SlideShare a Scribd company logo
1 of 45
Download to read offline
AN INSIDERS GUIDE TO CYBER-INSURANCE AND
SECURITY GUARANTEES
JEREMIAH GROSSMAN
CHIEF OF SECURITY STRATEGY
@jeremiahg
https://www.jeremiahgrossman.com/
http://blog.jeremiahgrossman.com/
http://sentinelone.com/
BIO
WHO I AM…
▸Professional Hacker
▸Person of the Year (OWASP, 2015)
▸International Speaker
▸Black Belt in Brazilian Jiu-Jitsu
▸Founder of WhiteHat Security
AREAS OF INTEREST
▸Intersection of security guarantees and cyber-insurance
▸Malware / Ransomware
▸Easing the burden of vulnerability remediation
▸Security crowd-sourcing
▸Industry skill shortage
“I OFTEN SAY THAT WHEN YOU CAN MEASURE WHAT
YOU ARE SPEAKING ABOUT, AND EXPRESS IT IN
NUMBERS, YOU KNOW SOMETHING ABOUT IT;
BUT WHEN YOU CANNOT MEASURE IT, WHEN YOU
CANNOT EXPRESS IT IN NUMBERS, YOUR KNOWLEDGE
IS OF A MEAGRE AND UNSATISFACTORY KIND."
Lord Kelvin
“2015 GLOBAL SPENDING ON INFORMATION
SECURITY IS SET TO GROW BY CLOSE TO 5%
THIS YEAR TO TOP $75BN,…”
The Wall Street Journal
HYPER-GROWTH INDUSTRY
ORGANIZED CRIME
NATION-STATE TERRORISM?
HACKTIVISTS
1,073,777,722NETCRAFT: JULY 2016 WEB SERVER SURVEY
FREQUENCY OF INCIDENT CLASSIFICATION PATTERNS OVER TIME ACROSS CONFIRMED DATA BREACHES.
VERIZON DATA BREACH INVESTIGATIONS REPORT (2016)
NO WAY REGULATIONS CAN KEEP UP.
VERIZON DATA BREACH INVESTIGATIONS REPORT (2016)
“APPSEC IS EATING SECURITY"
INCIDENT PATTERNS BY INDUSTRY
TRUSTWAVE GLOBAL SECURITY REPORT (2016)
APPLICATION SECURITY
VULNERABILITY LIKELIHOOD (1 OR MORE)
WHITEHAT’S WEBSITE SECURITY STATISTICS REPORT 2015
70%!
56%!
47%!
29%! 26%! 24%!
16%! 15%! 11%! 11%! 8%! 6%! 6%! 6%! 5%!
0%!
10%!
20%!
30%!
40%!
50%!
60%!
70%!
80%!
90%!
100%!
InsufficientTransportLayer
Inform
ation
Leakage!
C
ross
Site
Scripting!Brute
Force!
C
ontentSpoofing!
C
ross
Site
RequestForgery!
U
RL
RedirectorAbuse!
Predictable
Resource
Location!
Session
Fixation!
InsufficientAuthorization!
D
irectory
Indexing!
Abuse
ofFunctionality!
SQ
L
Injection!
InsufficientPassw
ord
Recovery!
Fingerprinting!
VERACODE: STATE OF SOFTWARE SECURITY REPORT VOL 6, FALL 2015
TOP 10 VULNERABILITY CATEGORIES BY PROGRAMMING LANGUAGE
AVERAGE TIME-TO-FIX (DAYS)
WHITEHAT’S WEBSITE SECURITY STATISTICS REPORT 2015
73!
97! 99! 108! 111!
130! 132! 136!
158! 160!
191! 192!
227!
0!
50!
100!
150!
200!
250!
Transportation!
Arts
&
Entertainm
ent!
Accom
m
odation!
Professional&
Scientific!
Public
Adm
inistration!O
therServices!
Inform
ation!
EducationalServices!
H
ealth
C
are
&
Social!
Finance
&
Insurance!M
anufacturing!
U
tilities!
RetailTrade!
VERACODE: STATE OF SOFTWARE SECURITY REPORT VOL 6, FALL 2015
PERCENT VULNERABILITIES
FOUND VS. FIXED
WINDOWS OF EXPOSURE
WHITEHAT’S WEBSITE SECURITY STATISTICS REPORT 2015
60%!
38%!
52%!
39%!
9%!
11%!
11%!
14%!
10%!
14%!
12%!
11%!
11%!
16%!
11%!
18%!
11%!
22%!
14%!
17%!
Retail Trade!
Information!
Health Care &!
Social Assistance!
Finance &!
Insurance!
Always Vulnerable!
Frequently Vulnerable (271-364 days a year)!
Regularly Vulnerable (151-270 days a year)!
Occasionally Vulnerable (31-150 days a year)!
Rarely Vulnerable (30 days or less a year)!
CYBER EDGE GROUP: 2015 CYBERTHREAT DEFENSE REPORT
NORTH AMERICA & EUROPE
HOW MANY TIMES DO YOU ESTIMATE THAT YOUR ORGANIZATION’S
GLOBAL NETWORK HAS BEEN COMPROMISED BY A SUCCESSFUL
CYBERATTACK WITHIN THE LAST 12 MONTHS?
CYBER EDGE GROUP: 2015 CYBERTHREAT DEFENSE REPORT
NORTH AMERICA & EUROPE
WHAT IS THE LIKELIHOOD THAT YOUR ORGANIZATION’S
NETWORK WILL BECOME COMPROMISED BY A
SUCCESSFUL CYBERATTACK IN 2015?
“71% WERE AFFECTED BY A
SUCCESSFUL CYBERATTACK IN
2014, BUT ONLY 52% EXPECT TO
FALL VICTIM AGAIN IN 2015.”
2015 CYBERTHREAT DEFENSE REPORT
NORTH AMERICA & EUROPE
MORE APATHY
DO YOU EXPECT A CYBERATTACK TO STRIKE
YOUR ORGANIZATION IN 2015? (N = 3,435)
A. YES 46% 

