SlideShare a Scribd company logo
VivoSecurity Inc.,	
  Los	
  Altos,	
  CA.	
  Email:	
  ThomasL@VivoSecurity.com
Carl	
  Friedrich	
  Gauss	
  who	
  discovered	
  the	
  Normal	
  (Gaussian)	
  
distribution,	
   which	
  characterizes	
  random	
  events.
OPERATIONAL	
  RISK	
  MODEL
for	
  CCAR	
  Data	
  Breach	
  Idiosyncratic	
  Scenarios
Demonstrate	
  strong	
  risk	
  management	
  culture	
  for	
  tier-­‐1	
  capital;	
  prove	
  insurance	
  adequacy;	
  champion	
  or	
  
challenger	
  model;	
  maintain	
  strong	
  Model	
  Risk	
  Management	
  with	
  a	
  SR	
  11-­‐7	
  and	
  SR	
  15-­‐18	
  compliant	
  model
The	
  Federal	
  Reserve	
  is	
  Focusing	
  on	
  Cybersecurity
Large data breaches are rare, but they do happen and the Federal Reserve is looking
for evidence that a bank has enough capital to withstand the event. But because they
are rare, any single company does not have sufficient data to predict the cost. An
analysis of cross-­‐company data is the only credible way to characterize the risk.
Some banks are demonstrating a strong risk management culture by using statistical
models and VivoSecurity is helping by creating strong SR 11-­‐7 compliant models using
cross-­‐company data. These models have the additional benefit of 1) bringing cyber
risk under the bank's model risk management framework, 2) providing a clearer
understand of what should be transferred with insurance and 3) allowing a bank to
benefit from cost reductions brought about from a mature incident response.
ü Strengthen Idiosyncratic Scenarios for CCAR/DFAST operational risk.
ü Challenge Models for Champion Models
ü Champion Models if no models
ü Justify a stance not to use cyber insurance
ü Demonstrate better management of risks to tier 1 capital
VivoSecurity	
  Inc,	
  1247	
  Russell	
  Ave,	
  Los	
  Altos	
  California;	
   Contact:	
   ThomasL@VivoSecurity.com,	
   (650)	
  919-­‐3050
What	
  is	
  a	
  Cyber-­‐Loss	
  Model?
The Cyber-­‐Loss Model is essentially a complex formula that can explain the
variability in cost of historical data breaches. It was trained upon a large set of
data breaches and tested for accuracy on a randomly selected set of validation
cases. It was developed in the statistical language R using standard statistical
techniques such as linear regression and Bayesian Model Averaging.
The Cyber-­‐Loss Model is deployed in an easy to use Excel Spreadsheet which
requires a small number of variable inputs that have been found to be predictive
of cost. No information is needed about a banks security posture.
What is Model Validation? Federal Reserve has created guidance for model
management (SR11-­‐7 & SR15-­‐18). This guidance assures that models are
developed following sound statistical practices. Many banks have an internal
validation process for establishing compliance for bank models. We can supply all
documentation needed for model validation, including quarterly maintenance,
and we cansupport internal validation efforts.
The graphs below are a pro forma example of breach cost characterizations.
Possible data breach cost is break down by incident and data type. The model also
provides a probability distribution for the range of costs, and the probability of
lawsuits.
$0
$20
$40
$60
$80
$100
Mean	
  Data	
  Breach	
  Costs
Millions
Incident	
  &	
  Data	
  Type
0%
20%
40%
60%
80%
100%
0 >0 1 2 3 4 5
Probability
Number	
  of	
  Lawsuits
Model	
  Outputs
$0
$5
$10
$15
$20
$25
Likelihood
Breach	
  Cost
Millions
$19.8M
80%	
  Confidence	
  Interval
Value	
  of	
  Incident	
  
