Read More - NTT Security
Transcription
Read More - NTT Security
Thought Leadership Cybercrime – do you have it covered? Navigating the complex business of cybercrime insurance Overview It’s estimated that cybercrime now costs the global economy more than $400bn each year – and it’s growing year on year. The threat landscape is becoming ever more complex with a broadening footprint that includes cloud-based services, mobile devices, big data, and the Internet of Things. And the fear of a costly breach is driving an increasing number of businesses towards taking out cyber insurance policies. The market for cyber insurance is potentially huge, with some estimating that annual gross written premiums could grow from around $2.5bn¹ to $7.5bn² by the end of the decade. And premiums are becoming prohibitively expensive, following high profile attacks in 2015 and a nervousness in the sector due to the lack of historical claims and a shortage of skilled underwriters. “Cybercrime is a costly, hard to detect and difficult to combat threat. From an insurance perspective, while analogies are often made with terrorism or catastrophe risks, cyber risk is in many ways a risk like no other.” Insurance 2020 & beyond: Reaping the dividends of cyber resilience, ©PWC As with all types of risk, organizations often look for ways to minimize their financial exposure should the worst happen – and cyber insurance policies seem a logical step. But insurers will be less likely in the future to impose blanket terms and conditions. Instead, they will require a much fuller assessment of the policyholder’s vulnerabilities, processes and response plans. This paper looks at the cyber insurance market, the need for expert advice and the steps that organizations can take to ensure that they fully understand their own data risks and security vulnerabilities before taking out a policy. companies have taken out standalone cyber insurance. It’s a minefield of ambiguity and there are many examples of insurers failing to pay out based on small print and complex policy interpretation. Inaccurate information can void a policy, and claims continue to be denied where the information supplied has proven to be inaccurate. “We expect full and complete answers to our questions on the measures the firm has taken to mitigate a potential data breach, including its culture, training of employees, technology and procedures in the event of a breach.” Steven Goldman, ACE Group A complex threat landscape Cyber criminals are continuously discovering new ways to exploit vulnerabilities, and technology. Although researchers and companies are working hard to remain one step ahead of attackers, we will never prevent all potential attacks. We’re living in a world where new threats are developing faster than An organization must demonstrate to the technologies. insurer the protective steps it has taken – As a result, many organizations take out both to assess and reduce the risk in the cyber insurance policies to transfer the first place – and then the steps it is taking financial risks associated with attacks, and to continuously monitor these risks. Only insurers are challenged to underwrite these then can an insurance company begin to understand its exposure. policies and provide recommendations. Cyber insurance is growing, but it’s still a relatively untapped opportunity for insurers with maturity levels varying across the globe. Some markets are more mature than others – approximately 90% of all cyber insurance is purchased by US organizations3, whereas only 2% of UK Organizations considering taking out cybercrime insurance should think carefully about what they expect the policy to deliver. How do you know if you are adequately covered? Could your policy be invalidated? And what cybercrime safety measures would insurers expect you to have in place? 1. Speech by John Nelson, Lloyd’s Chairman, at the AAMGA, 28 May 2015 2. ©PwC, Insurance 2020 & beyond: Reaping the dividends of cyber resilience 3. Fortune, 23 January 2015 Copyright© NTT Security 2016 Don’t ignore the small print Far too often, organizations take out cyber insurance without checking the small print. Many policies are taken out without sufficient research into what’s available, what they cost and what they cover. Policy terms are not dictated by regulators and no standard language has yet been adopted by the industry. And policies vary too, with some very well publicized disagreements where insurance providers have rejected claims based on their own interpretation of the fine print. Protection is key – but whose responsibility is it? Rather than relying solely on an insurance policy to cover all losses, businesses need a different game plan: by all means buy insurance to cover some of the losses, but at the same time, take measures to reduce the potential for loss. Many organizations will lay the responsibility firmly at the door of the IT department, yet IT security should be about more than just the hardware and software. It needs to be embedded in the culture of the organization, championed by the CEO, designed and executed by the “No insurance policy will protect an CISO and communicated effectively so organization’s brand or reputation.” that every employee takes responsibility Garry Sidaway, NTT Security for ensuring that good practices are followed. And if your organization relies For example, does the policy cover data if on the services of third party contractors it’s held by a third party or in the cloud? and suppliers, you need clear guidelines Will the policy pay out if your organization to ensure that all third parties are aware has failed to keep up-to-date with security of your security policies and practices. updates? How about if former employees This may not prevent a third-party related still have access to your systems? Are security incident, but it would be good you covered if the breach came via an practice to ensure that everyone is at least employee’s own device? And what happens aware