SlideShare a Scribd company logo
1 of 27
(Mt) – Provide a MEMO
Beneath the surface of a cyberattack A deeper look at business impacts Beneath the surface
of a cyberattack A deeper look at business impacts Foreword In our work and conversations
with more than a thousand clients across virtually all industry sectors, we consistently hear
that boards, executive management, and technology leaders are struggling to connect the
dots on a wide range of topics familiarly grouped under the heading of “cyber.” At the core
of this struggle is a view that business executives and security professionals seldom speak
the same language and—perhaps more important—they rarely approach cyber challenges
in a way that integrates multiple competencies to create better business context and insight
in their cyber strategies. We have found this to be especially true in the estimation of risks
and financial impact associated with cyberattacks. In particular, traditional approaches to
calculating impacts of cyber incidents have focused largely on the direct costs associated
with the theft of personal information. While this is helpful in certain situations, it does not
account for the growing number and severity of incidents that do not necessarily involve
the breach of customer or employee records—for example, the theft of intellectual property,
the disruption of core operations, or the destruction of critical infrastructure. This focus on
personal information is partly due to the availability of data, but it is also due to a tendency
to emphasize the impacts that are visible and easiest to quantify. In order to provide a more
complete view of the immediate and longer-term business impacts of cyber incidents,
Deloitte Advisory has brought together our market leading Cyber Risk, Forensic &
Investigation, and Valuation teams—supported by our industry practices—to demonstrate
how a multidisciplinary approach can yield richer business insight into any organization’s
cyber challenges. In Beneath the Surface of a Cyberattack: A Deeper Look at Business
Impacts, we have leveraged our experience with a variety of cyber incidents and our deep
industry knowledge to illustrate how 14 impact factors—including many that are not often
visible—can affect an organization in the days, months, and years following a cyberattack.
Using financial modeling, damages quantification, and business and asset valuation
techniques, we have developed approaches and guidance for estimating both the direct and
intangible costs associated with these impact factors. The resulting data is intended to
provide greater clarity around the potential range and financial risks associated with these
factors. This integration of cyber and valuation disciplines provides fuller insight that
should inform the way organizations think about and plan for cyber incidents. It also
reveals some important observations that are difficult to see through the traditional lens of
direct cost—and hopefully will encourage organizations to think beyond the “conventional
wisdom.” Edward W. Powers National Managing Principal Cyber Risk Services Deloitte
Advisory Deloitte & Touche LLP J. Donald Fancher National Managing Principal Forensic &
Investigation Services Deloitte Advisory Deloitte Transactions and Business Analytics LLP
Justin Silber National Managing Principal Valuation Services Deloitte Advisory Deloitte
Financial Advisory Services LLP Contents Foreword Introduction 1 Understanding impacts
4 Scenario A: US health insurer 8 Scenario B: US technology manufacturer 12 Scenario
takeaways 16 Going forward 17 Appendix 19 Beneath the surface of a cyberattack A deeper
look at business impacts Introduction A fundamental shift is occurring in the management
of cyber risk. The idea that cyberattacks are increasingly likely—and perhaps inevitable—is
beginning to take hold among executives and boards. Business leaders are realizing that we
have interconnected our world mostly using technologies designed for sharing information,
not protecting it. They recognize that they have to trust people—their own employees and
the third parties they do business with—to handle sensitive information and operate
critical infrastructure. And more and more they see that the intimate connection between
their strategic agenda and the creation of cyber risk makes it infeasible for them to lock
everything down and always put security first. As a result, many organizations are
beginning to adopt what Deloitte calls a Secure.Vigilant. Resilient.™ approach1 to cyber risk,
which appropriately balances investments in cybersecurity with efforts to develop better
threat visibility, and the ability to respond more rapidly and more effectively in the event of
a cyber incident. In order to prioritize properly, organizations should understand the types
of cyber risk they face and be able to gauge their relative likelihood. And just as important,
they need to understand the business impacts those risks are likely to involve. A significant
challenge, however, is that common perceptions about the impact of cyberattacks are
mostly shaped by what companies are required to report publicly— primarily theft of
personally identifiable information (PII), payment data, and personal health information
(PHI). Discussions tend to focus on costs related to customer notification, credit monitoring,
and the possibility of legal judgments or regulatory penalties. Important work has been
done in this area, and the industry is generally converging on the calculation of a “cost per
record” for consumer data breaches.2 The costs commonly associated with data breaches
are only the most widely understood impacts, the damage seen above the surface. But theft
of PII is not always an attacker’s objective. Rarely brought into full view are cases of
intellectual property (IP) theft, espionage, data destruction, attacks on core operations, or
attempts to disable critical infrastructure. Beneath the surface, these attacks can have a
much more significant impact on organizations. But the tolls they take are not broadly
understood and are much more difficult to quantify. Organizations can understand these
less obvious impacts, though, by employing a multidisciplinary approach that integrates
deep knowledge of cyber incidents with business context, valuation techniques, and
financial quantification. With better visibility into a broader range of the potential business
impacts, leaders can transform the way they manage cyber risk and improve their ability to
recover when a cyberattack occurs. 5 Understanding impacts Impact factors and the phases
of incident response There are many ways a cyberattack can affect an organization, and the
impacts will vary depending on the nature and severity of the attack. In general, there are
14 “impact factors” that business leaders should consider when preparing for cyber
incidents (see illustration on page 3). Some are well-known, direct costs commonly
associated with cyber breaches; others are more far-reaching, intangible costs that are both
more difficult to quantify and often hidden from public view. These impact factors play out
across an incident response lifecycle that can be broken down into three phases, which
usually overlap one another and can extend differently over time, depending on the type of
attack. Some of the impact factors are typically associated with one of the three phases and
may represent one-time costs, such as regulatory fines. Other impact factors, such as legal
costs or damages from IP loss, recur or are present throughout the recovery process.
Illustrating cyberattack impacts over time To show how impact factors can play out when
an actual attack occurs, the next sections present two scenarios—one featuring a health
insurer, the other a technology company. The companies and the situations are fictitious,
but the illustrations approximate how a stream of events might unfold and the effects they
can have—both the familiar and the lesser-known consequences. Understanding the cyber
risk of an organization requires knowledge of the business models, operational processes,
trends, maturity levels, and vulnerabilities specific to that organization and generally
present in its industry sector. The scenarios, therefore, were constructed from Deloitte’s
deep and broad knowledge of the industries to which the fictitious companies belong. In
addition to a brief company profile and description of a cyberattack, each scenario contains
a Cyber Incident Response timeline. The timeline illustrates some of the major events and
developments that may occur over a five-year period, which require both business and
technical responses. It also depicts the duration of the three incident response phases and
approximates the relative magnitude of their business impact. A summary table for each
scenario shows the estimated financial impact and approximate duration for each of the 14
impact factors. Incident response lifecycle Incident triage is the highly reactive phase in the
days or weeks after an attack is discovered. During this phase, business leaders direct near-
term decisions and actions, including communication with external parties and formulation
of strategies for continuity of important operations, if disruption has occurred. It includes
the analysis of what occurred, immediate steps to stop compromises in progress, and
emergency review and remediation of security controls. 2 Impact management involves the
reactive efforts required in the weeks or months after an attack to reduce and address the
direct consequences of the incident. Work streams can vary widely depending on the nature
of the attack, but might include efforts to stand up interim infrastructure and adjust
operational processes; reduce damage to client, customer and partner relationships; engage
in cyber audit processes and respond to findings; and initiate or respond to legal or law
enforcement matters. Business recovery is the remediation phase lasting months or years
when attention turns toward repairing damage to the business and preventing the
occurrence of a similar event in the future. Business recovery activity is also highly variable,
but can include the rebuilding or redesign of business processes, systems, applications, or
other assets; the development of strategies to rebuild reputation, revenue streams, and
competitive advantage; investment in security improvements, detection systems, or
preparedness capabilities—all with the goal of emerging from the crisis stronger than
before. Beneath the surface of a cyberattack A deeper look at business impacts Fourteen
cyberattack impact factors Technical investigation Customer breach notification Post-
breach customer protection A wide range of direct and/or intangible costs contribute to the
overall impact of a major cyber incident. Regulatory compliance Public relations Above the
surface better-known cyber incident costs Attorney fees and litigation Cybersecurity
improvements Insurance premium increases Increased cost to raise debt Impact of
operational disruption or destruction Beneath the surface hidden or less visible costs Lost
value of customer relationships Value of lost contract revenue Devaluation of trade name
Loss of intellectual property 3 Calculating impacts Each of the 14 impact factors requires a
specific approach for estimating cost. The illustration on page 3 shows that “above the
surface” are many tangible, direct costs. These factors, generally wellunderstood, include
such things as costs to notify customers or provide personal credit protection. They are
relatively straightforward to approximate using a combination of profile information for
each company, publicly available data, and cost assumptions derived from industry and
market research. These assumptions are detailed in the appendix. “Beneath the surface,”
however, many of the impacts are intangible and more difficult to quantify, including costs
associated with loss of IP or contracts, credit rating impact, or damage to the value of a
trade name. In situations where intangible assets are at risk, impact can be estimated using
generally accepted standard financial measures, damage quantification methodologies, and
valuation methods. The sidebar titled “Assigning Value to Intangible Losses” explains some
of the underlying concepts for how impacts were analyzed in these categories. Further
detail is provided in the appendix. Of course, a shift in the way the company was modeled or
in the assumptions regarding the incident and the response could influence the analysis,
leading to change in the potential financial impact. Furthermore, it is important to note that
in some cyber incidents, all 14 impact factors will be felt; others may involve many, but not
all. During Deloitte’s scenario calculation and financial analysis process, care was taken to
account for each financial impact only once. 4 And finally, as those familiar with financial
valuation techniques are aware, company values are typically modeled in perpetuity or
extrapolated for an indefinite time period. However, our work quantifies the present value
of the economic impact over a fiveyear period to demonstrate and account for a company’s
ability to recover and mitigate damages resulting from a cyberattack. Assigning value to
intangible losses Various financial modeling techniques were used to estimate the value of
lost IP, damage to trade name, and impact of lost customer relationships and contracts. The
following concepts are useful in understanding these methods. Valuation and financial
quantification are associated with a specific point in time Given the time value of money and
a wide range of unforeseen internal and external factors that may also impact the future
value of an asset, the aim of the valuation process is to assign an estimated value or financial
benefit to an asset at a specific point in time—in this case, the time the cyberattack was
discovered. We applied the widely accepted Discounted Cash Flow Method under the
Income Approach, which broadly entails estimating the present value of the projected
economic benefits to be derived from the use of the asset. With-and-without method The
“with-and-without” method is a comparative business valuation technique that involves
estimating the value of an asset under two scenarios: one, with a certain asset or situation
in place (the “situation,” in this context, being the occurrence of a cyberattack); and the
other without the asset or situation in place (in this case, the absence of a cyberattack). The
difference in these value estimates yields the isolated value impact that can be attributed to
the situation. Reliance on assumptions Performing a valuation or damages/loss exercise
often requires the use of professional judgment and reasonable assumptions in the absence
of detailed, actual data. In our analysis of the impact of a cyber incident on particular assets
in each of our hypothetical scenarios, we used typical industry benchmarks (or conducted
research to identify benchmarks) to arrive at assumptions for a financial impact analysis.
Some of these assumptions leverage Deloitte’s wealth of experience performing valuations
and damages analyses in similar contexts, as well as broad practical knowledge of the
industries represented in the scenarios. The cyber incident Scenario A: US health insurer
About the company • $60 billion annual revenue • 50,000 employees • 23.5 million
members across the US (60 percent subscribed through employer contracts) • Uses a
patient care application, which provides medical alerts and allows health practitioners
across its provider network to access patient records and insurance coverage information •
Holds open enrollment (the annual period when people can enroll in health insurance
plans) November through January • Regulated by both state and federal authorities • Plans
to raise $1 billion in debt capital to acquire a health system • Pays $7 million annual
premium for a $100 million cyber insurance policy 6 In May, the company learned that a
laptop containing 2.8 million of its personal health information (PHI) records had been
stolen from the company’s health care analytics software vendor. The compromise was
revealed five days later when the company was notified by a corporate client that
information associated with some of the client’s employees had been listed for sale on
cybercrime “dark web” sites. Concurrently, administrators of the patient care application
began to notice a significant increase in the number of new user accounts created and in
active use. They also detected that an additional one million patient records had been
downloaded from the application database and were unable to confirm it was for
authorized use. As a result, the company shut down physician access to the patient care
application and activated its cyber incident response team. The application was kept offline
for two weeks while the incident was investigated. During this time, coverage and claims
validation between the company and its physicians and providers had to be done manually,
requiring help from a professional services organization to provide “surge support” in the
company’s call center. Technical investigation revealed that cyberattackers had gained
access to the patient care application using privileged credentials from the stolen laptop
and had created a significant number of user IDs. Consequently, before service could be
restored, new user accounts had to be issued for all application users, and new application
and system controls were put in place. Beneath the surface of a cyberattack A deeper look at
business impacts As the incident unfolded, impact to reputation and damage to trade name
mounted. Lack of confidence in the company’s data protection practices resulted in the loss
of customers for approximately three years as some corporate clients and individual
subscribers chose other health plan alternatives. Higher borrowing costs resulted in the
delay of a strategic acquisition and, most impactful, the incident forced the company to
mitigate reputation damage and member loss by reducing its annual premium increase over
a five-year period. The company faced ongoing scrutiny for its handling of the incident;
many months after the breach their cyber insurance premiums were raised and legal fees
accumulated as the company faced identity theft lawsuits. Above the surface In the short
term, core business functions were disrupted by the shutdown of physician access to the
patient care application. While the application was unavailable, physicians and providers
relied on less effective and efficient means of receiving medical alerts, increasing risk to
patients. Without full access to health insurance coverage information, physicians and
providers could not be certain of the financial implications—to both their institution and
their patients—associated with the choice of care they provided. Summary of the impact
factors Beneath the surface The aftermath Term Post-breach customer protection 3 years
21.00 1.25% Cybersecurity improvements 1 year 14.00 0.83% Customer breach notification
6 months 10.00 0.60% Attorney fees and litigation 5 years 10.00 0.60% Regulatory
compliance (HIPAA fines) 1 year 2.00 0.12% Public relations 1 year 1.00 0.06% Technical
investigation 6 weeks 1.00 0.06% Value of lost contract revenue (premiums) 5 years 830.00
49.43% Lost value of customer relationships (members) 3 years 430.00 25.61%
Devaluation of trade name 5 years 230.00 13.70% Increased cost to raise debt 5 years 60.00
3.57% Insurance premium increases 3 years 40.00 2.38% Operational disruption
Immediate 30.00 1.79% Loss of intellectual property Not applicable – 0.00% $1,679.00
100.00% Total Cost (in millions) % Total cost Impact factor 7 Scenario A: Cyber incident
response timeline—how the events and impacts unfolded Year 1 Incident triage 4%
Incident discovery ! 2 Impact management 39% 3 4 5 Business recovery 57% INCIDENT
TIMELINE Cyber insurance premiums were increased A strategic acquisition A Health
Insurance was delayed due to a Portability and drop in credit rating Accountability Act
(HIPAA) fine was imposed Premium rate schedule was adjusted for upcoming enrollment
period A public relations campaign was launched, timed with upcoming open enrollment
period A second phase of cybersecurity improvements began Litigation began tied to a class
action suit filed for damages due to identity theft By Year 3, member enrollment rates
returned to normal, but at the expense of longer-term profitability. As identity theft cases
were settled, news coverage kept the breach fresh in public memory, and the company
faced ongoing pressure to reduce premium rate increases to secure new members and
clients. Initial phase of cybersecurity improvements began Breach notification and
customer protection programs began The patient care application was shut down and call
center staffing was increased External incident response support was hired Impact curves
illustrate the relative magnitude of costs as they are incurred across the three phases of the
response process, which are defined on page 2. The timeline shows major milestone events
and work efforts throughout the process. Some are externally imposed, and others reflect
the actions taken in response by the company. 8 Beneath the surface of a cyberattack A
deeper look at business impacts Highlights of the business impact The total cost of this
cyberattack was greater than $1.6 billion over a five-year timeframe, and of significant
interest, only 3.5 percent of the impact was accounted for “above the surface.” To the casual
observer, this incident was a classic example of PHI data theft, and while the company
suffered common ramifications of a data breach, including customer notification, customer
protection, and regulatory fines, there were much deeper implications. In reality, over 96
percent of the impact was “beneath the surface.” What’s more, almost 89 percent of the
impact was associated with just three “beneath the surface” impact factors: value of lost
contract revenue; devaluation of trade name; and lost value of customer relationships.
Another interesting observation is how the impact played out over time. The immediate
costs to “stop the bleeding” in the triage phase accounted for less than 4 percent of overall
financial impact. Impact during the impact management phase jumped to nearly 40 percent.
But that meant that approximately 57 percent of the impact played out in the years
following the incident, challenging thinking that the year after an incident is the most
impactful. In this scenario, the largest impacts were less obvious factors that played out
over time. Below is an explanation of how the three most impactful factors were estimated.
Value of lost contract revenue (premiums): In this scenario, contracts were not canceled,
however, as the company looked to reduce the damage of the incident, it adjusted the
premium increase they had historically charged their members. This resulted in an
estimated loss of $830 million over five years. To arrive at this calculation, it was assumed
that the average increase in annual premiums is reduced by 20 percent in year one and
premium growth rates steadily increased to meet average growth rates, consistent with
those prior to the incident, after five years. Devaluation of trade name: Due to erosion of
revenue, the company’s trade name value decreased, resulting in a $230 million loss. To
determine the financial impact of a cyber incident on the value of a company’s trade name,
the likely value of the trade name both before and after the cyberattack was assessed. To
assess the trade name value in both situations, we utilized the relief-from-royalty method of
valuation. After evaluating similar benchmarks for a typical company in this industry, we
established a reasonable royalty rate of 2 percent. The valuation of the trade name was then
derived by associating 100 percent of the company’s future expected revenues associated
with the trade name. The health plan’s trade name prior to the incident was valued at $3.9
billion. For purposes of this exercise, it was assumed that, following the cyberattack, the
company faced a 6 percent erosion of revenue, defined as a combination of lost premium
revenue and lost members over the course of five years. As a result, the company’s trade
name value potentially decreased to $3.7 billion. Lost value of customer relationships: The
decline in annual revenues due to lost members or customers caused the value of customer
relationships to decline by $430 million. This calculation assumed attrition for existing
customers (normally 7 percent) increased by approximately 30 percent (to 9 percent) in
year one. The model also assumed that customer attrition decreased over time, and
returned to a normal attrition rate of 7 percent at the end of three years. Further, this
calculation assumed new members in year one (immediately after the breach) decreased by
50 percent. However, the growth rate for new members steadily increased to normal
growth rates, so that in years four and five, growth rates of 25 percent and 30 percent,
respectively, were reached. Prior to the cyberattack, the total value of the company’s
customer relationships, or its members, was estimated at $10.3 billion. Based on the decline
in annual revenues due to lost members or customers, as modeled over the five-year period,
the value of customer relationships declined to $9.5 billion. This loss was in addition to the
lost contract revenue (premiums) referenced above. 9 The cyber incident Scenario B: US
technology manufacturer About the company • $40 billion annual revenue • 60,000
employees • Growth strategy rests on innovation to support the management of Internet of
Things (IoT) environments • Holds hundreds of contracts with clients across multiple
industries, including several very large federal government contracts • Operating profit
margin prior to the incident is 12.2 percent • Pays $3.75 million annually for $150 million in
cyber insurance 10 After significant research, development, production, and marketing, the
company was six months from a major release of a core product line that supports IoT
environments. Earlier versions were deployed in the field for over 12 months across the
government, transportation, utilities, smart home, and smart city sectors, and among
service providers who support customers in those sectors. The company was informed by a
federal agency that the company’s infrastructure was breached by a foreign nation-state. An
investigation revealed exfiltration of IP related to multiple product lines and confirmed that
15 of the company’s 30 device product lines were impacted. Revenue associated with
impacted product lines was projected to be 25 percent of total revenue over the following
five years. Despite efforts to keep the incident confidential, 30 days after discovery a tech
blog revealed that the foreign entity may be reverse-engineering the company’s IoT
products. Beneath the surface of a cyberattack A deeper look at business impacts While the
company was largely able to recover within five years, the incident had a number of serious
consequences. Sales and shipment of affected products were suspended for four months
while security vulnerabilities were addressed. When word of the incident surfaced, a large
government contract was terminated, causing an additional 5 percent drop in revenue.
Significant unplanned costs were incurred, including costs to redesign security features and
firmware for many product lines, and to redesign future products to embed advanced anti-
counterfeiting software and hardware. The loss of IP related to multiple product lines was a
significant blow to the organization and required unanticipated research and development
(R&D) expenditures and product fixes. It was a full year before product sales returned to
normal. Loss in market confidence lead to abnormally high sales force turnover. This type of
business disruption across multiple functions caused a significant decline in operating
efficiency. To help prevent future incidents, the company made security improvements to
its corporate environment a top priority, including infrastructure upgrades and a data loss
prevention program. Above the surface The adversary’s full intent was not known, but the
company was concerned that counterfeit products could directly impact long-term sales
and margins. It was equally concerned that attackers would exploit product vulnerabilities,
or implant malicious code into their products. To be associated with future customer
security incidents could be devastating to the company’s reputation. Summary of the impact
factors Beneath the surface The aftermath Impact factor Term Cybersecurity improvements
1 year 13.00 0.40% Attorney fees and litigation 5 years 11.00 0.35% Public relations 1 year
1.00 0.03% Technical investigation 9 weeks 1.00 0.03% Customer breach notification Not
applicable – 0.00% Post-breach customer protection Not applicable – 0.00% Regulatory
compliance Not applicable – 0.00% Value of lost contract revenue 5 years 1,600.00 49.11%
Operational disruption 2 years 1,200.00 36.83% Devaluation of trade name 5 years 280.00
8.59% Loss of intellectual property 5 years 151.00 4.63% Insurance premium increases 1
year 1.00 0.03% Increased cost to raise debt Not applicable – 0.00% Lost value of customer
relationships Not applicable – 0.00% $3,258.00 100.00% Total Cost (in millions) % Total
cost 11 Scenario B: Cyber incident response timeline—how the events and impacts
unfolded Year 1 Incident triage 8% 2 4 5 Business recovery 45% ! Incident discovery 3
Impact management 47% INCIDENT TIMELINE An infrastructure upgrade was
implemented Legal investigations began to identify and take action against counterfeiting
operations A project was launched to classify IP and implement data loss prevention
controls An enterprise-wide cyber risk assessment was conducted to develop mitigration
strategies Release of a new device was accelerated One year after the incident, product sales
returned to previous levels, but business performance continued to be burdened by the
phase of depressed revenue growth and lost productivity resulting from management and
R&D focus on the incident. Loss in buyer confidence posed ongoing challenges to sales
efficiency and product pricing. Exposure of unique product designs empowered
competitors, and placed extra pressure on the company’s innovation efforts to regain
market leadership. A major contract was lost ollout began for a firmware upgrade to
impacted devices A third-party blog post reveals that IP was stolen Outside technical help
and legal counsel was brought in Impact curves illustrate the magnitude of costs as they are
incurred across the three phases of the response process, which are defined on page 2. The
timeline shows major milestone events and work efforts throughout the process. Some are
externally imposed, and others reflect the actions taken in response by the company. 12
Beneath the surface of a cyberattack A deeper look at business impacts Highlights of the
business impact In this incident, which could be categorized as a case of IP theft, the overall
damage across all impact factors exceeded $3.2 billion over a five-year timeframe. Notably,
the vast portion of the impacts were “beneath the surface;” those “above the surface”
accounted for less than 1 percent of the total. In fact, 99 percent of the impact was focused
in four areas: devaluation of trade name; value of lost contract revenue; operational
disruption; and loss of IP. In terms of how the impacts played out over time, only 8 percent
of the total impact fell within incident triage. Over 40 percent occurred during impact
management, when operational disruption implications peaked, contract loss kicked in, and
the company started to see the impact of lost IP. Interestingly, the largest impact was felt
during business recovery, with half of the total impact having occurred more than two years
following the incident. Below is an explanation of how the most significant impact factors
were estimated. Devaluation of trade name: Due to the loss of intellectual property and
intangible assets, and the resulting impact to its reputation, the company lost almost $280
million in the value of its trade name. Utilizing the relief-from-royalty method, a royalty rate
of 1.5 percent was used to make this calculation, based on a review of comparable license
agreements of similar companies, and typical profit margins of public technology hardware
companies. Additionally, it was assumed that the incident continued to impact the company
for five years. The company’s trade name prior to the incident was valued at $1.8 billion;
after the incident it was valued at $1.5 billion. Value of lost contract revenue: As a result of
the cyber breach, there would be a high probability that a significant federal contract would
