Applying the Field Guide in Your Organization Short term Share the Guide with key stakeholders to inform them of the problem scope and enlist them in your team Assess your particular threats and controls against the Field Guide to ensure you are managing your most dangerous insider risks Medium term Modify the model to reflect your situation and priorities Long term Use the Guide to regularly re-assess your overall insider threat landscape 19

20 Resources Intel Field Guide to Threat: Intel Threat Agent Analysis: Improving Healthcare Risk Assessments to Maximize Security Budgets (how to tailor the model for your environment): CERT Threat Center: We actively engage with fellow travelers utilizing Threat Agent Analysis related to: Threat Assessments Supplier Management and Supply Chain Risk Tools and Visualization 20

21 Questions?

ENTERPRISE RISK MANAGEMENT (ERM) The Conceptual Framework

ENTERPRISE RISK MANAGEMENT (ERM) The Conceptual Framework ENTERPRISE RISK MANAGEMENT (ERM) The Conceptual Framework ENTERPRISE RISK MANAGEMENT (ERM) ERM Definition The Conceptual Frameworks: CAS and COSO Risk Categories Implementing ERM Why ERM? ERM Maturity

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

INFORMATION AND CYBER SECURITY POLICY V1.1

INFORMATION AND CYBER SECURITY POLICY V1.1 Future Generali 1 INFORMATION AND CYBER SECURITY V1.1 Future Generali 2 Revision History Revision / Version No. 1.0 1.1 Rollout Date Location of change 14-07- 2017 Mumbai 25.04.20 18 Thane Changed by Original

More information

Cyber Security Liability:

Cyber Security Liability: www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Retail. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Retail. Start Client Risk Solutions Going beyond insurance Risk solutions for Retail Start Partnering to Reduce Risk Retail companies compete vigorously to deliver superior service to customers with diverse and everchanging

More information

What is a privacy breach / security breach?

What is a privacy breach / security breach? What is a breach? What is a privacy breach / security breach? Privacy breach Computer security breach: The theft, loss or unauthorized disclosure of personally identifiable non-public information (PII)

More information

PA TURNPIKE COMMISSION POLICY

PA TURNPIKE COMMISSION POLICY POLICY POLICY SUBJECT: PA TURNPIKE COMMISSION POLICY This is a statement of official Pennsylvania Turnpike Policy RESPONSIBLE DEPARTMENT: NUMBER: 3.07 APPROVAL DATE: 07-23-2002 EFFECTIVE DATE: 08-07-2002

More information

Cyber Risk. October 2017

Cyber Risk. October 2017 Cyber Risk October 2017 The Cyber Landscape Dimensions to cyber risk Who is likely to target your clients Which jurisdictions do they operate in? Threat Types What is their line of business? Geography

More information

The Risk of Economic Crime

The Risk of Economic Crime The Risk of Economic Crime 0 ACFE European Fraud Conference London, March 7, 0 GROUP SECURITY HERE TO PROTECT OUR WORLD Torsten Wolf Group Head of Crime and Fraud Prevention Agenda Introduction Economic

More information

Risk Associated with Meetings

Risk Associated with Meetings Risk Associated with Meetings Risks Associated with Meetings & Events: No Company is Exempt Meetings and events remain a necessary way for people and organizations to communicate information, build relationships,

More information

Heerema Marine Contractors

Heerema Marine Contractors Heerema Marine Contractors ANTI-FRAUD POLICY Date of issue September 2012 Version 2012.02 Document HMC L055 Summary HMC requires its staff at all times to act honestly and with integrity in order to safeguard

More information

Catch Me If You Can. Fraud in Local Government. CITY & COUNTY OF SAN FRANCISCO Office of the Controller Audits Division

Catch Me If You Can. Fraud in Local Government. CITY & COUNTY OF SAN FRANCISCO Office of the Controller Audits Division Catch Me If You Can Fraud in Local Government CITY & COUNTY OF SAN FRANCISCO Office of the Controller Audits Division Steve Flaherty, Principal Investigator 10.03.2018 2 Disclaimer Any names or incidents