Response	
  Controls	
  
Most	
  companies	
  would	
  
experience	
  a	
  cost	
  of	
  
under	
  $5M.
What	
  Does	
  the	
  Cyber-­‐Loss	
  Model	
  Include?
VivoSecurity	
  Inc,	
  1247	
  Russell	
  Ave,	
  Los	
  Altos	
  California;	
   Contact:	
   ThomasL@VivoSecurity.com,	
   (650)	
  919-­‐3050
Included Detail
Deployment Models are deployed as an easy to use Excel
Spreadsheet.
Training We provide training on the use of the spreadsheet,
how to think about confidence intervals, and how to
guide insurance purchases.
Documentation We provide complete model documentation in the
bank’s own format.
Validation	
  Support We provide support for the bank’s model validation
team, including data turnover, troubleshooting R and
SQL code, and discussions on modeling methodology.
Quarterly	
  Maintenance We provide new data as it becomes available, model
re-­‐evaluation, all required validation documentation,
validation team support, re-­‐deployment, and evidence
of testing.
Investigation
Notification
Call	
  center
Remediation
o Business	
  Loss
o Damage	
  to	
  personal	
  credit
o Theft	
  of	
  money	
  &	
  goods
o Credit	
  card	
  replacement	
  costs
Business	
  loss;	
  theft	
  of	
  
money	
  &	
  goods
Credit	
  monitoring	
  &	
  
privacy	
  insurance.
Fines &	
  settlements
Public	
  &	
  Other	
  BusinessesBreach	
  Company
Total	
  costs
Mitigate
Transfer	
  
via	
  suits
Costs	
  Covered	
  by	
  the	
  Operational	
  Risk	
  Model	
  
Response	
  CostsDamage	
  costs
Term Meaning
Investigation Cost of investigating what happened in a data breach including data
that was exposed. Costs of updating agencies of investigation progress.
Remediation Cost to preventing future data breach.
Notification Legal costs of notifying federal agencies and states attorney general.
Call	
  Center Cost of hiring or expanding call centers to handle calls from people
affected by data breach.
Business	
  Loss,	
  theft	
  
of	
  money	
  &	
  goods
Loss of business and customers, fraud costs, cost of goods pur chased
with stolen cards
Credit	
  Monitoring	
  &	
  
Privacy	
  Insurance
Cost of providing credit monitoring such as Experian, insurance to
cover personal loss by people affected by the data breach.
Fines	
  &	
  Settlements Government fines, lawsuit awards and settlements, defense costs.
Glossary
The Operational Risk Model calculates the cost of a data breach exposing custodial data. Custodial
data is any PII data which triggers reporting requirements of various government agencies (also
known as risk to confidentiality, in AppSec parlance). The model calculates Total Costs; below is a
graphical breakdown of costs included in Total Costs.
Evaluation
Bank receives themodel as an Excel spreadsheet and performs initial evaluation using approximate
model inputs. VivoSecurity provides training for how to use the model, how to think about
confidenceintervals and apply results to insurancepurchases.
Model	
  Owner
The owner (sponsor) of the risk model is decided. The owner might be, for example, the CFO or
CRO group. Themodel owner might draft documents to officially sponsor themodel as preparation
for model validation.
Validation	
  Support
Data	
  Owner
VivoSecurity produces SR11-­‐7 compliant validation documentation, following the bank’s format.
VivoSecurity then works with thebank’s validation team to support validateactivities.
Departments are identified that will produce validated numbers that will be entered into the
model. This might include creating and approving SQL to query systems and to generate the
numbers.
Insurance	
  Adequacy
The model owner receives validated numbers from data owners and performs a model based
evaluation ofinsuranceadequacy. Considerations aredocumented and approved.
Adjust	
  Insurance
Insurance coverage can be adjusted and premiums lowered using model based arguments and
historical industry data. Note that neither carriers nor brokers have models as rigorous as ours,
giving thebank an advantage in negotiations.
Document Considerations for insurance adequacy along with validated models and evidence of insuranceare
incorporated into regulator reporting documentation, e.g., FR Y-­‐14A.
Use	
  Case
The diagram below shows the process for a typical retail bank that uses the Operational Risk Model in satisfying regulatory requirements.
Activities need not proceed sequentially. For example, after a model owner is determined, model validation (which takes the most time) can be
performed concurrently with other activities.
About	
  VivoSecurity
VivoSecurity	
  Inc,	
  1247	
  Russell	
  Ave,	
  Los	
  Altos	
  California;	
   Contact:	
   ThomasL@VivoSecurity.com,	
   (650)	
  919-­‐3050
VivoSecurity provides data analytics and statistical modeling to companies in the financial and
high tech industries. We are a Silicon Valley Startup since 2012, with PhD level scientists and
statisticians. We use advanced data analytic techniques to model the probability and cost of
cybersecurity events. We have strong cybersecurity domain knowledge, strong knowledge of
software applications, strong knowledge of operating systems and hardware and a strong
understanding of enterprise operations.
Model Description
Peer	
  Risk	
  Model Characterizes	
  cyber	
  risk	
  in	
  dollars	
  and	
  comparison	
  with	
  
