SlideShare a Scribd company logo
recovery
How should CEOs lead
response to a catastrophic
Cyber Attack?
www.CyberRescue.co.uk
Kevin Duffey
Managing Director
29th
June 2016
summary
www.CyberRescue.co.uk
This presentation was given to an invited audience of senior representatives from
the Cabinet Office (UK Government), Capita, E.ON, Institute of Directors, Microsoft,
Saga plc, Zurich Insurance, etc, at an event organised by Cyber Rescue on 29/6/16.
The event was “National & Commercial Strategies for Cyber Resilience.” It included
a pre-publication preview of the UK’s National Cyber Security Strategy to 2020.
Three items were discussed during this presentation:
•Specific CEO responses to cyber attack, and the particular ways that lack of
commercial preparation for breach hurt reputations & revenues. Slides 3-9
•Visualisation of threats, and what mature response looks like. By analogy with an
earthquake, anticipating the consequences of a breach is key. Slides 10-14
•Specific commercial challenges that follow a catastrophic cyber attack, in
particular the paralysing ambiguity of the situation. Slides 15-21.
For similar material, follow Cyber Rescue on LinkedIn here.
Amy Pascal former CEO of Sony Pictures, February 2015 [Click on name for full interview]
There was this
horrible moment
where I realized
there was
absolutely
nothing at all
that I could do.
Robert Pera CEO of Ubiquiti, on “whaling”loss of $46.7m that his staff didn't tell him about, January 2016
I’ve been through
stages of
denial, disbelief,
frustration.
I am
incredibly
angry
about this
data
breach.
John Legere CEO, T-Mobile USA, on breach of T-Mobile customer data stored by Experian, October 2015
The only crime that
has been proven is
the hack.
That is the story.
Ramon Fonseca founding partner of Mossack Fonseca ("Panama Papers"), April 2016
The
awful truth
is that
I don’t know.
Dame Dido Harding CEO of Talk Talk, when asked if affected customer data was encrypted, October 2015
Companies should be
thinking about
decisions the CEO
will need to make.
Michael Vatis Director, FBI's National Infrastructure Protection Center, January 2016
CEOs struggle to visualize data risks
The £600 USB 3.1 storage device “memory stick” from HyperX, stores 1,000 Gigabytes
FBI data storage in 1942 = 10 million sets of fingerprints, plus 23 million paper cards = 680 Gigabytes
All this data fits on a memory stick
CEOs struggle to visualize cyber response
“Hands on your head” isn’t enough for adults
Material for Earthquake Response. Slogan “Shake Out. Don’t Freak Out.”
Aesop’s Menagerie of
Cyber Breach Responses
http://www.cyberrescue.co.uk/library/blog#instincts
Without a commercial response plan to anticipate decisions that will be needed,
executives respond with well-intentioned but counter-productive instincts.
You are
“blindsided”
You weren’t told of other Security Incidents
CEO (55%), HR (68%), Legal (72%).
You are told of the Breach by an outsider
Law Enforcement (41%), 3rd Parties (35%),
Fraud Detection (14%) or Internal (10%).
You are already weeks behind the attackers
Average time to discovery of breach: 69 days
(114 days in health, and 46 in all other sectors)
Cyber Attacks are different from other
business continuity challenges in
the “paralysing ambiguity”
of the situation.
Authorities are
“difficult”
Who to call? 31 organisations fight cyber threats to Financial Services in UK.
68% of IoD Members are unaware of Action Fraud.
What resources do they have?
UK NCSP gives £30m pa to combat cyber crime, including £12m to NCEC.
The ICO has 30 officers handling over 200,000 concerns & 1,000 cases per year.
What do Authorities do? “4% of cyber crime dealt with appropriately by police.”
There are a lot
of opinions
Who is in charge? The UK Parliament expressed its view on 20th June 2016
.
What has been breached? Only 45% of security professionals are confident they can
determine the scope of a breach. External forensics typically lasts 43 days.
How soon to notify customers? 91% of consumers expect "24 hours or less." But
32% of consumers say their loyalty would diminish if they knew of a data breach.
(International)
Laws are complicated
Click to view DLA Piper’s 425 page summary of
Privacy and Breach Notification laws
and other “response” documents
Decisions imply a
Budget
Insurance Pays?
52% of UK CEOs
believe they have
cover, but <10%
actually do. Some
81% of companies
with cyber cover in
USA have never
claimed on it.
Claims covered:
In USA, 78% went
on Crisis Services,
8% on Defence,
9% on Settlement,
& 4% for Fines.
Big Gesture?
53% of Breach
Notifications offer
Credit Monitoring,
which is taken up
by 10% of affected
consumers.
How to triage complaints?
Irate consumers want to receive the
global standard in call centre response,
80% of calls answered in 20 seconds.
But volumes can be 100 times normal,
with call duration x2 standard 4 mins.
And in addition -
- Social Media
- Regulators
- Suppliers
- Press
- Staff
- Police
- Shareholders
You are overwhelmed
You are criticized
for trying your best
“You notified … too slowly … too fast … without cause … putting us at risk of scammers”
“Experts say you should have … encrypted … vetted suppliers … trained staff … … .”
UK Parliament 20/6/16: Bigger fines for poor response; cyber impact on CEO bonus
the future?
Massive growth in digital opportunities
and cyber threats.
Expectations on CEOs will rise:
to have a detailed plan
to reduce harm from
cyber attack.
membership
www.CyberRescue.co.uk
We help executives
reduce harm caused by cyber attacks
Practice your Response
with Executive Simulations
Bespoke Commercial
Response Plan
Commercial Coach for
Cyber Attack Response
To find out more, click here
or Assistance@CyberRescue.co.uk
thank you
National & Organisational
Strategies for Cyber Resilience
www.CyberRescue.co.uk
Kevin Duffey
Managing Director
29th
June 2016
For similar material, follow Cyber Rescue
on LinkedIn here.