be cancelled, leading to an estimated loss of $1.6 billion. Though its revenue base was
spread across hundreds of clients, this company was especially reliant on large contracts
with federal agencies and telecommunications providers. One of these was a five-year
contract with the federal government that made up 5 percent of the company’s total annual
revenue. The loss of this contract reduced total annual revenue by 5 percent and profit
margin declined by 2 percent. With the decline in revenue, the company then functioned
under a lower operating base since its fixed costs were spread over a lower revenue base.
Operational disruption: The cyberattack caused disruption to business operations, leading
to $1.2 billion in losses associated with a drop in productivity. In the wake of the incident,
not only did the company have to halt sales and shipments for four months, it also
experienced unanticipated R&D costs; because IP had been stolen and a competitor likely
could have replicated the same capabilities and functionalities, the company re-evaluated
15 product lines. Resources were re-allocated to focus on fixes to product lines, along with
the redesign and implementation of security features and other cybersecurity improvement
costs. Loss of sales force was also an unexpected impact in the year following the incident
due to a loss in market confidence. In order to quantify the financial impact of this
disruption, an overall impact to profitability was estimated before and after the cyber
incident. The company would have had a profit margin of 12.2 percent and generated
overall operating profits of almost $4.9 billion annually before the incident. Assuming the
company’s profit margin drops to 9.2 percent after the incident as a result of the disruption,
its operating profit dropped to less than $3.7 billion, resulting in a $1.2 billion loss in
operating profits. Loss of IP: Within the context of this IP theft incident, the actual value of
the lost IP was a significant component of the overall impact, leading to the loss of over
$150 million. The company’s performance and market share rested largely on the value of
its proprietary technology and trade secrets. To calculate the value of this loss, the
company’s IP was assumed to have had a useful life of five years, and it was known that 25
percent of the company’s revenue was attributable to the impacted product lines. By
analyzing comparable license agreements for related technologies, and profit margins of
public technology hardware companies, a royalty rate of 2.5 percent was established and
used in a relief-from-royalty calculation. Based on the risks associated with IP of this nature,
a discount rate of 12 percent was used. Applying values to the IP both before and after the
cyber event, the loss of IP cost the company over $150 million. 13 Scenario takeaways For
all the attention that major breaches receive, business leaders rarely see what occurs
behind the walls of an organization struggling to recover from an attack—until it happens
to them. Our intent is to help leaders broaden their understanding of the potential
consequences of an enterprise cyber incident. With a more robust picture of how an
incident may play out and what may be at stake, leaders may be better informed on how to
frame a risk-based approach and sharpen the focus of limited resources to enhance security,
vigilance, and resilience in those areas of the enterprise that may lead to the greatest
impacts. This focus ultimately allows leaders to improve the organization’s ability to thrive
in the face of today’s environment, where cyberattacks are prevalent. The scenarios
outlined represent different industries and attack objectives and illustrate two examples of
the many ways a cyberattack can unfold. Though necessarily simplified for this effort, the
scenarios demonstrate the unique ways the defined impact factors play out based on the
company, the incident, and the response. In sum, the examples highlight that a cyberattack
may include a broader set of business impacts than typically considered, and that
addressing these impacts may be highly complex and, in some cases, more costly than
cyberattack impacts “above the surface.” 14 In comparing the scenarios, several overarching
conclusions stand out. “Above the surface” costs commonly associated with data breaches
may only be the tip of the iceberg and are relatively small compared with the overall
impacts. Scenario A shows that even in an attack involving typical data theft, the classic
“above the surface” costs associated with data breach response may not be the most
significant over the course of the incident. The impact of a cyberattack plays out over years
following an incident. The immediate triage phase is costly, but the long-term efforts may
take a far greater toll. Long after intruders are removed and public scrutiny has faded, the
impacts from a cyberattack can reverberate over a multiyear timeline. Legal costs can
cascade as stolen data is leveraged in various ways over time; it can take years to recover
pre-incident growth and profitability levels; and brand impact can play out in multiple
ways. Recovering from an attack is not just a technical effort. Although cyberattacks are
conducted through technology-based means and can cause very significant damage to
infrastructure, equipment and applications, the major damage will usually be to business
value, not to IT assets themselves. Incident response is not primarily a technical effort. As
the scenarios demonstrate, the technical work to investigate, analyze, clean, and repair
computer systems is soon overshadowed by efforts to manage customer and third-party
relationships, legal matters, investment decisions, and changes in strategic course, which
are significant business leadership activities. Going forward What you do matters Becoming
more resilient Although cyberattacks are all but inevitable, the extent of their damage is not.
There are actions that our scenario companies took—or could have taken—that may have
changed the outcome. In Scenario A, for example, we assume that the company had an
integrated identity and access management system; therefore, user account changes could
be implemented in a matter of weeks versus months. Furthermore, had the cyberattack
occurred closer to open enrollment, news of a data breach might have had a more
devastating impact on subscriber rates; in that case, swift and decisive public relations and
customer care action to reduce damage would have been especially urgent. An additional
angle is the role of the analytics vendor, who promptly reported that a laptop with the
insurer’s data had been stolen. The resulting impacts may have turned out differently if the
vendor had not reported the loss so promptly or if data residing on that laptop had been
properly encrypted. For many organizations, becoming truly resilient to cyberattacks calls
for a shift in mindset that changes how they perceive cyber risk and potential impacts. It
requires organizational transformation that broadens the scope of involvement at the top of
the organization and instills focus on business risk, not just technology controls. It involves
the ability to reprioritize and refocus investments on mitigating likely outcomes, based on a
broad understanding of attackers’ motives and the ability to anticipate high-impact
scenarios. Many will find the following to be useful first steps. In the case of the technology
company, perhaps additional investments in cyber risk monitoring could have enabled the
detection of an early-stage infiltration before attackers were able to confiscate IP. As the
scenario implies, better governance around sensitive IP might have narrowed the range of
what could be accessed when attackers did succeed in gaining access to the network.
Furthermore, while hoping that news of the theft would not go public, the organization
could have taken more proactive steps in managing the relationships and communications
with its largest customers to avoid an impactful contract termination. 16 Convene the right
team. Evaluate organizational readiness by bringing together the right business and
technical leaders to develop a list of highrisk cyberattack scenarios. This will likely require a
team that collectively understands business strategy, products, revenue streams,
operations, technology, regulation and, of course, the organization’s cyber risk program.
Identify top risk areas and assets. In some enterprises, particular data sets, computer
systems, control devices, or other digital assets represent high value unto themselves. In
many cases, the value of information and technology assets is tied to the criticality of the
business processes and relationships they enable. Once those processes and activities are
identified, it is important to understand the underlying technical environment, model the
threats to the environment, and draw a realistic picture of the direct and intangible
business impacts should they be compromised. The lens should not be focused too narrowly
on data theft; other possible attack scenarios should be considered. Beneath the surface of a
cyberattack A deeper look at business impacts “Right-size” spend to reduce incident impact.
Budgets will never be big enough if the aim is to try to prevent every possible incident.
While greater investment may be required, it is likely more important to invest in a more
risk-focused manner. Effort should be taken to define the organization’s top risk areas and
assets and model realistic attack scenarios. This enables an organization to establish a
reasonable level of investment in various areas of a cyber risk program. Modernize what
“readiness” means. An incident response plan, if built on narrow assumptions, is likely to
fall short at a time of crisis. With awareness of what matters most to the organization, plans
can be made to involve the various parties needed to protect, defend, and recover if those
things are compromised. Incident response plans can be appropriately broadened—and
rehearsed—to anticipate and prepare for the high-risk cyberattack scenarios identified.
Establishing broad cyber-awareness and engagement across the organization improves the
ability to collaborate and react when the cyber incident alarm rings. Do more than prepare.
Cyber readiness is not just about what happens after an attack. Right now, malware is
sitting undetected on networked systems within an organization or on the devices of
partners, vendors, or employees. There may be ill-intended users within the walls of the
company who could use authorized access to inflict damage. In some areas, tighter security
practices may be warranted. Other areas may be technically impossible or impractical to
secure further, but might warrant stronger capabilities to detect potentially malicious
activity. Every organization should institute some variation of a secure, vigilant, and
resilient approach that is aligned to its cyber risk posture and program. Bringing cyber
impacts to the surface Beneath the surface of a cyberattack is intended to shed light on a
broad set of business impacts that are overlooked in most conversations about cyber risk.
Cyber incidents may begin as a technology issue, but they typically extend well beyond the
technology domain. These events can hit at the very heart of business value and
performance. We have attempted to demonstrate the toll cyber incidents can have on
enterprise performance far beyond the considerations usually associated with data
breaches. Whether adversaries set their sights on IP, trade secrets, operational disruption,
fraud, or data records, cyberattacks can have deep and long-lasting effects on an
organization. We encourage readers to challenge common assumptions about the breadth,
depth, and duration of cyber incidents and to take a more comprehensive view of their
potential cost. By viewing cyber risk through this wider lens, we believe that organizations
can ultimately improve their ability to survive and thrive in the face of increasingly likely
cyberattacks. 17 Endnotes 1 For a discussion of Deloitte’s Secure.Vigilant.Resilient.
approach, see Changing the Game on Cyber Risk: The Imperative to be Secure, Vigilant, and
Resilient, Deloitte Development LLC, 2015. 2 Ponemon Institute is recognized as a leader in
this area for its widely referenced annual Cost of a Data Breach studies, available at
www.ponemon.org. 3 Projected net cash flows over the five-year period were reflected in
present terms to reflect the time value of money and risk associated with obtaining these
cash flows in the future. 4 Operational efficiency is measured by the median operating profit
margin of guideline public companies in the technology industry, based on data from S&P
Capital IQ. 5 Zurich Insurance Company, The good, the bad and the careless: An overview of
corporate cyber risk, December 2014. 6 Ponemon Institute, 2015 Cost of a Data Breach
Study: Global Analysis, May 2015. 7 Zurich Insurance Company, The good, the bad and the
careless: An overview of corporate cyber risk, December 2014. 8 Ponemon Institute, The
Aftermath of a Data Breach: Consumer Sentiment, April 2014. This report indicates that
only 29 percent of customers who were offered identity theft protection following a breach
actually signed up for the services. 9 CMMI is a registered trademark of Carnegie Mellon
University. The CMMI model is a widely referenced framework for process and performance
improvement that leverages a 0-5 benchmark scale as a basis to reflect an entity’s level of
process maturity. 10 Given the use of fairly recent cases, there is not enough data to
ascertain impact to long-term credit rating. 11 Based on data from Morningstar Credit
Ratings, http://www.morningstar.com/credit-rating/corporate.aspx. 12 Baa yield data
from December 31, 2015, http://www.federalreserve.gov/releases/h15/20160104/. 13
Truven Health Analytics MarketScan® Research Databases. 18 Beneath the surface of a
cyberattack A deeper look at business impacts Appendix Definitions of the 14 cyberattack
impact factors and how costs were developed This appendix provides further detail on the
methods used to determine scenario costs for each of the 14 impact factors. Many direct
costs are generally wellunderstood and relatively straightforward to approximate based on
publicly available information. “Assigning Value to Intangible Losses” on page 4 describes
financial modeling techniques used to quantify intangible impact factors. As discussed,
these techniques often require reliance on assumptions. Deloitte reviewed and analyzed
data associated with cyber incidents occurring over the last few years, supplemented by
insights from well-known studies conducted by other organizations, as cited. The incidents
reviewed ranged from theft of high volumes of sensitive data, to theft of strategic
information, to instances of severe operational disruption; some cases involved more than
one attack type. Calculation of both direct and intangible costs also requires consideration
of company-specific information provided as part of the profile of each of the fictitious
companies. These company profiles, as described on the scenario pages, were derived from
Deloitte’s broad knowledge of the specific industry sectors to which the profiled companies
belong. Profiling of a plausible, fictitious company requires knowledge of the business,
business trends, typical cybersecurity maturity levels, typical cyber risk vulnerabilities,
revenue models, and operational processes within each industry sector. In some instances,
cost estimates and related values have been simplified for illustration purposes, as
presenting all underlying variables would not be feasible within the scope or length of this
paper. Although, as noted on page 4, value is estimated at a specific point in time, the term
over which a company would incur tangible actual costs would vary. Some would be
immediate, as in the case of the health insurer’s losses associated with health claims fraud;
other impact factors might be applicable over years, as in the case of the health insurance
company’s post-breach customer protection costs or the longer-term devaluation of the
technology company’s trade name. 19 Fourteen cyberattack impact factors A wide range of
direct and/or intangible costs contribute to the overall impact of a major cyber incident.
Above the surface: Well-known cyber incident costs Technical investigation Customer
breach notification Post-breach customer protection The costs associated with technical
investigations are direct expenses for analysis to determine what happened during a cyber
incident and who was responsible. An immediate objective is to support rapidly halting the
spread of a compromise and take action to limit its impact to systems, infrastructure, and
data. Efforts involve digital forensics, and malware and threat analysis to determine root
cause to assist in the remediation and recovery of impacted systems, and to inform future
cybersecurity improvements. Customer breach notification costs include the direct
expenses associated with informing and advising individuals whose data has been
compromised, as typically mandated by state or federal law or industry regulation. These
can include printing, mailing, and call center services, among others. Deloitte has used an
average indicator of $2.75 provided by Zurich Insurance stating that notification costs range
between $0.50 and $5 per customer.5 According to the Ponemon Institute, breach
notification costs have recently declined somewhat.6 Assuming that costs for these services
may continue to decline over time, Deloitte has chosen to use a figure of $2.75 per stolen
record. Post-breach customer protection costs are direct costs associated with services to
detect and protect against potential efforts to use an individual’s compromised personal
data for unauthorized purposes. To estimate the direct cost of credit monitoring or identify
theft protection services, Deloitte used the midpoint of Zurich Insurance’s guidance that
typical costs range from $10 to $30 per customer for an annual subscription7 and a
Ponemon Institute study indicating that, of customers surveyed, only 9 percent actually
registered for the identity theft protection services that had been offered.8 These figures
were applied to the number of customer records breached (3,800,000 in Scenario A; not
applicable in Scenario B). The scale of investigation activity can vary widely depending on
type and complexity of the breach, and to some extent directly reflects the number of
computing systems potentially impacted by the compromise. Estimated costs for this
impact factor were based on Deloitte’s experience in situations similar to the fictitious
scenarios presented. For scenario A, investigative work would center on analysis of data
within the patient care application and efforts to assess the extent of privileged account
compromise. A team of five incident response specialists would likely be deployed for
approximately six weeks, costing an estimated $600,000. For Scenario B, given the possible
involvement of a sophisticated nation-state actor and the range of systems used to support
multiple product lines, a deeper technical investigation of the broader environment would
be necessary to understand the full scope and impact of the breach. This investigation is
estimated to require five incident response specialists over a nine-week period, at a total
estimated cost of $1,080,000. 20 20 Beneath the surface of a cyberattack A deeper look at
business impacts Above the surface: Well-known cyber incident costs Regulatory
compliance Attorney fees and litigation Cybersecurity improvements Regulatory
compliance costs are fines or fees levied as a result of non-compliance with federal or state
cyber breach related laws and/or regulations. Company profiles include assumptions about
which federal, local, international and/or industry regulations the company may be subject
to. Costs were assigned to those factors based on publicly available information regarding
fines typically imposed. Looking forward, heightened focus on breaches is triggering greater
regulatory and legislative scrutiny. This is likely to complicate compliance challenges and
costs at both the state and federal level—including preparing for and defending against
government compliance actions. Attorney fees and litigation costs can encompass a wide
range of legal advisory fees and settlement costs externally imposed and costs associated
with legal actions the company may take to defend its interests. Such fees could potentially
be offset through the recovery of damages as a result of assertive litigation pursued against
an attacker, especially in regards to the theft of IP. However, the recovery could take years
to pursue through litigation and may not be ultimately recoverable, even after a positive
verdict in favor of the company. Based on our analysis of publicly available data pertaining
to recent consumer settlement cases and other legal costs relating to cyber incidents, we
observed that, on average, it could cost companies approximately $10 million in attorney
fees, potential settlement of loss claims, and other legal matters. The cases surveyed include
both data breaches and cyber incidents that caused operational disruption. We do note that
this amount is greatly dependent on the scale, nature, and severity of the incident, and the
probability of settlement, among other factors. This information was used as a basis to
estimate what costs both the fictitious companies might face over a three-year period. The
costs associated with cybersecurity improvements are direct expenses for technical
improvements to the infrastructure, security controls, monitoring capabilities, or
surrounding processes, specifically to recover business operations after an incident or to
prevent a similar occurrence in the future. Estimated cost of cybersecurity improvements
were based on Deloitte’s experience of typical costs for the kinds of projects undertaken in
each fictitious scenario. For Scenario A, these costs include efforts to restore and implement
additional security controls around the claim processing system; expand vulnerability,
identity and access management programs; and establish a security operations center
(SOC). Cybersecurity improvements for Scenario B include an enterprise-wide cyber risk
assessment; upgrades to its network infrastructure; and implementation of a data
classification and data loss prevention program. Public relations Public relations costs are
the direct costs associated with managing external communications or brand monitoring
following an incident. Deloitte surveyed leading communications firms and, based on
information provided, conservatively estimates that a four-week PR campaign in the
immediate aftermath of a cyber incident costs $400,000 on average. Extended campaigns to
monitor and repair trade name damage were found to be conservatively estimated at $1
million per year. 21 Fourteen cyberattack impact factors A wide range of direct and/or
intangible costs contribute to the overall impact of a major cyber incident. Beneath the
surface: Hidden or less visible costs Insurance premium increases Increased cost to raise
debt Impact of operational disruption or destruction Insurance premium increases are the
additional costs an insured entity might incur to purchase or renew cyber risk insurance
policies following a cyber incident. There is little public data available on actual premium
increases following cyberattacks. Deloitte conducted informal research among leading
providers of cyber insurance and found that it is not uncommon for a policyholder to face a
200 percent increase in premiums for the same coverage, or possibly even be denied
coverage until stringent conditions were met following a cyber incident. According to our
sources, factors that influence future costs can include: willingness and depth of
information provided by the policy holder upon review of the incident; the policy holder’s
plans to improve incident handling or other aspects of their security program; anticipated
litigation; and assumptions concerning the company’s level of cybersecurity “maturity.” For
purposes of this study, Deloitte assumes a premium increase of 200 percent for a company
whose cyber risk program was rated at a 3.0 on a Capability Maturity Model Integration
(CMMI®) scale.9 Factored in to our company profiles were assumptions about each
fictitious organization’s cyber risk CMMI score. We adjusted premium increases
proportionately up or down based on the company’s maturity above or below that grade.
For Scenario A, we assumed the company had a cyber risk program rated a 2.0 on the CMMI
scale. For Scenario B, we assumed the company had a cyber risk program rated a 4.0 on the
CMMI scale. Further, we assume that in many cases, by demonstrating cybersecurity
program improvements, lower insurance premiums could be negotiated after a one-year
period. Increased cost to raise debt occurs when, as a result of a drop in credit rating, the
victim organization faces higher interest rates for borrowed capital, either when raising
debt, or when renegotiating existing debt. Organizations appear to be perceived as higher-
risk borrowers during the months following a cyber incident. Deloitte analyzed the credit
rating of nine closely related public companies (from the same industry and comparable in
size) and observed an average Standard & Poor’s credit rating of A, and assessed these
companies against companies which had recently suffered a cyber incident.10 It was
observed that, in the short term, the credit rating agencies typically downgrade by one level
companies that have experienced a cyber incident. For purposes of establishing costs in
Scenario A (this impact factor is not applicable in Scenario B), a postcyber incident credit
rating decline from A to Baa was assumed.11 Bloomberg’s median yields for a large
universe of corporate bonds (a composite index) were applied. A yield for a typical 10-year,
A-rated corporate bond was 3.44 percent.12 This same median yield for a universe of Baa-
rated corporate bonds was 4.48 percent, resulting in an incremental yield due to rating
drop of 1.04 percent. The health plan company in Scenario A seeks to finance $1 billion over
ten years for an acquisition. After suffering a cyber incident, it would cost the company
$242.5 million in interest, as opposed to the $183.3 million it would have cost the company
had it not sustained a cyber incident—an increased borrowing cost of $59 million over the
term of the loan. Impact of operational disruption or destruction is a highly variable cost
category that includes losses tied to manipulation or alteration of normal business
operations and costs associated with rebuilding operational capabilities. This could include
the need to repair equipment and facilities, build temporary infrastructure, divert resources
from one part of the business to another, or increase current resources to support
alternative business operations to replace the function of systems that have been
temporarily shut down; it could also include losses associated with inability to deliver
goods or services. The nature of operational disruption—and therefore the appropriate
method of calculating its impact—is very specific to each situation and requires direct
knowledge of a number of distinct information components. 22 For Scenario A, calculating
the financial impact of operational disruption entails estimating costs associated with hiring
an external professional services organization to augment call center staffing so that
coverage can be confirmed for claims submitted during the two-week triage period that the
patient care application is shut down. Using data obtained from Truven Health Analytics
MarketScan,13 an analysis was run to determine, based on the average number of claims
generated per member per health care visit (3.7), and the average percentage of insurance
claims that are typically pre-qualified for insurance coverage (75 percent), that the
temporary call center would handle almost 2.5 million claims over the two-week period,
requiring over 800,000 hours of staff time and roughly 100 hours of supervisory time. This
equates to approximately $27 million in personnel costs at typical hourly rates. Added to
this are approximately $3 million in computing and communications infrastructure
equipment and services, totaling approximately $30.0 million in operational disruption
costs. In situations such as Scenario B, a precise bottom-up calculation may be most desired,
however, such an effort would require gathering a wide range of very detailed information
over the duration of the actual incident response and recovery efforts, such as personnel
hours spent on unplanned efforts, salary costs, impact of lost opportunity, excess R&D costs,
and others. Absent such detailed information, a macro-level projection of impact to the
company is often done by calculating an estimate of the decline in operating profit margin;
such an effort was employed by Deloitte for this scenario. Leveraging available data on the
profit margins of public companies in this industry, and assuming that this enterprise prior
to the incident had a typical operational efficiency profile (equating to a 12.2 percent
operating profit margin), the company would have generated overall operating profits of
almost $4.9 billion annually before the incident. After the incident, the company sees a
reduction in operating margin due to a loss in revenue over the same fixed costs, with the
addition of cybersecurity improvement costs and additional R&D efforts. Assuming the
company’s profit margin drops to 9.2 percent, its operating profit drops to less than $3.7
billion, resulting in a $1.2 billion loss in operating profits. Beneath the surface of a
cyberattack A deeper look at business impacts Beneath the surface: Hidden or less visible
costs Lost value of customer relationships Value of lost contract revenue Devaluation of
trade name During an initial triage period immediately following a breach, it can be hard to
track and quantify how many customers are lost. Economists and marketing teams
approach this challenge by attaching a “value” to each customer or member to quantify how
much the business must invest to acquire that customer or member. They then look at the
likely revenue that this one customer or member will generate for the business over time.
These numbers can then be evaluated per industry and particular organization to estimate
how much investment is needed to attract and acquire new customers. The value of lost
customer relationships is not applicable to Scenario B because the technology company
does not sell directly to individual consumers. In Scenario A, the average attrition rate of
existing customers (or members) is assumed to be 7 percent. After the incident, the attrition
rate for customers or members is estimated to increase by approximately 30 percent to 9.1
percent. The attrition rate is estimated to return to normal (7 percent) after three years.
New member acquisition in the first year after the incident is estimated to decrease by 50
percent. We then estimated the value of customer relationships by calculating the
incremental after-tax cash flows (or “excess earnings”) attributable only to the customer
relationships and used the with-and-without method, as described earlier, to evaluate the
impact of lost customers (or members) due to a cyber incident. Value of lost contract
revenue (or value of premiums, in the case of the health insurer in Scenario A) includes
revenue and ultimate income loss, as well as lost future opportunity associated with
contracts that are terminated as a result of a cyber incident. Devaluation of trade name is an
intangible cost category referring to the loss in value of the names, marks, or symbols an
organization uses to distinguish its products and services. A brand name is associated with
the name of a specific company or a specific product, whereas a trade name relates to an
organization as a whole. To determine the financial impact of a cyber incident on the value
of a company’s trade name, the likely value of the trade name both before and after the
cyber incident was assessed. To value the trade name itself, Deloitte employed the relief-
from-royalty method. The relief-fromroyalty method, commonly used to value IP assets
such as trade names, estimates the value by analyzing what another entity would have to
pay to license the company’s trade name. Our analysis involved establishing a reasonable
“royalty fee” by looking at royalty fees or rates paid in actual royalty transactions for similar
types of IP, and the analysis of profit margins across the industries to which our fictitious
