SlideShare a Scribd company logo
1 of 3
Download to read offline
How to Prevent Data Breach Risk
from Impacting Capital Ratios
Authors: Srinivas Peri, Thomas Lee PhD
How to Prevent Data Breach Risk from Impacting Capital Ratios
Authors: Srinivas Peri (linkedIn), Thomas Lee (linkedIn)
The Federal Reserve is beginning to focus on cybersecurity and the impact that a data breach could have
on the stability of the banking system (see MarketPlace.org). Although expert judgment is allowed for
assessing the financial impact of a data breach, some banks are finding significant value using SR 11-7
compliant regression models (see SlideShare). We have explained elsewhere how these models can support
Internal Audit and demonstrate a stronger risk management culture. Here we explain how these same
models can be combined with the security team’s Incident Response Plan to argue for a substantially lower
loss reserve in the context of CCAR Idiosyncratic Scenarios.
The cost of a data breach, as characterized by a model trained on cross-industry data breaches, is best
described as a lognormal distribution with a long tail. The lognormal distribution characterizes the
probability versus cost relationship and it shows that the most probable cost is not high. But using
confidence intervals in the CCAR stress test that are commonly used for credit loss can result in a very high
cost forecast and a significant impact to capital ratios.
For example, the median cost of a data breach caused by a malicious outsider affecting 50 million
households is just $61 million, while the 80% confidence interval is a staggering third-of-a-billion dollars.
But unlike credit loss which is a strong function of the overall economy, factors controlling the cost of a
data breach are within the control of the
bank.
Modeling reveals two costs that dominate:
1) fines and lawsuits, when they occur and
2) investigation costs. Investigation costs
are the costs related to forensic
investigation which consist of using server
and data access logs, to determine the
identity of the intruders, how they entered
and what data was exposed. Investigation
costs are reduced when 1) all logging is
enabled for workstations, servers and data
repositories, 2) logs are formatted
uniformly and 3) logs are saved in a read only fashion so that intruders cannot delete them. If the
investigation is to be carried out by a third-party, a pre-negotiated contract could also control costs.
Both probability and cost of lawsuits can also be managed and an experienced law firm can help identify
mitigation activities. For example, being careful with contracts and advertising promises, notifying victims
and offering identity theft insurance in a timely manner, and being responsive through call centers.
These activities which reduce the investigation cost and probability of lawsuit are considered part of the
Incident Response Plan which is normally part of cybersecurity and the office of the CISO. A financial
institution could therefore build a credible, well documented case for using a smaller confidence interval,
by simply combining the security teams Incident Response Plan with model based observations. The
Incident Response Plan may however, need to be bolstered with supporting documentation of readiness
assessments, rectified deficiencies and demonstrable governance.
For example, to demonstrate that investigation costs are well managed, a third-party security company
experienced in investigations could be engaged to write a report evaluating data logging and other readiness
indicators. Remediation recommendations could be carried out, documented and signed-off by
management. A Standard Operating Procedure (SOP) could be approved by management outlining
quarterly maintenance to ensure logging remains turned-on and these maintenance activities can be
documented and signed-off by management. This extra level of documentation may seem burdensome, but
these activities are likely already carried out and the security team might even welcome further justification
for the Incident Response Plan.
For CCAR banks (Cybersecurity breaches are operational risk events - 14A A.6), all of these activities
could be included as model-enhanced expert judgement in the supporting documentation for 14A Schedule
E - Operational Risk Loss.
The possibility of a massive data breach is scary. The biggest risk is the unknown unknown, and a model
that can accurately forecast costs, trained on a history of data breaches reveals that this risk is more in the
bank’s control than most other risks. The cost of mitigating this risk can payoff in substantially lower
operational risk loss reserves that affect a bank’s capital ratios.
For more information, contact:
Srinivas Peri Srinivas.Peri@PrincetonStrategyGroup.com
Thomas Lee ThomasL@VivoSecurity.com

More Related Content

What's hot

GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
Kate Tomlinson
 
Security as a Service flyer
Security as a Service flyerSecurity as a Service flyer
Security as a Service flyer
Scott Fields
 
Veta compliance operations review
Veta compliance operations reviewVeta compliance operations review
Veta compliance operations review
Mark Taylor
 

What's hot (18)

What every CEO needs to know about Califorinia's new data breach law
What every CEO needs to know about Califorinia's new data breach lawWhat every CEO needs to know about Califorinia's new data breach law
What every CEO needs to know about Califorinia's new data breach law
 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
 
Peer Risk Model for Cyber Security Risk
Peer Risk Model for Cyber Security RiskPeer Risk Model for Cyber Security Risk
Peer Risk Model for Cyber Security Risk
 