More information

CyberMatics SM FAQs. General Questions

CyberMatics SM FAQs. General Questions CyberMatics SM FAQs General Questions What is CyberMatics? Like telematics for auto insurance, CyberMatics is a technology-driven process to help clients understand their current cyber risk as seen by

More information

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY

CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY CYBER ATTACKS AFFECTING FINANCIAL INSTITUTIONS GUS SPRINGMANN, AON PAVEL STERNBERG, BEAZLEY Agenda Threat Landscape and Trends Breach Response Process Pitfalls and Critical Points BBR Services Breach Prevention

More information

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Real Estate. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Real Estate. Start Client Risk Solutions Going beyond insurance Risk solutions for Real Estate Start Partnering to Reduce Risk Real estate owners, operators, managers and developers act vigorously to maintain profitability

More information

How to mitigate risks, liabilities and costs of data breach of health information by third parties

How to mitigate risks, liabilities and costs of data breach of health information by third parties How to mitigate risks, liabilities and costs of data breach of health information by third parties April 17, 2012 ID Experts Webinar www.idexpertscorp.com Rick Kam President and Co-Founder richard.kam@idexpertscorp.com

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Energy. Oil, Gas and Petrochemical. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Energy. Oil, Gas and Petrochemical. Start Client Risk Solutions Going beyond insurance Risk solutions for Energy Oil, Gas and Petrochemical Start Partnering to Reduce Risk AIG s Client Risk Solutions (CRS) partners with organizations to build

More information

2. Joplin Schools would enroll approximately 900 members plus 380 dependents/spouses in the program.

2. Joplin Schools would enroll approximately 900 members plus 380 dependents/spouses in the program. REQUEST FOR PROPOSAL TELEMEDICINE SERVICES Joplin Schools P.O. Box 128 Joplin MO 64802-0128 Phone (417) 625-5200 General information and submittal instructions 1. Joplin Schools ( District ) is seeking

More information

PRIVACY AND CYBER SECURITY

PRIVACY AND CYBER SECURITY PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information

More information

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them

ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them ChicagoLand RIMS Cyber Insurance Coverage Pitfalls and How to Avoid Them PROVIDED BY HUB INTERNATIONAL October 25th, 2016 W W W. C H I C A G O L A N D R I S K F O R U M. O R G AGENDA 1. The evolution of

More information

GLOBAL CODE OF CONDUCT AND ETHICS

GLOBAL CODE OF CONDUCT AND ETHICS Author: Legal Department Updated by: Global Compliance Release Date: 10 September 2014 Last Reviewed: 10 September 2014 Status: Approved Owner: Legal Department Version: 2.0 Custodian: Global Compliance

More information

The Guide to Budgeting for Insider Threat Management

The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management This guide is intended to help show you how to approach including Insider Threat Management within

More information

California Resources Corporation. Business Ethics

California Resources Corporation. Business Ethics California Resources Corporation Business Ethics Statement of Integrity California Resources Corporation carries on a tradition of producing oil and gas in California that stretches back many decades.

More information

Energize Your Enterprise Risk Management

Energize Your Enterprise Risk Management Energize Your Enterprise Risk Management Presented By Mark Caiazzo, CISA, CISM, CRISC Tammy Michaud, CPA May 15, 2017 Reviewed: Agenda Enterprise Risk Management Defined Benefits of ERM Key Components

More information

At the Heart of Cyber Risk Mitigation

At the Heart of Cyber Risk Mitigation At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying

More information

Risk. Management FOR A SMALL BUSINESS

Risk. Management FOR A SMALL BUSINESS Risk Management FOR A SMALL BUSINESS Welcome 1. Agenda 2. Ground Rules 3. Introductions Objectives Identify the common risks associated with a small business Identify the external and internal factors

