Page 12 - TNR-V02N1
P. 12

• Transfer the risk >                                 The aim is to ensure the data in custody would be
            Get cybersecurity insurance coverage and hope that   reasonably safe from attacks, while remaining functional and
            they will absorb the cost if the risk is realized.   usable. There must be a balance. Over-securing could either
          • Reduce the risk > get outside cybersecurity help from   make the data unusable or simply cost more than the value
            a specialized outsource company to harden the IT    being protected.
            infrastructure.
          • Hedge against the risk  > Reduce and transfer the   Conclusions
            risk, by implementing both (4) and (5) - the “belt and   In 1736, Benjamin Franklin helped create the “Union
            suspenders” approach.                               Fire Company” in Philadelphia. This became a model for
                                                                subsequent modern municipal fire departments. On the
        The following graphs show a clear correlation between the   topic of urban fire damage potential, he was famously
        global increased cost of cyberattacks and cyber insurance   quoted for advising that “An ounce of prevention is worth a
        premiums. For many organizations, transferring the risk   pound of cure.”
        with cybersecurity insurance coverage may soon be
        conditional to showing that every effort has been made to   Using the fire analogy, arson attack methods have not
        harden against cyber-attacks.                           changed much for centuries. By comparison, cyberattacks
                                                                constantly morph and evolve. They are moving targets.
        An investment in reducing cyber risk has both short and   Defending against those is a continuous challenge to
        long-term benefits:                                     anticipate and adapt. Successful or not, instances of
          • In the short-term:                                  cyberattacks are increasingly common. In the past,
              o  The cost of prevention is invariably cheaper than   companies who fell victim to those attacks experienced
                the cost of recovering from a cyberattack.      some measure of “shame” for having to admit that they had
              o  Being prepared is being ready. Industry standard   been hacked. The new reality is that for most organizations,
                cybersecurity measures are likely to become a   the current outlook on cyberattacks is closer to “will we be
                pre-requisite to being able to get cyber insurance   prepared, when it happens?”
                coverage.
          • In the long-term:                                   Cyberattacks may never totally be eradicated. The key
              o  Reducing the chance of an attack being successful.   question is:  What can a company or organization do, when
              o  Pro-actively protecting data improves the      planning for cybersecurity protection? Security in layers,
                safety of information related to individuals such   including but not limited to the following elements is a
                as personnel, clients, Personally Identifiable   good start:
                Information (PII), Protected Health Information   • Top-level sponsorship for cybersecurity initiative is
                (PHI) data and any other sensitive information.     number one
              o  Customers have greater confidence in a supplier     o  People – setting up security training, phishing
                who invests in data security.                           simulations, tabletop exercises to walk through
              o  Some cybersecurity providers offer warranties,         security exposure scenarios
                in the event of a network breach, for customers      o  Processes – implementing a disaster recovery
                covered under their managed monitoring services.        plan, complete with yearly disaster recovery
                                                                        practices, reviews and updates

























        Source: https://www.ic3.gov/Home/AnnualReports     Sources: https://www.ciab.com/download/31507/,
        Note: 2010 figure not available from IC3           https://digitallatestnews.in/cyber-premiums-quickly-grew-
                                                           74-in-2021-fitch/


          12              Return to TOC                             True North RESILIENCE magazine - Spring 2023
   7   8   9   10   11   12   13   14   15   16   17