SlideShare a Scribd company logo
ANNUAL REVIEW Reprint July 2019
������������������
���������������
��������������������
Cyber Security &
Risk Management
Financier Worldwide canvasses the opinions of leading professionals around the world on
the latest trends in cyber security & risk management.
Published by Financier Worldwide Ltd
©2019 Financier Worldwide Ltd. All rights reserved.
Permission to use this reprint has
been granted by the publisher.
REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com
A N N UA L R E V I E W
C Y B E R S E C U R I T Y &
R I S K M A N AG E M E N T
EMANUELE CAVALLERO
Tokio Marine HCC
Senior Underwriter
+34 93 530 7322
ecavallero@tmhcc.com
Emanuele Cavallero is a senior
underwriter for Italy, Greece and
the Middle East at Tokio Marine
HCC, with over 10 years experience
in financial lines products. Over
the last five years, he has been
focusing on the underwriting of
cyber risks with the ultimate goal
of customising cyber security
insurance products for his markets.
Mr Cavallero holds a Bachelor’s
degree in Economics from the
Università degli Studi di Torino
and he speaks Italian, English and
Spanish.
Italy■
■ Q. In your opinion, what are the major
cyber threats to which today’s companies
are vulnerable? Could you comment on any
recent, high profile cyber attacks in Italy?
CAVALLERO: Today, cyber attacks are perpetrated
from a variety of places, using constantly evolving
methods and techniques. Though some threats
are more invasive than others, they can be
equally devastating for unprepared businesses.
Consequently, understanding the state of cyber
security is key to successfully protecting a business
from advanced cyber attacks. Not having a cyber
security plan creates high-risk situations, including
the potential compromising of private data, costly
recovery expenses or weakened client trust. Italy
fell victim to two major cyber attacks during the
last two months of 2018. The first saw a server
near Rome targeted and accessed by unknown
hackers. The server handles certified email accounts
for public administrators. Then, less than a month
later, an Italian oil company, Saipem, was targeted
by hackers utilising a modified version of the
‘Shamoon’ virus. Due to this, hundreds of the
companies’ servers and personal computers in
the United Arab Emirates (UAE), Saudi Arabia,
Scotland and India were taken down.
A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T
JULY 2019 • FINANCIER WORLDWIDE • REPRINT 8www.financierworldwide.com
ITALY • EMANUELE CAVALLERO • TOKIO MARINE HCC
■ Q. Given the risks, do you believe
companies are placing enough importance
on cyber security? Are board members
taking a proactive, hands-on approach to
improving policies and processes?
CAVALLERO: Many companies think IT
systems security is important, but only a few
have a formal strategy in place to protect their
data and devices. Cyber threats can no longer
be considered exceptional circumstances for
businesses. Until recently, most companies had
a small group of staff responsible for their IT
and cyber security. Organisations now need
greater defences as hackers and malware
become increasingly sophisticated. With around
4000 ransomware attacks being conducted per
day, and the frequency of ransomware attacks
estimated to occur every 14 seconds by the end
of 2019, building defences against ransomware
should, therefore, be a top priority for companies
worldwide.
■ Q. To what extent have cyber security
and data privacy regulations changed
in Italy? How is this affecting the
way companies manage and maintain
compliance?
CAVALLERO: Organisations need to conduct
data protection impact assessments (DPIAs) as
part of the General Data Protection Regulation’s
(GDPR’s) mandate. DPIAs are required in
specific circumstances and used to identify,
understand and address any privacy issues that
might arise when developing new products
and services that involve the processing of
personal data. Nevertheless, some of the main
risks to businesses continue to stem from
cyber security. In addition to fines for a lack of
compliance, businesses that are not on top of
security could face very real risks arising from
socially engineered attacks, ransomware and
other targeted, advanced assaults. In the first
nine months since the GDPR came into force,
just over €55m was collected in fines issued by
the European Union’s (EU’s) data protection
supervisory authorities (DPAs). The DPAs have
seen a huge increase in the number of personal
data breaches being reported, with over 89,000
personal data breaches being notified in less than
12 months. Only 63 percent of cases investigated
by DPAs have been closed. Over 144,000 queries
and complaints are reported to have been made
by individuals who believe their rights under
GDPR have been violated.
REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com
A N N UA L R E V I E W
C Y B E R S E C U R I T Y &
R I S K M A N AG E M E N T
■ Q. In your experience, what steps
should companies take to avoid potential
cyber breaches – either from external
sources such as hackers or internal
sources such as rogue employees?
CAVALLERO: Cyber attacks are rapidly
evolving and are becoming increasingly
sophisticated. Therefore, it is no longer enough
to simply protect a company’s perimeter alone.
Today, both technology which helps detect and
contain malicious activities and the inclusion of
cyber security as part of a company’s corporate
culture are essential. The latter is important and
necessary when assessing today’s workplace.
Simple factors, such as the extensive usage of
cloud services, the usage of external Wi-Fi for
accessing internal documents, the increasing
popularity of bring your own device (BYOD)
and the increasingly popular work from home
policies must be considered. On a basic level,
there are certain threats that can be effectively
eradicated if security becomes part of workforce
culture, thus helping to avoid or reduce the
success of future social engineering and phishing
attacks.
■ Q. How should firms respond
immediately after falling victim to cyber
crime, to demonstrate that they have done
the right thing in the event of a cyber
breach or data loss?
CAVALLERO: The ‘golden hour’ refers to the
fact that once a system hack is confirmed, action
needs to be taken immediately. Every minute
is important. The first step for a hacked firm