peers.
Probability	
  for	
  Fraud, personal	
  customers Calculates	
  probability	
  for	
  a	
  cyber	
  attach	
  that	
  leads	
  to	
  
fraud.
Probability	
  for	
  Fraud,	
  corporate	
  customers Calculates	
  probability	
  for	
  a	
  cyber	
  attach	
  that	
  leads	
  to	
  
fraud.
3rd party	
  (vendor)	
  Risk Calculates	
  risk	
  in	
  dollars	
  posed	
  by	
  3rd party	
  partners.
Additional	
  Offerings

More Related Content

What's hot

Risk Dashboard
Risk Dashboard Risk Dashboard
Risk Dashboard
Michel Rochette
 
Proactive IT management: eliminating mean time to surprise
Proactive IT management: eliminating mean time to surpriseProactive IT management: eliminating mean time to surprise
Proactive IT management: eliminating mean time to surprise
Kishore Jethanandani, MBA, MA, MPhil,
 
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...The Role of the Chief Risk Officer Why You are the Most Important Person in Y...
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...
WolfPAC - Integrated Risk Management
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Cognizant
 
My blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industryMy blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industry
Kishore Jethanandani, MBA, MA, MPhil,
 
My blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banksMy blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banks
Kishore Jethanandani, MBA, MA, MPhil,
 
17 domains
17 domains17 domains
17 domains
Allison Giddens
 
A safe approach to growing your loan book in wealth management
A safe approach to growing your loan book in wealth managementA safe approach to growing your loan book in wealth management
A safe approach to growing your loan book in wealth management
Rockall Technologies
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructure
Jake Weaver
 
Risk as a Service – The Next Thing in Affordable Corporate Risk Management?
Risk as a Service – The Next Thing in Affordable Corporate Risk Management?Risk as a Service – The Next Thing in Affordable Corporate Risk Management?
Risk as a Service – The Next Thing in Affordable Corporate Risk Management?
CTRM Center
 
Riscos Sistêmicos e o Impacto na Subscrição de RC: Um Novo Enfoque de Modelag...
Riscos Sistêmicos e o Impacto na Subscrição de RC: Um Novo Enfoque de Modelag...Riscos Sistêmicos e o Impacto na Subscrição de RC: Um Novo Enfoque de Modelag...
Riscos Sistêmicos e o Impacto na Subscrição de RC: Um Novo Enfoque de Modelag...
CNseg
 
Adopting a Top-Down Approach to Model Risk Governance to Optimize Digital Tra...
Adopting a Top-Down Approach to Model Risk Governance to Optimize Digital Tra...Adopting a Top-Down Approach to Model Risk Governance to Optimize Digital Tra...
Adopting a Top-Down Approach to Model Risk Governance to Optimize Digital Tra...
Jacob Kosoff
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
Jojo Colina
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
Ted Richmond
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
FraudBusters
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
FraudBusters
 
OFSAA - BIGDATA - IBANK
OFSAA - BIGDATA - IBANKOFSAA - BIGDATA - IBANK
OFSAA - BIGDATA - IBANK
ibankuk
 
Oracle erf overview v4
Oracle erf overview v4Oracle erf overview v4
Oracle erf overview v4
David Clement
 