B. NO 24%
C. UNSURE 30%
Respondents are global business and IT
professionals who are members of ISACA.
SURVEY’S ALL AGREE
APATHETIC.
REALISTIC.
BOTH?
RANGE OF EXPECTED LOSSES
RECORDS PREDICTION
(LOWER)!
AVERAGE
(LOWER)!
EXPECTED AVERAGE
(UPPER)!
PREDICTION
(UPPER)!
100! $1,170! $18,120! $25,450! $35,730! $555,660!
1,000! $3,110! $52,260! $67,480! $87,140! $1,461,730!
10,000! $8,280! $143,360! $178,960! $223,400! $3,866,400!
100,000! $21,900! $366,500! $474,600! $614,600! $10,283,200!
1,000,000! $57,600! $892,400! $1,258,670! $1,775,350! $27,500,090!
10,000,000! $150,700! $2,125,900! $3,338,020! $5,241,300! $73,943,950!
100,000,000! $392,000! $5,016,200! $8,852,540! $15,622,700! $199,895,100!
VERIZON DATA BREACH INVESTIGATIONS REPORT (2015)
DOWNSIDE PROTECTION
CYBER-INSURANCE
▸ As of 2014, American businesses
were expected to pay up to $2
billion on cyber-insurance
premiums, a 67% spike from $1.2
billion spent in 2013.
▸ Current expectations by one
industry watcher suggest 100%
growth in insurance premium
activity, possibly 130% growth.
“ACCORDING TO PWC, THE CYBER
INSURANCE MARKET IS SET TO
TRIPLE IN THE NEXT FEW YEARS AND
WILL REACH $7.5 BILLION BY 2020.”
Dark Reading
BOOMING INDUSTRY
“THE LARGEST BARRIER TO GROWTH IS LACK
OF ACTUARIAL DATA ABOUT CYBERATTACKS,
BUT THIS IS QUICKLY CHANGING WITH
CONTINUED CYBER ASSAULTS.”
“ABI RESEARCH FORECASTS THE MARKET TO
HIT US $10 BILLION BY 2020.”
ABI Research
HYPER-GROWTH
“ABOUT A THIRD OF U.S. COMPANIES
ALREADY HAVE SOME FORM OF CYBER-
INSURANCE COVERAGE, ACCORDING TO A
REPORT PRICEWATERHOUSECOOPERS
RELEASED LAST YEAR.”
The Parallax
BUY WHATEVER THERE IS
SMALL PAYOUTS. LARGE PAYOUTS.
BREACH CLAIMS
▸ Target spent $248 million after hackers
stole 40 million payment card accounts
and the personal information of up to 70
million customers. The insurance payout,
according to Target, will be $90 million.
▸ Home Depot reported $43 million in
expenses related to its September 2014
hack, which affected 56 million credit and
debit card holders. Insurance covered only
$15 million.
LOTS OF INSURERS GETTING INTO THE BUSINESS
BREACH CLAIMS
▸ “Anthem has $150 million to $200
million in cyber coverage, including
excess layers, sources say.”
▸ “Insurers providing excess layers of
cyber coverage include: Lloyd’s of
London syndicates: operating units
of Liberty Mutual Holding Co.;
Zurich Insurance Group; and CNA
Financial Corp., sources say.”
“AVERAGE RATES FOR RETAILERS SURGED 32% IN
THE FIRST HALF OF THIS YEAR, AFTER STAYING
FLAT IN 2014, ACCORDING TO PREVIOUSLY
UNREPORTED FIGURES FROM MARSH.”
“AND EVEN THE BIGGEST INSURERS WILL NOT
WRITE POLICIES FOR MORE THAN $100 MILLION
FOR RISKY CUSTOMERS.”
The Security Ledger
INCIDENTS DRIVING UP COST OF PREMIUMS
2014 – 2015
NEW SECURITY INVESTMENT VS. CYBER-INSURANCE
$3,800,000,000
$3,200,000,000
Informa(on	Security	Spending	(Global)	
~	$3.8	billion	in	new	spending	(+4.7%)	
Cyber-Security	Insurance	
~$3.2	billion	in	spending	(+67%)
EVER NOTICE HOW
EVERYTHING IN THE
INFORMATION SECURITY