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Financial Institutions. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Financial Institutions. Start Client Risk Solutions Going beyond insurance Risk solutions for Financial Institutions Start Partnering to Reduce Risk Financial Institutions compete vigorously to maintain profitability and deliver superior

More information

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE

LIABILITY INTERRUPTION OF ACTIVITIES CYBER CRIMINALITY OWN DAMAGE AND COSTS OPTION: LEGAL ASSISTANCE I N S U R A N C E a g a i n s t c y b e r r i s k s After "prevention", risk covering is always the next step. Good insurance policies have the substantial merit allowing people to progress, even choosing

More information

Cyber Liability: New Exposures

Cyber Liability: New Exposures Cyber Liability: New Exposures Presented by: CONRAD INSURANCE 2007, 2010-2011, 2013-2014 Zywave Inc. All rights reserved. New Economy, New Exposures Business shift: Bricks and Mortar to Clicks and Orders

More information

The Continuous Evolution of the. Implications (Session Code CRM11/690)

The Continuous Evolution of the. Implications (Session Code CRM11/690) The Continuous Evolution of the Internet of Things and Insurance Implications (Session Code CRM11/690) Speakers: Denise C. Schlitt, Director, Global Risk Management NCR Corporation Fredrik Motzfeldt -

More information

How we manage risk. Risk philosophy. Risk policy. Risk framework

How we manage risk. Risk philosophy. Risk policy. Risk framework How we manage risk Risk management is integral to the daily operations of our businesses. As a multinational group with activities in over 130 countries, Naspers is exposed to a wide range of risks that

More information

LEGAL IMPLICATIONS FOR THE SHIPPING INDUSTRY

LEGAL IMPLICATIONS FOR THE SHIPPING INDUSTRY CYBER THREATS LEGAL IMPLICATIONS FOR THE SHIPPING INDUSTRY DOHA - DECEMBER 2014 Elinor Dautlich, Partner T: +44 207 264 8493 elinor.dautlich@hfw.com Our clients' sectors Cyber risks Intrusion by sector

More information

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group

JAMES GRAY SPECIAL GUEST 6/7/2017. Underwriter, London UK Specialty Treaty Beazley Group SPECIAL GUEST JAMES GRAY Underwriter, London UK Specialty Treaty Beazley Group All 6 Beazley Lloyd's Syndicates are rated A (Excellent) by A.M. Best Admitted Carrier in the US Beazley Ins Co rated A (Excellent)

More information

Cyber-risk and cyber-controls:

Cyber-risk and cyber-controls: Cyber-risk and cyber-controls: 1 Insurance alone is not enough Cyber-risk has become one of the most significant topics in boardrooms around the world. The threat is indeed, very real. Consequently, in

More information

Healthcare Data Breaches: Handle with Care.

Healthcare Data Breaches: Handle with Care. Healthcare Data Breaches: Handle with Care November 13, 2012 ID Experts Webinar www.idexpertscorp.com The material presented in this presentation is not intended to provide legal or other expert advice

More information

Enterprise Risk Management Balancing Risks & Identifying Opportunities WEBINAR

Enterprise Risk Management Balancing Risks & Identifying Opportunities WEBINAR Enterprise Management Balancing s & Identifying Opportunities WEBINAR November 17, 2009 Ty Inglis, CPA I Partner Mary Peter, Director of Enterprise Management Discussion Points Eide Bailly & BioFuels Industry

More information

2017 Cyber Security and Data Privacy Study

2017 Cyber Security and Data Privacy Study RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy

More information

Cyber & Privacy Liability and Technology E&0

Cyber & Privacy Liability and Technology E&0 Cyber & Privacy Liability and Technology E&0 Risks and Coverage Geoff Kinsella Partner http://map.norsecorp.com http://www.youtube.com/watch?v=f7pyhn9ic9i Presentation Overview 1. The Cyber Evolution 2.

More information

What is a Compliance Program?