5 Risks in Commercial Lending
5 Risks in Commercial Lending5 Risks in Commercial Lending
5 Risks in Commercial Lending
Colleen Beck-Domanico
 

What's hot (19)

Risk Dashboard
Risk Dashboard Risk Dashboard
Risk Dashboard
 
Proactive IT management: eliminating mean time to surprise
Proactive IT management: eliminating mean time to surpriseProactive IT management: eliminating mean time to surprise
Proactive IT management: eliminating mean time to surprise
 
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...The Role of the Chief Risk Officer Why You are the Most Important Person in Y...
The Role of the Chief Risk Officer Why You are the Most Important Person in Y...
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
 
My blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industryMy blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industry
 
My blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banksMy blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banks
 
17 domains
17 domains17 domains
17 domains
 
A safe approach to growing your loan book in wealth management
A safe approach to growing your loan book in wealth managementA safe approach to growing your loan book in wealth management
A safe approach to growing your loan book in wealth management
 
Whitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructureWhitepaper : Building a disaster ready infrastructure
Whitepaper : Building a disaster ready infrastructure
 
Risk as a Service – The Next Thing in Affordable Corporate Risk Management?
Risk as a Service – The Next Thing in Affordable Corporate Risk Management?Risk as a Service – The Next Thing in Affordable Corporate Risk Management?
Risk as a Service – The Next Thing in Affordable Corporate Risk Management?
 
Riscos Sistêmicos e o Impacto na Subscrição de RC: Um Novo Enfoque de Modelag...
Riscos Sistêmicos e o Impacto na Subscrição de RC: Um Novo Enfoque de Modelag...Riscos Sistêmicos e o Impacto na Subscrição de RC: Um Novo Enfoque de Modelag...
Riscos Sistêmicos e o Impacto na Subscrição de RC: Um Novo Enfoque de Modelag...
 
Adopting a Top-Down Approach to Model Risk Governance to Optimize Digital Tra...
Adopting a Top-Down Approach to Model Risk Governance to Optimize Digital Tra...Adopting a Top-Down Approach to Model Risk Governance to Optimize Digital Tra...
Adopting a Top-Down Approach to Model Risk Governance to Optimize Digital Tra...
 
Justifying Security Investment
Justifying Security InvestmentJustifying Security Investment
Justifying Security Investment
 
Richmond reprint 20151106
Richmond reprint 20151106Richmond reprint 20151106
Richmond reprint 20151106
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
OFSAA - BIGDATA - IBANK
OFSAA - BIGDATA - IBANKOFSAA - BIGDATA - IBANK
OFSAA - BIGDATA - IBANK
 
Oracle erf overview v4
Oracle erf overview v4Oracle erf overview v4
Oracle erf overview v4
 
5 Risks in Commercial Lending
5 Risks in Commercial Lending5 Risks in Commercial Lending
5 Risks in Commercial Lending
 

Similar to Cyber Op Risk Model, banks v7p4

Peer Risk Model for Cyber Security Risk
Peer Risk Model for Cyber Security RiskPeer Risk Model for Cyber Security Risk
Peer Risk Model for Cyber Security Risk
Thomas Lee
 
AI model security.pdf
AI model security.pdfAI model security.pdf
AI model security.pdf
StephenAmell4
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
infosec train
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
CloudMask inc.
 
CIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalCIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis Final
Claire Louis
 
8 rajib chakravorty risk
8 rajib chakravorty risk8 rajib chakravorty risk
8 rajib chakravorty risk
CCR-interactive
 
How to prevent data breach risk from impacting capital ratios
How to prevent data breach risk from impacting capital ratiosHow to prevent data breach risk from impacting capital ratios
How to prevent data breach risk from impacting capital ratios
Thomas Lee
 
Quant Foundry Labs - Low Probability Defaults
Quant Foundry Labs - Low Probability DefaultsQuant Foundry Labs - Low Probability Defaults
Quant Foundry Labs - Low Probability Defaults
Davidkerrkelly
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
Open Security Summit
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
Metaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
Metaorange
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
Visionet Systems, Inc.
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
Jim Romeo
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)
ecommerce
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
Securestorm
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016
Tim Grieveson
 