companies belong, to determine what a typical company in the industry would have the
capacity to pay. Using this data, Deloitte calculated the royalty rate for the health plan
company in Scenario A to be 2 percent, and 1.5 percent for the technology company in
Scenario B. The value of the trade name at the time of the cyber incident (using present-
value calculations) was then derived by applying the royalty rate to each company’s future
revenues (tax-adjusted) over time. To determine the financial impact of the lost contracts or
premiums, Deloitte estimated the value of the contracts both before and after the
cyberattack was assessed. Following a cyberattack, if the subject company were to lose
contracts, we assumed there would be a decrease in revenues. We determined the present
value (meaning an estimate of the value of a future income stream depicted in present
dollar terms; receiving a dollar today is worth more than receiving a dollar in the future,
since one could earn interest on that dollar) of cash flows that the company would earn over
the term of the contracts. For Scenario A, we estimated the value of the contracts (or
premiums) by calculating the incremental after-tax cash flows (or “excess earnings”)
attributable only to the contracts (or premiums). For Scenario B, given the size and
importance of the potential lost contract to the federal government (and because for a large
organization such as a federal agency, replacing a technology investment is often a time-
consuming and costly endeavor), we did not assume 100 percent certainty of the loss.
Instead we assumed a 50 percent likelihood of contract cancellation following the
cyberattack in an effort to account for the probability of such an impactful effect occurring.
The resulting probability estimate of impact to the company is a loss in value of $1.6 billion
due to the cyber event. The net cash flows generated by the company over a five-year period
with the contract in place were discounted using a 12 percent discount rate to yield a value
of $15 billion. For both scenarios, we used the with-and-without method to evaluate the
impact of lost customers (e.g., members, in the case of Scenario A) due to a cyber incident
over a five-year period, the period of time over which the incident is estimated to affect the
company. The difference in value estimates between these two calculations yields the value
eroded due to loss of the contracts or premiums. Loss of intellectual property (IP) Loss of IP
is an intangible cost associated with loss of exclusive control over trade secrets, copyrights,
investment plans, and other proprietary and confidential information, which can lead to
loss of competitive advantage, loss of revenue, and lasting and potentially irreparable
economic damage to the company. Types of IP include, but are not limited to, patents,
designs, copyrights, trademarks, and trade secrets. In the case of the technology company in
Scenario B, its IP is composed of trade secrets related to its various product lines. A trade
secret is any confidential business information or technology that provides a company with
a competitive advantage. Unlike other types of IP, trade secrets are protected indefinitely
until publicly disclosed. Similar to the value of a trade name, the value of IP is estimated by
approximating how much another party would pay to license that IP. To value the loss of the
technology company’s IP, Deloitte used the with-and-without method to compare the
results of a relief-from-royalty analysis prior to the cyber incident to the results after the
cyber incident. Using the method described above, Deloitte calculated the royalty rate
applicable for this company at 2.5 percent. The value of the IP at the time of the cyber
incident (using present-value calculations) was then derived by calculating 2.5 percent of
the company’s future revenues (tax-adjusted) over time. Given the characteristics of the
stolen IP, its useful life was assumed to be five years and, according to assumptions
provided in the company’s profile, was directly tied to 50 percent of the technology
company’s total revenues. 23 Authors Emily Mossburg Principal | Deloitte Advisory Cyber
Risk Services Deloitte & Touche LLP John Gelinne Managing Director | Deloitte Advisory
Cyber Risk Services Deloitte & Touche LLP Hector Calzada Managing Director | Deloitte
Advisory Valuation Services Deloitte Transactions and Business Analytics LLP Contributors
Amy Kroll, Principal, Advisory Heath Care Leader, Deloitte & Touche LLP Irfan Saif,
Principal, Advisory Technology Sector Leader, Deloitte & Touche LLP Harsh Dalwadi, Senior
Manager, Cyber Risk Services, Deloitte & Touche LLP Amy Edwards, Senior Manager,
Forensic and Investigation Services, Deloitte Financial Advisory Services LLP Emily Johns,
Manager, Valuation Services, Deloitte Transactions and Business Analytics LLP Arun
Perinkolam, Senior Manager, Cyber Risk Services, Deloitte & Touche LLP Sarah Robinson,
Consultant, Cyber Risk Services, Deloitte & Touche LLP Beth Ruck, Senior Manager,
Advisory Marketing, Deloitte Services LLP Secure.Vigilant.Resilient. To grow, streamline,
and innovate, many organizations have difficulty keeping pace with the evolution of cyber
threats. The traditional discipline of IT security, isolated from a more comprehensive risk-
based approach, may no longer be enough to protect you. Through the lens of what’s most
important to your organization, you must invest in cost-justified security controls to protect
your most important assets, and focus equal or greater effort on gaining more insight into
threats, and responding more effectively to reduce their impact. A Secure.Vigilant.Resilient.
cyber risk program can help you become more confident in your ability to reap the value of
your strategic investments. Contact us BEING SECURE means having riskfocused defenses
around what matters most to your mission. For an electronic version of this paper, please
go to: http://www2.deloitte.com/us/beneath-the-surface-of-a-cyberattack Please direct
inquiries to cyberriskinfo@deloitte.com BEING VIGILANT means having threat awareness
to know when a compromise has occurred or may be imminent. BEING RESILIENT means
having the ability to regain ground when an incident does occur. This document contains
general information only and Deloitte Advisory is not, by means of this document, rendering
accounting, business, financial, investment, legal, tax, or other professional advice or
services. This document is not a substitute for such professional advice or services, nor
should it be used as a basis for any decision or action that may affect your business. Before
making any decision or taking any action that may affect your business, you should consult
a qualified professional advisor. Deloitte Advisory shall not be responsible for any loss
sustained by any person who relies on this document. About Deloitte As used in this
document, “Deloitte” means Deloitte & Touche LLP, Deloitte Financial Advisory Services
LLP, and its affiliate, Deloitte Transactions and Business Analytics LLP. Deloitte
Transactions and Business Analytics LLP is not a certified public accounting firm. These
entities are separate subsidiaries of Deloitte LLP. Please see
“http://www.deloitte.com/us/about” www.deloitte.com/us/about for a detailed
description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may
not be available to attest clients under the rules and regulations of public accounting.
Copyright © 2016 Deloitte Development LLC. All rights reserved. February 12, 2013 Raising
the Bar for Cybersecurity James A. Lewis “What was previously classified as an unlikely but
very damaging event affecting one or a few institutions should now probably be thought of
as a persistent threat with potential systemic implications.” 1—Dennis Lockhart, President,
Atlanta Federal Reserve Bank Executive Summary Analysis of successful attacks has
provided good data on both the techniques used in breaching corporate networks and the
steps needed to prevent such breaches. However, this information is not reflected in
practice. Companies underestimate the risk they face of being breached or hacked. Most
companies only find out that they have been hacked when told by a third party. This could
raise questions of fiduciary responsibility as greater awareness of risk grows in the
business community and in government. Hacking is incredibly easy; survey data
consistently shows that 80 to 90 percent of successful breaches of corporate networks
required only the most basic techniques. Hacking tools are easily acquired from the
Internet, including tools that “crack” passwords in minutes. In the last few years, in 2009
and 2010, Australia’s Defense Signals Directorate (DSD) and the U.S. National Security
Agency (NSA) independently surveyed the techniques hackers used to successfully
penetrate networks. NSA (in partnership with private experts) and DSD each came up with
a list of measures that stop almost all attacks. DSD found that four risk reduction measures
block most attacks. Agencies and companies implementing these measures saw risk fall by
85 percent and, in some cases, to zero. These measures are “whitelisting,” which allows only
authorized software to run on a computer or network, very rapid patching both operating
systems and programs, and minimizing the number of people on a network who have
“administrator” privileges. Implementing these four steps eliminates most of the risk of
being breached. When the DSD mitigation strategies or their U.S. equivalent are combined
with “continuous monitoring” of risk (a term borrowed from the financial risk and audit
communities), they provide corporations and agencies the ability to identify and mitigate
the risk of cyber attack. Companies may need to use other measures and services to secure
their intellectual property and networks (from politically motivated denial-of-service
attacks, for example), but implementing these mitigation strategies through continuous
monitoring for risk is essential for exercising due diligence in protecting shareholder value.
The White House should direct agencies, in implementing any executive order on
cybersecurity and critical infrastructure, to immediately adopt these mitigation strategies
as an initial measure while the National Institute of Standards and Technology (NIST)
develops its comprehensive set of standards. 1 Kelly Faircloth, “Cyberattacks on Banks
Worry the President of the Atlanta Fed,” BetaBeat.com, November 27, 2012,
http://betabeat.com/ 2012/11/atlanta-federal-reserve-president-dennis-lockhart-berlin-
cyberattacks-ddos-hactivists/. 2 Hacking Is Easy Extracting value from the computers or
networks of unsuspecting companies and government agencies has become a big business.
No company or agency can ignore network security; it is the source of systemic risk that
threatens long-term health and profitability. Companies must secure their networks if they
are to exercise fiduciary responsibility and due diligence. Cybersecurity is part of the larger
corporate strategy for managing risk and compliance. Cybersecurity risk management is
becoming a board-level responsibility. This paper identifies how those responsibilities can
be met. In the past few years, a new approach to cybersecurity has emerged, based on the
analysis of data on successful attacks. In this approach, continuous diagnostics and
mitigation replace the reactive network security methods used in the past. The approach
combines continuous monitoring of network health with relatively straightforward
mitigation strategies. The strategies used in this approach reduce the opportunities for
attack and force attackers to develop more sophisticated (and expensive) techniques or to
give up on the target. In combination, continuous monitoring and mitigation strategies
provide the basis for better cybersecurity. Hacking Is Not that Hard More than 90% of
successful breaches required only the most basic techniques. Only 3% of breaches were
unavoidable without difficult or expensive actions. Outsiders were responsible for most
breaches. 85% of breaches took months to be discovered; the average time is five months.
96% of successful breaches could have been avoided if the victim had put in place simple or
intermediate controls. 75% of attacks use publicly known vulnerabilities in commercial
software that could be prevented by regular patching. One study found that antivirus
software missed as much of 95% of malware in the first few days after its introduction.
Another study found that 25% of malware is not detected by current techniques.
Cybersecurity is a term that means many different things to many people. It has leapt into
prominence as networks moved to the center of business operation, linking companies to
what turns out to be a very risky environment. Cyberspace is the Wild West. Governments
have not agreed on the “rules” that should apply to cyberspace, or how to apply existing
“rules” for espionage, crime, and warfare. Just as Bonnie and Clyde would rob a bank in one
state and drive across the border into another state, with the pursing sheriff stopping at the
border, smart hackers take advantage of borders and the Internet’s ability to cross them
with ease and without fear of punishment. They live in countries that tolerate or encourage
their activities; they are often outside the grasp of national law enforcement. There are
efforts underway to change this, but it will take time to make cyberspace more secure. A
good way to think about the cybersecurity challenge is to divide it into three problems: 1.
State versus state conflict. Cyber war, involving attacks that create physical damage, get the
most attention and involve the greatest potential risk to nations and in some instances, such
as the recent “Shamoon” attack against Aramco, to companies. 2 2. Espionage. The spread of
high-speed global networks makes it easy to extract massive quantities of information.
Powerful government agencies target companies, as can competitors and private hackers
seeking intellectual property and business confidential information. 3. Crime. A cyber-
criminal underworld has existed for years, focused on extracting personal information and
cash (rather than intellectual property). If a cyber criminal is smart and lives outside the
United States, in a country that offers sanctuary, he or she faces almost no risk of
prosecution. When we look at successful attacks, it is embarrassing to note that these are
not sophisticated exploits carried out 2 In August 2012, a group called “Cutting Sword of
Justice” linked to Iran claimed it had used the “Shamoon” virus to attack Aramco, a major
Saudi oil supplier, deleting data on 30,000 computers and infecting (without causing
damage) control systems. The attack also affected the Qatar company RasGas, a major LNG
supplier. Other oil companies may have also been infected. 3 by evil geniuses. Hacking is all
too easy. One report estimated that targeted attacks against businesses and governments
increased to about 30,000 a year in 2012. 3 The metrics for estimating the damage from a
successful hack are not well established. Companies can suffer reduced valuation after they
have been hacked, usually in the form of a drop in stock prices. These losses can be
significant—ranging from 1 to 5 percent—but the decline is not permanent. Stock prices
usually recover by the next quarter. However, it will be interesting to see if this changes as a
result of new Securities and Exchange Commission regulations that require companies to
report major hacking incidents. In the future, the recovery of stock prices may not be so
quick if it is known that there is significant damage to a company’s intellectual property
portfolio. It is harder to estimate the damage from the loss of intellectual property (IP). IP
now makes up a major part of most companies value, but often the value of this IP is not
known until it is put on the market. Counting how much was spent to create the IP is not a
good measure of worth. It also takes time for an acquirer to turn stolen IP into a competitive
product. In some cases, the damage may not be visible for years. In other cases—such as
designs for high-speed trains, automobiles, or wind turbines—the competing product may
reach market before the victim company’s own design. The scale of loss and its effect,
however, remains a subject of dispute. Anecdotal evidence suggests that cyber crime against
banks and other financial institutions probably costs the United States hundreds of millions
of dollars every year. Estimates of the dollar value of annual losses to businesses from cyber
espionage show a tremendous range, from a few billion dollars to hundreds of billions, but
it is safe to say that this is large and growing. Most people are now aware of the problems
with cybersecurity. What many do not know, however, is how simple it is to hack. Currently,
the question for hackers, highly skilled or not, is why bother with a high-end attack when
something simple will probably work as well. A reasonable goal for policy would be to make
hackers work harder for their success. This will reduce both the number of successes and
the number of hackers capable of achieving success. Improving the primary level of security
will not solve the cybersecurity problem, but it will make it more manageable and,
ultimately, easier to “solve.” Numerous studies confirm that hacking is not that hard.
Surveys in 2011 and 2012 showed that more than 90 percent of successful penetrations of
company networks required only the most basic techniques. Outsiders were responsible for
most breaches, and most went undetected for weeks. Usually it was a third party that
discovered them. One 2012 survey found that 92 percent of attacks were not highly difficult
and that only 3 percent of breaches were unavoidable without difficult or expensive
corrective action. 4 “Most victims fell prey because they were found to possess an (often
easily) exploitable weakness.” 5 Ninety-six percent of successful breaches could have been
avoided if the victim had put in place simple or intermediate controls. Eighty-five percent of
penetrations took months to be discovered—the average time is five months—and the
discovery in most cases was usually made by a third party (such as a credit card company)
rather than the victim. 6 There is a growing cadre of highly skilled hackers, often the proxies
of a state that gives them sanctuary. These hackers use programs that continuously scan
their target for vulnerable systems, even test systems that are only temporarily online. They
have advanced programming skills to identify new vulnerabilities and to create the
malicious software (malware) needed to exploit them. With their ability to target specific
high-value networks, these high-end hackers can challenge all but the most sophisticated
defenders. Equally important, they build and sell the tools and techniques that let less
experienced hackers perform successful attacks. Eventually, the work of the advanced
hackers in both vulnerability identification and malware writing appears on the cyber black
market, becoming globally available. 3 Symantec, Internet Security Threat Report: 2011
Trends, vol. 17 (Mountain View, CA: Symantec, April 2012), p. 14,
http://www.symantec.com/content/en/us/enterprise/other_resources/b-
istr_main_report_2011_21239364.en-us.pdf. 4 Verizon, “2012 Data Breach Investigations
Report,” http://www.verizonbusiness.com/resources/reports/rp_data-breach-
investigationsreport-2012_en_xg.pdf. 5 Ibid., p. 3. 6 Trustwave, “Global Security Report
2010,”
https://www.trustwave.com/downloads/whitepapers/Trustwave_WP_Global_Security_Re
port_ 2010.pdf. 4 But successful hacking does not require this level of skill. Relatively simple
“hacks” work all too well, and even highend opponents use them—why use a sophisticated
assault when the target can be overcome with a simple one. Most companies that were
hacked fell victim because hackers found an easily exploitable weakness. It is so easy that
hackers don’t have to try very hard because most networks are poorly defended.
Eliminating the vulnerabilities exploited by these “easy” hacks will shrink the pool of
successful hackers as the less skilled drop out. It will increase the cost for attackers, as they
have to put more work into penetrating a target network. Vulnerability mitigation
strategies reduce the avenues for potential attack and force attackers to develop more
sophisticated (and expensive) techniques or give up on the target. The effect will be to
reduce risk and allow companies to focus resources on high-end threats. The tools for these
“easy” hacks are widely available and in some cases freely downloadable from the Internet.
A Washington Post series explored how hackers can use “Shodan,” a downloadable search
engine that identifies vulnerable networks and infrastructures, or download programs like
“Wireshark,” “Aircrack,” or “Metasploit,” 7 programs developed as network maintenance
and security tools that can be misused for criminal purposes. Hackers have used such tools
to create thousands of exploits. Metasploit, for example, is portrayed as a legitimate
research tool, but like any tool, it can easily be turned to malicious purposes. It creates
programs that can use the Internet to find vulnerable networks and then take control of
them. Metasploit has an “open source” version to which anyone can contribute, allowing
researchers to share new techniques and hackers to share successful exploits, 8 but it is
only one of dozens of downloadable hacking tools. Cybersecurity Is Feeble The ability to
download hacking tools means that a determined 12-year old with some basic computer
skills, if he or she has an Internet connection, can become a successful hacker. For the more
advanced, there are cyber-crime black markets that sell personal data, credit card
information, tools, passwords, and successful exploits. Criminals can rent “bot-nets” from
the cybercriminal underworld or even purchase complete online stores to collect personal
information or to sell bogus products. This is a competitive market, with price wars,
guarantees, and special offers. Hacking has become a big business, not only because the
Internet is now “where the money is,” but because most networks, despite claims to the
contrary, are inadequately defended. 9 Uneven Implementation 45% of surveyed
companies believed they were doing well; a review showed only 10% were taking adequate
steps. 70% of surveyed companies use malware detection tools, but only 50% have
automated patch management or use intrusion detection tools. Only 33% use robust
identity and account management systems. One study found that 75 percent of attacks used
publicly known vulnerabilities in commercial software that could be prevented by regular
patching—in patching, the software company that made the product sends over the
Internet a small fix to an existing program to improve performance or eliminate a
vulnerability. A failure to patch leaves the vulnerability unfixed, something hackers are
quick to exploit. While patching is essential, it is not enough. When software vendors
announce and ship patches, hackers analyze the patches and can often develop exploits for
the problem faster than companies can install the patch. Twenty-five percent of attacks
reviewed in this study were new, unknown to defenders, and could not have been stopped.
Many security controls—firewalls, intrusion prevention, antivirus—fail to prevent these
attacks from succeeding. Often, malware will delete itself after running, and attackers have
improved their ability to clean up and hide 7 SecTools.org, “SecTools.Org: Top 125 Network
Security Tools,” http://sectools.org/. Robert O’Harrow Jr., “Hacking tool kits, available free
online, fuel growing cyberspace arms race,” Washington Post, November 13, 2012,
http://www.washingtonpost.com/investigations/hacking-tool-kits-available-free-online-
fuel-growing-cyberspace-arms-race/2012/11/12/ 1add77a4-21e6-11e2-ac85-
e669876c6a24_story_1.html. 9 Panda Security, “The Cyber-Crime Black Market:
Uncovered,” January 2011,
http://press.pandasecurity.com/wpcontent/uploads/2011/01/The-Cyber-Crime-Black-
Market.pdf. 8 5 evidence of what they have done. This complicates the defenders task if
their approach is reactive, requiring an analysis of the malware to determine how it
functioned and what had been infected. One way to assess the ease of hacking is to look at
the ease of breaking into a network using illicitly obtained passwords. Essentially, the
password as we know it is completely useless as a defense. Any password based on a name
or word can be rapidly “cracked” with widely available online tools. Passwords based on
personal information, such as birthdays, are also easy to guess. Information on social
networks can be harvested by hackers to get the personal data that will let them guess
passwords. Searching Google on the keywords “password cracker” gets 21 million results,
offering free password crackers and advice on how to use them. The hacker’s task is made
easier by the reuse of passwords, where people use the same password for multiple systems
and websites. This reuse is a very common avenue for attack vector, and some data suggests
that password reuse is actually a bigger problem than a weak password. Passwords no
longer provide any more than the most basic security. 10 Default settings on computing and
network devices are another easy path for attack. Anyone who has bought a computer or
other network device knows that the manufacturer sets the password and user name to
“admin” and “password.” Criminals know this, too. People forget to change these default
settings or, for large networks, change most but not all of the settings. A U.S. Air Force study
found that in large organizations with thousands of machines, perhaps 5 percent were
configured to use the default password and user name. Hacking tools can search
automatically for these misconfigured devices. The most popular technique for hacking
currently is phishing, which combines fraud and malicious software to bypass many
traditional security measures. Individuals in a company are sent a message that appears to
be from a legitimate e-mail address (these addresses are easily spoofed). It has an with a
tempting subject, like “Next Year’s Bonuses.” Sent to a hundred people, hackers can count
on a few of them to open the document or click on the link, which immediately installs the
malicious software. Advanced hackers may use personal data culled from social network
sites to “personalize” the e-mail and make it look more convincing. How immediate and how
visible the damage will be depends on what is taken. Confidential business information,
such as sales and marketing plans, plans for new products, or financial data, is immediately
profitable for the acquirer. One major oil company lost exploration data that cost it billions
of dollars. A major bank saw $10 million extracted in two days; it avoided the damaging
publicity by reclassifying the loss as an “operating expense.” Companies lose merger and
acquisitions strategies and information to hacking, a loss that has an immediate effect—
think of the other side of the table having a copy of your briefing book and knowing your
bottom line. The recent attacks on Aramco, where 30,000 company computers had their
data erased permanently, along with credible reports of the huge losses of military and
commercial technology intellectual property and business confidential information,
demonstrate that what governments and companies are doing now in cybersecurity is not
working effectively—despite spending as much 7 percent of their information technology
(IT) budgets on it. One estimate puts annual spending globally on cybersecurity software at
almost $18 billion. 11 However, there is evidence to suggest that the traditional methods
are not working. One study found that initial detection rates for antivirus software—there
are now almost 50 million different viruses on the Internet—were less than 5 percent when
the malware was introduced and that, on average, it took almost a month to update
detection mechanisms and spot the new viruses. Another study found that detection rates
averaged about 20 percent. 12 Hackers can avoid detection by making minor changes to
their malware to evade detection, and some use the updates from security companies to see
if their exploits can be detected by the latest updates. 10 Mat Honan, “Kill the Password:
Why a String of Characters Can’t Protect Us Anymore,” Wired, November 15, 2012,
http://www.wired.com/ gadgetlab/2012/11/ff-mat-honan-password-hacker/. 11 Nicole
Perlroth, “Outmaneuvered at Their Own Game, Antivirus Makers Struggle to Adapt,” New
York Times, December 2012,
http://www.nytimes.com/2013/01/01/technology/antivirus-makers-work-on-software-
to-catch-malware-moreeffectively.html?pagewanted=all; Gartner, Inc., “Gartner Says
Security Software Market Grew 7.5 Percent in 2011,” press release, April 26, 2012,
http://www.gartner.com/it/page.jsp?id=1996415. 12 Imperva, “Assessing the
Effectiveness of Antivirus Solutions,” Hacker Intelligence Initiative: Monthly Trend Report
#14,
http://www.imperva.com/docs/HII_Assessing_the_Effectiveness_of_Antivirus_Solutions.pdf
. 6 Some business groups argue that companies could improve their network security if
there were greater information sharing between themselves and the government.
Information sharing is passive and reactive, however, and will always miss a considerable
number of attacks (such as the 95 percent of malware missed after its introduction). 13
Someone learns of an attack, analyzes it, and then sends information about it to others. Even
if this were done in a matter of hours, it will not work for the 25 percent of attacks that are
unknown, nor will it work for rapidly executed attacks, some of which can occur in minutes.
Information sharing and reactive approaches to cybersecurity are not effective. Another
traditional approach, the use of “signatures” to identify an attack, is also becoming less
effective. A signature is a pattern of code that has been identified as malware. Computers
can be programmed to look for that malicious pattern and block it. If the pattern is not
known, the attack is not blocked (which is one of the limitations on information sharing).
The New York Times found that only one of the 45 kinds of malware used in an attack on its
networks was detected by its antivirus program. 14 Attackers have also become more
sophisticated in evading signature-based controls, often testing their malware on antivirus
programs before deployment to see if they can be detected. Advanced attacks can bypass
signature-based defenses. The cybersecurity problem is often presented as the result of a
lack of resources. Yet every year, increasing amounts of money are devoted to
cybersecurity. The research for this report suggests that the real problem is that
cybersecurity resources, adequate or not, are often spent on ineffective activities. Another
major problem in cybersecurity is the tendency of corporate leadership to treat it as an “IT
problem” best left to chief information officers and technicians. This may have been the
right course of action a decade ago, but it is now badly outdated. A better way for a C-suite
to think about cybersecurity is that it is the source of a damaging “material effect,” hurting a
company’s profits, value, and financial future, that will be increasingly difficult to ignore. 15
One survey taken in 2012 found uneven implementation of cyber defense among leading
companies. Many companies in the survey believed they were doing well in securing their
networks, but a review showed that most were not. While 70 percent used some kind of
malware detection tools, only half of the surveyed companies had automated patch
management or used intrusion detection tools. Only a third used some form of identity and
account management (meaning that an employee’s identity must be robustly verified before
he can access the network and that, when an employee leaves, the account is automatically
closed). Overall, the survey found a “diminution of detection technology arsenals” with
declines in the use of malware and intrusion detection tools for, as well as tools for
vulnerability scanning, security event correlation, and data loss prevention. 16 A similar
survey in Japan found that more than half of the surveyed companies were not even
considering cyber countermeasures. 17 There will always be risk in cyberspace, just as
there is risk in driving a car, mailing a letter, or flying in an airplane. The goal is to make
online activities no riskier than offline activities—to “normalize” cyberspace. Right now,
that is not the case and the risks will grow as we become more dependent on software and
computers….