should be to call the incident response unit
or emergency response team (ERT), which is
composed of specific individuals who have been
trained in what to do after a cyber attack. This
can be an in-house group or an external company
on retainer. Having an incident team further
minimises the damage a company may endure
and helps reduce the cost of a cyber attack. The
GDPR requires companies to notify users of a
data breach within 72 hours. With significant
financial penalties, it is even more critical to
develop and test a company’s cyber security
incident response plan (CSIRP) before a breach
occurs. A comprehensive CSIRP, regularly tested
and updated, can help incident response teams
save valuable time and resources. In the event
of an incident, it is critical to answer three key
questions: What has happened? What data have
the attackers accessed? How can the damage
be quickly contained and remediated? A robust
response plan will answer these questions.
■ Q. In what ways can risk transfer
and insurance help companies and their
D&Os to deal with cyber risk, potential
losses and related liabilities?
CAVALLERO: Evolving cyber attacks and
tightening regulatory requirements are increasing
the need for organisations to transfer those risks,
as cyber security management alone is no longer
enough. By arranging a cyber security insurance
policy, the risk is transferred effectively. This
recent need for a holistic approach in terms
of cyber security has created a path where
insurance companies have seen a surge of
business, especially following the implementation
of tougher regulations like the GDPR. A more
mature cyber insurance market in Europe is
now leading some carriers to develop additional
services beyond basic risk transfer, like, for
example, post-incident services in order to
JULY 2019 • FINANCIER WORLDWIDE • REPRINTwww.financierworldwide.com
A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T
support customers that suffer a breach or
tools to help monitor risks as part of a trusted
partnership between insurer and insured.
■ Q. What are your predictions for cyber
crime and data security in Italy over the
coming years?
CAVALLERO: Technology is always evolving,
which means that cyber crime itself must adapt
if it wants to survive. This is why hackers are
constantly devising new lines of attack and
adapting in order to avoid detection. Cyber
security by itself will not be enough to secure our
most sensitive data or our privacy. Security will
also have to focus on enabling organisations to
leverage and monetise the data they hold without
being exposed to data breaches or IP theft,
particularly in the era of artificial intelligence
(AI) and Big Data. ■
“ Today, both technology which helps detect and
contain malicious activities and the inclusion of cyber
security as part of a company’s corporate culture are
essential.”
ITALY • EMANUELE CAVALLERO • TOKIO MARINE HCC
www.tmhcc.com
Tokio Marine HCC is a leading specialty insurance group with offices in the
United States, the United Kingdom, Spain and Ireland, transacting business in
approximately 180 countries and underwriting more than 100 classes of specialty
insurance.
EMANUELE CAVALLERO
Senior Underwriter
+34 93 530 7322
ecavallero@tmhcc.com
GÜLSAH DAGDELEN
Senior Underwriter – Cyber
+34 93 530 7358
gdagdelen@tmhcc.com
SIMON CALDERBANK
Senior Underwriter – Cyber
+44 (0)20 7680 2910
scalderbank@tmhcc.com
REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com
A N N UA L R E V I E W
C Y B E R S E C U R I T Y &
R I S K M A N AG E M E N T
PAULINA RADGOWSKA
Tokio Marine HCC
Senior Underwriter
+34 93 530 7422
pradgowska@tmhcc.com
Paulina Radgowska is as senior
underwriter for Switzerland and
Central & Eastern Europe for
financial lines insurance, focusing
on cyber risks. Prior to joining Tokio
Marine HCC she worked as a broker
for Marsh in its Finpro practice and
spent some time in its cyber centre
of excellence in New York. She has
a BA in Spatial Economics from
Warsaw University and a masters
degree from Warsaw School of
Economics where she specialised
in business management and real
estate management. She speaks
Polish, English, Portuguese and
Spanish.
Poland■
■ Q. In your opinion, what are the major
cyber threats to which today’s companies
are vulnerable? Could you comment on any
recent, high profile cyber attacks in Poland?
RADGOWSKA: According to a recent KPMG
survey of 100 Polish companies, cyber criminals are
still the biggest threat companies face. Attackers
include both individual hackers and organised
groups using ransomware and social engineering
techniques to steal confidential data and funds. The
recent attacks on the biggest financial institutions in
Poland were performed using spyware and phishing
techniques. However, it is always difficult to obtain
detailed information on losses made as companies
do not like to publicise the fact that they have been
hacked. Data theft by employees is also a concern.
Employees, contractors and temporary workers who
have direct access to critical resources, introduce
risks that need to be understood and countered.
Human error is also a great challenge for all
businesses.
■ Q. Given the risks, do you believe
companies are placing enough importance
on cyber security? Are board members
taking a proactive, hands-on approach to
improving policies and processes?
A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T
JULY 2019 • FINANCIER WORLDWIDE • REPRINT 8www.financierworldwide.com
POLAND • PAULINA RADGOWSKA • TOKIO MARINE HCC
RADGOWSKA: Many companies are improving
their approaches to cyber security; however,
there is still a lot of work to be done. Security
policies, procedures and guidelines are written,
to a large extent, based on auditor instructions
but are then never shared, explained or used with
employees. To be useful, the procedures need
to be put into action and appropriately adapted.
No one is going to follow the rules if people do
not know they exist. The consequences of non-
compliance are expensive liability issues for the
company, which makes it crucial that employees
are aware of what is expected of them in terms
of preventing cyber incidents. An increasing
number of organisations are developing business
continuity plans or at least crisis management
procedures. However, many of these documents
go untested.
■ Q. To what extent have cyber security
and data privacy regulations changed