What is a Compliance Program? Course Objectives Learn about the most important elements of the compliance program; Increase awareness and effectiveness of our compliance program; Learn about the important laws and what the government

More information

IKEA some facts & figures

IKEA some facts & figures IKEA some facts & figures BUSINESS OPERATIONS: 235 stores in 24 countries 42 warehouses in 16 countries 45 purchase offices in 31 countries 38 factories and sawmills in 11 countries 1.350 suppliers in

More information

Risk management of operations in emerging markets

Risk management of operations in emerging markets Risk management of operations in emerging markets Chris Holt MBE, Towers Watson 26-27 September 2013, Brussels 2013 Towers Watson. All rights reserved. Agenda What do we do Where do we expect growth What

More information

Client Risk Solutions Going beyond insurance. Risk solutions for Energy. Chemical. Start

Client Risk Solutions Going beyond insurance. Risk solutions for Energy. Chemical. Start Client Risk Solutions Going beyond insurance Risk solutions for Energy Chemical Start Partnering to Reduce Risk AIG s Client Risk Solutions (CRS) partners with organizations to build long-term relationships

More information

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD The insured perils Criminal abduction, assault, bribery demand, competitor malfeasance, criminal facilitation, murder, product tampering, stalking,

More information

Thank you for your interest in and continued support of the Joplin Schools Student Information System RFP.

Thank you for your interest in and continued support of the Joplin Schools Student Information System RFP. REQUEST FOR PROPOSAL Student Information System RFP Joplin Schools Technology Department P.O. Box 128 Joplin MO 64802-0128 Phone (417) 625-5200 December 13, 2017 REQUEST FOR PROPOSAL Student Information

More information

South Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy

South Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy South Lincolnshire NHS Clinical Commissioning Group Business Continuity Policy Reference No: CG001 Version: Version 1 Approval date 27 March 2014 Date ratified: 27 March 2014 Name of Author and Lead Jules

More information

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP

CYBER LIABILITY INSURANCE OVERVIEW FOR. Prepared by: Evan Taylor NFP CYBER LIABILITY INSURANCE OVERVIEW FOR Prepared by: Evan Taylor NFP Targeted Industries Business Sector Financial Services 10% Non-Profit 11% Retail 10% Other 37% Other 18% Type of Data PII 40% Professional

More information

BUSINESS-DRIVEN S E C U R I T Y

BUSINESS-DRIVEN S E C U R I T Y BUSINESS-DRIVEN SECURITY MARKET DISRUPTORS Mobile Cloud Big Data Extended Workforce Networked Value Chains APTs Sophisticated Fraud Infrastructure Transformation Less control over access device and back-end

More information

FOX VALLEY ORTHOPEDICS. Identity Compliance Program

FOX VALLEY ORTHOPEDICS. Identity Compliance Program I. ADOPTION OF WRITTEN PROGRAM ( Program ) Fox Valley Orthopedics (the Practice ) adopts this written program to assist in identifying sensitive information, as well as identifying, detecting and mitigating

More information

Responding to Privacy Breaches

Responding to Privacy Breaches Key Steps in Responding to Privacy Breaches The purpose of this document is to provide guidance to private sector organizations, health custodians and public sector bodies on how to manage a privacy breach.

More information

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM I. ADOPTION Michigan State University Identity Theft Prevention Program The Board of Trustees of Michigan State University adopted this Identity Theft Prevention

More information

SHSU International Travel Handbook Office of International Programs

SHSU International Travel Handbook Office of International Programs SHSU International Travel Handbook Office of International Programs Updated 11/12/18 1 SHSU International Travel Handbook Table of Contents I. Travel Policies a. Texas State University System Policy-Foreign

More information

White Paper: Incident Management. By Michael Miora, CISSP President & CEO ContingenZ Corporation

White Paper: Incident Management. By Michael Miora, CISSP President & CEO ContingenZ Corporation White Paper: Incident Management By Michael Miora, CISSP President & CEO ContingenZ Corporation mmiora@contingenz.com April 20, 2002 Table of Contents Introduction to Incident Management... 2 Incident

More information

MANITOBA OMBUDSMAN PRACTICE NOTE

MANITOBA OMBUDSMAN PRACTICE NOTE MANITOBA OMBUDSMAN PRACTICE NOTE Practice notes are prepared by Manitoba Ombudsman to assist persons using the legislation. They are intended as advice only and are not a substitute for the legislation.