More Related Content

Similar to Provide a MEMO.docx

How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Ahad
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
The 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party RiskThe 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party RiskElizabeth Dimit
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Booz Allen Hamilton
 
What Every CISO Should Learn From the Target Attack
What Every CISO Should Learn From the Target AttackWhat Every CISO Should Learn From the Target Attack
What Every CISO Should Learn From the Target AttackBooz Allen Hamilton
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsSarah Cirelli
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Silvia Cardona
 
Consider the security of a personal computer. List a few of the atta.pdf
Consider the security of a personal computer. List a few of the atta.pdfConsider the security of a personal computer. List a few of the atta.pdf
Consider the security of a personal computer. List a few of the atta.pdflejeunehayneswowel96
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfgokuforhelp
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmDavid Sweigert
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10David X Martin
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016Ben Browning
 
LogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperLogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperTom Salmon
 

Similar to Provide a MEMO.docx (20)

How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
The 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party RiskThe 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party Risk
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
What Every CISO Should Learn From the Target Attack
What Every CISO Should Learn From the Target AttackWhat Every CISO Should Learn From the Target Attack
What Every CISO Should Learn From the Target Attack
 
Cybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial InstitutionsCybersecurity Risk Management for Financial Institutions
Cybersecurity Risk Management for Financial Institutions
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014
 
Consider the security of a personal computer. List a few of the atta.pdf
Consider the security of a personal computer. List a few of the atta.pdfConsider the security of a personal computer. List a few of the atta.pdf
Consider the security of a personal computer. List a few of the atta.pdf
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdf
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10
 
Ics white paper report 2017
Ics white paper report 2017Ics white paper report 2017
Ics white paper report 2017
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
 
LogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector WhitepaperLogRhythm Reducing cyber risk in the legal sector Whitepaper
LogRhythm Reducing cyber risk in the legal sector Whitepaper
 

More from write30

Symposium.docx
Symposium.docxSymposium.docx
Symposium.docxwrite30
 
Subprime Education.docx
Subprime Education.docxSubprime Education.docx
Subprime Education.docxwrite30
 
Strategic 5 year plan.docx
Strategic 5 year plan.docxStrategic 5 year plan.docx
Strategic 5 year plan.docxwrite30
 
Spinoza and Maimon were among the first Jews to join.docx
Spinoza and Maimon were among the first Jews to join.docxSpinoza and Maimon were among the first Jews to join.docx
Spinoza and Maimon were among the first Jews to join.docxwrite30
 
Spanish Tongue Oppression in the United States.docx
Spanish Tongue Oppression in the United States.docxSpanish Tongue Oppression in the United States.docx
Spanish Tongue Oppression in the United States.docxwrite30
 
Socrates claim in the.docx
Socrates claim in the.docxSocrates claim in the.docx
Socrates claim in the.docxwrite30
 