Performing Strategic Risk Management with simulation models
Performing Strategic Risk Management with simulation modelsPerforming Strategic Risk Management with simulation models
Performing Strategic Risk Management with simulation models
Weibull AS
 
Financial Services in the Cloud
Financial Services in the CloudFinancial Services in the Cloud
Financial Services in the Cloud
Amazon Web Services
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
VMware Tanzu
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
Lalith Kumar Vemali
 

Similar to Cyber Op Risk Model, banks v7p4 (20)

Peer Risk Model for Cyber Security Risk
Peer Risk Model for Cyber Security RiskPeer Risk Model for Cyber Security Risk
Peer Risk Model for Cyber Security Risk
 
AI model security.pdf
AI model security.pdfAI model security.pdf
AI model security.pdf
 
Top 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptxTop 10 Interview Questions for Risk Analyst.pptx
Top 10 Interview Questions for Risk Analyst.pptx
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
CIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis FinalCIA Quebec 11 Sept 2015 Presentation C Louis Final
CIA Quebec 11 Sept 2015 Presentation C Louis Final
 
8 rajib chakravorty risk
8 rajib chakravorty risk8 rajib chakravorty risk
8 rajib chakravorty risk
 
How to prevent data breach risk from impacting capital ratios
How to prevent data breach risk from impacting capital ratiosHow to prevent data breach risk from impacting capital ratios
How to prevent data breach risk from impacting capital ratios
 
Quant Foundry Labs - Low Probability Defaults
Quant Foundry Labs - Low Probability DefaultsQuant Foundry Labs - Low Probability Defaults
Quant Foundry Labs - Low Probability Defaults
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 
State of Security Operations 2016
State of Security Operations 2016State of Security Operations 2016
State of Security Operations 2016
 
Performing Strategic Risk Management with simulation models
Performing Strategic Risk Management with simulation modelsPerforming Strategic Risk Management with simulation models
Performing Strategic Risk Management with simulation models
 
Financial Services in the Cloud
Financial Services in the CloudFinancial Services in the Cloud
Financial Services in the Cloud
 
Treating Security Like a Product
Treating Security Like a ProductTreating Security Like a Product
Treating Security Like a Product
 
Risk Product.pptx
Risk Product.pptxRisk Product.pptx
Risk Product.pptx
 

Recently uploaded

一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
74nqk8xf
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
74nqk8xf
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
Timothy Spann
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
g4dpvqap0
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
jerlynmaetalle
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
ahzuo
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
kuntobimo2016
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
dwreak4tg
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
mzpolocfi
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
sameer shah
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
Walaa Eldin Moustafa
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
ahzuo
 
Natural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptxNatural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptx
fkyes25
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
vikram sood
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
74nqk8xf
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 

Recently uploaded (20)

一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
一比一原版(Coventry毕业证书)考文垂大学毕业证如何办理
 
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
一比一原版(Chester毕业证书)切斯特大学毕业证如何办理
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Dat...
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证如何办理
 
Influence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business PlanInfluence of Marketing Strategy and Market Competition on Business Plan
Influence of Marketing Strategy and Market Competition on Business Plan
 
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
一比一原版(UIUC毕业证)伊利诺伊大学|厄巴纳-香槟分校毕业证如何办理
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023State of Artificial intelligence Report 2023
State of Artificial intelligence Report 2023
 
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
一比一原版(BCU毕业证书)伯明翰城市大学毕业证如何办理
 
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
一比一原版(Dalhousie毕业证书)达尔豪斯大学毕业证如何办理
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...
 