More information

What can be done to mitigate cyber risk?

What can be done to mitigate cyber risk? KEY POINTS As well as the better known hacking, cyber threats encompass a wide range of risks, the consequences of which can be severe. Banks could face regulatory sanction and may be deemed undercapitalised

More information

Break the Risk Paradigms - Overhauling Your Risk Program

Break the Risk Paradigms - Overhauling Your Risk Program SESSION ID: GRC-T11 Break the Risk Paradigms - Overhauling Your Risk Program Evan Wheeler MUFG Union Bank Director, Information Risk Management Your boss asks you to identify the top risks for your organization

More information

4.1 Risk Assessment and Treatment Assessing Security Risks

4.1 Risk Assessment and Treatment Assessing Security Risks Information Security Standard 4.1 Risk Assessment and Treatment Assessing Security Risks Version: 1.0 Status Revised: 03/01/2013 Contact: Chief Information Security Officer PURPOSE To identify, quantify,

More information

What path will you navigate to carve-out sale success? Road map part 2: Sign to close

What path will you navigate to carve-out sale success? Road map part 2: Sign to close What path will you navigate to carve-out sale success? Road map part 2: Sign to close Congratulations; the deal is signed. Now another phase of heavy lifting begins. How do you successfully close your

More information

2018 Small Business Risk Report

2018 Small Business Risk Report 2018 Small Business Risk Report Key findings The 2018 Small Business Risk Report reveals that while small business owners are aware they face multiple risks and growing concerns, they often are not spending

More information

Client Risk Solutions Going beyond insurance. Risk solutions for the Manufacturing sector. Start

Client Risk Solutions Going beyond insurance. Risk solutions for the Manufacturing sector. Start Client Risk Solutions Going beyond insurance Risk solutions for the Manufacturing sector Start Partnering to Reduce Risk Manufacturers are faced with a myriad of challenges including a rapid pace of innovation,

More information

Supplier Code of Conduct

Supplier Code of Conduct Supplier Code of Conduct VERIZON SUPPLIER CODE OF CONDUCT The Verizon Supplier Code of Conduct ( Supplier Code ) sets forth principles that Verizon has adopted to promote ethical conduct in the workplace,

More information

The Procurement Fraud Equation. Tom Caulfield

The Procurement Fraud Equation. Tom Caulfield The Procurement Fraud Equation Tom Caulfield Specializing in assessment and mitigation strategies for procurement integrity to reduce the risk of financial and reputation losses 2016 ACFE Law Enforcement

More information

CODE OF BUSINESS CONDUCT AND ETHICS

CODE OF BUSINESS CONDUCT AND ETHICS CODE OF BUSINESS CONDUCT AND ETHICS The Board of Directors (the Board ) of Robert Half International Inc. (the Company ) has adopted the following Code of Business Conduct and Ethics (the Code ) for itself

More information

Protecting Knowledge Assets Case & Method for New CISO Portfolio

Protecting Knowledge Assets Case & Method for New CISO Portfolio SESSION ID: Protecting Knowledge Assets Case & Method for New CISO Portfolio MODERATOR: Jon Neiditz Kilpatrick Townsend & Stockton LLP jneiditz@kilpatricktownsend.com @jonneiditz PANELISTS: Dr. Larry Ponemon

More information

POLICY: FRAUD PREVENTION. October 2017

POLICY: FRAUD PREVENTION. October 2017 POLICY: October 2017 CONTENTS 1. PURPOSE P3 2. SCOPE P3 3. LEGISLATION AND CORPORATE GOVERNANCE REQUIREMENTS REFERENCE 4. POLICY STATEMENT AND INTERNAL STANDARDS P3 P4 4.1 Background P4 4.2 Actions constituting

More information

January to June 2016 fraud update: Payment cards, remote banking and cheque

January to June 2016 fraud update: Payment cards, remote banking and cheque January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.