in Poland? How is this affecting the
way companies manage and maintain
compliance?
RADGOWSKA: Unfortunately, many
organisations do not understand all relevant
legislation. In addition, technology changes
at such a fast pace that all new laws and
regulations, if too detailed, would never
represent reality. For this reason, the European
Union’s (EU’s) General Data Protection
Regulation (GDPR), is a good example of a
high-level requirement that still puzzles many
companies. It is now, when fines for non-
compliance start to crop up in Poland and
regulators place privacy issues under more
scrutiny, that companies not taking cyber
security seriously may get a wake-up call.
However, while some organisations are still
getting to grips with the GDPR, another EU
regulation requires their attention: the new EU
ePrivacy Regulation (ePR). The scope of the ePR
applies to any business that provides any form
of online communication services, uses online
tracking technologies or engages in electronic
direct marketing. Regulation on the protection of
undisclosed know-how and business information
against their unlawful acquisition, use and
disclosure, as well as the Directive on security
of network and information systems (NIS
Directive), which is the first piece of EU-wide
legislation on cyber security, are worth studying
thoroughly.
REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com
A N N UA L R E V I E W
C Y B E R S E C U R I T Y &
R I S K M A N AG E M E N T
■ Q. In your experience, what steps
should companies take to avoid potential
cyber breaches – either from external
sources such as hackers or internal
sources such as rogue employees?
RADGOWSKA: Compiling an inventory and
categorising companies’ information systems
should be the first step in assessing any potential
data breach. Without knowing the quantity
and type of data existing in the company, it is
extremely difficult to choose and implement
proper security mechanisms. When this is
done, it is crucial that companies monitor the
effectiveness of any controls which have been
put in place alongside employees’ compliance
with internal rules. The latter should be linked
to frequent cyber awareness training for all
employees and should be supported and directed
by senior management. Companies should limit
employees’ access to their more critical data and
make sure that third-party vendors comply with
their privacy requirements.
■ Q. How should firms respond
immediately after falling victim to cyber
crime, to demonstrate that they have done
the right thing in the event of a cyber
breach or data loss?
RADGOWSKA: Organisations should have
a clear response protocol in place to help
employees focus in high-pressure situations.
Moreover, having the right team on the job is
critical. There should be one leader from the
C-suite, or reporting directly to the C-suite,
with overall responsibility for responding to the
breach. This way, decisions can be made quickly.
It is also very important to hire a public relations
expert who will take care of the company’s
external communication. It takes years to build a
reputation and gain client trust, but only seconds
to lose it. This applies even more in today’s
increasingly interconnected world. Finally, if
it is not possible to tell exactly what data has
been compromised, it may be wise to take a
conservative approach and, in more serious
cases, proactive notification is generally the right
strategy.
■ Q. In what ways can risk transfer
and insurance help companies and their
D&Os to deal with cyber risk, potential
losses and related liabilities?
RADGOWSKA: Risk quantification, which
details the sensitivity and critical importance of
assets, and defines risk appetite, should be the
first step for companies to determine the level of
insurance coverage. Cyber insurance is designed
to help organisations mitigate risk exposure by
offsetting the costs involved with recovery after
a cyber-related security breach or similar event.
In Poland, the biggest driver for purchasing this
insurance is liability, as companies fear costs
related to handling data breaches. Nevertheless,
more entities are now focusing on responding
to business interruption, ensuring that they are
not losing money when their systems are down.
Cyber insurance provides organisations with
a panel of specialists, including an incident
coordinator and response teams for any legal,
information technology (IT) and public relation
issues that may arise in relation to a cyber event.
Moreover, preventive consulting services are
becoming a great added value for companies.
JULY 2019 • FINANCIER WORLDWIDE • REPRINTwww.financierworldwide.com
A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T
■ Q. What are your predictions for cyber
crime and data security in Poland over the
coming years?
RADGOWSKA: Criminals simply shift their
focus and adapt their tactics to locate and steal
the data they consider most valuable. Organised
criminals will continue to conduct attacks,
damaging companies and individuals alike.
The landscape globally, not just in Poland, is
transitioning from ‘smash and grab’ attacks to
slower and more determined ones, like Advanced
Persistent Threat. According to the Certified
Information Systems Security Professional
(CISSP) All-in-one guide, there has been a
decrease in the number of viruses created just
for populating as many systems as possible, and
it is predicted that more dangerous malware will
increase its range. What is even scarier is that
the next generation of AI-powered attacks will
likely be sophisticated enough to emulate the
behaviours of specific users to fool even skilled
and experienced security personnel. ■
“ It takes years to build a reputation and gain client
trust, but only seconds to lose it. This applies even
more in today’s increasingly interconnected world. ”
POLAND • PAULINA RADGOWSKA • TOKIO MARINE HCC
www.tmhcc.com
Tokio Marine HCC is a leading specialty insurance group with offices in the
United States, the United Kingdom, Spain and Ireland, transacting business in
approximately 180 countries and underwriting more than 100 classes of specialty
insurance.
PAULINA RADGOWSKA
Senior Underwriter
+34 93 530 7422
pradgowska@tmhcc.com
GÜLSAH DAGDELEN
Senior Underwriter – Cyber
+34 93 530 7358
gdagdelen@tmhcc.com
SIMON CALDERBANK
Senior Underwriter – Cyber
+44 (0)20 7680 2910
scalderbank@tmhcc.com