The Epic of Gilgamesh.docx
The Epic of Gilgamesh.docxThe Epic of Gilgamesh.docx
The Epic of Gilgamesh.docxwrite30
 
Using the data in the extracts and your economic evaluate.docx
Using the data in the extracts and your economic evaluate.docxUsing the data in the extracts and your economic evaluate.docx
Using the data in the extracts and your economic evaluate.docxwrite30
 
The New Benefit Plan.docx
The New Benefit Plan.docxThe New Benefit Plan.docx
The New Benefit Plan.docxwrite30
 
Themed of Faith in the Middle and Europe.docx
Themed of Faith in the Middle and Europe.docxThemed of Faith in the Middle and Europe.docx
Themed of Faith in the Middle and Europe.docxwrite30
 
The Effect of Simulation on Identification of.docx
The Effect of Simulation on Identification of.docxThe Effect of Simulation on Identification of.docx
The Effect of Simulation on Identification of.docxwrite30
 
writing about a places york.docx
writing about a places york.docxwriting about a places york.docx
writing about a places york.docxwrite30
 
Write about the a fellow student in Residency at The.docx
Write about the a fellow student in Residency at The.docxWrite about the a fellow student in Residency at The.docx
Write about the a fellow student in Residency at The.docxwrite30
 
WORLD ARCHAEOLOGY.docx
WORLD ARCHAEOLOGY.docxWORLD ARCHAEOLOGY.docx
WORLD ARCHAEOLOGY.docxwrite30
 
Telephony Signaling.docx
Telephony Signaling.docxTelephony Signaling.docx
Telephony Signaling.docxwrite30
 
Three Sociological Paradigms.docx
Three Sociological Paradigms.docxThree Sociological Paradigms.docx
Three Sociological Paradigms.docxwrite30
 
Sources and Collection of Data.docx
Sources and Collection of Data.docxSources and Collection of Data.docx
Sources and Collection of Data.docxwrite30
 
SPH 511 Exposure Assessment Report.docx
SPH 511 Exposure Assessment Report.docxSPH 511 Exposure Assessment Report.docx
SPH 511 Exposure Assessment Report.docxwrite30
 
Species Briefing Report.docx
Species Briefing Report.docxSpecies Briefing Report.docx
Species Briefing Report.docxwrite30
 
The Model.docx
The Model.docxThe Model.docx
The Model.docxwrite30
 

More from write30 (20)

Symposium.docx
Symposium.docxSymposium.docx
Symposium.docx
 
Subprime Education.docx
Subprime Education.docxSubprime Education.docx
Subprime Education.docx
 
Strategic 5 year plan.docx
Strategic 5 year plan.docxStrategic 5 year plan.docx
Strategic 5 year plan.docx
 
Spinoza and Maimon were among the first Jews to join.docx
Spinoza and Maimon were among the first Jews to join.docxSpinoza and Maimon were among the first Jews to join.docx
Spinoza and Maimon were among the first Jews to join.docx
 
Spanish Tongue Oppression in the United States.docx
Spanish Tongue Oppression in the United States.docxSpanish Tongue Oppression in the United States.docx
Spanish Tongue Oppression in the United States.docx
 
Socrates claim in the.docx
Socrates claim in the.docxSocrates claim in the.docx
Socrates claim in the.docx
 
The Epic of Gilgamesh.docx
The Epic of Gilgamesh.docxThe Epic of Gilgamesh.docx
The Epic of Gilgamesh.docx
 
Using the data in the extracts and your economic evaluate.docx
Using the data in the extracts and your economic evaluate.docxUsing the data in the extracts and your economic evaluate.docx
Using the data in the extracts and your economic evaluate.docx
 
The New Benefit Plan.docx
The New Benefit Plan.docxThe New Benefit Plan.docx
The New Benefit Plan.docx
 
Themed of Faith in the Middle and Europe.docx
Themed of Faith in the Middle and Europe.docxThemed of Faith in the Middle and Europe.docx
Themed of Faith in the Middle and Europe.docx
 
The Effect of Simulation on Identification of.docx
The Effect of Simulation on Identification of.docxThe Effect of Simulation on Identification of.docx
The Effect of Simulation on Identification of.docx
 
writing about a places york.docx
writing about a places york.docxwriting about a places york.docx
writing about a places york.docx
 
Write about the a fellow student in Residency at The.docx
Write about the a fellow student in Residency at The.docxWrite about the a fellow student in Residency at The.docx
Write about the a fellow student in Residency at The.docx
 
WORLD ARCHAEOLOGY.docx
WORLD ARCHAEOLOGY.docxWORLD ARCHAEOLOGY.docx
WORLD ARCHAEOLOGY.docx
 
Telephony Signaling.docx
Telephony Signaling.docxTelephony Signaling.docx
Telephony Signaling.docx
 
Three Sociological Paradigms.docx
Three Sociological Paradigms.docxThree Sociological Paradigms.docx
Three Sociological Paradigms.docx
 
Sources and Collection of Data.docx
Sources and Collection of Data.docxSources and Collection of Data.docx
Sources and Collection of Data.docx
 
SPH 511 Exposure Assessment Report.docx
SPH 511 Exposure Assessment Report.docxSPH 511 Exposure Assessment Report.docx
SPH 511 Exposure Assessment Report.docx
 
Species Briefing Report.docx
Species Briefing Report.docxSpecies Briefing Report.docx
Species Briefing Report.docx
 
The Model.docx
The Model.docxThe Model.docx
The Model.docx
 

Recently uploaded

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesSHIVANANDaRV
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 