More information

1. Define risk. Which are the various types of risk?

1. Define risk. Which are the various types of risk? 1. Define risk. Which are the various types of risk? Risk, is an integral part of the economic scenario, and can be termed as a potential event that can have opportunities that benefit or a hazard to an

More information

Managing E-Commerce Risks

Managing E-Commerce Risks Managing E-Commerce Risks, Chartered Insurer ACII (UK), CPCU (USA), ARe (USA), ARM (USA), FIII (India). MBA Email: manoj@einsuranceprofessional.com E-Commerce and Risk Management E-Commerce is the delivery

More information

NOT ALL DISASTERS ARE MADE BY MOTHER NATURE

NOT ALL DISASTERS ARE MADE BY MOTHER NATURE NOT ALL ISASTERS ARE MAE BY MOTHER NATURE Terrorism risk is evolving. Businesses are more concerned about lone wolf attacks versus another 9/11 occurring. The Hiscox suite of products has grown to meet

More information

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING

CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING CYBER LIABILITY: TRENDS AND DEVELOPMENTS: WHERE WE ARE AND WHERE WE ARE GOING 2015 Verizon Data Breach Report 79,790 security incidents 2,122 confirmed data breaches Top industries affected: Public, Information,

More information

About Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index.

About Chubb. Chubb Limited, the parent company of Chubb, is listed on the New York Stock Exchange (NYSE: CB) and is a component of the S&P 500 index. About Chubb Chubb is the world's largest publicly traded property and casualty insurer. With operations in 54 countries, Chubb provides commercial and personal property and casualty insurance, personal

More information

Best Practices in ENTERPRISE RISK MANAGEMENT. [ Managing Risks Holistically ]

Best Practices in ENTERPRISE RISK MANAGEMENT. [ Managing Risks Holistically ] Best Practices in ENTERPRISE RISK MANAGEMENT [ Managing Risks Holistically ] INTRODUCTIONS MODERATOR: Bob Lipps, JD, CPA PANELISTS: Ron Wilcox Abel Pomar Karen Gordon, Esq. THE EVOLUTION OF RISK Traditional

More information

MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT

MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT MEASURING & PRICING THE COST DRIVERS OF A CYBER SECURITY RISK EVENT IOWA ACTUARIES CLUB 2/25/16 EDUCATION DAY PRESENTED BY KEITH BURKHARDT, V.P. KRAUS-ANDERSON INSURANCE Overview I. Why are cyber security

More information

Vaco Cyber Security Panel

Vaco Cyber Security Panel Vaco Cyber Security Panel ISACA Charlotte Chapter December 5 th, 2017 Vaco is an international talent solutions firm headquartered in Nashville, Tennessee, with more than 35 locations around the globe.

More information

Advancing the Science of Safety. A Holistic Approach To Effective Security Risk Management 3rd Annual IIRSM UAE Branch Symposium / AGM 2 nd May, 2018

Advancing the Science of Safety. A Holistic Approach To Effective Security Risk Management 3rd Annual IIRSM UAE Branch Symposium / AGM 2 nd May, 2018 A Holistic Approach To Effective Security Risk Management 3rd Annual IIRSM UAE Branch Symposium / AGM 2 nd May, 2018 Introduction What is Security? The state of being free from danger or threat How is

More information

i!lsms CODE OF CONDUCT POLICY

i!lsms CODE OF CONDUCT POLICY i!lsms SPECIALIZED MEDICAL SEltVlCES ~NEW POLICY AND PROCEDURE 0 REVISION DATE: CODE OF CONDUCT POLICY Specialized Medical Services, Inc. ("SMS") has adopted a comprehensive "Corporate Compliance Program"