More Related Content

What's hot

Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
Merry D'souza
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
Abdul-Hakeem Ajijola
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
Kolluru N Rao
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
Paul Melson
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & Opportunities
Mohamed Amine Belarbi
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
PECB
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Business Days
 
2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report
Δρ. Γιώργος K. Κασάπης
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
BrianHuntMSFCPACRISC
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
seadeloitte
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
seadeloitte
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
seadeloitte
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Business Days
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 

What's hot (20)

Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & Opportunities
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 

Similar to Financier Worldwide - Cyber Security annual review

Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspective
Cyber Watching
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
Dharmendra Rama
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...Charmaine Servado
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
Graeme Cross
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Enterprise Insider
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
Mark Albala
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
Cigniti Technologies Ltd
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
IBM Security
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
The Economist Media Businesses
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Rahul Neel Mani
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
Management Events
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Jef Lacson
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Six Degrees
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Hewlett Packard Enterprise Business Value Exchange
 
Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016
Munich Re
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000finance40
 

Similar to Financier Worldwide - Cyber Security annual review (20)

Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspective
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 

More from Morgan Jones

Nota de Prensa - UNESPA
Nota de Prensa - UNESPANota de Prensa - UNESPA
Nota de Prensa - UNESPA
Morgan Jones
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
Morgan Jones
 