Recently uploaded (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 

Provide a MEMO.docx

  • 1. (Mt) – Provide a MEMO Beneath the surface of a cyberattack A deeper look at business impacts Beneath the surface of a cyberattack A deeper look at business impacts Foreword In our work and conversations with more than a thousand clients across virtually all industry sectors, we consistently hear that boards, executive management, and technology leaders are struggling to connect the dots on a wide range of topics familiarly grouped under the heading of “cyber.” At the core of this struggle is a view that business executives and security professionals seldom speak the same language and—perhaps more important—they rarely approach cyber challenges in a way that integrates multiple competencies to create better business context and insight in their cyber strategies. We have found this to be especially true in the estimation of risks and financial impact associated with cyberattacks. In particular, traditional approaches to calculating impacts of cyber incidents have focused largely on the direct costs associated with the theft of personal information. While this is helpful in certain situations, it does not account for the growing number and severity of incidents that do not necessarily involve the breach of customer or employee records—for example, the theft of intellectual property, the disruption of core operations, or the destruction of critical infrastructure. This focus on personal information is partly due to the availability of data, but it is also due to a tendency to emphasize the impacts that are visible and easiest to quantify. In order to provide a more complete view of the immediate and longer-term business impacts of cyber incidents, Deloitte Advisory has brought together our market leading Cyber Risk, Forensic & Investigation, and Valuation teams—supported by our industry practices—to demonstrate how a multidisciplinary approach can yield richer business insight into any organization’s cyber challenges. In Beneath the Surface of a Cyberattack: A Deeper Look at Business Impacts, we have leveraged our experience with a variety of cyber incidents and our deep industry knowledge to illustrate how 14 impact factors—including many that are not often visible—can affect an organization in the days, months, and years following a cyberattack. Using financial modeling, damages quantification, and business and asset valuation techniques, we have developed approaches and guidance for estimating both the direct and intangible costs associated with these impact factors. The resulting data is intended to provide greater clarity around the potential range and financial risks associated with these factors. This integration of cyber and valuation disciplines provides fuller insight that should inform the way organizations think about and plan for cyber incidents. It also reveals some important observations that are difficult to see through the traditional lens of direct cost—and hopefully will encourage organizations to think beyond the “conventional
  • 2. wisdom.” Edward W. Powers National Managing Principal Cyber Risk Services Deloitte Advisory Deloitte & Touche LLP J. Donald Fancher National Managing Principal Forensic & Investigation Services Deloitte Advisory Deloitte Transactions and Business Analytics LLP Justin Silber National Managing Principal Valuation Services Deloitte Advisory Deloitte Financial Advisory Services LLP Contents Foreword Introduction 1 Understanding impacts 4 Scenario A: US health insurer 8 Scenario B: US technology manufacturer 12 Scenario takeaways 16 Going forward 17 Appendix 19 Beneath the surface of a cyberattack A deeper look at business impacts Introduction A fundamental shift is occurring in the management of cyber risk. The idea that cyberattacks are increasingly likely—and perhaps inevitable—is beginning to take hold among executives and boards. Business leaders are realizing that we have interconnected our world mostly using technologies designed for sharing information, not protecting it. They recognize that they have to trust people—their own employees and the third parties they do business with—to handle sensitive information and operate critical infrastructure. And more and more they see that the intimate connection between their strategic agenda and the creation of cyber risk makes it infeasible for them to lock everything down and always put security first. As a result, many organizations are beginning to adopt what Deloitte calls a Secure.Vigilant. Resilient.™ approach1 to cyber risk, which appropriately balances investments in cybersecurity with efforts to develop better threat visibility, and the ability to respond more rapidly and more effectively in the event of a cyber incident. In order to prioritize properly, organizations should understand the types of cyber risk they face and be able to gauge their relative likelihood. And just as important, they need to understand the business impacts those risks are likely to involve. A significant challenge, however, is that common perceptions about the impact of cyberattacks are mostly shaped by what companies are required to report publicly— primarily theft of personally identifiable information (PII), payment data, and personal health information (PHI). Discussions tend to focus on costs related to customer notification, credit monitoring, and the possibility of legal judgments or regulatory penalties. Important work has been done in this area, and the industry is generally converging on the calculation of a “cost per record” for consumer data breaches.2 The costs commonly associated with data breaches are only the most widely understood impacts, the damage seen above the surface. But theft of PII is not always an attacker’s objective. Rarely brought into full view are cases of intellectual property (IP) theft, espionage, data destruction, attacks on core operations, or attempts to disable critical infrastructure. Beneath the surface, these attacks can have a much more significant impact on organizations. But the tolls they take are not broadly understood and are much more difficult to quantify. Organizations can understand these less obvious impacts, though, by employing a multidisciplinary approach that integrates deep knowledge of cyber incidents with business context, valuation techniques, and financial quantification. With better visibility into a broader range of the potential business impacts, leaders can transform the way they manage cyber risk and improve their ability to recover when a cyberattack occurs. 5 Understanding impacts Impact factors and the phases of incident response There are many ways a cyberattack can affect an organization, and the impacts will vary depending on the nature and severity of the attack. In general, there are 14 “impact factors” that business leaders should consider when preparing for cyber
  • 3. incidents (see illustration on page 3). Some are well-known, direct costs commonly associated with cyber breaches; others are more far-reaching, intangible costs that are both more difficult to quantify and often hidden from public view. These impact factors play out across an incident response lifecycle that can be broken down into three phases, which usually overlap one another and can extend differently over time, depending on the type of attack. Some of the impact factors are typically associated with one of the three phases and may represent one-time costs, such as regulatory fines. Other impact factors, such as legal costs or damages from IP loss, recur or are present throughout the recovery process. Illustrating cyberattack impacts over time To show how impact factors can play out when an actual attack occurs, the next sections present two scenarios—one featuring a health insurer, the other a technology company. The companies and the situations are fictitious, but the illustrations approximate how a stream of events might unfold and the effects they can have—both the familiar and the lesser-known consequences. Understanding the cyber risk of an organization requires knowledge of the business models, operational processes, trends, maturity levels, and vulnerabilities specific to that organization and generally present in its industry sector. The scenarios, therefore, were constructed from Deloitte’s deep and broad knowledge of the industries to which the fictitious companies belong. In addition to a brief company profile and description of a cyberattack, each scenario contains a Cyber Incident Response timeline. The timeline illustrates some of the major events and developments that may occur over a five-year period, which require both business and technical responses. It also depicts the duration of the three incident response phases and approximates the relative magnitude of their business impact. A summary table for each scenario shows the estimated financial impact and approximate duration for each of the 14 impact factors. Incident response lifecycle Incident triage is the highly reactive phase in the days or weeks after an attack is discovered. During this phase, business leaders direct near- term decisions and actions, including communication with external parties and formulation of strategies for continuity of important operations, if disruption has occurred. It includes the analysis of what occurred, immediate steps to stop compromises in progress, and emergency review and remediation of security controls. 2 Impact management involves the reactive efforts required in the weeks or months after an attack to reduce and address the direct consequences of the incident. Work streams can vary widely depending on the nature of the attack, but might include efforts to stand up interim infrastructure and adjust operational processes; reduce damage to client, customer and partner relationships; engage in cyber audit processes and respond to findings; and initiate or respond to legal or law enforcement matters. Business recovery is the remediation phase lasting months or years when attention turns toward repairing damage to the business and preventing the occurrence of a similar event in the future. Business recovery activity is also highly variable, but can include the rebuilding or redesign of business processes, systems, applications, or other assets; the development of strategies to rebuild reputation, revenue streams, and competitive advantage; investment in security improvements, detection systems, or preparedness capabilities—all with the goal of emerging from the crisis stronger than before. Beneath the surface of a cyberattack A deeper look at business impacts Fourteen cyberattack impact factors Technical investigation Customer breach notification Post-
  • 4. breach customer protection A wide range of direct and/or intangible costs contribute to the overall impact of a major cyber incident. Regulatory compliance Public relations Above the surface better-known cyber incident costs Attorney fees and litigation Cybersecurity improvements Insurance premium increases Increased cost to raise debt Impact of operational disruption or destruction Beneath the surface hidden or less visible costs Lost value of customer relationships Value of lost contract revenue Devaluation of trade name Loss of intellectual property 3 Calculating impacts Each of the 14 impact factors requires a specific approach for estimating cost. The illustration on page 3 shows that “above the surface” are many tangible, direct costs. These factors, generally wellunderstood, include such things as costs to notify customers or provide personal credit protection. They are relatively straightforward to approximate using a combination of profile information for each company, publicly available data, and cost assumptions derived from industry and market research. These assumptions are detailed in the appendix. “Beneath the surface,” however, many of the impacts are intangible and more difficult to quantify, including costs associated with loss of IP or contracts, credit rating impact, or damage to the value of a trade name. In situations where intangible assets are at risk, impact can be estimated using generally accepted standard financial measures, damage quantification methodologies, and valuation methods. The sidebar titled “Assigning Value to Intangible Losses” explains some of the underlying concepts for how impacts were analyzed in these categories. Further detail is provided in the appendix. Of course, a shift in the way the company was modeled or in the assumptions regarding the incident and the response could influence the analysis, leading to change in the potential financial impact. Furthermore, it is important to note that in some cyber incidents, all 14 impact factors will be felt; others may involve many, but not all. During Deloitte’s scenario calculation and financial analysis process, care was taken to account for each financial impact only once. 4 And finally, as those familiar with financial valuation techniques are aware, company values are typically modeled in perpetuity or extrapolated for an indefinite time period. However, our work quantifies the present value of the economic impact over a fiveyear period to demonstrate and account for a company’s ability to recover and mitigate damages resulting from a cyberattack. Assigning value to intangible losses Various financial modeling techniques were used to estimate the value of lost IP, damage to trade name, and impact of lost customer relationships and contracts. The following concepts are useful in understanding these methods. Valuation and financial quantification are associated with a specific point in time Given the time value of money and a wide range of unforeseen internal and external factors that may also impact the future value of an asset, the aim of the valuation process is to assign an estimated value or financial benefit to an asset at a specific point in time—in this case, the time the cyberattack was discovered. We applied the widely accepted Discounted Cash Flow Method under the Income Approach, which broadly entails estimating the present value of the projected economic benefits to be derived from the use of the asset. With-and-without method The “with-and-without” method is a comparative business valuation technique that involves estimating the value of an asset under two scenarios: one, with a certain asset or situation in place (the “situation,” in this context, being the occurrence of a cyberattack); and the other without the asset or situation in place (in this case, the absence of a cyberattack). The
  • 5. difference in these value estimates yields the isolated value impact that can be attributed to the situation. Reliance on assumptions Performing a valuation or damages/loss exercise often requires the use of professional judgment and reasonable assumptions in the absence of detailed, actual data. In our analysis of the impact of a cyber incident on particular assets in each of our hypothetical scenarios, we used typical industry benchmarks (or conducted research to identify benchmarks) to arrive at assumptions for a financial impact analysis. Some of these assumptions leverage Deloitte’s wealth of experience performing valuations and damages analyses in similar contexts, as well as broad practical knowledge of the industries represented in the scenarios. The cyber incident Scenario A: US health insurer About the company • $60 billion annual revenue • 50,000 employees • 23.5 million members across the US (60 percent subscribed through employer contracts) • Uses a patient care application, which provides medical alerts and allows health practitioners across its provider network to access patient records and insurance coverage information • Holds open enrollment (the annual period when people can enroll in health insurance plans) November through January • Regulated by both state and federal authorities • Plans to raise $1 billion in debt capital to acquire a health system • Pays $7 million annual premium for a $100 million cyber insurance policy 6 In May, the company learned that a laptop containing 2.8 million of its personal health information (PHI) records had been stolen from the company’s health care analytics software vendor. The compromise was revealed five days later when the company was notified by a corporate client that information associated with some of the client’s employees had been listed for sale on cybercrime “dark web” sites. Concurrently, administrators of the patient care application began to notice a significant increase in the number of new user accounts created and in active use. They also detected that an additional one million patient records had been downloaded from the application database and were unable to confirm it was for authorized use. As a result, the company shut down physician access to the patient care application and activated its cyber incident response team. The application was kept offline for two weeks while the incident was investigated. During this time, coverage and claims validation between the company and its physicians and providers had to be done manually, requiring help from a professional services organization to provide “surge support” in the company’s call center. Technical investigation revealed that cyberattackers had gained access to the patient care application using privileged credentials from the stolen laptop and had created a significant number of user IDs. Consequently, before service could be restored, new user accounts had to be issued for all application users, and new application and system controls were put in place. Beneath the surface of a cyberattack A deeper look at business impacts As the incident unfolded, impact to reputation and damage to trade name mounted. Lack of confidence in the company’s data protection practices resulted in the loss of customers for approximately three years as some corporate clients and individual subscribers chose other health plan alternatives. Higher borrowing costs resulted in the delay of a strategic acquisition and, most impactful, the incident forced the company to mitigate reputation damage and member loss by reducing its annual premium increase over a five-year period. The company faced ongoing scrutiny for its handling of the incident; many months after the breach their cyber insurance premiums were raised and legal fees
  • 6. accumulated as the company faced identity theft lawsuits. Above the surface In the short term, core business functions were disrupted by the shutdown of physician access to the patient care application. While the application was unavailable, physicians and providers relied on less effective and efficient means of receiving medical alerts, increasing risk to patients. Without full access to health insurance coverage information, physicians and providers could not be certain of the financial implications—to both their institution and their patients—associated with the choice of care they provided. Summary of the impact factors Beneath the surface The aftermath Term Post-breach customer protection 3 years 21.00 1.25% Cybersecurity improvements 1 year 14.00 0.83% Customer breach notification 6 months 10.00 0.60% Attorney fees and litigation 5 years 10.00 0.60% Regulatory compliance (HIPAA fines) 1 year 2.00 0.12% Public relations 1 year 1.00 0.06% Technical investigation 6 weeks 1.00 0.06% Value of lost contract revenue (premiums) 5 years 830.00 49.43% Lost value of customer relationships (members) 3 years 430.00 25.61% Devaluation of trade name 5 years 230.00 13.70% Increased cost to raise debt 5 years 60.00 3.57% Insurance premium increases 3 years 40.00 2.38% Operational disruption Immediate 30.00 1.79% Loss of intellectual property Not applicable – 0.00% $1,679.00 100.00% Total Cost (in millions) % Total cost Impact factor 7 Scenario A: Cyber incident response timeline—how the events and impacts unfolded Year 1 Incident triage 4% Incident discovery ! 2 Impact management 39% 3 4 5 Business recovery 57% INCIDENT TIMELINE Cyber insurance premiums were increased A strategic acquisition A Health Insurance was delayed due to a Portability and drop in credit rating Accountability Act (HIPAA) fine was imposed Premium rate schedule was adjusted for upcoming enrollment period A public relations campaign was launched, timed with upcoming open enrollment period A second phase of cybersecurity improvements began Litigation began tied to a class action suit filed for damages due to identity theft By Year 3, member enrollment rates returned to normal, but at the expense of longer-term profitability. As identity theft cases were settled, news coverage kept the breach fresh in public memory, and the company faced ongoing pressure to reduce premium rate increases to secure new members and clients. Initial phase of cybersecurity improvements began Breach notification and customer protection programs began The patient care application was shut down and call center staffing was increased External incident response support was hired Impact curves illustrate the relative magnitude of costs as they are incurred across the three phases of the response process, which are defined on page 2. The timeline shows major milestone events and work efforts throughout the process. Some are externally imposed, and others reflect the actions taken in response by the company. 8 Beneath the surface of a cyberattack A deeper look at business impacts Highlights of the business impact The total cost of this cyberattack was greater than $1.6 billion over a five-year timeframe, and of significant interest, only 3.5 percent of the impact was accounted for “above the surface.” To the casual observer, this incident was a classic example of PHI data theft, and while the company suffered common ramifications of a data breach, including customer notification, customer protection, and regulatory fines, there were much deeper implications. In reality, over 96 percent of the impact was “beneath the surface.” What’s more, almost 89 percent of the impact was associated with just three “beneath the surface” impact factors: value of lost
  • 7. contract revenue; devaluation of trade name; and lost value of customer relationships. Another interesting observation is how the impact played out over time. The immediate costs to “stop the bleeding” in the triage phase accounted for less than 4 percent of overall financial impact. Impact during the impact management phase jumped to nearly 40 percent. But that meant that approximately 57 percent of the impact played out in the years following the incident, challenging thinking that the year after an incident is the most impactful. In this scenario, the largest impacts were less obvious factors that played out over time. Below is an explanation of how the three most impactful factors were estimated. Value of lost contract revenue (premiums): In this scenario, contracts were not canceled, however, as the company looked to reduce the damage of the incident, it adjusted the premium increase they had historically charged their members. This resulted in an estimated loss of $830 million over five years. To arrive at this calculation, it was assumed that the average increase in annual premiums is reduced by 20 percent in year one and premium growth rates steadily increased to meet average growth rates, consistent with those prior to the incident, after five years. Devaluation of trade name: Due to erosion of revenue, the company’s trade name value decreased, resulting in a $230 million loss. To determine the financial impact of a cyber incident on the value of a company’s trade name, the likely value of the trade name both before and after the cyberattack was assessed. To assess the trade name value in both situations, we utilized the relief-from-royalty method of valuation. After evaluating similar benchmarks for a typical company in this industry, we established a reasonable royalty rate of 2 percent. The valuation of the trade name was then derived by associating 100 percent of the company’s future expected revenues associated with the trade name. The health plan’s trade name prior to the incident was valued at $3.9 billion. For purposes of this exercise, it was assumed that, following the cyberattack, the company faced a 6 percent erosion of revenue, defined as a combination of lost premium revenue and lost members over the course of five years. As a result, the company’s trade name value potentially decreased to $3.7 billion. Lost value of customer relationships: The decline in annual revenues due to lost members or customers caused the value of customer relationships to decline by $430 million. This calculation assumed attrition for existing customers (normally 7 percent) increased by approximately 30 percent (to 9 percent) in year one. The model also assumed that customer attrition decreased over time, and returned to a normal attrition rate of 7 percent at the end of three years. Further, this calculation assumed new members in year one (immediately after the breach) decreased by 50 percent. However, the growth rate for new members steadily increased to normal growth rates, so that in years four and five, growth rates of 25 percent and 30 percent, respectively, were reached. Prior to the cyberattack, the total value of the company’s customer relationships, or its members, was estimated at $10.3 billion. Based on the decline in annual revenues due to lost members or customers, as modeled over the five-year period, the value of customer relationships declined to $9.5 billion. This loss was in addition to the lost contract revenue (premiums) referenced above. 9 The cyber incident Scenario B: US technology manufacturer About the company • $40 billion annual revenue • 60,000 employees • Growth strategy rests on innovation to support the management of Internet of Things (IoT) environments • Holds hundreds of contracts with clients across multiple
  • 8. industries, including several very large federal government contracts • Operating profit margin prior to the incident is 12.2 percent • Pays $3.75 million annually for $150 million in cyber insurance 10 After significant research, development, production, and marketing, the company was six months from a major release of a core product line that supports IoT environments. Earlier versions were deployed in the field for over 12 months across the government, transportation, utilities, smart home, and smart city sectors, and among service providers who support customers in those sectors. The company was informed by a federal agency that the company’s infrastructure was breached by a foreign nation-state. An investigation revealed exfiltration of IP related to multiple product lines and confirmed that 15 of the company’s 30 device product lines were impacted. Revenue associated with impacted product lines was projected to be 25 percent of total revenue over the following five years. Despite efforts to keep the incident confidential, 30 days after discovery a tech blog revealed that the foreign entity may be reverse-engineering the company’s IoT products. Beneath the surface of a cyberattack A deeper look at business impacts While the company was largely able to recover within five years, the incident had a number of serious consequences. Sales and shipment of affected products were suspended for four months while security vulnerabilities were addressed. When word of the incident surfaced, a large government contract was terminated, causing an additional 5 percent drop in revenue. Significant unplanned costs were incurred, including costs to redesign security features and firmware for many product lines, and to redesign future products to embed advanced anti- counterfeiting software and hardware. The loss of IP related to multiple product lines was a significant blow to the organization and required unanticipated research and development (R&D) expenditures and product fixes. It was a full year before product sales returned to normal. Loss in market confidence lead to abnormally high sales force turnover. This type of business disruption across multiple functions caused a significant decline in operating efficiency. To help prevent future incidents, the company made security improvements to its corporate environment a top priority, including infrastructure upgrades and a data loss prevention program. Above the surface The adversary’s full intent was not known, but the company was concerned that counterfeit products could directly impact long-term sales and margins. It was equally concerned that attackers would exploit product vulnerabilities, or implant malicious code into their products. To be associated with future customer security incidents could be devastating to the company’s reputation. Summary of the impact factors Beneath the surface The aftermath Impact factor Term Cybersecurity improvements 1 year 13.00 0.40% Attorney fees and litigation 5 years 11.00 0.35% Public relations 1 year 1.00 0.03% Technical investigation 9 weeks 1.00 0.03% Customer breach notification Not applicable – 0.00% Post-breach customer protection Not applicable – 0.00% Regulatory compliance Not applicable – 0.00% Value of lost contract revenue 5 years 1,600.00 49.11% Operational disruption 2 years 1,200.00 36.83% Devaluation of trade name 5 years 280.00 8.59% Loss of intellectual property 5 years 151.00 4.63% Insurance premium increases 1 year 1.00 0.03% Increased cost to raise debt Not applicable – 0.00% Lost value of customer relationships Not applicable – 0.00% $3,258.00 100.00% Total Cost (in millions) % Total cost 11 Scenario B: Cyber incident response timeline—how the events and impacts unfolded Year 1 Incident triage 8% 2 4 5 Business recovery 45% ! Incident discovery 3
  • 9. Impact management 47% INCIDENT TIMELINE An infrastructure upgrade was implemented Legal investigations began to identify and take action against counterfeiting operations A project was launched to classify IP and implement data loss prevention controls An enterprise-wide cyber risk assessment was conducted to develop mitigration strategies Release of a new device was accelerated One year after the incident, product sales returned to previous levels, but business performance continued to be burdened by the phase of depressed revenue growth and lost productivity resulting from management and R&D focus on the incident. Loss in buyer confidence posed ongoing challenges to sales efficiency and product pricing. Exposure of unique product designs empowered competitors, and placed extra pressure on the company’s innovation efforts to regain market leadership. A major contract was lost ollout began for a firmware upgrade to impacted devices A third-party blog post reveals that IP was stolen Outside technical help and legal counsel was brought in Impact curves illustrate the magnitude of costs as they are incurred across the three phases of the response process, which are defined on page 2. The timeline shows major milestone events and work efforts throughout the process. Some are externally imposed, and others reflect the actions taken in response by the company. 12 Beneath the surface of a cyberattack A deeper look at business impacts Highlights of the business impact In this incident, which could be categorized as a case of IP theft, the overall damage across all impact factors exceeded $3.2 billion over a five-year timeframe. Notably, the vast portion of the impacts were “beneath the surface;” those “above the surface” accounted for less than 1 percent of the total. In fact, 99 percent of the impact was focused in four areas: devaluation of trade name; value of lost contract revenue; operational disruption; and loss of IP. In terms of how the impacts played out over time, only 8 percent of the total impact fell within incident triage. Over 40 percent occurred during impact management, when operational disruption implications peaked, contract loss kicked in, and the company started to see the impact of lost IP. Interestingly, the largest impact was felt during business recovery, with half of the total impact having occurred more than two years following the incident. Below is an explanation of how the most significant impact factors were estimated. Devaluation of trade name: Due to the loss of intellectual property and intangible assets, and the resulting impact to its reputation, the company lost almost $280 million in the value of its trade name. Utilizing the relief-from-royalty method, a royalty rate of 1.5 percent was used to make this calculation, based on a review of comparable license agreements of similar companies, and typical profit margins of public technology hardware companies. Additionally, it was assumed that the incident continued to impact the company for five years. The company’s trade name prior to the incident was valued at $1.8 billion; after the incident it was valued at $1.5 billion. Value of lost contract revenue: As a result of the cyber breach, there would be a high probability that a significant federal contract would be cancelled, leading to an estimated loss of $1.6 billion. Though its revenue base was spread across hundreds of clients, this company was especially reliant on large contracts with federal agencies and telecommunications providers. One of these was a five-year contract with the federal government that made up 5 percent of the company’s total annual revenue. The loss of this contract reduced total annual revenue by 5 percent and profit margin declined by 2 percent. With the decline in revenue, the company then functioned