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data Lake
 
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
一比一原版(CBU毕业证)卡普顿大学毕业证如何办理
 
Natural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptxNatural Language Processing (NLP), RAG and its applications .pptx
Natural Language Processing (NLP), RAG and its applications .pptx
 
Global Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headedGlobal Situational Awareness of A.I. and where its headed
Global Situational Awareness of A.I. and where its headed
 
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
一比一原版(牛布毕业证书)牛津布鲁克斯大学毕业证如何办理
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 

Cyber Op Risk Model, banks v7p4

  • 1. VivoSecurity Inc.,  Los  Altos,  CA.  Email:  ThomasL@VivoSecurity.com Carl  Friedrich  Gauss  who  discovered  the  Normal  (Gaussian)   distribution,   which  characterizes  random  events. OPERATIONAL  RISK  MODEL for  CCAR  Data  Breach  Idiosyncratic  Scenarios Demonstrate  strong  risk  management  culture  for  tier-­‐1  capital;  prove  insurance  adequacy;  champion  or   challenger  model;  maintain  strong  Model  Risk  Management  with  a  SR  11-­‐7  and  SR  15-­‐18  compliant  model
  • 2. The  Federal  Reserve  is  Focusing  on  Cybersecurity Large data breaches are rare, but they do happen and the Federal Reserve is looking for evidence that a bank has enough capital to withstand the event. But because they are rare, any single company does not have sufficient data to predict the cost. An analysis of cross-­‐company data is the only credible way to characterize the risk. Some banks are demonstrating a strong risk management culture by using statistical models and VivoSecurity is helping by creating strong SR 11-­‐7 compliant models using cross-­‐company data. These models have the additional benefit of 1) bringing cyber risk under the bank's model risk management framework, 2) providing a clearer understand of what should be transferred with insurance and 3) allowing a bank to benefit from cost reductions brought about from a mature incident response. ü Strengthen Idiosyncratic Scenarios for CCAR/DFAST operational risk. ü Challenge Models for Champion Models ü Champion Models if no models ü Justify a stance not to use cyber insurance ü Demonstrate better management of risks to tier 1 capital
  • 3. VivoSecurity  Inc,  1247  Russell  Ave,  Los  Altos  California;   Contact:   ThomasL@VivoSecurity.com,   (650)  919-­‐3050 What  is  a  Cyber-­‐Loss  Model? The Cyber-­‐Loss Model is essentially a complex formula that can explain the variability in cost of historical data breaches. It was trained upon a large set of data breaches and tested for accuracy on a randomly selected set of validation cases. It was developed in the statistical language R using standard statistical techniques such as linear regression and Bayesian Model Averaging. The Cyber-­‐Loss Model is deployed in an easy to use Excel Spreadsheet which requires a small number of variable inputs that have been found to be predictive of cost. No information is needed about a banks security posture. What is Model Validation? Federal Reserve has created guidance for model management (SR11-­‐7 & SR15-­‐18). This guidance assures that models are developed following sound statistical practices. Many banks have an internal validation process for establishing compliance for bank models. We can supply all documentation needed for model validation, including quarterly maintenance, and we cansupport internal validation efforts.
  • 4. The graphs below are a pro forma example of breach cost characterizations. Possible data breach cost is break down by incident and data type. The model also provides a probability distribution for the range of costs, and the probability of lawsuits. $0 $20 $40 $60 $80 $100 Mean  Data  Breach  Costs Millions Incident  &  Data  Type 0% 20% 40% 60% 80% 100% 0 >0 1 2 3 4 5 Probability Number  of  Lawsuits Model  Outputs $0 $5 $10 $15 $20 $25 Likelihood Breach  Cost Millions $19.8M 80%  Confidence  Interval Value  of  Incident   Response  Controls   Most  companies  would   experience  a  cost  of   under  $5M.
  • 5. What  Does  the  Cyber-­‐Loss  Model  Include? VivoSecurity  Inc,  1247  Russell  Ave,  Los  Altos  California;   Contact:   ThomasL@VivoSecurity.com,   (650)  919-­‐3050 Included Detail Deployment Models are deployed as an easy to use Excel Spreadsheet. Training We provide training on the use of the spreadsheet, how to think about confidence intervals, and how to guide insurance purchases. Documentation We provide complete model documentation in the bank’s own format. Validation  Support We provide support for the bank’s model validation team, including data turnover, troubleshooting R and SQL code, and discussions on modeling methodology. Quarterly  Maintenance We provide new data as it becomes available, model re-­‐evaluation, all required validation documentation, validation team support, re-­‐deployment, and evidence of testing.