INDUSTRY IS SOLD “AS IS”?
NO GUARANTEES
NO WARRANTIES
NO RETURN POLICIES
INFORMATION SECURITY


THE
$75 BILLION
GARAGE SALE

INFOSEC’S BIGGEST OPPORTUNITY
SECURITY GUARANTEES
SECURITY VENDORS
CASE STUDIES
▸ SentinelOne
▸ WhiteHat Security
▸ Trusona
▸ Others…
SECURITY GUARANTEE
DETAILS
▸ Program Launched: July 2016.
▸ Setting up their guarantee with the
underwriter took 3 months.
▸ Claims or payouts? 0.
SENTINELONE’S GUARANTEE OFFERS FINANCIAL
SUPPORT OF $1,000 PER ENDPOINT (UP TO $1
MILLION PER COMPANY), SECURING AGAINST
FINANCIAL IMPLICATIONS OF A RANSOMWARE
INFECTION, IF SENTINELONE IS UNABLE TO
BLOCK OR REMEDIATE THE EFFECTS.
SECURITY GUARANTEE
DETAILS
▸ Program Launched: August 2014.
▸ Setting up their guarantee with the
underwriter took 18 months.
▸ Claims or payouts? 0.
IF A WEBSITE COVERED BY SENTINEL ELITE
IS HACKED, EXPLOITED BY A MISSED
VULNERABILITY, THE CUSTOMER WILL BE
REFUNDED IN FULL AND OFFERED UP TO
$500,000 IN BREACH LOSS COMPENSATION.
SECURITY GUARANTEE
DETAILS
▸ Program Launched: January 2016.
▸ Setting up their guarantee with the
underwriter took 18 months.
▸ Stroz Friedberg ran the
assessments on behalf of the
underwriter to measure
performance.
▸ Claims or payouts? 0.
MALWARE KITS COME WITH WARRANTEES
Malware offered for $249 with a service level
agreement (SLA) and replacement warranty if the
creation is detected by any antivirus within 9 months
“…THE ZATKOS’ OPERATION WON’T TELL YOU IF
YOUR SOFTWARE IS LITERALLY INCENDIARY, BUT IT
WILL GIVE YOU A WAY TO COMPARISON-SHOP
BROWSERS, APPLICATIONS, AND ANTIVIRUS
PRODUCTS ACCORDING TO HOW HARDENED THEY
ARE AGAINST ATTACK. IT MAY ALSO PUSH
SOFTWARE MAKERS TO IMPROVE THEIR CODE TO
AVOID A LOW SCORE AND REMAIN COMPETITIVE.“
The Intercept
THE CYBER INDEPENDENT TESTING LAB
“THE ONLY TWO PRODUCTS NOT COVERED
BY PRODUCT LIABILITY ARE RELIGION AND
SOFTWARE, AND SOFTWARE SHALL NOT
ESCAPE MUCH LONGER.”
Dan Geer
CISO, In-Q-Tel
THANK YOU
Jeremiah Grossman
@jeremiahg
https://www.facebook.com/jeremiahgrossman
https://www.linkedin.com/in/grossmanjeremiah
https://www.jeremiahgrossman.com/
http://blog.jeremiahgrossman.com/