El Mundo - Actualidad Económica
El Mundo - Actualidad EconómicaEl Mundo - Actualidad Económica
El Mundo - Actualidad Económica
Morgan Jones
 
Commercial Risk Europe - Nov/Dec Issue 2019
Commercial Risk Europe - Nov/Dec Issue 2019Commercial Risk Europe - Nov/Dec Issue 2019
Commercial Risk Europe - Nov/Dec Issue 2019
Morgan Jones
 
Cyber Crime, una minaccia che evolve
Cyber Crime, una minaccia che evolveCyber Crime, una minaccia che evolve
Cyber Crime, una minaccia che evolve
Morgan Jones
 
GoingPublic Magazine - M&A Insurance Special
GoingPublic Magazine - M&A Insurance SpecialGoingPublic Magazine - M&A Insurance Special
GoingPublic Magazine - M&A Insurance Special
Morgan Jones
 
Risk and Compliance Oct 2018 Adrià Vázquez
Risk and Compliance Oct 2018 Adrià VázquezRisk and Compliance Oct 2018 Adrià Vázquez
Risk and Compliance Oct 2018 Adrià Vázquez
Morgan Jones
 

More from Morgan Jones (7)

Nota de Prensa - UNESPA
Nota de Prensa - UNESPANota de Prensa - UNESPA
Nota de Prensa - UNESPA
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
El Mundo - Actualidad Económica
El Mundo - Actualidad EconómicaEl Mundo - Actualidad Económica
El Mundo - Actualidad Económica
 
Commercial Risk Europe - Nov/Dec Issue 2019
Commercial Risk Europe - Nov/Dec Issue 2019Commercial Risk Europe - Nov/Dec Issue 2019
Commercial Risk Europe - Nov/Dec Issue 2019
 
Cyber Crime, una minaccia che evolve
Cyber Crime, una minaccia che evolveCyber Crime, una minaccia che evolve
Cyber Crime, una minaccia che evolve
 
GoingPublic Magazine - M&A Insurance Special
GoingPublic Magazine - M&A Insurance SpecialGoingPublic Magazine - M&A Insurance Special
GoingPublic Magazine - M&A Insurance Special
 
Risk and Compliance Oct 2018 Adrià Vázquez
Risk and Compliance Oct 2018 Adrià VázquezRisk and Compliance Oct 2018 Adrià Vázquez
Risk and Compliance Oct 2018 Adrià Vázquez
 

Recently uploaded

anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 

Recently uploaded (20)

anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 

Financier Worldwide - Cyber Security annual review

  • 1. ANNUAL REVIEW Reprint July 2019 ������������������ ��������������� �������������������� Cyber Security & Risk Management Financier Worldwide canvasses the opinions of leading professionals around the world on the latest trends in cyber security & risk management. Published by Financier Worldwide Ltd ©2019 Financier Worldwide Ltd. All rights reserved. Permission to use this reprint has been granted by the publisher.
  • 2. REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com A N N UA L R E V I E W C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T EMANUELE CAVALLERO Tokio Marine HCC Senior Underwriter +34 93 530 7322 ecavallero@tmhcc.com Emanuele Cavallero is a senior underwriter for Italy, Greece and the Middle East at Tokio Marine HCC, with over 10 years experience in financial lines products. Over the last five years, he has been focusing on the underwriting of cyber risks with the ultimate goal of customising cyber security insurance products for his markets. Mr Cavallero holds a Bachelor’s degree in Economics from the Università degli Studi di Torino and he speaks Italian, English and Spanish. Italy■ ■ Q. In your opinion, what are the major cyber threats to which today’s companies are vulnerable? Could you comment on any recent, high profile cyber attacks in Italy? CAVALLERO: Today, cyber attacks are perpetrated from a variety of places, using constantly evolving methods and techniques. Though some threats are more invasive than others, they can be equally devastating for unprepared businesses. Consequently, understanding the state of cyber security is key to successfully protecting a business from advanced cyber attacks. Not having a cyber security plan creates high-risk situations, including the potential compromising of private data, costly recovery expenses or weakened client trust. Italy fell victim to two major cyber attacks during the last two months of 2018. The first saw a server near Rome targeted and accessed by unknown hackers. The server handles certified email accounts for public administrators. Then, less than a month later, an Italian oil company, Saipem, was targeted by hackers utilising a modified version of the ‘Shamoon’ virus. Due to this, hundreds of the companies’ servers and personal computers in the United Arab Emirates (UAE), Saudi Arabia, Scotland and India were taken down.
  • 3. A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T JULY 2019 • FINANCIER WORLDWIDE • REPRINT 8www.financierworldwide.com ITALY • EMANUELE CAVALLERO • TOKIO MARINE HCC ■ Q. Given the risks, do you believe companies are placing enough importance on cyber security? Are board members taking a proactive, hands-on approach to improving policies and processes? CAVALLERO: Many companies think IT systems security is important, but only a few have a formal strategy in place to protect their data and devices. Cyber threats can no longer be considered exceptional circumstances for businesses. Until recently, most companies had a small group of staff responsible for their IT and cyber security. Organisations now need greater defences as hackers and malware become increasingly sophisticated. With around 4000 ransomware attacks being conducted per day, and the frequency of ransomware attacks estimated to occur every 14 seconds by the end of 2019, building defences against ransomware should, therefore, be a top priority for companies worldwide. ■ Q. To what extent have cyber security and data privacy regulations changed in Italy? How is this affecting the way companies manage and maintain compliance? CAVALLERO: Organisations need to conduct data protection impact assessments (DPIAs) as part of the General Data Protection Regulation’s (GDPR’s) mandate. DPIAs are required in specific circumstances and used to identify, understand and address any privacy issues that might arise when developing new products and services that involve the processing of personal data. Nevertheless, some of the main risks to businesses continue to stem from cyber security. In addition to fines for a lack of compliance, businesses that are not on top of security could face very real risks arising from socially engineered attacks, ransomware and other targeted, advanced assaults. In the first nine months since the GDPR came into force, just over €55m was collected in fines issued by the European Union’s (EU’s) data protection supervisory authorities (DPAs). The DPAs have seen a huge increase in the number of personal data breaches being reported, with over 89,000 personal data breaches being notified in less than 12 months. Only 63 percent of cases investigated by DPAs have been closed. Over 144,000 queries and complaints are reported to have been made by individuals who believe their rights under GDPR have been violated.
  • 4. REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com A N N UA L R E V I E W C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T ■ Q. In your experience, what steps should companies take to avoid potential cyber breaches – either from external sources such as hackers or internal sources such as rogue employees? CAVALLERO: Cyber attacks are rapidly evolving and are becoming increasingly sophisticated. Therefore, it is no longer enough to simply protect a company’s perimeter alone. Today, both technology which helps detect and contain malicious activities and the inclusion of cyber security as part of a company’s corporate culture are essential. The latter is important and necessary when assessing today’s workplace. Simple factors, such as the extensive usage of cloud services, the usage of external Wi-Fi for accessing internal documents, the increasing popularity of bring your own device (BYOD) and the increasingly popular work from home policies must be considered. On a basic level, there are certain threats that can be effectively eradicated if security becomes part of workforce culture, thus helping to avoid or reduce the success of future social engineering and phishing attacks. ■ Q. How should firms respond immediately after falling victim to cyber crime, to demonstrate that they have done the right thing in the event of a cyber breach or data loss? CAVALLERO: The ‘golden hour’ refers to the fact that once a system hack is confirmed, action needs to be taken immediately. Every minute is