More Related Content

What's hot

A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
Dawn Yankeelov
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
Craig McGill
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
Tripwire
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
Andrew Bycroft
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
Craig McGill
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015
Wynyard Group
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
Community IT Innovators
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
Phil Agcaoili
 
Cyber security
Cyber securityCyber security
Cyber security
Vaibhav Jain
 
Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016
Anna Fenston
 
12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit
Tripwire
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
businessforward
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber SecurityPhil Agcaoili
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
College Development Network
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
centralohioissa
 
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Dragos, Inc.
 
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Cohesive Networks
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye, Inc.
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on Security
Ina Luft
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year
Tripwire
 

What's hot (20)

A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
The July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk LandscapeThe July 2017 Cybersecurity Risk Landscape
The July 2017 Cybersecurity Risk Landscape
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Cyber risk trends in 2015
Cyber risk trends in 2015Cyber risk trends in 2015
Cyber risk trends in 2015
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Think Cyber Think Resilience | William Barker | March 2016
Think Cyber Think Resilience | William Barker  | March 2016Think Cyber Think Resilience | William Barker  | March 2016
Think Cyber Think Resilience | William Barker | March 2016
 
12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit12 Top Talks from the 2017 R-CISC Summit
12 Top Talks from the 2017 R-CISC Summit
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 
2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security2015 KSU So You Want To Be in Cyber Security
2015 KSU So You Want To Be in Cyber Security
 
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your ServiceVirtual Bridge Sessions: The National Cyber Security Centre at Your Service
Virtual Bridge Sessions: The National Cyber Security Centre at Your Service
 
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
 
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
Insights To Building An Effective Industrial Cybersecurity Strategy For Your ...
 
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
Dwight Koop's Chicago ECFT talk "The Chicago School of Cybersecurity Thinking...
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on Security
 
2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year2017 in Review: Infosec Pros Look Back on the Year
2017 in Review: Infosec Pros Look Back on the Year
 

Similar to CEOs leading Recovery from Cyber Attack

SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
Matthew Pascucci
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
CBIZ, Inc.
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
Ethan S. Burger
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?
Ethan S. Burger
 
Risk Management on the Internet
Risk Management on the InternetRisk Management on the Internet
Risk Management on the Internet
sekiur
 
