SlideShare a Scribd company logo
1 of 8
Download to read offline
A	
  Worked	
  Example
Use	
  of	
  the	
  Cyber	
  Loss	
  Model	
  within	
  a	
  Retail	
  Bank
Following is an example of how a
retail bank can use the Cyber Loss
Model to characterize the risk and
assess cyber insurance needs for a
major data breach and demonstrate
a strong risk management culture to
the board of directors and the
Federal Reserve.
Worked	
  Example,	
  the	
  Questions:
• What	
  is	
  the	
  bank’s	
  risk	
  from	
  a	
  major	
  data	
  breach?
• How	
  much	
  insurance	
  coverage	
  should	
  be	
  purchased?	
  
• What	
  should	
  be	
  covered?
VivoSecurity	
  Inc,	
  1247	
  Russell	
  Ave,	
  Los	
  Altos	
  California;	
   Contact:	
   ThomasL@VivoSecurity.com,	
   (650)	
  919-­‐3050
Worked	
  Example,	
  the	
  Bank
Bank	
  Details:
• 425,000	
  accounts	
  for	
  300,000	
  individual	
  account	
  holders.
• Archived	
  data	
  on	
  40,000	
  accounts	
  for	
  25,000	
  past,	
  individual	
  
account	
  holders.	
  
• 24,000	
  accounts	
  for	
  10,000	
  businesses	
  account	
  holders.
• Archived	
  data	
  on	
  1,200	
  accounts	
  for	
  800	
  past,	
  businesses	
  
account	
  holders.
• No	
  credit	
  card	
  data.
• 2,500	
  employees.
Parameter Input
Number	
  Affected Number	
  of	
  people	
  affected	
  by	
  a	
  data	
  breach	
  for	
  whom	
  the	
  reporting	
  requirement	
  is	
  triggered	
  by	
  the	
  various	
  
state’s	
  attorneys	
  general.
Data	
  Type PII – Personal	
  Identifiable	
  Information,	
  which	
  includes	
  drivers	
  license,	
  SSN	
  etc.
PFI – Personal	
  Financial	
  Information,	
  which is	
  PII	
  +	
  any financial	
  information,	
  bank	
  account	
  etc.
CHD – Card	
  Holder	
  Data,	
  which	
  is	
  PII	
  +	
  payment	
  information	
  such	
  as	
  credit	
  cards	
  number
PHI – Protected	
  Health	
  Information,	
  which is	
  PII	
  +	
  diagnostic,	
  treatment	
  or	
  health	
  payment	
  information
Incident	
  Type Malicious	
  Outsider –perpetrated	
  by	
  people	
  not	
  known	
  by the	
  company,	
  such	
  as	
  phishing	
  or hacking.
Malicious	
  Insider – unauthorized	
  access	
  to	
  data	
  by	
  individuals	
  within the	
  company	
  which	
  could	
  trigger	
  state	
  
reporting	
  requirements,	
  such	
  as	
  unauthorized access	
  to	
  bank	
  accounts by	
  employees.
Accident – accidental	
  exposure	
  of	
  data	
  by	
  the	
  company	
  or	
  partner,	
  such	
  as	
  deployment	
  of	
  a	
  software	
  upgrade	
  
that	
  allowed unauthorized	
  access	
  to	
  personal	
  data, or	
  emailing	
  personal	
  information	
  to	
  the	
  wrong	
  party.
Lost/Stolen – exposure	
  of	
  data	
  caused	
  by	
  any	
  lost	
  or	
  stolen	
  device	
  such	
  as	
  a	
  laptop,	
  tape	
  drive,	
  USB	
  drive.
Modeling	
  of	
  historical	
  industry	
  data	
  finds	
  that	
  1)	
  Data	
  Type,	
  2)	
  Incident	
  Type	
  and	
  
3)	
  Number	
  of	
  Affected	
  people	
  are	
  the	
  factors	
  that	
  best	
  predict	
  the	
  cost	
  of	
  a	
  data	
  