important. The first step for a hacked firm should be to call the incident response unit or emergency response team (ERT), which is composed of specific individuals who have been trained in what to do after a cyber attack. This can be an in-house group or an external company on retainer. Having an incident team further minimises the damage a company may endure and helps reduce the cost of a cyber attack. The GDPR requires companies to notify users of a data breach within 72 hours. With significant financial penalties, it is even more critical to develop and test a company’s cyber security incident response plan (CSIRP) before a breach occurs. A comprehensive CSIRP, regularly tested and updated, can help incident response teams save valuable time and resources. In the event of an incident, it is critical to answer three key questions: What has happened? What data have the attackers accessed? How can the damage be quickly contained and remediated? A robust response plan will answer these questions. ■ Q. In what ways can risk transfer and insurance help companies and their D&Os to deal with cyber risk, potential losses and related liabilities? CAVALLERO: Evolving cyber attacks and tightening regulatory requirements are increasing the need for organisations to transfer those risks, as cyber security management alone is no longer enough. By arranging a cyber security insurance policy, the risk is transferred effectively. This recent need for a holistic approach in terms of cyber security has created a path where insurance companies have seen a surge of business, especially following the implementation of tougher regulations like the GDPR. A more mature cyber insurance market in Europe is now leading some carriers to develop additional services beyond basic risk transfer, like, for example, post-incident services in order to
  • 5. JULY 2019 • FINANCIER WORLDWIDE • REPRINTwww.financierworldwide.com A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T support customers that suffer a breach or tools to help monitor risks as part of a trusted partnership between insurer and insured. ■ Q. What are your predictions for cyber crime and data security in Italy over the coming years? CAVALLERO: Technology is always evolving, which means that cyber crime itself must adapt if it wants to survive. This is why hackers are constantly devising new lines of attack and adapting in order to avoid detection. Cyber security by itself will not be enough to secure our most sensitive data or our privacy. Security will also have to focus on enabling organisations to leverage and monetise the data they hold without being exposed to data breaches or IP theft, particularly in the era of artificial intelligence (AI) and Big Data. ■ “ Today, both technology which helps detect and contain malicious activities and the inclusion of cyber security as part of a company’s corporate culture are essential.” ITALY • EMANUELE CAVALLERO • TOKIO MARINE HCC www.tmhcc.com Tokio Marine HCC is a leading specialty insurance group with offices in the United States, the United Kingdom, Spain and Ireland, transacting business in approximately 180 countries and underwriting more than 100 classes of specialty insurance. EMANUELE CAVALLERO Senior Underwriter +34 93 530 7322 ecavallero@tmhcc.com GÜLSAH DAGDELEN Senior Underwriter – Cyber +34 93 530 7358 gdagdelen@tmhcc.com SIMON CALDERBANK Senior Underwriter – Cyber +44 (0)20 7680 2910 scalderbank@tmhcc.com
  • 6. REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com A N N UA L R E V I E W C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T PAULINA RADGOWSKA Tokio Marine HCC Senior Underwriter +34 93 530 7422 pradgowska@tmhcc.com Paulina Radgowska is as senior underwriter for Switzerland and Central & Eastern Europe for financial lines insurance, focusing on cyber risks. Prior to joining Tokio Marine HCC she worked as a broker for Marsh in its Finpro practice and spent some time in its cyber centre of excellence in New York. She has a BA in Spatial Economics from Warsaw University and a masters degree from Warsaw School of Economics where she specialised in business management and real estate management. She speaks Polish, English, Portuguese and Spanish. Poland■ ■ Q. In your opinion, what are the major cyber threats to which today’s companies are vulnerable? Could you comment on any recent, high profile cyber attacks in Poland? RADGOWSKA: According to a recent KPMG survey of 100 Polish companies, cyber criminals are still the biggest threat companies face. Attackers include both individual hackers and organised groups using ransomware and social engineering techniques to steal confidential data and funds. The recent attacks on the biggest financial institutions in Poland were performed using spyware and phishing techniques. However, it is always difficult to obtain detailed information on losses made as companies do not like to publicise the fact that they have been hacked. Data theft by employees is also a concern. Employees, contractors and temporary workers who have direct access to critical resources, introduce risks that need to be understood and countered. Human error is also a great challenge for all businesses. ■ Q. Given the risks, do you believe companies are placing enough importance on cyber security? Are board members taking a proactive, hands-on approach to improving policies and processes?
  • 7. A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T JULY 2019 • FINANCIER WORLDWIDE • REPRINT 8www.financierworldwide.com POLAND • PAULINA RADGOWSKA • TOKIO MARINE HCC RADGOWSKA: Many companies are improving their approaches to cyber security; however, there is still a lot of work to be done. Security policies, procedures and guidelines are written, to a large extent, based on auditor instructions but are then never shared, explained or used with employees. To be useful, the procedures need to be put into action and appropriately adapted. No one is going to follow the rules if people do not know they exist. The consequences of non- compliance are expensive liability issues for the company, which makes it crucial that employees are aware of what is expected of them in terms of preventing cyber incidents. An increasing number of organisations are developing business continuity plans or at least crisis management procedures. However, many of these documents go untested. ■ Q. To what extent have cyber security