More information

Does it pay to be cyber-insured

Does it pay to be cyber-insured Does it pay to be cyber-insured Dr. Marie Moe Research Scientist, SINTEF ICT, @MarieGMoe Mr. Eireann Leverett Founder and CEO, Concinnity Risks, @blackswanburst @concinnityrisks Key issues Where do insurance

More information

STURM, RUGER & COMPANY, INC. CODE OF BUSINESS CONDUCT AND ETHICS

STURM, RUGER & COMPANY, INC. CODE OF BUSINESS CONDUCT AND ETHICS STURM, RUGER & COMPANY, INC. CODE OF BUSINESS CONDUCT AND ETHICS Sturm, Ruger & Company, Inc. (the "Company") maintains an extensive "Corporate Compliance Program" which governs the obligation of all employees,

More information

Contents. Copyright The City of Calgary. All rights reserved. Reprinted with Permission.

Contents. Copyright The City of Calgary. All rights reserved. Reprinted with Permission. Contents 1 What is business continuity? 3 Why should my business have a plan? 3 How to develop a business continuity plan 4 STEP ONE: Analyze your business 5 STEP TWO: Assess the risks 6 STEP THREE: Develop

More information

A FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015

A FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015 APRIL 2015 CYBER RISK IS HERE TO STAY Even an unlimited budget for information security will not eliminate your cyber risk. Tom Reagan Marsh Cyber Practice Leader 2 SIMPLIFIED CYBER RISK MANAGEMENT FRAMEWORK

More information

Workplace Violence. Work/Life Section 8, Page 15 Revised: April 1, Purpose

Workplace Violence. Work/Life Section 8, Page 15 Revised: April 1, Purpose Workplace Environment, Health. Wellness & Section 8, Page 15 Contents: Purpose Purpose Definitions Coverage Prohibited Actions and Sanctions Authorized Exceptions to Policy Support and Protections Retaliation

More information

S L tr lo a y t d egy s Cyber -Attack

S L tr lo a y t d egy s Cyber -Attack Lloyd s Cyber-Attack Strategy 02 Introduction The focus of this paper is on insurance losses arising from malicious electronic acts, referred to throughout as cyber-attack. The malicious act is the proximate

More information

Last Updated: 1 February 2018 To be reviewed: Annually

Last Updated: 1 February 2018 To be reviewed: Annually CARE International Policy on Fraud and Corruption Awareness, Prevention, Reporting and Response Sponsor: Secretary General/CEO Policy Owner: Deputy Secretary General, CARE International Effective Date:

More information

UK Terrorism Insurance. Product Brochure

UK Terrorism Insurance. Product Brochure UK Terrorism Insurance Product Brochure Introduction 1The threat of terrorism throughout the world is rising, and extremist groups are now global and may target businesses anywhere in the world, rarely

More information

Electronic Commerce and Cyber Risk

Electronic Commerce and Cyber Risk Electronic Commerce and Cyber Risk Fifth Third Bank All Rights Reserved Reality and Solutions Objectives for Today What I will cover How banks are changing How the public is changing How the laws are changing

More information

Terrorism and Cyber the fast changing landscape it is not just about privacy anymore

Terrorism and Cyber the fast changing landscape it is not just about privacy anymore Terrorism and Cyber the fast changing landscape it is not just about privacy anymore www.miller-insurance.com Terrorism - conventional exposures and responses Miller Insurance Services LLP is authorised

More information

From Risk to Resilience: Find (& Overcome) Your Company s Weakest Link THE RISK INSTITUTE RESEARCH TRANSLATION SERIES

From Risk to Resilience: Find (& Overcome) Your Company s Weakest Link THE RISK INSTITUTE RESEARCH TRANSLATION SERIES From Risk to Resilience: Find (& Overcome) Your Company s Weakest Link THE RISK INSTITUTE RESEARCH TRANSLATION SERIES 2 From Risk to Resilience: Find (& Overcome) i, ii Your Company s Weakest Link Joseph

More information

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD Criminal risks abduction, assault, bribery demand, competitor malfeasance, criminal facilitation, murder, product tampering, stalking, suspicious

More information

DEBUNKING MYTHS FOR CYBER INSURANCE

DEBUNKING MYTHS FOR CYBER INSURANCE SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?