breach.
Worked	
  Example,	
  the	
  Model
Worked	
  Example,	
  Bank	
  Inputs
Following	
  are	
  the	
  model	
  inputs	
  provided	
  by	
  the	
  bank.
Parameter Chosen	
  Input
Number	
  Affected 325,000 -­‐-­‐ The major cost to a data breach is the reporting requirement, which is not required for business
accounts. Since reporting requirements scale with the number of individuals, not accounts or records, the
bank decided to use the sum total of current and past individual account holders, for which the bank
maintains electronic records.
Data	
  Type PFI -­‐-­‐ The bank does not deal with credit card data so the data type that could be breached is PFI. The bank
also has PHI for employees but the number of employees is not significant compared with the number of
customers.
Incident	
  Type Malicious Outsider – modeling finds that a data breach caused by a malicious outsider is more costly than
any other cause, even though this incident type is also relatively rare. For the purpose of insurance
coverage, the cost of malicious outsider was the incident type considered.
Worked	
  Example,	
  Results	
  &	
  Considerations
The model shows that the median
cost of a data breach is small: just
$3.6M. With such a breach, the
model also shows a 10% chance of a
lawsuit.
Since modeling shows that a lawsuit
can double the cost, the bank intends
to keep probability of lawsuits low by
offering Experian Lifelock credit
monitoringin the event of a breach.
Data	
  Entered	
  
into	
  the	
  Model
Worked	
  Example,	
  Results	
  &	
  Considerations	
  (continued)
The bank chose to purchase $25M insurance
coverage based upon the 80% confidence interval,
for the followingreasons:
• The bank has a strong intrusion detection program
so the probability of exposing all data is remote, and
the probability of the 90% confidence interval is
even more remote.
• The probability density has a very long tail (see
graph), suggesting that the bank can influence the
cost by their actions.
• Notification costs are a significant cost of a data
breach so the bank has engaged a law firm and
negotiated the cost of notification in the event of a
data breach.
• The bank has engaged with Experian to negotiate
the cost of Lifelock in the event of a data breach.
• The bank has a rehearsed plan to orchestrate the
response, minimize disruption, reassure customers
in a timely manner and control costs.
Worked	
  Example,	
  Actions	
  Taken
The model and decisions were presented to Fed
examiners in the context of DFAST, to demonstrate a
strong risk management culture. The banks assets are
too small for CCAR.
A report was given to the board of directors who
understood, for the first time, that the cost of a data
breach was manageable and less than expected.
Security budget was adjusted as follows:
• More effort will be spent on responding in the event
of a breach
• More resources will be allocated to prevent incidents
other than Malicious Outsider (see graph).
VivoSecurity	
  Inc,	
  1247	
  Russell	
  Ave,	
  Los	
  Altos	
  California;	
   Contact:	
   ThomasL@VivoSecurity.com,	
   (650)	
  919-­‐3050

More Related Content

What's hot

Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity reportOwen Bartolome
 
SecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_ReportSecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_ReportAlex Himmelberg
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...Security B-Sides
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptCapgemini
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Cognizant
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingKartik Mehta
 
My blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industryMy blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industryKishore Jethanandani, MBA, MA, MPhil,
 
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...CA Technologies
 
Anomaly Detection Petty
Anomaly Detection   PettyAnomaly Detection   Petty
Anomaly Detection PettyTodd Petty
 
Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)AML Source
 
Reduce your aml compliance workload
Reduce your aml compliance workloadReduce your aml compliance workload
Reduce your aml compliance workloadAlessa
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3Sunny Fei
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochurePaul Stabile
 

What's hot (19)

Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report2016 Finance industry cybersecurity report
2016 Finance industry cybersecurity report
 
SecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_ReportSecurityScorecard_2016_Financial_Report
SecurityScorecard_2016_Financial_Report
 
My blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banksMy blogs on big data and cybersecurity in banks
My blogs on big data and cybersecurity in banks
 
How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...How really to prepare for a credit card compromise (PCI) forensics investigat...
How really to prepare for a credit card compromise (PCI) forensics investigat...
 
Enterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to AdaptEnterprise Fraud Management: How Banks Need to Adapt
Enterprise Fraud Management: How Banks Need to Adapt
 
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Winning Tactics for Data Governance
Winning Tactics for Data GovernanceWinning Tactics for Data Governance
Winning Tactics for Data Governance
 
My blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industryMy blogs on big data and compliance in financial services and health industry
My blogs on big data and compliance in financial services and health industry
 
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
 
Anomaly Detection Petty
Anomaly Detection   PettyAnomaly Detection   Petty
Anomaly Detection Petty
 
Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)Introduction to Careers in Anti-Money Laundering (AML)
Introduction to Careers in Anti-Money Laundering (AML)
 
IBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insuranceIBM Smarter Analytics Solution for insurance
IBM Smarter Analytics Solution for insurance
 
Fraud Monitoring Solution
Fraud Monitoring SolutionFraud Monitoring Solution
Fraud Monitoring Solution
 
Reduce your aml compliance workload
Reduce your aml compliance workloadReduce your aml compliance workload
Reduce your aml compliance workload
 