and data privacy regulations changed in Poland? How is this affecting the way companies manage and maintain compliance? RADGOWSKA: Unfortunately, many organisations do not understand all relevant legislation. In addition, technology changes at such a fast pace that all new laws and regulations, if too detailed, would never represent reality. For this reason, the European Union’s (EU’s) General Data Protection Regulation (GDPR), is a good example of a high-level requirement that still puzzles many companies. It is now, when fines for non- compliance start to crop up in Poland and regulators place privacy issues under more scrutiny, that companies not taking cyber security seriously may get a wake-up call. However, while some organisations are still getting to grips with the GDPR, another EU regulation requires their attention: the new EU ePrivacy Regulation (ePR). The scope of the ePR applies to any business that provides any form of online communication services, uses online tracking technologies or engages in electronic direct marketing. Regulation on the protection of undisclosed know-how and business information against their unlawful acquisition, use and disclosure, as well as the Directive on security of network and information systems (NIS Directive), which is the first piece of EU-wide legislation on cyber security, are worth studying thoroughly.
  • 8. REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com A N N UA L R E V I E W C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T ■ Q. In your experience, what steps should companies take to avoid potential cyber breaches – either from external sources such as hackers or internal sources such as rogue employees? RADGOWSKA: Compiling an inventory and categorising companies’ information systems should be the first step in assessing any potential data breach. Without knowing the quantity and type of data existing in the company, it is extremely difficult to choose and implement proper security mechanisms. When this is done, it is crucial that companies monitor the effectiveness of any controls which have been put in place alongside employees’ compliance with internal rules. The latter should be linked to frequent cyber awareness training for all employees and should be supported and directed by senior management. Companies should limit employees’ access to their more critical data and make sure that third-party vendors comply with their privacy requirements. ■ Q. How should firms respond immediately after falling victim to cyber crime, to demonstrate that they have done the right thing in the event of a cyber breach or data loss? RADGOWSKA: Organisations should have a clear response protocol in place to help employees focus in high-pressure situations. Moreover, having the right team on the job is critical. There should be one leader from the C-suite, or reporting directly to the C-suite, with overall responsibility for responding to the breach. This way, decisions can be made quickly. It is also very important to hire a public relations expert who will take care of the company’s external communication. It takes years to build a reputation and gain client trust, but only seconds to lose it. This applies even more in today’s increasingly interconnected world. Finally, if it is not possible to tell exactly what data has been compromised, it may be wise to take a conservative approach and, in more serious cases, proactive notification is generally the right strategy. ■ Q. In what ways can risk transfer and insurance help companies and their D&Os to deal with cyber risk, potential losses and related liabilities? RADGOWSKA: Risk quantification, which details the sensitivity and critical importance of assets, and defines risk appetite, should be the first step for companies to determine the level of insurance coverage. Cyber insurance is designed to help organisations mitigate risk exposure by offsetting the costs involved with recovery after a cyber-related security breach or similar event. In Poland, the biggest driver for purchasing this insurance is liability, as companies fear costs related to handling data breaches. Nevertheless, more entities are now focusing on responding to business interruption, ensuring that they are not losing money when their systems are down. Cyber insurance provides organisations with a panel of specialists, including an incident coordinator and response teams for any legal, information technology (IT) and public relation issues that may arise in relation to a cyber event. Moreover, preventive consulting services are becoming a great added value for companies.
  • 9. JULY 2019 • FINANCIER WORLDWIDE • REPRINTwww.financierworldwide.com A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T ■ Q. What are your predictions for cyber crime and data security in Poland over the coming years? RADGOWSKA: Criminals simply shift their focus and adapt their tactics to locate and steal the data they consider most valuable. Organised criminals will continue to conduct attacks, damaging companies and individuals alike. The landscape globally, not just in Poland, is transitioning from ‘smash and grab’ attacks to slower and more determined ones, like Advanced Persistent Threat. According to the Certified Information Systems Security Professional (CISSP) All-in-one guide, there has been a decrease in the number of viruses created just for populating as many systems as possible, and it is predicted that more dangerous malware will increase its range. What is even scarier is that the next generation of AI-powered attacks will likely be sophisticated enough to emulate the behaviours of specific users to fool even skilled and experienced security personnel. ■ “ It takes years to build a reputation and gain client trust, but only seconds to lose it. This applies even more in today’s increasingly interconnected world. ” POLAND • PAULINA RADGOWSKA • TOKIO MARINE HCC www.tmhcc.com Tokio Marine HCC is a leading specialty insurance group with offices in the United States, the United Kingdom, Spain and Ireland, transacting business in approximately 180 countries and underwriting more than 100 classes of specialty insurance. PAULINA RADGOWSKA Senior Underwriter +34 93 530 7422 pradgowska@tmhcc.com GÜLSAH DAGDELEN Senior Underwriter – Cyber +34 93 530 7358 gdagdelen@tmhcc.com SIMON CALDERBANK Senior Underwriter – Cyber +44 (0)20 7680 2910 scalderbank@tmhcc.com