More Related Content

Viewers also liked

Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Cyber insurance (linked in) the basics (tcic)
Cyber insurance (linked in)   the basics (tcic)Cyber insurance (linked in)   the basics (tcic)
Cyber insurance (linked in) the basics (tcic)Chris Stallard
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationEric Reehl
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepIBM Security
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics Chris Stallard
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Ht seminar uniten-cyber security threat landscape
Ht seminar uniten-cyber security threat landscapeHt seminar uniten-cyber security threat landscape
Ht seminar uniten-cyber security threat landscapeHaris Tahir
 
Küresel Endeks Tuzakları
Küresel Endeks Tuzakları Küresel Endeks Tuzakları
Küresel Endeks Tuzakları Fatma ÇINAR
 
マグノンWiedemann-Franz則
マグノンWiedemann-Franz則マグノンWiedemann-Franz則
マグノンWiedemann-Franz則Kouki Nakata
 
Some technology notes tomato paste projects
Some technology notes  tomato paste projectsSome technology notes  tomato paste projects
Some technology notes tomato paste projectsmsmsindia
 
Planning the eHealth Forum of tomorrow
Planning the eHealth Forum of tomorrow Planning the eHealth Forum of tomorrow
Planning the eHealth Forum of tomorrow eHealth Forum
 

Viewers also liked (15)

Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Cybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber SpiesCybercrime - Attack of the Cyber Spies
Cybercrime - Attack of the Cyber Spies
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Cyber insurance (linked in) the basics (tcic)
Cyber insurance (linked in)   the basics (tcic)Cyber insurance (linked in)   the basics (tcic)
Cyber insurance (linked in) the basics (tcic)
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Ht seminar uniten-cyber security threat landscape
Ht seminar uniten-cyber security threat landscapeHt seminar uniten-cyber security threat landscape
Ht seminar uniten-cyber security threat landscape
 
Küresel Endeks Tuzakları
Küresel Endeks Tuzakları Küresel Endeks Tuzakları
Küresel Endeks Tuzakları
 
マグノンWiedemann-Franz則
マグノンWiedemann-Franz則マグノンWiedemann-Franz則
マグノンWiedemann-Franz則
 
Some technology notes tomato paste projects
Some technology notes  tomato paste projectsSome technology notes  tomato paste projects
Some technology notes tomato paste projects
 
Planning the eHealth Forum of tomorrow
Planning the eHealth Forum of tomorrow Planning the eHealth Forum of tomorrow
Planning the eHealth Forum of tomorrow
 

More from Jeremiah Grossman

All these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterAll these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterJeremiah Grossman
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorJeremiah Grossman
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryJeremiah Grossman
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareJeremiah Grossman
 
Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Jeremiah Grossman
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Jeremiah Grossman
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015Jeremiah Grossman
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
 
WhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedWhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedJeremiah Grossman
 
WhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportWhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportJeremiah Grossman
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)Jeremiah Grossman
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Jeremiah Grossman
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]Jeremiah Grossman
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Jeremiah Grossman
 
Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Jeremiah Grossman
 

More from Jeremiah Grossman (20)

All these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterAll these vulnerabilities, rarely matter
All these vulnerabilities, rarely matter
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare Sector
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare Industry
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
 
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About RansomwareWhat the Kidnapping & Ransom Economy Teaches Us About Ransomware
What the Kidnapping & Ransom Economy Teaches Us About Ransomware
 
Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security Guarantees
 
WhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedWhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report Explained
 
WhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportWhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics Report
 
Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

An Insiders Guide to Cyber-Insurance and Security Guarantees

  • 1. AN INSIDERS GUIDE TO CYBER-INSURANCE AND SECURITY GUARANTEES JEREMIAH GROSSMAN CHIEF OF SECURITY STRATEGY @jeremiahg https://www.jeremiahgrossman.com/ http://blog.jeremiahgrossman.com/ http://sentinelone.com/
  • 2. BIO WHO I AM… ▸Professional Hacker ▸Person of the Year (OWASP, 2015) ▸International Speaker ▸Black Belt in Brazilian Jiu-Jitsu ▸Founder of WhiteHat Security
  • 3. AREAS OF INTEREST ▸Intersection of security guarantees and cyber-insurance ▸Malware / Ransomware ▸Easing the burden of vulnerability remediation ▸Security crowd-sourcing ▸Industry skill shortage
  • 4. “I OFTEN SAY THAT WHEN YOU CAN MEASURE WHAT YOU ARE SPEAKING ABOUT, AND EXPRESS IT IN NUMBERS, YOU KNOW SOMETHING ABOUT IT; BUT WHEN YOU CANNOT MEASURE IT, WHEN YOU CANNOT EXPRESS IT IN NUMBERS, YOUR KNOWLEDGE IS OF A MEAGRE AND UNSATISFACTORY KIND." Lord Kelvin
  • 5. “2015 GLOBAL SPENDING ON INFORMATION SECURITY IS SET TO GROW BY CLOSE TO 5% THIS YEAR TO TOP $75BN,…” The Wall Street Journal HYPER-GROWTH INDUSTRY
  • 8. FREQUENCY OF INCIDENT CLASSIFICATION PATTERNS OVER TIME ACROSS CONFIRMED DATA BREACHES. VERIZON DATA BREACH INVESTIGATIONS REPORT (2016) NO WAY REGULATIONS CAN KEEP UP.
  • 9. VERIZON DATA BREACH INVESTIGATIONS REPORT (2016) “APPSEC IS EATING SECURITY" INCIDENT PATTERNS BY INDUSTRY
  • 10. TRUSTWAVE GLOBAL SECURITY REPORT (2016) APPLICATION SECURITY
  • 11. VULNERABILITY LIKELIHOOD (1 OR MORE) WHITEHAT’S WEBSITE SECURITY STATISTICS REPORT 2015 70%! 56%! 47%! 29%! 26%! 24%! 16%! 15%! 11%! 11%! 8%! 6%! 6%! 6%! 5%! 0%! 10%! 20%! 30%! 40%! 50%! 60%! 70%! 80%! 90%! 100%! InsufficientTransportLayer Inform ation Leakage! C ross Site Scripting!Brute Force! C ontentSpoofing! C ross Site RequestForgery! U RL RedirectorAbuse! Predictable Resource Location! Session Fixation! InsufficientAuthorization! D irectory Indexing! Abuse ofFunctionality! SQ L Injection! InsufficientPassw ord Recovery! Fingerprinting!
  • 12. VERACODE: STATE OF SOFTWARE SECURITY REPORT VOL 6, FALL 2015 TOP 10 VULNERABILITY CATEGORIES BY PROGRAMMING LANGUAGE
  • 13. AVERAGE TIME-TO-FIX (DAYS) WHITEHAT’S WEBSITE SECURITY STATISTICS REPORT 2015 73! 97! 99! 108! 111! 130! 132! 136! 158! 160! 191! 192! 227! 0! 50! 100! 150! 200! 250! Transportation! Arts & Entertainm ent! Accom m odation! Professional& Scientific! Public Adm inistration!O therServices! Inform ation! EducationalServices! H ealth C are & Social! Finance & Insurance!M anufacturing! U tilities! RetailTrade!
  • 14. VERACODE: STATE OF SOFTWARE SECURITY REPORT VOL 6, FALL 2015 PERCENT VULNERABILITIES FOUND VS. FIXED
  • 15. WINDOWS OF EXPOSURE WHITEHAT’S WEBSITE SECURITY STATISTICS REPORT 2015 60%! 38%! 52%! 39%! 9%! 11%! 11%! 14%! 10%! 14%! 12%! 11%! 11%! 16%! 11%! 18%! 11%! 22%! 14%! 17%! Retail Trade! Information! Health Care &! Social Assistance! Finance &! Insurance! Always Vulnerable! Frequently Vulnerable (271-364 days a year)! Regularly Vulnerable (151-270 days a year)! Occasionally Vulnerable (31-150 days a year)! Rarely Vulnerable (30 days or less a year)!