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
SophiaPalmira
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
Rahul Tyagi
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
January 2017 Printed Newsletter
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed Newsletter
Yigal Behar
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
Ulf Mattsson
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
NCCOMMS
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
Don Grauel
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
galagirishp
 

Similar to CEOs leading Recovery from Cyber Attack (20)

SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?Can We Avert A Cyber-Insurance Market Crisis?
Can We Avert A Cyber-Insurance Market Crisis?
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Risk Management on the Internet
Risk Management on the InternetRisk Management on the Internet
Risk Management on the Internet
 
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
Opening Keynote: How a Pandemic Can Inform Our Response to a Major Cyber Secu...
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
January 2017 Printed Newsletter
January 2017 Printed NewsletterJanuary 2017 Printed Newsletter
January 2017 Printed Newsletter
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 

More from Kevin Duffey

Cyber Insights from 100 surveys
Cyber Insights from 100 surveysCyber Insights from 100 surveys
Cyber Insights from 100 surveys
Kevin Duffey
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
Kevin Duffey
 
Ensuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance SectorEnsuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance Sector
Kevin Duffey
 
Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022
Kevin Duffey
 
Best Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveysBest Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveys
Kevin Duffey
 
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so LowBreaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Kevin Duffey
 
Cyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptxCyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptx
Kevin Duffey
 
Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022
Kevin Duffey
 
Breaches Anticipated - because firms have weak cyber security visible to hac...
Breaches Anticipated  - because firms have weak cyber security visible to hac...Breaches Anticipated  - because firms have weak cyber security visible to hac...
Breaches Anticipated - because firms have weak cyber security visible to hac...
Kevin Duffey
 
Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022
Kevin Duffey
 
Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021
Kevin Duffey
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial Services
Kevin Duffey
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Kevin Duffey
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Kevin Duffey
 
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Kevin Duffey
 
Cyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersCyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and Suppliers
Kevin Duffey
 
London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018
Kevin Duffey
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 Executives
Kevin Duffey
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Kevin Duffey
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Kevin Duffey
 

More from Kevin Duffey (20)

Cyber Insights from 100 surveys
Cyber Insights from 100 surveysCyber Insights from 100 surveys
Cyber Insights from 100 surveys
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
Ensuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance SectorEnsuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance Sector
 
Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022
 
Best Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveysBest Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveys
 
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so LowBreaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so Low
 
Cyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptxCyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptx
 
Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022
 
Breaches Anticipated - because firms have weak cyber security visible to hac...
Breaches Anticipated  - because firms have weak cyber security visible to hac...Breaches Anticipated  - because firms have weak cyber security visible to hac...
Breaches Anticipated - because firms have weak cyber security visible to hac...
 
Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022
 
Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial Services
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
 
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
 
Cyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersCyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and Suppliers
 
London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 Executives
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 

Recently uploaded

Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 

Recently uploaded (20)

Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 

CEOs leading Recovery from Cyber Attack

  • 1. recovery How should CEOs lead response to a catastrophic Cyber Attack? www.CyberRescue.co.uk Kevin Duffey Managing Director 29th June 2016
  • 2. summary www.CyberRescue.co.uk This presentation was given to an invited audience of senior representatives from the Cabinet Office (UK Government), Capita, E.ON, Institute of Directors, Microsoft, Saga plc, Zurich Insurance, etc, at an event organised by Cyber Rescue on 29/6/16. The event was “National & Commercial Strategies for Cyber Resilience.” It included a pre-publication preview of the UK’s National Cyber Security Strategy to 2020. Three items were discussed during this presentation: •Specific CEO responses to cyber attack, and the particular ways that lack of commercial preparation for breach hurt reputations & revenues. Slides 3-9 •Visualisation of threats, and what mature response looks like. By analogy with an earthquake, anticipating the consequences of a breach is key. Slides 10-14 •Specific commercial challenges that follow a catastrophic cyber attack, in particular the paralysing ambiguity of the situation. Slides 15-21. For similar material, follow Cyber Rescue on LinkedIn here.
  • 3.
  • 4. Amy Pascal former CEO of Sony Pictures, February 2015 [Click on name for full interview] There was this horrible moment where I realized there was absolutely nothing at all that I could do.
  • 5. Robert Pera CEO of Ubiquiti, on “whaling”loss of $46.7m that his staff didn't tell him about, January 2016 I’ve been through stages of denial, disbelief, frustration.
  • 6. I am incredibly angry about this data breach. John Legere CEO, T-Mobile USA, on breach of T-Mobile customer data stored by Experian, October 2015
  • 7. The only crime that has been proven is the hack. That is the story. Ramon Fonseca founding partner of Mossack Fonseca ("Panama Papers"), April 2016
  • 8. The awful truth is that I don’t know. Dame Dido Harding CEO of Talk Talk, when asked if affected customer data was encrypted, October 2015
  • 9. Companies should be thinking about decisions the CEO will need to make. Michael Vatis Director, FBI's National Infrastructure Protection Center, January 2016
  • 10. CEOs struggle to visualize data risks The £600 USB 3.1 storage device “memory stick” from HyperX, stores 1,000 Gigabytes
  • 11. FBI data storage in 1942 = 10 million sets of fingerprints, plus 23 million paper cards = 680 Gigabytes All this data fits on a memory stick
  • 12. CEOs struggle to visualize cyber response
  • 13. “Hands on your head” isn’t enough for adults Material for Earthquake Response. Slogan “Shake Out. Don’t Freak Out.”
  • 14. Aesop’s Menagerie of Cyber Breach Responses http://www.cyberrescue.co.uk/library/blog#instincts Without a commercial response plan to anticipate decisions that will be needed, executives respond with well-intentioned but counter-productive instincts.
  • 15. You are “blindsided” You weren’t told of other Security Incidents CEO (55%), HR (68%), Legal (72%). You are told of the Breach by an outsider Law Enforcement (41%), 3rd Parties (35%), Fraud Detection (14%) or Internal (10%). You are already weeks behind the attackers Average time to discovery of breach: 69 days (114 days in health, and 46 in all other sectors) Cyber Attacks are different from other business continuity challenges in the “paralysing ambiguity” of the situation.
  • 16. Authorities are “difficult” Who to call? 31 organisations fight cyber threats to Financial Services in UK. 68% of IoD Members are unaware of Action Fraud. What resources do they have? UK NCSP gives £30m pa to combat cyber crime, including £12m to NCEC. The ICO has 30 officers handling over 200,000 concerns & 1,000 cases per year. What do Authorities do? “4% of cyber crime dealt with appropriately by police.”
  • 17. There are a lot of opinions Who is in charge? The UK Parliament expressed its view on 20th June 2016 . What has been breached? Only 45% of security professionals are confident they can determine the scope of a breach. External forensics typically lasts 43 days. How soon to notify customers? 91% of consumers expect "24 hours or less." But 32% of consumers say their loyalty would diminish if they knew of a data breach.
  • 18. (International) Laws are complicated Click to view DLA Piper’s 425 page summary of Privacy and Breach Notification laws and other “response” documents
  • 19. Decisions imply a Budget Insurance Pays? 52% of UK CEOs believe they have cover, but <10% actually do. Some 81% of companies with cyber cover in USA have never claimed on it. Claims covered: In USA, 78% went on Crisis Services, 8% on Defence, 9% on Settlement, & 4% for Fines. Big Gesture? 53% of Breach Notifications offer Credit Monitoring, which is taken up by 10% of affected consumers.
  • 20. How to triage complaints? Irate consumers want to receive the global standard in call centre response, 80% of calls answered in 20 seconds. But volumes can be 100 times normal, with call duration x2 standard 4 mins. And in addition - - Social Media - Regulators - Suppliers - Press - Staff - Police - Shareholders You are overwhelmed
  • 21. You are criticized for trying your best “You notified … too slowly … too fast … without cause … putting us at risk of scammers” “Experts say you should have … encrypted … vetted suppliers … trained staff … … .” UK Parliament 20/6/16: Bigger fines for poor response; cyber impact on CEO bonus
  • 22. the future? Massive growth in digital opportunities and cyber threats. Expectations on CEOs will rise: to have a detailed plan to reduce harm from cyber attack.
  • 23. membership www.CyberRescue.co.uk We help executives reduce harm caused by cyber attacks Practice your Response with Executive Simulations Bespoke Commercial Response Plan Commercial Coach for Cyber Attack Response To find out more, click here or Assistance@CyberRescue.co.uk
  • 24. thank you National & Organisational Strategies for Cyber Resilience www.CyberRescue.co.uk Kevin Duffey Managing Director 29th June 2016 For similar material, follow Cyber Rescue on LinkedIn here.