  • 6. Investigation Notification Call  center Remediation o Business  Loss o Damage  to  personal  credit o Theft  of  money  &  goods o Credit  card  replacement  costs Business  loss;  theft  of   money  &  goods Credit  monitoring  &   privacy  insurance. Fines &  settlements Public  &  Other  BusinessesBreach  Company Total  costs Mitigate Transfer   via  suits Costs  Covered  by  the  Operational  Risk  Model   Response  CostsDamage  costs Term Meaning Investigation Cost of investigating what happened in a data breach including data that was exposed. Costs of updating agencies of investigation progress. Remediation Cost to preventing future data breach. Notification Legal costs of notifying federal agencies and states attorney general. Call  Center Cost of hiring or expanding call centers to handle calls from people affected by data breach. Business  Loss,  theft   of  money  &  goods Loss of business and customers, fraud costs, cost of goods pur chased with stolen cards Credit  Monitoring  &   Privacy  Insurance Cost of providing credit monitoring such as Experian, insurance to cover personal loss by people affected by the data breach. Fines  &  Settlements Government fines, lawsuit awards and settlements, defense costs. Glossary The Operational Risk Model calculates the cost of a data breach exposing custodial data. Custodial data is any PII data which triggers reporting requirements of various government agencies (also known as risk to confidentiality, in AppSec parlance). The model calculates Total Costs; below is a graphical breakdown of costs included in Total Costs.
  • 7. Evaluation Bank receives themodel as an Excel spreadsheet and performs initial evaluation using approximate model inputs. VivoSecurity provides training for how to use the model, how to think about confidenceintervals and apply results to insurancepurchases. Model  Owner The owner (sponsor) of the risk model is decided. The owner might be, for example, the CFO or CRO group. Themodel owner might draft documents to officially sponsor themodel as preparation for model validation. Validation  Support Data  Owner VivoSecurity produces SR11-­‐7 compliant validation documentation, following the bank’s format. VivoSecurity then works with thebank’s validation team to support validateactivities. Departments are identified that will produce validated numbers that will be entered into the model. This might include creating and approving SQL to query systems and to generate the numbers. Insurance  Adequacy The model owner receives validated numbers from data owners and performs a model based evaluation ofinsuranceadequacy. Considerations aredocumented and approved. Adjust  Insurance Insurance coverage can be adjusted and premiums lowered using model based arguments and historical industry data. Note that neither carriers nor brokers have models as rigorous as ours, giving thebank an advantage in negotiations. Document Considerations for insurance adequacy along with validated models and evidence of insuranceare incorporated into regulator reporting documentation, e.g., FR Y-­‐14A. Use  Case The diagram below shows the process for a typical retail bank that uses the Operational Risk Model in satisfying regulatory requirements. Activities need not proceed sequentially. For example, after a model owner is determined, model validation (which takes the most time) can be performed concurrently with other activities.
  • 8. About  VivoSecurity VivoSecurity  Inc,  1247  Russell  Ave,  Los  Altos  California;   Contact:   ThomasL@VivoSecurity.com,   (650)  919-­‐3050 VivoSecurity provides data analytics and statistical modeling to companies in the financial and high tech industries. We are a Silicon Valley Startup since 2012, with PhD level scientists and statisticians. We use advanced data analytic techniques to model the probability and cost of cybersecurity events. We have strong cybersecurity domain knowledge, strong knowledge of software applications, strong knowledge of operating systems and hardware and a strong understanding of enterprise operations. Model Description Peer  Risk  Model Characterizes  cyber  risk  in  dollars  and  comparison  with   peers. Probability  for  Fraud, personal  customers Calculates  probability  for  a  cyber  attach  that  leads  to   fraud. Probability  for  Fraud,  corporate  customers Calculates  probability  for  a  cyber  attach  that  leads  to   fraud. 3rd party  (vendor)  Risk Calculates  risk  in  dollars  posed  by  3rd party  partners. Additional  Offerings