of what is expected of them. if the original breach pre-dates your Choose your policy with care policy, yet you were unaware that your systems had been infiltrated some months Businesses of all sizes will rely on their IT infrastructure to some degree, exposing previously? A recent report4 reveals that themselves to the risks of business nearly 21% of vulnerabilities detected in interruption, income loss, plummeting client networks were more than three share prices and reputational damage years old and over 5% were more than 10 if systems fail or are interrupted. Yet years old. organizations are not adequately insuring It’s all but impossible to cover yourself themselves against attacks and in recent 100%. If you’re unsure about the fine print years, we’ve seen a number of high profile – seek legal counsel. court cases with insurers rejecting cyberrelated claims under more traditional policies. When contested, the courts have, Risk:Value 2016 research findings5 in the majority of cases, sided with the insurers. General professional indemnity • 75% of people do not believe that policies don’t usually provide any of all their business data is secure the first-party cover offered by a cyber • 48% of respondents don’t have a insurance policy and it’s this first-party full information security policy in cover that will include loss of business place income as well as crisis management • 51% of respondents do not have a support (PR, legal advice, forensic full disaster recovery plan in place investigators, IT specialists) to minimize the • 65% of organizations do not have a impact of the breach. Don’t assume that cyber insurance policy in place your public liability insurance will cover all the costs associated with a data breach – it Of those organizations with a cyber almost certainly won’t. insurance policy in place: Assess your risk exposure • 50% think that lack of compliance would invalidate their policy What is important to insurers is that clients have a complete understanding of their • 43% believe that their lack of an risk exposure. Without this, it’s impossible incident response plan would to create a policy that is relevant for your invalidate their policy business. • 43% think that lack of employee care and attention would invalidate A first step in protecting your organization their policy against potential threats is to fully understand your risk exposure across all 4. NTT Group Security Global Threat Intelligence Report 2016 Cybercrime protection, best practice 1. Understand your risk – conduct an annual risk assessment exercise to understand your current risk exposure. Maintain the Board’s engagement with cyber risk 2. Secure configuration – keep hardware and software protections up to date – persistence pays off for the cyber criminal. Stay on top of basic protection 3. Home and mobile working – set robust guidelines for data access. User-owned devices are increasingly being used to for day–to-day business. Protect your network regardless of the access device 4. Education and training – ensure your employees know your policies and incident response processes by implementing a full security awareness program including, where practical, poster campaigns, regular advisory emails, new starter security inductions and annual computer-based training 5. Incident management – establish, produce and routinely test incident management plans 6. Monitoring – continuously monitor all ICT systems and associated logs to spot and act upon potential attacks 7. Secure network – manage the network perimeter and filter out unauthorized access 8. Malware protection - establish anti-malware defenses and continuously scan for malware 9. Manage user privileges – limit user privileges and monitor user activity 10.Establish employee ground rules for use of social media – social media is becoming a primary path for cyber criminals. Give your employees the ground rules for acceptable use at work and guidance on secure online behavior outside of work 11.Perform security assessments on third parties during the procurement process and at least annually, to monitor compliance to your organization’s security requirements, as well as legislative and regulatory controls 12.Establish and maintain a formal risk management process – ideally adopting an internationallyrecognized standard 5. NTT Security Risk:Value 2016 Report Copyright© NTT Security 2016 2 areas of the organization, ensuring industry best practice is considered. There’s a growing global shortage of cybersecurity skills, so if you don’t have the skills inhouse, take expert advice and consider a comprehensive evaluation of your company. This will highlight areas of risk, make recommendations, prioritize actions and help you build a strategic roadmap for continuous risk management. A full assessment would highlight gaps in your IT security armor and show you the critical areas that need immediate attention. And an evaluation summary would give a timeline for carrying out any remedial actions required. This could then be shared with your insurer as evidence that you are taking security seriously. Understand your risk – see yourself as an attacker sees you Threats are constantly changing and so should your defensive testing. Stealthy and continuous hacking processes or Advanced Persistent Threats (APTs) employ a high degree of covertness over a long period of time, and many high profile attacks have bypassed traditional company defenses. If you can see yourself as an attacker sees you, you’ll be a step closer to protecting your information assets and again, you will demonstrate to your insurer that you have robust security measures in place. APT Simulation is a good place to start. APT attacks require a different form of testing to traditional assessments like penetration testing, which focus on a particular area of infrastructure or web application. This is why APT Simulation is regularly deployed by organizations to help mitigate this risk. APT Simulation follows the steps that