  • 10. under a lower operating base since its fixed costs were spread over a lower revenue base. Operational disruption: The cyberattack caused disruption to business operations, leading to $1.2 billion in losses associated with a drop in productivity. In the wake of the incident, not only did the company have to halt sales and shipments for four months, it also experienced unanticipated R&D costs; because IP had been stolen and a competitor likely could have replicated the same capabilities and functionalities, the company re-evaluated 15 product lines. Resources were re-allocated to focus on fixes to product lines, along with the redesign and implementation of security features and other cybersecurity improvement costs. Loss of sales force was also an unexpected impact in the year following the incident due to a loss in market confidence. In order to quantify the financial impact of this disruption, an overall impact to profitability was estimated before and after the cyber incident. The company would have had a profit margin of 12.2 percent and generated overall operating profits of almost $4.9 billion annually before the incident. Assuming the company’s profit margin drops to 9.2 percent after the incident as a result of the disruption, its operating profit dropped to less than $3.7 billion, resulting in a $1.2 billion loss in operating profits. Loss of IP: Within the context of this IP theft incident, the actual value of the lost IP was a significant component of the overall impact, leading to the loss of over $150 million. The company’s performance and market share rested largely on the value of its proprietary technology and trade secrets. To calculate the value of this loss, the company’s IP was assumed to have had a useful life of five years, and it was known that 25 percent of the company’s revenue was attributable to the impacted product lines. By analyzing comparable license agreements for related technologies, and profit margins of public technology hardware companies, a royalty rate of 2.5 percent was established and used in a relief-from-royalty calculation. Based on the risks associated with IP of this nature, a discount rate of 12 percent was used. Applying values to the IP both before and after the cyber event, the loss of IP cost the company over $150 million. 13 Scenario takeaways For all the attention that major breaches receive, business leaders rarely see what occurs behind the walls of an organization struggling to recover from an attack—until it happens to them. Our intent is to help leaders broaden their understanding of the potential consequences of an enterprise cyber incident. With a more robust picture of how an incident may play out and what may be at stake, leaders may be better informed on how to frame a risk-based approach and sharpen the focus of limited resources to enhance security, vigilance, and resilience in those areas of the enterprise that may lead to the greatest impacts. This focus ultimately allows leaders to improve the organization’s ability to thrive in the face of today’s environment, where cyberattacks are prevalent. The scenarios outlined represent different industries and attack objectives and illustrate two examples of the many ways a cyberattack can unfold. Though necessarily simplified for this effort, the scenarios demonstrate the unique ways the defined impact factors play out based on the company, the incident, and the response. In sum, the examples highlight that a cyberattack may include a broader set of business impacts than typically considered, and that addressing these impacts may be highly complex and, in some cases, more costly than cyberattack impacts “above the surface.” 14 In comparing the scenarios, several overarching conclusions stand out. “Above the surface” costs commonly associated with data breaches
  • 11. may only be the tip of the iceberg and are relatively small compared with the overall impacts. Scenario A shows that even in an attack involving typical data theft, the classic “above the surface” costs associated with data breach response may not be the most significant over the course of the incident. The impact of a cyberattack plays out over years following an incident. The immediate triage phase is costly, but the long-term efforts may take a far greater toll. Long after intruders are removed and public scrutiny has faded, the impacts from a cyberattack can reverberate over a multiyear timeline. Legal costs can cascade as stolen data is leveraged in various ways over time; it can take years to recover pre-incident growth and profitability levels; and brand impact can play out in multiple ways. Recovering from an attack is not just a technical effort. Although cyberattacks are conducted through technology-based means and can cause very significant damage to infrastructure, equipment and applications, the major damage will usually be to business value, not to IT assets themselves. Incident response is not primarily a technical effort. As the scenarios demonstrate, the technical work to investigate, analyze, clean, and repair computer systems is soon overshadowed by efforts to manage customer and third-party relationships, legal matters, investment decisions, and changes in strategic course, which are significant business leadership activities. Going forward What you do matters Becoming more resilient Although cyberattacks are all but inevitable, the extent of their damage is not. There are actions that our scenario companies took—or could have taken—that may have changed the outcome. In Scenario A, for example, we assume that the company had an integrated identity and access management system; therefore, user account changes could be implemented in a matter of weeks versus months. Furthermore, had the cyberattack occurred closer to open enrollment, news of a data breach might have had a more devastating impact on subscriber rates; in that case, swift and decisive public relations and customer care action to reduce damage would have been especially urgent. An additional angle is the role of the analytics vendor, who promptly reported that a laptop with the insurer’s data had been stolen. The resulting impacts may have turned out differently if the vendor had not reported the loss so promptly or if data residing on that laptop had been properly encrypted. For many organizations, becoming truly resilient to cyberattacks calls for a shift in mindset that changes how they perceive cyber risk and potential impacts. It requires organizational transformation that broadens the scope of involvement at the top of the organization and instills focus on business risk, not just technology controls. It involves the ability to reprioritize and refocus investments on mitigating likely outcomes, based on a broad understanding of attackers’ motives and the ability to anticipate high-impact scenarios. Many will find the following to be useful first steps. In the case of the technology company, perhaps additional investments in cyber risk monitoring could have enabled the detection of an early-stage infiltration before attackers were able to confiscate IP. As the scenario implies, better governance around sensitive IP might have narrowed the range of what could be accessed when attackers did succeed in gaining access to the network. Furthermore, while hoping that news of the theft would not go public, the organization could have taken more proactive steps in managing the relationships and communications with its largest customers to avoid an impactful contract termination. 16 Convene the right team. Evaluate organizational readiness by bringing together the right business and
  • 12. technical leaders to develop a list of highrisk cyberattack scenarios. This will likely require a team that collectively understands business strategy, products, revenue streams, operations, technology, regulation and, of course, the organization’s cyber risk program. Identify top risk areas and assets. In some enterprises, particular data sets, computer systems, control devices, or other digital assets represent high value unto themselves. In many cases, the value of information and technology assets is tied to the criticality of the business processes and relationships they enable. Once those processes and activities are identified, it is important to understand the underlying technical environment, model the threats to the environment, and draw a realistic picture of the direct and intangible business impacts should they be compromised. The lens should not be focused too narrowly on data theft; other possible attack scenarios should be considered. Beneath the surface of a cyberattack A deeper look at business impacts “Right-size” spend to reduce incident impact. Budgets will never be big enough if the aim is to try to prevent every possible incident. While greater investment may be required, it is likely more important to invest in a more risk-focused manner. Effort should be taken to define the organization’s top risk areas and assets and model realistic attack scenarios. This enables an organization to establish a reasonable level of investment in various areas of a cyber risk program. Modernize what “readiness” means. An incident response plan, if built on narrow assumptions, is likely to fall short at a time of crisis. With awareness of what matters most to the organization, plans can be made to involve the various parties needed to protect, defend, and recover if those things are compromised. Incident response plans can be appropriately broadened—and rehearsed—to anticipate and prepare for the high-risk cyberattack scenarios identified. Establishing broad cyber-awareness and engagement across the organization improves the ability to collaborate and react when the cyber incident alarm rings. Do more than prepare. Cyber readiness is not just about what happens after an attack. Right now, malware is sitting undetected on networked systems within an organization or on the devices of partners, vendors, or employees. There may be ill-intended users within the walls of the company who could use authorized access to inflict damage. In some areas, tighter security practices may be warranted. Other areas may be technically impossible or impractical to secure further, but might warrant stronger capabilities to detect potentially malicious activity. Every organization should institute some variation of a secure, vigilant, and resilient approach that is aligned to its cyber risk posture and program. Bringing cyber impacts to the surface Beneath the surface of a cyberattack is intended to shed light on a broad set of business impacts that are overlooked in most conversations about cyber risk. Cyber incidents may begin as a technology issue, but they typically extend well beyond the technology domain. These events can hit at the very heart of business value and performance. We have attempted to demonstrate the toll cyber incidents can have on enterprise performance far beyond the considerations usually associated with data breaches. Whether adversaries set their sights on IP, trade secrets, operational disruption, fraud, or data records, cyberattacks can have deep and long-lasting effects on an organization. We encourage readers to challenge common assumptions about the breadth, depth, and duration of cyber incidents and to take a more comprehensive view of their potential cost. By viewing cyber risk through this wider lens, we believe that organizations
  • 13. can ultimately improve their ability to survive and thrive in the face of increasingly likely cyberattacks. 17 Endnotes 1 For a discussion of Deloitte’s Secure.Vigilant.Resilient. approach, see Changing the Game on Cyber Risk: The Imperative to be Secure, Vigilant, and Resilient, Deloitte Development LLC, 2015. 2 Ponemon Institute is recognized as a leader in this area for its widely referenced annual Cost of a Data Breach studies, available at www.ponemon.org. 3 Projected net cash flows over the five-year period were reflected in present terms to reflect the time value of money and risk associated with obtaining these cash flows in the future. 4 Operational efficiency is measured by the median operating profit margin of guideline public companies in the technology industry, based on data from S&P Capital IQ. 5 Zurich Insurance Company, The good, the bad and the careless: An overview of corporate cyber risk, December 2014. 6 Ponemon Institute, 2015 Cost of a Data Breach Study: Global Analysis, May 2015. 7 Zurich Insurance Company, The good, the bad and the careless: An overview of corporate cyber risk, December 2014. 8 Ponemon Institute, The Aftermath of a Data Breach: Consumer Sentiment, April 2014. This report indicates that only 29 percent of customers who were offered identity theft protection following a breach actually signed up for the services. 9 CMMI is a registered trademark of Carnegie Mellon University. The CMMI model is a widely referenced framework for process and performance improvement that leverages a 0-5 benchmark scale as a basis to reflect an entity’s level of process maturity. 10 Given the use of fairly recent cases, there is not enough data to ascertain impact to long-term credit rating. 11 Based on data from Morningstar Credit Ratings, http://www.morningstar.com/credit-rating/corporate.aspx. 12 Baa yield data from December 31, 2015, http://www.federalreserve.gov/releases/h15/20160104/. 13 Truven Health Analytics MarketScan® Research Databases. 18 Beneath the surface of a cyberattack A deeper look at business impacts Appendix Definitions of the 14 cyberattack impact factors and how costs were developed This appendix provides further detail on the methods used to determine scenario costs for each of the 14 impact factors. Many direct costs are generally wellunderstood and relatively straightforward to approximate based on publicly available information. “Assigning Value to Intangible Losses” on page 4 describes financial modeling techniques used to quantify intangible impact factors. As discussed, these techniques often require reliance on assumptions. Deloitte reviewed and analyzed data associated with cyber incidents occurring over the last few years, supplemented by insights from well-known studies conducted by other organizations, as cited. The incidents reviewed ranged from theft of high volumes of sensitive data, to theft of strategic information, to instances of severe operational disruption; some cases involved more than one attack type. Calculation of both direct and intangible costs also requires consideration of company-specific information provided as part of the profile of each of the fictitious companies. These company profiles, as described on the scenario pages, were derived from Deloitte’s broad knowledge of the specific industry sectors to which the profiled companies belong. Profiling of a plausible, fictitious company requires knowledge of the business, business trends, typical cybersecurity maturity levels, typical cyber risk vulnerabilities, revenue models, and operational processes within each industry sector. In some instances, cost estimates and related values have been simplified for illustration purposes, as presenting all underlying variables would not be feasible within the scope or length of this
  • 14. paper. Although, as noted on page 4, value is estimated at a specific point in time, the term over which a company would incur tangible actual costs would vary. Some would be immediate, as in the case of the health insurer’s losses associated with health claims fraud; other impact factors might be applicable over years, as in the case of the health insurance company’s post-breach customer protection costs or the longer-term devaluation of the technology company’s trade name. 19 Fourteen cyberattack impact factors A wide range of direct and/or intangible costs contribute to the overall impact of a major cyber incident. Above the surface: Well-known cyber incident costs Technical investigation Customer breach notification Post-breach customer protection The costs associated with technical investigations are direct expenses for analysis to determine what happened during a cyber incident and who was responsible. An immediate objective is to support rapidly halting the spread of a compromise and take action to limit its impact to systems, infrastructure, and data. Efforts involve digital forensics, and malware and threat analysis to determine root cause to assist in the remediation and recovery of impacted systems, and to inform future cybersecurity improvements. Customer breach notification costs include the direct expenses associated with informing and advising individuals whose data has been compromised, as typically mandated by state or federal law or industry regulation. These can include printing, mailing, and call center services, among others. Deloitte has used an average indicator of $2.75 provided by Zurich Insurance stating that notification costs range between $0.50 and $5 per customer.5 According to the Ponemon Institute, breach notification costs have recently declined somewhat.6 Assuming that costs for these services may continue to decline over time, Deloitte has chosen to use a figure of $2.75 per stolen record. Post-breach customer protection costs are direct costs associated with services to detect and protect against potential efforts to use an individual’s compromised personal data for unauthorized purposes. To estimate the direct cost of credit monitoring or identify theft protection services, Deloitte used the midpoint of Zurich Insurance’s guidance that typical costs range from $10 to $30 per customer for an annual subscription7 and a Ponemon Institute study indicating that, of customers surveyed, only 9 percent actually registered for the identity theft protection services that had been offered.8 These figures were applied to the number of customer records breached (3,800,000 in Scenario A; not applicable in Scenario B). The scale of investigation activity can vary widely depending on type and complexity of the breach, and to some extent directly reflects the number of computing systems potentially impacted by the compromise. Estimated costs for this impact factor were based on Deloitte’s experience in situations similar to the fictitious scenarios presented. For scenario A, investigative work would center on analysis of data within the patient care application and efforts to assess the extent of privileged account compromise. A team of five incident response specialists would likely be deployed for approximately six weeks, costing an estimated $600,000. For Scenario B, given the possible involvement of a sophisticated nation-state actor and the range of systems used to support multiple product lines, a deeper technical investigation of the broader environment would be necessary to understand the full scope and impact of the breach. This investigation is estimated to require five incident response specialists over a nine-week period, at a total estimated cost of $1,080,000. 20 20 Beneath the surface of a cyberattack A deeper look at
  • 15. business impacts Above the surface: Well-known cyber incident costs Regulatory compliance Attorney fees and litigation Cybersecurity improvements Regulatory compliance costs are fines or fees levied as a result of non-compliance with federal or state cyber breach related laws and/or regulations. Company profiles include assumptions about which federal, local, international and/or industry regulations the company may be subject to. Costs were assigned to those factors based on publicly available information regarding fines typically imposed. Looking forward, heightened focus on breaches is triggering greater regulatory and legislative scrutiny. This is likely to complicate compliance challenges and costs at both the state and federal level—including preparing for and defending against government compliance actions. Attorney fees and litigation costs can encompass a wide range of legal advisory fees and settlement costs externally imposed and costs associated with legal actions the company may take to defend its interests. Such fees could potentially be offset through the recovery of damages as a result of assertive litigation pursued against an attacker, especially in regards to the theft of IP. However, the recovery could take years to pursue through litigation and may not be ultimately recoverable, even after a positive verdict in favor of the company. Based on our analysis of publicly available data pertaining to recent consumer settlement cases and other legal costs relating to cyber incidents, we observed that, on average, it could cost companies approximately $10 million in attorney fees, potential settlement of loss claims, and other legal matters. The cases surveyed include both data breaches and cyber incidents that caused operational disruption. We do note that this amount is greatly dependent on the scale, nature, and severity of the incident, and the probability of settlement, among other factors. This information was used as a basis to estimate what costs both the fictitious companies might face over a three-year period. The costs associated with cybersecurity improvements are direct expenses for technical improvements to the infrastructure, security controls, monitoring capabilities, or surrounding processes, specifically to recover business operations after an incident or to prevent a similar occurrence in the future. Estimated cost of cybersecurity improvements were based on Deloitte’s experience of typical costs for the kinds of projects undertaken in each fictitious scenario. For Scenario A, these costs include efforts to restore and implement additional security controls around the claim processing system; expand vulnerability, identity and access management programs; and establish a security operations center (SOC). Cybersecurity improvements for Scenario B include an enterprise-wide cyber risk assessment; upgrades to its network infrastructure; and implementation of a data classification and data loss prevention program. Public relations Public relations costs are the direct costs associated with managing external communications or brand monitoring following an incident. Deloitte surveyed leading communications firms and, based on information provided, conservatively estimates that a four-week PR campaign in the immediate aftermath of a cyber incident costs $400,000 on average. Extended campaigns to monitor and repair trade name damage were found to be conservatively estimated at $1 million per year. 21 Fourteen cyberattack impact factors A wide range of direct and/or intangible costs contribute to the overall impact of a major cyber incident. Beneath the surface: Hidden or less visible costs Insurance premium increases Increased cost to raise debt Impact of operational disruption or destruction Insurance premium increases are the
  • 16. additional costs an insured entity might incur to purchase or renew cyber risk insurance policies following a cyber incident. There is little public data available on actual premium increases following cyberattacks. Deloitte conducted informal research among leading providers of cyber insurance and found that it is not uncommon for a policyholder to face a 200 percent increase in premiums for the same coverage, or possibly even be denied coverage until stringent conditions were met following a cyber incident. According to our sources, factors that influence future costs can include: willingness and depth of information provided by the policy holder upon review of the incident; the policy holder’s plans to improve incident handling or other aspects of their security program; anticipated litigation; and assumptions concerning the company’s level of cybersecurity “maturity.” For purposes of this study, Deloitte assumes a premium increase of 200 percent for a company whose cyber risk program was rated at a 3.0 on a Capability Maturity Model Integration (CMMI®) scale.9 Factored in to our company profiles were assumptions about each fictitious organization’s cyber risk CMMI score. We adjusted premium increases proportionately up or down based on the company’s maturity above or below that grade. For Scenario A, we assumed the company had a cyber risk program rated a 2.0 on the CMMI scale. For Scenario B, we assumed the company had a cyber risk program rated a 4.0 on the CMMI scale. Further, we assume that in many cases, by demonstrating cybersecurity program improvements, lower insurance premiums could be negotiated after a one-year period. Increased cost to raise debt occurs when, as a result of a drop in credit rating, the victim organization faces higher interest rates for borrowed capital, either when raising debt, or when renegotiating existing debt. Organizations appear to be perceived as higher- risk borrowers during the months following a cyber incident. Deloitte analyzed the credit rating of nine closely related public companies (from the same industry and comparable in size) and observed an average Standard & Poor’s credit rating of A, and assessed these companies against companies which had recently suffered a cyber incident.10 It was observed that, in the short term, the credit rating agencies typically downgrade by one level companies that have experienced a cyber incident. For purposes of establishing costs in Scenario A (this impact factor is not applicable in Scenario B), a postcyber incident credit rating decline from A to Baa was assumed.11 Bloomberg’s median yields for a large universe of corporate bonds (a composite index) were applied. A yield for a typical 10-year, A-rated corporate bond was 3.44 percent.12 This same median yield for a universe of Baa- rated corporate bonds was 4.48 percent, resulting in an incremental yield due to rating drop of 1.04 percent. The health plan company in Scenario A seeks to finance $1 billion over ten years for an acquisition. After suffering a cyber incident, it would cost the company $242.5 million in interest, as opposed to the $183.3 million it would have cost the company had it not sustained a cyber incident—an increased borrowing cost of $59 million over the term of the loan. Impact of operational disruption or destruction is a highly variable cost category that includes losses tied to manipulation or alteration of normal business operations and costs associated with rebuilding operational capabilities. This could include the need to repair equipment and facilities, build temporary infrastructure, divert resources from one part of the business to another, or increase current resources to support alternative business operations to replace the function of systems that have been
  • 17. temporarily shut down; it could also include losses associated with inability to deliver goods or services. The nature of operational disruption—and therefore the appropriate method of calculating its impact—is very specific to each situation and requires direct knowledge of a number of distinct information components. 22 For Scenario A, calculating the financial impact of operational disruption entails estimating costs associated with hiring an external professional services organization to augment call center staffing so that coverage can be confirmed for claims submitted during the two-week triage period that the patient care application is shut down. Using data obtained from Truven Health Analytics MarketScan,13 an analysis was run to determine, based on the average number of claims generated per member per health care visit (3.7), and the average percentage of insurance claims that are typically pre-qualified for insurance coverage (75 percent), that the temporary call center would handle almost 2.5 million claims over the two-week period, requiring over 800,000 hours of staff time and roughly 100 hours of supervisory time. This equates to approximately $27 million in personnel costs at typical hourly rates. Added to this are approximately $3 million in computing and communications infrastructure equipment and services, totaling approximately $30.0 million in operational disruption costs. In situations such as Scenario B, a precise bottom-up calculation may be most desired, however, such an effort would require gathering a wide range of very detailed information over the duration of the actual incident response and recovery efforts, such as personnel hours spent on unplanned efforts, salary costs, impact of lost opportunity, excess R&D costs, and others. Absent such detailed information, a macro-level projection of impact to the company is often done by calculating an estimate of the decline in operating profit margin; such an effort was employed by Deloitte for this scenario. Leveraging available data on the profit margins of public companies in this industry, and assuming that this enterprise prior to the incident had a typical operational efficiency profile (equating to a 12.2 percent operating profit margin), the company would have generated overall operating profits of almost $4.9 billion annually before the incident. After the incident, the company sees a reduction in operating margin due to a loss in revenue over the same fixed costs, with the addition of cybersecurity improvement costs and additional R&D efforts. Assuming the company’s profit margin drops to 9.2 percent, its operating profit drops to less than $3.7 billion, resulting in a $1.2 billion loss in operating profits. Beneath the surface of a cyberattack A deeper look at business impacts Beneath the surface: Hidden or less visible costs Lost value of customer relationships Value of lost contract revenue Devaluation of trade name During an initial triage period immediately following a breach, it can be hard to track and quantify how many customers are lost. Economists and marketing teams approach this challenge by attaching a “value” to each customer or member to quantify how much the business must invest to acquire that customer or member. They then look at the likely revenue that this one customer or member will generate for the business over time. These numbers can then be evaluated per industry and particular organization to estimate how much investment is needed to attract and acquire new customers. The value of lost customer relationships is not applicable to Scenario B because the technology company does not sell directly to individual consumers. In Scenario A, the average attrition rate of existing customers (or members) is assumed to be 7 percent. After the incident, the attrition