CRMS_Project-JF-edits
CRMS_Project-JF-editsCRMS_Project-JF-edits
CRMS_Project-JF-edits
 
Ibm financial crime management solution 3
Ibm financial crime management solution 3Ibm financial crime management solution 3
Ibm financial crime management solution 3
 
Fiserv FCRM Platform Brochure
Fiserv FCRM Platform BrochureFiserv FCRM Platform Brochure
Fiserv FCRM Platform Brochure
 

Viewers also liked

How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 
Terry Liskevych Presentation: Practice Planning
Terry Liskevych Presentation: Practice PlanningTerry Liskevych Presentation: Practice Planning
Terry Liskevych Presentation: Practice Planningbenlittle
 
Terry Liskevych Presentation: Coaching Basics
Terry Liskevych Presentation: Coaching BasicsTerry Liskevych Presentation: Coaching Basics
Terry Liskevych Presentation: Coaching Basicsbenlittle
 
Terry Liskevych Presentation: Psychology
Terry Liskevych Presentation: PsychologyTerry Liskevych Presentation: Psychology
Terry Liskevych Presentation: Psychologybenlittle
 
Presentación imformatica
Presentación imformaticaPresentación imformatica
Presentación imformaticaNeilly0808
 
WT Softball Game Notes (3-27-17)
WT Softball Game Notes (3-27-17)WT Softball Game Notes (3-27-17)
WT Softball Game Notes (3-27-17)West Texas A&M
 
3Com 3C905-TX-1
3Com 3C905-TX-13Com 3C905-TX-1
3Com 3C905-TX-1savomir
 
Didáctica crítica
Didáctica críticaDidáctica crítica
Didáctica críticaSandra Jamin
 
Didaktika orokorra aurkezpena i
Didaktika orokorra aurkezpena iDidaktika orokorra aurkezpena i
Didaktika orokorra aurkezpena itrutxete
 
σημειώσεις Word ppt
σημειώσεις Word pptσημειώσεις Word ppt
σημειώσεις Word pptbouliegavp
 
Pautas generales de entrega 2017
Pautas generales de  entrega 2017Pautas generales de  entrega 2017
Pautas generales de entrega 2017Federico Ruvituso
 
Egg Cooker - Yoghurt Maker - Food Steamer
Egg Cooker - Yoghurt Maker - Food SteamerEgg Cooker - Yoghurt Maker - Food Steamer
Egg Cooker - Yoghurt Maker - Food SteamerBerkay Özdemir
 
Anger Psychology
Anger PsychologyAnger Psychology
Anger PsychologyHaziq123456
 

Viewers also liked (15)

How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 
Terry Liskevych Presentation: Practice Planning
Terry Liskevych Presentation: Practice PlanningTerry Liskevych Presentation: Practice Planning
Terry Liskevych Presentation: Practice Planning
 
Terry Liskevych Presentation: Coaching Basics
Terry Liskevych Presentation: Coaching BasicsTerry Liskevych Presentation: Coaching Basics
Terry Liskevych Presentation: Coaching Basics
 
Terry Liskevych Presentation: Psychology
Terry Liskevych Presentation: PsychologyTerry Liskevych Presentation: Psychology
Terry Liskevych Presentation: Psychology
 
Introduccion
IntroduccionIntroduccion
Introduccion
 
Presentación imformatica
Presentación imformaticaPresentación imformatica
Presentación imformatica
 
WT Softball Game Notes (3-27-17)
WT Softball Game Notes (3-27-17)WT Softball Game Notes (3-27-17)
WT Softball Game Notes (3-27-17)
 
3Com 3C905-TX-1
3Com 3C905-TX-13Com 3C905-TX-1
3Com 3C905-TX-1
 
Didáctica crítica
Didáctica críticaDidáctica crítica
Didáctica crítica
 
Didaktika orokorra aurkezpena i
Didaktika orokorra aurkezpena iDidaktika orokorra aurkezpena i
Didaktika orokorra aurkezpena i
 
σημειώσεις Word ppt
σημειώσεις Word pptσημειώσεις Word ppt
σημειώσεις Word ppt
 
Pautas generales de entrega 2017
Pautas generales de  entrega 2017Pautas generales de  entrega 2017
Pautas generales de entrega 2017
 
Egg Cooker - Yoghurt Maker - Food Steamer
Egg Cooker - Yoghurt Maker - Food SteamerEgg Cooker - Yoghurt Maker - Food Steamer
Egg Cooker - Yoghurt Maker - Food Steamer
 