  • 16.
  • 17. CYBER EDGE GROUP: 2015 CYBERTHREAT DEFENSE REPORT NORTH AMERICA & EUROPE HOW MANY TIMES DO YOU ESTIMATE THAT YOUR ORGANIZATION’S GLOBAL NETWORK HAS BEEN COMPROMISED BY A SUCCESSFUL CYBERATTACK WITHIN THE LAST 12 MONTHS?
  • 18. CYBER EDGE GROUP: 2015 CYBERTHREAT DEFENSE REPORT NORTH AMERICA & EUROPE WHAT IS THE LIKELIHOOD THAT YOUR ORGANIZATION’S NETWORK WILL BECOME COMPROMISED BY A SUCCESSFUL CYBERATTACK IN 2015?
  • 19. “71% WERE AFFECTED BY A SUCCESSFUL CYBERATTACK IN 2014, BUT ONLY 52% EXPECT TO FALL VICTIM AGAIN IN 2015.” 2015 CYBERTHREAT DEFENSE REPORT NORTH AMERICA & EUROPE MORE APATHY
  • 20. DO YOU EXPECT A CYBERATTACK TO STRIKE YOUR ORGANIZATION IN 2015? (N = 3,435) A. YES 46% 
 B. NO 24% C. UNSURE 30% Respondents are global business and IT professionals who are members of ISACA. SURVEY’S ALL AGREE
  • 22. RANGE OF EXPECTED LOSSES RECORDS PREDICTION (LOWER)! AVERAGE (LOWER)! EXPECTED AVERAGE (UPPER)! PREDICTION (UPPER)! 100! $1,170! $18,120! $25,450! $35,730! $555,660! 1,000! $3,110! $52,260! $67,480! $87,140! $1,461,730! 10,000! $8,280! $143,360! $178,960! $223,400! $3,866,400! 100,000! $21,900! $366,500! $474,600! $614,600! $10,283,200! 1,000,000! $57,600! $892,400! $1,258,670! $1,775,350! $27,500,090! 10,000,000! $150,700! $2,125,900! $3,338,020! $5,241,300! $73,943,950! 100,000,000! $392,000! $5,016,200! $8,852,540! $15,622,700! $199,895,100! VERIZON DATA BREACH INVESTIGATIONS REPORT (2015)
  • 23. DOWNSIDE PROTECTION CYBER-INSURANCE ▸ As of 2014, American businesses were expected to pay up to $2 billion on cyber-insurance premiums, a 67% spike from $1.2 billion spent in 2013. ▸ Current expectations by one industry watcher suggest 100% growth in insurance premium activity, possibly 130% growth.
  • 24. “ACCORDING TO PWC, THE CYBER INSURANCE MARKET IS SET TO TRIPLE IN THE NEXT FEW YEARS AND WILL REACH $7.5 BILLION BY 2020.” Dark Reading BOOMING INDUSTRY
  • 25. “THE LARGEST BARRIER TO GROWTH IS LACK OF ACTUARIAL DATA ABOUT CYBERATTACKS, BUT THIS IS QUICKLY CHANGING WITH CONTINUED CYBER ASSAULTS.” “ABI RESEARCH FORECASTS THE MARKET TO HIT US $10 BILLION BY 2020.” ABI Research HYPER-GROWTH
  • 26. “ABOUT A THIRD OF U.S. COMPANIES ALREADY HAVE SOME FORM OF CYBER- INSURANCE COVERAGE, ACCORDING TO A REPORT PRICEWATERHOUSECOOPERS RELEASED LAST YEAR.” The Parallax BUY WHATEVER THERE IS
  • 27. SMALL PAYOUTS. LARGE PAYOUTS. BREACH CLAIMS ▸ Target spent $248 million after hackers stole 40 million payment card accounts and the personal information of up to 70 million customers. The insurance payout, according to Target, will be $90 million. ▸ Home Depot reported $43 million in expenses related to its September 2014 hack, which affected 56 million credit and debit card holders. Insurance covered only $15 million.