Editor's Notes

  1. The Cyber Rescue Alliance exists to help Executives reduce harm from cyber attack. To help organisations be resilient. To help with commercial Recovery. We help executives avoid turning a breach into a disaster. We help CEOs make decisions in what is often the most stressful time in their career. We recognise that a cyber attack is a crime We know that executives deserve our sympathy and support And we know that executives find attacks very stressful because they are often so unprepared. So I will share some observations about how executives respond to major breaches. I will start by looking at the public face of a breach to show what lack of preparation looks like to shareholders, suppliers and customers. I will finish by asking your thoughts on the mistakes executives should most avoid when told of a major breach. Most executives – especially of bigger firms - think that they have a plan. But then… If there’s time, I’ll explain the services that our Member Organisations seem to find most useful. But we’ve brought you together because we We have a particular emphasis on Recovery: Commercial Coaches to advise on remediation during a major attack Commercial Response Plans for Our twenty advisors and researchers bring together the specialisms needed for effective recovery. are specialise 20 we recover. We have over 20 advisors, researchers and staff who are experts in different aspects of that recovery. I’m going to help you think But many Executives – if they think about Recovery at all – think that Recovery is A technical issue That belongs to someone else Do executives have a Plan for a major cyber attack?
  2. “Everyone thinks they have a plan, until they get punched in the face.” Mike Tyson said that. So did Vicki Gavin – the award winning CISO of The Economist Group – and many others who work in cyber resilience. The quote applies at two levels: CEOs genuinely think they have a plan. For example, the UK Government found that more than half of UK CEOs think they have cyber insurance,Insurance Brokers say the actual figure is closer to 2%. Where a plan does exist, it is inadequate. Typically it covers only technical response, Technical forensics and Technical remediation Such response is necessary but not sufficient for Full Recovery That includes the Reputation, the Revenues and indeed the Roles that executives are responsible for. Technical incident response plans don’t support Executives through the shock that is often disorientating, and the uncertainty that often leads to decision paralysis or Reckless Hyper Activity After a Breach it’s fine to feel Anger, Depression, Self-Pity or Betrayal, but then Executives need a plan of action. Famously, they don’t always. Amy Pascal didn’t have a plan.
  3. “There was this horrible moment, where I realized there was absolutely nothing at all that I could do.” There was actually – of course - a huge amount to do. Which she’d have learnt by role playing a cyber attack – Engaging with law enforcement, the media staff and talent customers and suppliers investors and regulators finance, operations, HR, customer service, IT and many more. But there’s so much to do, it’s hard to get past emotions Robert Pera did a service by sharing his feelings.
  4. “Denial, Disbelief, Frustration.” Those are the emotions he described to shareholders, after the FBI told him they’d seen his company’s money going into a bank account they were watching. Pera blamed “a couple individuals who displayed incredibly poor judgment and incompetence” But those “couple of individuals” made 14 wire transfers, over 17 days, totalling over $46m without checking in person with the “colleague” who supposedly was emailing instructions to send the cash to new bank accounts in China, Russia, Poland and other countries. As CEO, Pera could have created a culture in which staff talk to executives when asked to do strange things a control system that checks new payments to new bank accounts a training platform that educates staff about the risks of phishing, whaling and other attacks. It’s obvious Pera was feeling enormous anger. That anger is even more intense when a breach can be blamed on a supplier.
  5. John Legere, was “incredibly angry” when data on his 15 million customers was breached by one of his suppliers, the data processor, Experian. Experian’s costs for that breach – so far - are $20 million plus the loss of one of their largest customers, T-Mobile. But executives can do more than trust that their data will be safe, they can make efforts to verify. In the future, it won’t be enough for Executives to say they are angry. They must insist on a procurement approach that does more than ask providers to promise to keep data safe. For just $20,000, it is possible to automatically identify which of your providers - has failed to patch their systems, - has failed to keep passwords safe, - has failed to XXX. At Cyber Rescue, we offer that $20,000 service. We also help CEOs role play and plan for the consequences of a breach. A cyber attack is a crime. The attacked CEO might expect sympathy. An obvious example of a CEO who expected sympathy is Ramon Fonseca? He said…