Anger Psychology
Anger PsychologyAnger Psychology
Anger Psychology
 
Database 2
Database 2Database 2
Database 2
 

Similar to How to Use a Cyber Loss Model within a Retail Bank

Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarDon Grauel
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)ecommerce
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to knowFitCEO, Inc. (FCI)
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863IBMgbsNA
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationEric Reehl
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
financial exec final
financial exec finalfinancial exec final
financial exec finalAdam Ortlieb
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Chris Hails
 
Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked EconomySonia Kaul Takoo
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftCBIZ, Inc.
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsJason Dover
 
How a Predictive Analytics-based Framework Helps Reduce Bad Debts in Utilities
How a Predictive Analytics-based Framework Helps Reduce Bad Debts in Utilities How a Predictive Analytics-based Framework Helps Reduce Bad Debts in Utilities
How a Predictive Analytics-based Framework Helps Reduce Bad Debts in Utilities WNS Global Services
 

Similar to How to Use a Cyber Loss Model within a Retail Bank (20)

Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
George Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler SeminarGeorge Gavras 2010 Fowler Seminar
George Gavras 2010 Fowler Seminar
 
Ecommerce(2)
Ecommerce(2)Ecommerce(2)
Ecommerce(2)
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863Insight2014 mitigate risk_fraud_6863
Insight2014 mitigate risk_fraud_6863
 
Cyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and PreparationCyber Liability - Insurance Risk Management and Preparation
Cyber Liability - Insurance Risk Management and Preparation
 
B crisis
B crisisB crisis
B crisis
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
financial exec final
financial exec finalfinancial exec final
financial exec final
 
Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...Crossing the streams: How security professionals can leverage the NZ Privacy ...
Crossing the streams: How security professionals can leverage the NZ Privacy ...
 
Privacy Issues in Networked Economy
Privacy Issues in Networked EconomyPrivacy Issues in Networked Economy
Privacy Issues in Networked Economy
 
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" TheftWhat Not-for-Profits Can Do To Prevent "Uninspired" Theft
What Not-for-Profits Can Do To Prevent "Uninspired" Theft
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101Statewide Insurance Brokers - Cyber Insurance 101
Statewide Insurance Brokers - Cyber Insurance 101
 
The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses The Rise of Data Breaches in Small Businesses
The Rise of Data Breaches in Small Businesses
 
Captive Insurance and Cyber Risk
Captive Insurance and Cyber RiskCaptive Insurance and Cyber Risk
Captive Insurance and Cyber Risk
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant Environments
 
How a Predictive Analytics-based Framework Helps Reduce Bad Debts in Utilities
How a Predictive Analytics-based Framework Helps Reduce Bad Debts in Utilities How a Predictive Analytics-based Framework Helps Reduce Bad Debts in Utilities
How a Predictive Analytics-based Framework Helps Reduce Bad Debts in Utilities
 

Recently uploaded

VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...ThinkInnovation
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort servicejennyeacort
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...Pooja Nehwal
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样vhwb25kk
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfLars Albertsson
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts ServiceSapana Sha
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 

Recently uploaded (20)

VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
 
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
9711147426✨Call In girls Gurgaon Sector 31. SCO 25 escort service
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...{Pooja:  9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
{Pooja: 9892124323 } Call Girl in Mumbai | Jas Kaur Rate 4500 Free Hotel Del...
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
1:1定制(UQ毕业证)昆士兰大学毕业证成绩单修改留信学历认证原版一模一样
 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
 
Industrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdfIndustrialised data - the key to AI success.pdf
Industrialised data - the key to AI success.pdf
 
Call Girls In Mahipalpur O9654467111 Escorts Service
Call Girls In Mahipalpur O9654467111  Escorts ServiceCall Girls In Mahipalpur O9654467111  Escorts Service
Call Girls In Mahipalpur O9654467111 Escorts Service
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 