  • 28. LOTS OF INSURERS GETTING INTO THE BUSINESS BREACH CLAIMS ▸ “Anthem has $150 million to $200 million in cyber coverage, including excess layers, sources say.” ▸ “Insurers providing excess layers of cyber coverage include: Lloyd’s of London syndicates: operating units of Liberty Mutual Holding Co.; Zurich Insurance Group; and CNA Financial Corp., sources say.”
  • 29. “AVERAGE RATES FOR RETAILERS SURGED 32% IN THE FIRST HALF OF THIS YEAR, AFTER STAYING FLAT IN 2014, ACCORDING TO PREVIOUSLY UNREPORTED FIGURES FROM MARSH.” “AND EVEN THE BIGGEST INSURERS WILL NOT WRITE POLICIES FOR MORE THAN $100 MILLION FOR RISKY CUSTOMERS.” The Security Ledger INCIDENTS DRIVING UP COST OF PREMIUMS
  • 30. 2014 – 2015 NEW SECURITY INVESTMENT VS. CYBER-INSURANCE $3,800,000,000 $3,200,000,000 Informa(on Security Spending (Global) ~ $3.8 billion in new spending (+4.7%) Cyber-Security Insurance ~$3.2 billion in spending (+67%)
  • 31. EVER NOTICE HOW EVERYTHING IN THE INFORMATION SECURITY
 INDUSTRY IS SOLD “AS IS”? NO GUARANTEES NO WARRANTIES NO RETURN POLICIES
  • 33.
  • 35. SECURITY VENDORS CASE STUDIES ▸ SentinelOne ▸ WhiteHat Security ▸ Trusona ▸ Others…
  • 36. SECURITY GUARANTEE DETAILS ▸ Program Launched: July 2016. ▸ Setting up their guarantee with the underwriter took 3 months. ▸ Claims or payouts? 0.
  • 37. SENTINELONE’S GUARANTEE OFFERS FINANCIAL SUPPORT OF $1,000 PER ENDPOINT (UP TO $1 MILLION PER COMPANY), SECURING AGAINST FINANCIAL IMPLICATIONS OF A RANSOMWARE INFECTION, IF SENTINELONE IS UNABLE TO BLOCK OR REMEDIATE THE EFFECTS.
  • 38. SECURITY GUARANTEE DETAILS ▸ Program Launched: August 2014. ▸ Setting up their guarantee with the underwriter took 18 months. ▸ Claims or payouts? 0.
  • 39. IF A WEBSITE COVERED BY SENTINEL ELITE IS HACKED, EXPLOITED BY A MISSED VULNERABILITY, THE CUSTOMER WILL BE REFUNDED IN FULL AND OFFERED UP TO $500,000 IN BREACH LOSS COMPENSATION.
  • 40. SECURITY GUARANTEE DETAILS ▸ Program Launched: January 2016. ▸ Setting up their guarantee with the underwriter took 18 months. ▸ Stroz Friedberg ran the assessments on behalf of the underwriter to measure performance. ▸ Claims or payouts? 0.
  • 41.
  • 42. MALWARE KITS COME WITH WARRANTEES Malware offered for $249 with a service level agreement (SLA) and replacement warranty if the creation is detected by any antivirus within 9 months
  • 43. “…THE ZATKOS’ OPERATION WON’T TELL YOU IF YOUR SOFTWARE IS LITERALLY INCENDIARY, BUT IT WILL GIVE YOU A WAY TO COMPARISON-SHOP BROWSERS, APPLICATIONS, AND ANTIVIRUS PRODUCTS ACCORDING TO HOW HARDENED THEY ARE AGAINST ATTACK. IT MAY ALSO PUSH SOFTWARE MAKERS TO IMPROVE THEIR CODE TO AVOID A LOW SCORE AND REMAIN COMPETITIVE.“ The Intercept THE CYBER INDEPENDENT TESTING LAB
  • 44. “THE ONLY TWO PRODUCTS NOT COVERED BY PRODUCT LIABILITY ARE RELIGION AND SOFTWARE, AND SOFTWARE SHALL NOT ESCAPE MUCH LONGER.” Dan Geer CISO, In-Q-Tel