Half the Picture
Half the PictureHalf the Picture
Half the Picture
 
8 Reasons Why You Need A Strategy Management Software
8 Reasons Why You Need A Strategy Management Software8 Reasons Why You Need A Strategy Management Software
8 Reasons Why You Need A Strategy Management Software
 
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gapsGRC15620_Report_-_Third_party_risk_exposing_the_gaps
GRC15620_Report_-_Third_party_risk_exposing_the_gaps
 
Strategy Insights - How to Quantify IT Risks
Strategy Insights - How to Quantify IT Risks Strategy Insights - How to Quantify IT Risks
Strategy Insights - How to Quantify IT Risks
 
Security as a Service flyer
Security as a Service flyerSecurity as a Service flyer
Security as a Service flyer
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
 
Information Security - Implementation Effectiveness
Information Security -  Implementation EffectivenessInformation Security -  Implementation Effectiveness
Information Security - Implementation Effectiveness
 
Don't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You UpDon't Let Cybersecurity Trip You Up
Don't Let Cybersecurity Trip You Up
 
Veta compliance operations review
Veta compliance operations reviewVeta compliance operations review
Veta compliance operations review
 
Continuous Monitoring: Introduction & Considerations – Part 1 of 3
Continuous Monitoring: Introduction & Considerations – Part 1 of 3Continuous Monitoring: Introduction & Considerations – Part 1 of 3
Continuous Monitoring: Introduction & Considerations – Part 1 of 3
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Top 8 Ways to Improve Underwriting Workflow
Top 8 Ways to Improve Underwriting WorkflowTop 8 Ways to Improve Underwriting Workflow
Top 8 Ways to Improve Underwriting Workflow
 
Dont Gamble With Your Data
Dont Gamble With Your DataDont Gamble With Your Data
Dont Gamble With Your Data
 

Similar to How to prevent data breach risk from impacting capital ratios

Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection Imperative
DataCore Software
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
walterl4
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
IlonaThornburg83
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016
Tim Grieveson
 
CIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalCIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis Final
Claire Louis
 

Similar to How to prevent data breach risk from impacting capital ratios (20)

Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
 
201206 Tech Decisions: Finding Profits
201206 Tech Decisions: Finding Profits201206 Tech Decisions: Finding Profits
201206 Tech Decisions: Finding Profits
 
Keys to extract value from the data analytics life cycle
Keys to extract value from the data analytics life cycleKeys to extract value from the data analytics life cycle
Keys to extract value from the data analytics life cycle
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection Imperative
 
Cyber loss model for all industries
Cyber loss model for all industriesCyber loss model for all industries
Cyber loss model for all industries
 
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docxChapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 
The 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident ResponseThe 4 Challenges of Managing Privacy Incident Response
The 4 Challenges of Managing Privacy Incident Response
 
Cyber Security Program Realization in the Mid Market - Executive Summary
Cyber Security Program Realization in the Mid Market - Executive SummaryCyber Security Program Realization in the Mid Market - Executive Summary
Cyber Security Program Realization in the Mid Market - Executive Summary
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
Business Continuity for Mission Critical Applications
Business Continuity for Mission Critical ApplicationsBusiness Continuity for Mission Critical Applications
Business Continuity for Mission Critical Applications
 
CIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalCIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis Final
 
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATIONQUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
 
Property & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital AgeProperty & Casualty: Deterring Claims Leakage in the Digital Age
Property & Casualty: Deterring Claims Leakage in the Digital Age
 
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATIONQUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
QUALITY ASSESSMENT OF ACCESS SECURITY CONTROLS OVER FINANCIAL INFORMATION
 
Risk management by Deepak kumar dwivedi
Risk management by Deepak kumar dwivediRisk management by Deepak kumar dwivedi
Risk management by Deepak kumar dwivedi
 
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
 
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
 
2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final2017 global-cyber-risk-transfer-report-final
2017 global-cyber-risk-transfer-report-final
 

Recently uploaded

NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
Amil baba
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
ju0dztxtn
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
23050636
 
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
ppy8zfkfm
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证
pwgnohujw
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
yulianti213969
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
fztigerwe
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Valters Lauzums
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
pwgnohujw
 

Recently uploaded (20)

Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
 
Displacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second DerivativesDisplacement, Velocity, Acceleration, and Second Derivatives
Displacement, Velocity, Acceleration, and Second Derivatives
 
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...Genuine love spell caster )! ,+27834335081)   Ex lover back permanently in At...
Genuine love spell caster )! ,+27834335081) Ex lover back permanently in At...
 