How to Use a Cyber Loss Model within a Retail Bank

  • 1. A  Worked  Example Use  of  the  Cyber  Loss  Model  within  a  Retail  Bank Following is an example of how a retail bank can use the Cyber Loss Model to characterize the risk and assess cyber insurance needs for a major data breach and demonstrate a strong risk management culture to the board of directors and the Federal Reserve.
  • 2. Worked  Example,  the  Questions: • What  is  the  bank’s  risk  from  a  major  data  breach? • How  much  insurance  coverage  should  be  purchased?   • What  should  be  covered? VivoSecurity  Inc,  1247  Russell  Ave,  Los  Altos  California;   Contact:   ThomasL@VivoSecurity.com,   (650)  919-­‐3050
  • 3. Worked  Example,  the  Bank Bank  Details: • 425,000  accounts  for  300,000  individual  account  holders. • Archived  data  on  40,000  accounts  for  25,000  past,  individual   account  holders.   • 24,000  accounts  for  10,000  businesses  account  holders. • Archived  data  on  1,200  accounts  for  800  past,  businesses   account  holders. • No  credit  card  data. • 2,500  employees.
  • 4. Parameter Input Number  Affected Number  of  people  affected  by  a  data  breach  for  whom  the  reporting  requirement  is  triggered  by  the  various   state’s  attorneys  general. Data  Type PII – Personal  Identifiable  Information,  which  includes  drivers  license,  SSN  etc. PFI – Personal  Financial  Information,  which is  PII  +  any financial  information,  bank  account  etc. CHD – Card  Holder  Data,  which  is  PII  +  payment  information  such  as  credit  cards  number PHI – Protected  Health  Information,  which is  PII  +  diagnostic,  treatment  or  health  payment  information Incident  Type Malicious  Outsider –perpetrated  by  people  not  known  by the  company,  such  as  phishing  or hacking. Malicious  Insider – unauthorized  access  to  data  by  individuals  within the  company  which  could  trigger  state   reporting  requirements,  such  as  unauthorized access  to  bank  accounts by  employees. Accident – accidental  exposure  of  data  by  the  company  or  partner,  such  as  deployment  of  a  software  upgrade   that  allowed unauthorized  access  to  personal  data, or  emailing  personal  information  to  the  wrong  party. Lost/Stolen – exposure  of  data  caused  by  any  lost  or  stolen  device  such  as  a  laptop,  tape  drive,  USB  drive. Modeling  of  historical  industry  data  finds  that  1)  Data  Type,  2)  Incident  Type  and   3)  Number  of  Affected  people  are  the  factors  that  best  predict  the  cost  of  a  data   breach. Worked  Example,  the  Model
  • 5. Worked  Example,  Bank  Inputs Following  are  the  model  inputs  provided  by  the  bank. Parameter Chosen  Input Number  Affected 325,000 -­‐-­‐ The major cost to a data breach is the reporting requirement, which is not required for business accounts. Since reporting requirements scale with the number of individuals, not accounts or records, the bank decided to use the sum total of current and past individual account holders, for which the bank maintains electronic records. Data  Type PFI -­‐-­‐ The bank does not deal with credit card data so the data type that could be breached is PFI. The bank also has PHI for employees but the number of employees is not significant compared with the number of customers. Incident  Type Malicious Outsider – modeling finds that a data breach caused by a malicious outsider is more costly than any other cause, even though this incident type is also relatively rare. For the purpose of insurance coverage, the cost of malicious outsider was the incident type considered.
  • 6. Worked  Example,  Results  &  Considerations The model shows that the median cost of a data breach is small: just $3.6M. With such a breach, the model also shows a 10% chance of a lawsuit. Since modeling shows that a lawsuit can double the cost, the bank intends to keep probability of lawsuits low by offering Experian Lifelock credit monitoringin the event of a breach. Data  Entered   into  the  Model
  • 7. Worked  Example,  Results  &  Considerations  (continued) The bank chose to purchase $25M insurance coverage based upon the 80% confidence interval, for the followingreasons: • The bank has a strong intrusion detection program so the probability of exposing all data is remote, and the probability of the 90% confidence interval is even more remote. • The probability density has a very long tail (see graph), suggesting that the bank can influence the cost by their actions. • Notification costs are a significant cost of a data breach so the bank has engaged a law firm and negotiated the cost of notification in the event of a data breach. • The bank has engaged with Experian to negotiate the cost of Lifelock in the event of a data breach. • The bank has a rehearsed plan to orchestrate the response, minimize disruption, reassure customers in a timely manner and control costs.
  • 8. Worked  Example,  Actions  Taken The model and decisions were presented to Fed examiners in the context of DFAST, to demonstrate a strong risk management culture. The banks assets are too small for CCAR. A report was given to the board of directors who understood, for the first time, that the cost of a data breach was manageable and less than expected. Security budget was adjusted as follows: • More effort will be spent on responding in the event of a breach • More resources will be allocated to prevent incidents other than Malicious Outsider (see graph). VivoSecurity  Inc,  1247  Russell  Ave,  Los  Altos  California;   Contact:   ThomasL@VivoSecurity.com,   (650)  919-­‐3050