  • 18. rate for customers or members is estimated to increase by approximately 30 percent to 9.1 percent. The attrition rate is estimated to return to normal (7 percent) after three years. New member acquisition in the first year after the incident is estimated to decrease by 50 percent. We then estimated the value of customer relationships by calculating the incremental after-tax cash flows (or “excess earnings”) attributable only to the customer relationships and used the with-and-without method, as described earlier, to evaluate the impact of lost customers (or members) due to a cyber incident. Value of lost contract revenue (or value of premiums, in the case of the health insurer in Scenario A) includes revenue and ultimate income loss, as well as lost future opportunity associated with contracts that are terminated as a result of a cyber incident. Devaluation of trade name is an intangible cost category referring to the loss in value of the names, marks, or symbols an organization uses to distinguish its products and services. A brand name is associated with the name of a specific company or a specific product, whereas a trade name relates to an organization as a whole. To determine the financial impact of a cyber incident on the value of a company’s trade name, the likely value of the trade name both before and after the cyber incident was assessed. To value the trade name itself, Deloitte employed the relief- from-royalty method. The relief-fromroyalty method, commonly used to value IP assets such as trade names, estimates the value by analyzing what another entity would have to pay to license the company’s trade name. Our analysis involved establishing a reasonable “royalty fee” by looking at royalty fees or rates paid in actual royalty transactions for similar types of IP, and the analysis of profit margins across the industries to which our fictitious companies belong, to determine what a typical company in the industry would have the capacity to pay. Using this data, Deloitte calculated the royalty rate for the health plan company in Scenario A to be 2 percent, and 1.5 percent for the technology company in Scenario B. The value of the trade name at the time of the cyber incident (using present- value calculations) was then derived by applying the royalty rate to each company’s future revenues (tax-adjusted) over time. To determine the financial impact of the lost contracts or premiums, Deloitte estimated the value of the contracts both before and after the cyberattack was assessed. Following a cyberattack, if the subject company were to lose contracts, we assumed there would be a decrease in revenues. We determined the present value (meaning an estimate of the value of a future income stream depicted in present dollar terms; receiving a dollar today is worth more than receiving a dollar in the future, since one could earn interest on that dollar) of cash flows that the company would earn over the term of the contracts. For Scenario A, we estimated the value of the contracts (or premiums) by calculating the incremental after-tax cash flows (or “excess earnings”) attributable only to the contracts (or premiums). For Scenario B, given the size and importance of the potential lost contract to the federal government (and because for a large organization such as a federal agency, replacing a technology investment is often a time- consuming and costly endeavor), we did not assume 100 percent certainty of the loss. Instead we assumed a 50 percent likelihood of contract cancellation following the cyberattack in an effort to account for the probability of such an impactful effect occurring. The resulting probability estimate of impact to the company is a loss in value of $1.6 billion due to the cyber event. The net cash flows generated by the company over a five-year period
  • 19. with the contract in place were discounted using a 12 percent discount rate to yield a value of $15 billion. For both scenarios, we used the with-and-without method to evaluate the impact of lost customers (e.g., members, in the case of Scenario A) due to a cyber incident over a five-year period, the period of time over which the incident is estimated to affect the company. The difference in value estimates between these two calculations yields the value eroded due to loss of the contracts or premiums. Loss of intellectual property (IP) Loss of IP is an intangible cost associated with loss of exclusive control over trade secrets, copyrights, investment plans, and other proprietary and confidential information, which can lead to loss of competitive advantage, loss of revenue, and lasting and potentially irreparable economic damage to the company. Types of IP include, but are not limited to, patents, designs, copyrights, trademarks, and trade secrets. In the case of the technology company in Scenario B, its IP is composed of trade secrets related to its various product lines. A trade secret is any confidential business information or technology that provides a company with a competitive advantage. Unlike other types of IP, trade secrets are protected indefinitely until publicly disclosed. Similar to the value of a trade name, the value of IP is estimated by approximating how much another party would pay to license that IP. To value the loss of the technology company’s IP, Deloitte used the with-and-without method to compare the results of a relief-from-royalty analysis prior to the cyber incident to the results after the cyber incident. Using the method described above, Deloitte calculated the royalty rate applicable for this company at 2.5 percent. The value of the IP at the time of the cyber incident (using present-value calculations) was then derived by calculating 2.5 percent of the company’s future revenues (tax-adjusted) over time. Given the characteristics of the stolen IP, its useful life was assumed to be five years and, according to assumptions provided in the company’s profile, was directly tied to 50 percent of the technology company’s total revenues. 23 Authors Emily Mossburg Principal | Deloitte Advisory Cyber Risk Services Deloitte & Touche LLP John Gelinne Managing Director | Deloitte Advisory Cyber Risk Services Deloitte & Touche LLP Hector Calzada Managing Director | Deloitte Advisory Valuation Services Deloitte Transactions and Business Analytics LLP Contributors Amy Kroll, Principal, Advisory Heath Care Leader, Deloitte & Touche LLP Irfan Saif, Principal, Advisory Technology Sector Leader, Deloitte & Touche LLP Harsh Dalwadi, Senior Manager, Cyber Risk Services, Deloitte & Touche LLP Amy Edwards, Senior Manager, Forensic and Investigation Services, Deloitte Financial Advisory Services LLP Emily Johns, Manager, Valuation Services, Deloitte Transactions and Business Analytics LLP Arun Perinkolam, Senior Manager, Cyber Risk Services, Deloitte & Touche LLP Sarah Robinson, Consultant, Cyber Risk Services, Deloitte & Touche LLP Beth Ruck, Senior Manager, Advisory Marketing, Deloitte Services LLP Secure.Vigilant.Resilient. To grow, streamline, and innovate, many organizations have difficulty keeping pace with the evolution of cyber threats. The traditional discipline of IT security, isolated from a more comprehensive risk- based approach, may no longer be enough to protect you. Through the lens of what’s most important to your organization, you must invest in cost-justified security controls to protect your most important assets, and focus equal or greater effort on gaining more insight into threats, and responding more effectively to reduce their impact. A Secure.Vigilant.Resilient. cyber risk program can help you become more confident in your ability to reap the value of
  • 20. your strategic investments. Contact us BEING SECURE means having riskfocused defenses around what matters most to your mission. For an electronic version of this paper, please go to: http://www2.deloitte.com/us/beneath-the-surface-of-a-cyberattack Please direct inquiries to cyberriskinfo@deloitte.com BEING VIGILANT means having threat awareness to know when a compromise has occurred or may be imminent. BEING RESILIENT means having the ability to regain ground when an incident does occur. This document contains general information only and Deloitte Advisory is not, by means of this document, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This document is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte Advisory shall not be responsible for any loss sustained by any person who relies on this document. About Deloitte As used in this document, “Deloitte” means Deloitte & Touche LLP, Deloitte Financial Advisory Services LLP, and its affiliate, Deloitte Transactions and Business Analytics LLP. Deloitte Transactions and Business Analytics LLP is not a certified public accounting firm. These entities are separate subsidiaries of Deloitte LLP. Please see “http://www.deloitte.com/us/about” www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. Copyright © 2016 Deloitte Development LLC. All rights reserved. February 12, 2013 Raising the Bar for Cybersecurity James A. Lewis “What was previously classified as an unlikely but very damaging event affecting one or a few institutions should now probably be thought of as a persistent threat with potential systemic implications.” 1—Dennis Lockhart, President, Atlanta Federal Reserve Bank Executive Summary Analysis of successful attacks has provided good data on both the techniques used in breaching corporate networks and the steps needed to prevent such breaches. However, this information is not reflected in practice. Companies underestimate the risk they face of being breached or hacked. Most companies only find out that they have been hacked when told by a third party. This could raise questions of fiduciary responsibility as greater awareness of risk grows in the business community and in government. Hacking is incredibly easy; survey data consistently shows that 80 to 90 percent of successful breaches of corporate networks required only the most basic techniques. Hacking tools are easily acquired from the Internet, including tools that “crack” passwords in minutes. In the last few years, in 2009 and 2010, Australia’s Defense Signals Directorate (DSD) and the U.S. National Security Agency (NSA) independently surveyed the techniques hackers used to successfully penetrate networks. NSA (in partnership with private experts) and DSD each came up with a list of measures that stop almost all attacks. DSD found that four risk reduction measures block most attacks. Agencies and companies implementing these measures saw risk fall by 85 percent and, in some cases, to zero. These measures are “whitelisting,” which allows only authorized software to run on a computer or network, very rapid patching both operating systems and programs, and minimizing the number of people on a network who have “administrator” privileges. Implementing these four steps eliminates most of the risk of
  • 21. being breached. When the DSD mitigation strategies or their U.S. equivalent are combined with “continuous monitoring” of risk (a term borrowed from the financial risk and audit communities), they provide corporations and agencies the ability to identify and mitigate the risk of cyber attack. Companies may need to use other measures and services to secure their intellectual property and networks (from politically motivated denial-of-service attacks, for example), but implementing these mitigation strategies through continuous monitoring for risk is essential for exercising due diligence in protecting shareholder value. The White House should direct agencies, in implementing any executive order on cybersecurity and critical infrastructure, to immediately adopt these mitigation strategies as an initial measure while the National Institute of Standards and Technology (NIST) develops its comprehensive set of standards. 1 Kelly Faircloth, “Cyberattacks on Banks Worry the President of the Atlanta Fed,” BetaBeat.com, November 27, 2012, http://betabeat.com/ 2012/11/atlanta-federal-reserve-president-dennis-lockhart-berlin- cyberattacks-ddos-hactivists/. 2 Hacking Is Easy Extracting value from the computers or networks of unsuspecting companies and government agencies has become a big business. No company or agency can ignore network security; it is the source of systemic risk that threatens long-term health and profitability. Companies must secure their networks if they are to exercise fiduciary responsibility and due diligence. Cybersecurity is part of the larger corporate strategy for managing risk and compliance. Cybersecurity risk management is becoming a board-level responsibility. This paper identifies how those responsibilities can be met. In the past few years, a new approach to cybersecurity has emerged, based on the analysis of data on successful attacks. In this approach, continuous diagnostics and mitigation replace the reactive network security methods used in the past. The approach combines continuous monitoring of network health with relatively straightforward mitigation strategies. The strategies used in this approach reduce the opportunities for attack and force attackers to develop more sophisticated (and expensive) techniques or to give up on the target. In combination, continuous monitoring and mitigation strategies provide the basis for better cybersecurity. Hacking Is Not that Hard More than 90% of successful breaches required only the most basic techniques. Only 3% of breaches were unavoidable without difficult or expensive actions. Outsiders were responsible for most breaches. 85% of breaches took months to be discovered; the average time is five months. 96% of successful breaches could have been avoided if the victim had put in place simple or intermediate controls. 75% of attacks use publicly known vulnerabilities in commercial software that could be prevented by regular patching. One study found that antivirus software missed as much of 95% of malware in the first few days after its introduction. Another study found that 25% of malware is not detected by current techniques. Cybersecurity is a term that means many different things to many people. It has leapt into prominence as networks moved to the center of business operation, linking companies to what turns out to be a very risky environment. Cyberspace is the Wild West. Governments have not agreed on the “rules” that should apply to cyberspace, or how to apply existing “rules” for espionage, crime, and warfare. Just as Bonnie and Clyde would rob a bank in one state and drive across the border into another state, with the pursing sheriff stopping at the border, smart hackers take advantage of borders and the Internet’s ability to cross them
  • 22. with ease and without fear of punishment. They live in countries that tolerate or encourage their activities; they are often outside the grasp of national law enforcement. There are efforts underway to change this, but it will take time to make cyberspace more secure. A good way to think about the cybersecurity challenge is to divide it into three problems: 1. State versus state conflict. Cyber war, involving attacks that create physical damage, get the most attention and involve the greatest potential risk to nations and in some instances, such as the recent “Shamoon” attack against Aramco, to companies. 2 2. Espionage. The spread of high-speed global networks makes it easy to extract massive quantities of information. Powerful government agencies target companies, as can competitors and private hackers seeking intellectual property and business confidential information. 3. Crime. A cyber- criminal underworld has existed for years, focused on extracting personal information and cash (rather than intellectual property). If a cyber criminal is smart and lives outside the United States, in a country that offers sanctuary, he or she faces almost no risk of prosecution. When we look at successful attacks, it is embarrassing to note that these are not sophisticated exploits carried out 2 In August 2012, a group called “Cutting Sword of Justice” linked to Iran claimed it had used the “Shamoon” virus to attack Aramco, a major Saudi oil supplier, deleting data on 30,000 computers and infecting (without causing damage) control systems. The attack also affected the Qatar company RasGas, a major LNG supplier. Other oil companies may have also been infected. 3 by evil geniuses. Hacking is all too easy. One report estimated that targeted attacks against businesses and governments increased to about 30,000 a year in 2012. 3 The metrics for estimating the damage from a successful hack are not well established. Companies can suffer reduced valuation after they have been hacked, usually in the form of a drop in stock prices. These losses can be significant—ranging from 1 to 5 percent—but the decline is not permanent. Stock prices usually recover by the next quarter. However, it will be interesting to see if this changes as a result of new Securities and Exchange Commission regulations that require companies to report major hacking incidents. In the future, the recovery of stock prices may not be so quick if it is known that there is significant damage to a company’s intellectual property portfolio. It is harder to estimate the damage from the loss of intellectual property (IP). IP now makes up a major part of most companies value, but often the value of this IP is not known until it is put on the market. Counting how much was spent to create the IP is not a good measure of worth. It also takes time for an acquirer to turn stolen IP into a competitive product. In some cases, the damage may not be visible for years. In other cases—such as designs for high-speed trains, automobiles, or wind turbines—the competing product may reach market before the victim company’s own design. The scale of loss and its effect, however, remains a subject of dispute. Anecdotal evidence suggests that cyber crime against banks and other financial institutions probably costs the United States hundreds of millions of dollars every year. Estimates of the dollar value of annual losses to businesses from cyber espionage show a tremendous range, from a few billion dollars to hundreds of billions, but it is safe to say that this is large and growing. Most people are now aware of the problems with cybersecurity. What many do not know, however, is how simple it is to hack. Currently, the question for hackers, highly skilled or not, is why bother with a high-end attack when something simple will probably work as well. A reasonable goal for policy would be to make
  • 23. hackers work harder for their success. This will reduce both the number of successes and the number of hackers capable of achieving success. Improving the primary level of security will not solve the cybersecurity problem, but it will make it more manageable and, ultimately, easier to “solve.” Numerous studies confirm that hacking is not that hard. Surveys in 2011 and 2012 showed that more than 90 percent of successful penetrations of company networks required only the most basic techniques. Outsiders were responsible for most breaches, and most went undetected for weeks. Usually it was a third party that discovered them. One 2012 survey found that 92 percent of attacks were not highly difficult and that only 3 percent of breaches were unavoidable without difficult or expensive corrective action. 4 “Most victims fell prey because they were found to possess an (often easily) exploitable weakness.” 5 Ninety-six percent of successful breaches could have been avoided if the victim had put in place simple or intermediate controls. Eighty-five percent of penetrations took months to be discovered—the average time is five months—and the discovery in most cases was usually made by a third party (such as a credit card company) rather than the victim. 6 There is a growing cadre of highly skilled hackers, often the proxies of a state that gives them sanctuary. These hackers use programs that continuously scan their target for vulnerable systems, even test systems that are only temporarily online. They have advanced programming skills to identify new vulnerabilities and to create the malicious software (malware) needed to exploit them. With their ability to target specific high-value networks, these high-end hackers can challenge all but the most sophisticated defenders. Equally important, they build and sell the tools and techniques that let less experienced hackers perform successful attacks. Eventually, the work of the advanced hackers in both vulnerability identification and malware writing appears on the cyber black market, becoming globally available. 3 Symantec, Internet Security Threat Report: 2011 Trends, vol. 17 (Mountain View, CA: Symantec, April 2012), p. 14, http://www.symantec.com/content/en/us/enterprise/other_resources/b- istr_main_report_2011_21239364.en-us.pdf. 4 Verizon, “2012 Data Breach Investigations Report,” http://www.verizonbusiness.com/resources/reports/rp_data-breach- investigationsreport-2012_en_xg.pdf. 5 Ibid., p. 3. 6 Trustwave, “Global Security Report 2010,” https://www.trustwave.com/downloads/whitepapers/Trustwave_WP_Global_Security_Re port_ 2010.pdf. 4 But successful hacking does not require this level of skill. Relatively simple “hacks” work all too well, and even highend opponents use them—why use a sophisticated assault when the target can be overcome with a simple one. Most companies that were hacked fell victim because hackers found an easily exploitable weakness. It is so easy that hackers don’t have to try very hard because most networks are poorly defended. Eliminating the vulnerabilities exploited by these “easy” hacks will shrink the pool of successful hackers as the less skilled drop out. It will increase the cost for attackers, as they have to put more work into penetrating a target network. Vulnerability mitigation strategies reduce the avenues for potential attack and force attackers to develop more sophisticated (and expensive) techniques or give up on the target. The effect will be to reduce risk and allow companies to focus resources on high-end threats. The tools for these “easy” hacks are widely available and in some cases freely downloadable from the Internet.
  • 24. A Washington Post series explored how hackers can use “Shodan,” a downloadable search engine that identifies vulnerable networks and infrastructures, or download programs like “Wireshark,” “Aircrack,” or “Metasploit,” 7 programs developed as network maintenance and security tools that can be misused for criminal purposes. Hackers have used such tools to create thousands of exploits. Metasploit, for example, is portrayed as a legitimate research tool, but like any tool, it can easily be turned to malicious purposes. It creates programs that can use the Internet to find vulnerable networks and then take control of them. Metasploit has an “open source” version to which anyone can contribute, allowing researchers to share new techniques and hackers to share successful exploits, 8 but it is only one of dozens of downloadable hacking tools. Cybersecurity Is Feeble The ability to download hacking tools means that a determined 12-year old with some basic computer skills, if he or she has an Internet connection, can become a successful hacker. For the more advanced, there are cyber-crime black markets that sell personal data, credit card information, tools, passwords, and successful exploits. Criminals can rent “bot-nets” from the cybercriminal underworld or even purchase complete online stores to collect personal information or to sell bogus products. This is a competitive market, with price wars, guarantees, and special offers. Hacking has become a big business, not only because the Internet is now “where the money is,” but because most networks, despite claims to the contrary, are inadequately defended. 9 Uneven Implementation 45% of surveyed companies believed they were doing well; a review showed only 10% were taking adequate steps. 70% of surveyed companies use malware detection tools, but only 50% have automated patch management or use intrusion detection tools. Only 33% use robust identity and account management systems. One study found that 75 percent of attacks used publicly known vulnerabilities in commercial software that could be prevented by regular patching—in patching, the software company that made the product sends over the Internet a small fix to an existing program to improve performance or eliminate a vulnerability. A failure to patch leaves the vulnerability unfixed, something hackers are quick to exploit. While patching is essential, it is not enough. When software vendors announce and ship patches, hackers analyze the patches and can often develop exploits for the problem faster than companies can install the patch. Twenty-five percent of attacks reviewed in this study were new, unknown to defenders, and could not have been stopped. Many security controls—firewalls, intrusion prevention, antivirus—fail to prevent these attacks from succeeding. Often, malware will delete itself after running, and attackers have improved their ability to clean up and hide 7 SecTools.org, “SecTools.Org: Top 125 Network Security Tools,” http://sectools.org/. Robert O’Harrow Jr., “Hacking tool kits, available free online, fuel growing cyberspace arms race,” Washington Post, November 13, 2012, http://www.washingtonpost.com/investigations/hacking-tool-kits-available-free-online- fuel-growing-cyberspace-arms-race/2012/11/12/ 1add77a4-21e6-11e2-ac85- e669876c6a24_story_1.html. 9 Panda Security, “The Cyber-Crime Black Market: Uncovered,” January 2011, http://press.pandasecurity.com/wpcontent/uploads/2011/01/The-Cyber-Crime-Black- Market.pdf. 8 5 evidence of what they have done. This complicates the defenders task if their approach is reactive, requiring an analysis of the malware to determine how it
  • 25. functioned and what had been infected. One way to assess the ease of hacking is to look at the ease of breaking into a network using illicitly obtained passwords. Essentially, the password as we know it is completely useless as a defense. Any password based on a name or word can be rapidly “cracked” with widely available online tools. Passwords based on personal information, such as birthdays, are also easy to guess. Information on social networks can be harvested by hackers to get the personal data that will let them guess passwords. Searching Google on the keywords “password cracker” gets 21 million results, offering free password crackers and advice on how to use them. The hacker’s task is made easier by the reuse of passwords, where people use the same password for multiple systems and websites. This reuse is a very common avenue for attack vector, and some data suggests that password reuse is actually a bigger problem than a weak password. Passwords no longer provide any more than the most basic security. 10 Default settings on computing and network devices are another easy path for attack. Anyone who has bought a computer or other network device knows that the manufacturer sets the password and user name to “admin” and “password.” Criminals know this, too. People forget to change these default settings or, for large networks, change most but not all of the settings. A U.S. Air Force study found that in large organizations with thousands of machines, perhaps 5 percent were configured to use the default password and user name. Hacking tools can search automatically for these misconfigured devices. The most popular technique for hacking currently is phishing, which combines fraud and malicious software to bypass many traditional security measures. Individuals in a company are sent a message that appears to be from a legitimate e-mail address (these addresses are easily spoofed). It has an with a tempting subject, like “Next Year’s Bonuses.” Sent to a hundred people, hackers can count on a few of them to open the document or click on the link, which immediately installs the malicious software. Advanced hackers may use personal data culled from social network sites to “personalize” the e-mail and make it look more convincing. How immediate and how visible the damage will be depends on what is taken. Confidential business information, such as sales and marketing plans, plans for new products, or financial data, is immediately profitable for the acquirer. One major oil company lost exploration data that cost it billions of dollars. A major bank saw $10 million extracted in two days; it avoided the damaging publicity by reclassifying the loss as an “operating expense.” Companies lose merger and acquisitions strategies and information to hacking, a loss that has an immediate effect— think of the other side of the table having a copy of your briefing book and knowing your bottom line. The recent attacks on Aramco, where 30,000 company computers had their data erased permanently, along with credible reports of the huge losses of military and commercial technology intellectual property and business confidential information, demonstrate that what governments and companies are doing now in cybersecurity is not working effectively—despite spending as much 7 percent of their information technology (IT) budgets on it. One estimate puts annual spending globally on cybersecurity software at almost $18 billion. 11 However, there is evidence to suggest that the traditional methods are not working. One study found that initial detection rates for antivirus software—there are now almost 50 million different viruses on the Internet—were less than 5 percent when the malware was introduced and that, on average, it took almost a month to update
  • 26. detection mechanisms and spot the new viruses. Another study found that detection rates averaged about 20 percent. 12 Hackers can avoid detection by making minor changes to their malware to evade detection, and some use the updates from security companies to see if their exploits can be detected by the latest updates. 10 Mat Honan, “Kill the Password: Why a String of Characters Can’t Protect Us Anymore,” Wired, November 15, 2012, http://www.wired.com/ gadgetlab/2012/11/ff-mat-honan-password-hacker/. 11 Nicole Perlroth, “Outmaneuvered at Their Own Game, Antivirus Makers Struggle to Adapt,” New York Times, December 2012, http://www.nytimes.com/2013/01/01/technology/antivirus-makers-work-on-software- to-catch-malware-moreeffectively.html?pagewanted=all; Gartner, Inc., “Gartner Says Security Software Market Grew 7.5 Percent in 2011,” press release, April 26, 2012, http://www.gartner.com/it/page.jsp?id=1996415. 12 Imperva, “Assessing the Effectiveness of Antivirus Solutions,” Hacker Intelligence Initiative: Monthly Trend Report #14, http://www.imperva.com/docs/HII_Assessing_the_Effectiveness_of_Antivirus_Solutions.pdf . 6 Some business groups argue that companies could improve their network security if there were greater information sharing between themselves and the government. Information sharing is passive and reactive, however, and will always miss a considerable number of attacks (such as the 95 percent of malware missed after its introduction). 13 Someone learns of an attack, analyzes it, and then sends information about it to others. Even if this were done in a matter of hours, it will not work for the 25 percent of attacks that are unknown, nor will it work for rapidly executed attacks, some of which can occur in minutes. Information sharing and reactive approaches to cybersecurity are not effective. Another traditional approach, the use of “signatures” to identify an attack, is also becoming less effective. A signature is a pattern of code that has been identified as malware. Computers can be programmed to look for that malicious pattern and block it. If the pattern is not known, the attack is not blocked (which is one of the limitations on information sharing). The New York Times found that only one of the 45 kinds of malware used in an attack on its networks was detected by its antivirus program. 14 Attackers have also become more sophisticated in evading signature-based controls, often testing their malware on antivirus programs before deployment to see if they can be detected. Advanced attacks can bypass signature-based defenses. The cybersecurity problem is often presented as the result of a lack of resources. Yet every year, increasing amounts of money are devoted to cybersecurity. The research for this report suggests that the real problem is that cybersecurity resources, adequate or not, are often spent on ineffective activities. Another major problem in cybersecurity is the tendency of corporate leadership to treat it as an “IT problem” best left to chief information officers and technicians. This may have been the right course of action a decade ago, but it is now badly outdated. A better way for a C-suite to think about cybersecurity is that it is the source of a damaging “material effect,” hurting a company’s profits, value, and financial future, that will be increasingly difficult to ignore. 15 One survey taken in 2012 found uneven implementation of cyber defense among leading companies. Many companies in the survey believed they were doing well in securing their networks, but a review showed that most were not. While 70 percent used some kind of
  • 27. malware detection tools, only half of the surveyed companies had automated patch management or used intrusion detection tools. Only a third used some form of identity and account management (meaning that an employee’s identity must be robustly verified before he can access the network and that, when an employee leaves, the account is automatically closed). Overall, the survey found a “diminution of detection technology arsenals” with declines in the use of malware and intrusion detection tools for, as well as tools for vulnerability scanning, security event correlation, and data loss prevention. 16 A similar survey in Japan found that more than half of the surveyed companies were not even considering cyber countermeasures. 17 There will always be risk in cyberspace, just as there is risk in driving a car, mailing a letter, or flying in an airplane. The goal is to make online activities no riskier than offline activities—to “normalize” cyberspace. Right now, that is not the case and the risks will grow as we become more dependent on software and computers….