an attacker would take when profiling your organization in order to try and breach its defenses, often through malicious email links and attachments. From gathering personal and business information, through to attacking via the path of least resistance and finally to penetrating the organization and covertly extracting data. Following the APT Simulation, you will have a full understanding of any security vulnerabilities relating to process, people and technology that could be open to attack. You’ll be able to test your incident response procedures and implement suitable systems to minimize the risk of a successful attack. Be proactive The risk of attack will never diminish and the sophistication and frequency of attacks is growing. For example, recent research6 indicates that all of the top 10 vulnerabilities targeted by exploit kits during 2015 are related to Adobe Flash, and the number of publicized Flash vulnerabilities jumped by almost 312 percent from 2014 levels. Spear phishing attacks accounted for 17% of all incident response activities in 2015. And brute force attacks jumped 135 percent from 2014 levels. General liability insurance has been proven time and again to be insufficient to cover cybercrime attacks, yet the impact on your organization in terms of damaged reputation, lost customers and financial losses, could be significant. This is a risk your business can’t afford to ignore. If you do decide to take out a cyber insurance policy, you are making a commitment to transfer risk and ultimately, reduce any costs associated with as yet unknown attacks. Yet, underwriting these policies is still a challenge for insurers and organizations must do everything possible to understand their exposure and take appropriate steps to mitigate risk, and to demonstrate to insurers that information security and risk management is top of the agenda. Conclusion Insurance policies are not a licence to be reckless and it shouldn’t be surprising that policies are written in such a way as to avoid covering high-impact scenarios that could be easily prevented, like someone willingly sending a large amount of money without any secondary verification. Similar to home insurance, coverage against cybercrime does not replace preventative measures to secure your home – such as locking the doors and windows before you leave the house. A smart business will implement a security framework that includes both technological and process controls to prevent breaches and consider an insurance policy only as a supplement to their own solid risk-based security program, not a replacement for it. Organizations need to invest in both protecting assets in the first instance, and also in transferring any risks via appropriate insurance cover should an attack occur. These are not mutually exclusive requirements: it’s important to have prevention measures in place before you go on to insure your assets. Companies that want to transfer some of the risk of a breach will increasingly turn to cyber insurance. Unfortunately, they will not always get what they think they’re paying for. Case Study: Bitcoin provider. v. US Insurance Company7 • December 2014 – an unknown hacker, hacked the computer of a third-party associate of a bitcoin provider company • This attack on the third party enabled the spear phishing of the bitcoin provider’s CFO • The hacked email account was then used to trick the bitcoin provider into making three bitcoin transactions over two days to the value of $1.85m • The insurance claim was that the hacking of the account had fraudulently resulted in the bitcoin transfer and therefore the loss of $1.85m • The insurance company refused to pay out, due to the wording of the policy – as far as they were concerned, it was the computer system of the third party that had been compromised and he was not the insured party Commentary This type of attack is known as ‘Business Email Compromise’ (BEC) or simply ‘CEO Fraud’. Computers may have been used to send the email and transfer money but this breach, if it can be called that, was fundamentally a failure of people and processes rather than anything technological and it would be hard to call this a cyber attack. There is no technical solution for spear phishing and IT personnel rarely have the knowledge or authority to implement the organization-wide process controls that would be a more appropriate defense against this type of attack. In order to be effective, real security responsibility belongs at the executive level, where policy and process changes can be implemented with IT playing a part in the overall risk management strategy. Businesses should be aware of this type of attack by now and have implemented proper financial controls around large transactions. As the insurance company in this case is pointing out, there is a big difference between falling for a convincing forged financial document, versus a sketchy email purporting to be from an executive. 6. NTT Group Security Global Threat Intelligence Report 2016 7. The full story can be found at networkworld.com Copyright© NTT Security 2016 3 About NTT Security NTT Security seamlessly delivers cyber resilience by enabling organizations to build high-performing and effective security, and risk management programs with controls that enable the increasingly connected world and digital economy to overcome constantly changing security challenges. Through the Full Security Life Cycle, we ensure that scarce resources are used effectively by providing the right mix of integrated consulting, managed, cloud, and hybrid services – delivered by local resources and leveraging our global capabilities. NTT Security is part of the NTT Group (Nippon Telegraph and Telephone Corporation), one of the largest information and communications technology (ICT) companies in the world. To learn more about NTT Security and our unique services for information security and risk management, please speak to your account representative. Copyright© NTT Security 2016 4