More information

GENERAL RISK CONTROL AND MANAGEMENT POLICY

GENERAL RISK CONTROL AND MANAGEMENT POLICY GENERAL RISK CONTROL AND MANAGEMENT POLICY OF SIEMENS GAMESA RENEWABLE ENERGY, S.A. (Text approved by resolution of the Board of Directors dated September 12, 2018) GENERAL RISK CONTROL AND MANAGEMENT

More information

Risk Management: Principles, Methodologies and Techniques. Peter Getugi Internal Audit Manager ILRI

Risk Management: Principles, Methodologies and Techniques. Peter Getugi Internal Audit Manager ILRI Risk Management: Principles, Methodologies and Techniques Peter Getugi Internal Audit Manager ILRI NAIROBI 22 JUNE, 2010 Session Objectives What is Risk Management? Why is Risk Management importance rising?

More information

American Express Company

American Express Company American Express Company Goldman Sachs U.S. Financial Services Conference December 5, 2017 Assumptions that Materialized Migration to plastic Information & technology Consolidation of U.S. issuance Payments

More information

SOMERVILLE HOUSING AUTHORITY ANTI- FRAUD POLICY. April 3, 2013

SOMERVILLE HOUSING AUTHORITY ANTI- FRAUD POLICY. April 3, 2013 SOMERVILLE HOUSING AUTHORITY ANTI- FRAUD POLICY April 3, 2013 Introduction The Board of Commissioners of the Somerville Housing Authority has established an anti-fraud policy to enforce controls and to

More information

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD

SECURITY INCIDENT RESPONSE PEACE OF MIND IN A CHANGING WORLD SECURITY INCIENT RESPONSE PEACE OF MIN IN A CHANGING WORL The insured perils Criminal abduction, assault, bribery demand, competitor malfeasance, criminal facilitation, murder, product tampering, stalking,

More information

Cyber Insurance. How Insuretechs Can Unlock The Opportunity

Cyber Insurance. How Insuretechs Can Unlock The Opportunity Cyber Insurance How Insuretechs Can Unlock The Opportunity 1 Cyber Insurance how insuretechs can unlock the opportunity Cyber Insurance how insuretechs can unlock the opportunity 2 Not just digital, also

More information

WHS Risk Assessment and Control Form

WHS Risk Assessment and Control Form WHS Risk Assessment and Control Form Step 1: Who has conducted the Risk Assessment Risk Assessment completed by (name): Staff / Student Number: Signature: Date: Step 4: Documentation and initial approval

More information

Crawford & Company (Canada) Inc. Cyber Loss Management Program

Crawford & Company (Canada) Inc. Cyber Loss Management Program Crawford & Company (Canada) Inc. Cyber Loss Management Program About Crawford & Company (Canada) Inc. Crawford & Company (Canada) Inc. is an independent provider of claims management solutions that has

More information

Information security policy

Information security policy Information security policy Policy objectives 1 This policy is intended to establish the necessary policies, procedures and an organisational structure that will protect NMC s information assets and critical

More information

Cyber-Insurance: Fraud, Waste or Abuse?

Cyber-Insurance: Fraud, Waste or Abuse? SESSION ID: STR-F03 Cyber-Insurance: Fraud, Waste or Abuse? David Nathans Director of Security SOCSoter, Inc. @Zourick Cyber Insurance overview One Size Does Not Fit All 2 Our Research Reviewed many major

More information

Workplace Violence and Threats Prevention Policy City of New London

Workplace Violence and Threats Prevention Policy City of New London Workplace Violence and Threats Prevention Policy City of New London Issue Date: January 7, 2009 Revised: November 2011 Sources: CVMIC GENERAL: The City of New London is committed to providing a safe and

More information