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor NetworksSensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
Sensing the Future: Anomaly Detection and Event Prediction in Sensor Networks
 
社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction社内勉強会資料_Object Recognition as Next Token Prediction
社内勉強会資料_Object Recognition as Next Token Prediction
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"
 
The Significance of Transliteration Enhancing
The Significance of Transliteration EnhancingThe Significance of Transliteration Enhancing
The Significance of Transliteration Enhancing
 
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
1:1原版定制利物浦大学毕业证(Liverpool毕业证)成绩单学位证书留信学历认证
 
Data Analysis Project Presentation : NYC Shooting Cluster Analysis
Data Analysis Project Presentation : NYC Shooting Cluster AnalysisData Analysis Project Presentation : NYC Shooting Cluster Analysis
Data Analysis Project Presentation : NYC Shooting Cluster Analysis
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
 
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI  MANAJEMEN OF PENYAKIT TETANUS.pptMATERI  MANAJEMEN OF PENYAKIT TETANUS.ppt
MATERI MANAJEMEN OF PENYAKIT TETANUS.ppt
 
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 

How to prevent data breach risk from impacting capital ratios

  • 1. How to Prevent Data Breach Risk from Impacting Capital Ratios Authors: Srinivas Peri, Thomas Lee PhD
  • 2. How to Prevent Data Breach Risk from Impacting Capital Ratios Authors: Srinivas Peri (linkedIn), Thomas Lee (linkedIn) The Federal Reserve is beginning to focus on cybersecurity and the impact that a data breach could have on the stability of the banking system (see MarketPlace.org). Although expert judgment is allowed for assessing the financial impact of a data breach, some banks are finding significant value using SR 11-7 compliant regression models (see SlideShare). We have explained elsewhere how these models can support Internal Audit and demonstrate a stronger risk management culture. Here we explain how these same models can be combined with the security team’s Incident Response Plan to argue for a substantially lower loss reserve in the context of CCAR Idiosyncratic Scenarios. The cost of a data breach, as characterized by a model trained on cross-industry data breaches, is best described as a lognormal distribution with a long tail. The lognormal distribution characterizes the probability versus cost relationship and it shows that the most probable cost is not high. But using confidence intervals in the CCAR stress test that are commonly used for credit loss can result in a very high cost forecast and a significant impact to capital ratios. For example, the median cost of a data breach caused by a malicious outsider affecting 50 million households is just $61 million, while the 80% confidence interval is a staggering third-of-a-billion dollars. But unlike credit loss which is a strong function of the overall economy, factors controlling the cost of a data breach are within the control of the bank. Modeling reveals two costs that dominate: 1) fines and lawsuits, when they occur and 2) investigation costs. Investigation costs are the costs related to forensic investigation which consist of using server and data access logs, to determine the identity of the intruders, how they entered and what data was exposed. Investigation costs are reduced when 1) all logging is enabled for workstations, servers and data repositories, 2) logs are formatted uniformly and 3) logs are saved in a read only fashion so that intruders cannot delete them. If the investigation is to be carried out by a third-party, a pre-negotiated contract could also control costs. Both probability and cost of lawsuits can also be managed and an experienced law firm can help identify mitigation activities. For example, being careful with contracts and advertising promises, notifying victims and offering identity theft insurance in a timely manner, and being responsive through call centers. These activities which reduce the investigation cost and probability of lawsuit are considered part of the Incident Response Plan which is normally part of cybersecurity and the office of the CISO. A financial institution could therefore build a credible, well documented case for using a smaller confidence interval, by simply combining the security teams Incident Response Plan with model based observations. The Incident Response Plan may however, need to be bolstered with supporting documentation of readiness assessments, rectified deficiencies and demonstrable governance. For example, to demonstrate that investigation costs are well managed, a third-party security company experienced in investigations could be engaged to write a report evaluating data logging and other readiness indicators. Remediation recommendations could be carried out, documented and signed-off by management. A Standard Operating Procedure (SOP) could be approved by management outlining quarterly maintenance to ensure logging remains turned-on and these maintenance activities can be documented and signed-off by management. This extra level of documentation may seem burdensome, but
  • 3. these activities are likely already carried out and the security team might even welcome further justification for the Incident Response Plan. For CCAR banks (Cybersecurity breaches are operational risk events - 14A A.6), all of these activities could be included as model-enhanced expert judgement in the supporting documentation for 14A Schedule E - Operational Risk Loss. The possibility of a massive data breach is scary. The biggest risk is the unknown unknown, and a model that can accurately forecast costs, trained on a history of data breaches reveals that this risk is more in the bank’s control than most other risks. The cost of mitigating this risk can payoff in substantially lower operational risk loss reserves that affect a bank’s capital ratios. For more information, contact: Srinivas Peri Srinivas.Peri@PrincetonStrategyGroup.com Thomas Lee ThomasL@VivoSecurity.com