  6. “The only crime that has been proven is the hack. That is the story.” But of course the story that the media focussed on as they read the Panama Papers that had been breached from his law firm Was the illegal tax evasion and money laundering the law firm appeared to have facilitated. If the executives at Mossack Fonseca had role played the consequences of a data breach it would have been obvious they’d get little public sympathy. At Cyber Rescue, we have Members, who have realised through our role play exercises that while what they do is really good work the media might choose not to be sympathetic to a breach. So having role-played a breach, our Members our members do much more to encrypt, segment, tokenise, limit access to and otherwise protect their clients data. By role-playing and planning the consequences of a breach Executives at least understand what protections they have in place. They don’t need to find themselves on national TV and having to say
  7. “The awful truth is that I don’t know” It is not a great answer to the question “Do you know if your customer’s sensitive information was encrypted?” Dido Harding was faced with several questions that could have been anticipated. For example, “did TalkTalk implement Cyber Essentials before this breach.” Role playing such a question in advance makes it obvious that an investment of less than £1k to get the certificate the Government recommends is worth making even if you’re already doing everything needed technically. Cyber attacks are not just a technical issue, they are an expected challenge of doing digital business So, companies need to be expecting a breach. And as the FBI says…
  8. “Companies should be thinking about the decisions the CEO will need to make” During and immediately after a major cyber attack is discovered. And that’s where we in this room have a responsibility We have to help CEOs to anticipate and really visualise the consequences of cyber attack. People say that “out of sight is out of mind” and what does data look like? These days, if it has any physical appearance, perhaps it looks like this.
  9. This memory stick holds 1,000 Gigabytes Who here can visualise what that looks like? We find it helpful to show CEOs this picture, of just 600 Gigabytes
  10. It’s the data storage system the FBI used in 1942 To hold a lot less data than fits on a modern memory stick. Choosing pictures that tell stories is really important. For example, some people compare a data breach to an earthquake. There is some value in that approach, because…
  11. …CEOs struggle to visualise effective cyber response. Putting your hands on your head is a start, but we actually want more from our leaders. As Group General Manager at International SOS I was responsible for evacuating thousands of people during events like The Arab Spring, the eruptions of the Eyjafjallajökul volcano in Iceland and the Japanese earthquake that destroyed the Fukushima nuclear plant. My career has been based on helping leaders anticipate the future including the consequences of disasters And it’s the consequences that often do more damage than the event.
  12. For example, a mature response to an earthquake anticipates all the decisions and resources needed when an earthquake can be followed by: Landslide Tsunami Fire Radiation Leak Water Shortage Food Shortage Shelter Shortage Transport Problems and so on
  13. Responding by Instinct is not enough. Indeed, well-intentioned responses are often counter productive.
  14. Passions can run high, because although we all know a breach is “inevitable,” most CEOs aren’t mentally prepared. And the “paralysing ambiguity” of an attack you can’t physically see is very disorientating.
  15. CEOs then think about calling for help And there are some excellent individuals at the many organisations that help fight cyber attacks. But it can be difficult to navigate the various authorities during a crisis.
  16. Similarly, it can be difficult to navigate internally
  17. And the legal picture is certainly not simple, especially for businesses that operate in more than one State.
  18. Yet decisions have to be made including to put dollars against specific actions.
  19. How much, for example, should be invested in the Surge capability needed to communicate with all Stakeholders?
  20. Recognise that no matter how much you do you’ll still be criticised. Some individuals and organisations will bring their own agenda and might be motivated to make you look bad.
  21. The future will bring many digital opportunities, but the bar of expectations will also be raised not just for good cyber security, but also for good commercial response.
  22. Please contact us if you’d like to protect your Reputation, Revenues and Company Value
  23. Thank you.