35
Analyzing Cyber insurance as a Market Based Solution for Cyber Resiliency Sachin Shetty, Ph.D. Associate Professor Virginia Modeling, Analysis and Simulation Center Collaborator: Jay Kesan (UIUC)

Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Embed Size (px)

Citation preview

Page 1: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Analyzing Cyber insurance as a Market Based Solution for Cyber

ResiliencySachin Shetty, Ph.D.Associate Professor

Virginia Modeling, Analysis and Simulation CenterCollaborator: Jay Kesan (UIUC)

Presenter
Presentation Notes
Analyzing Cyberinsurance as a Market Based Solution for Cyber Resiliency  
Page 2: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

© 2017 CIRI / A Department of Homeland Security Center of Excellence 2

• Cyber Insurance Is A Private Market Solution• Insurance allows risk shifting, but the risks of data-based injuries are often

unknown.• A more developed cyber insurance market could incentivize the adoption of

better security practices by requiring such practices as a condition of coverage.

• Cyber Insurance Complements Government Action• Government agencies can establish recommended standards of conduct, like

the NIST Cybersecurity Framework, but their oversight ability is limited. • Insurance companies have a financial interest in (1) having a lot of policy

holders, and (2) having policy holders whose networks are secure.• Government collaboration can turn the vicious circle of bad coverage and high

premiums into a virtuous circle of good coverage and affordable premiums.

Why Cyber Insurance?

Presenter
Presentation Notes
https://multimedia.telos.com/blog/empowering-nist-cybersecurity-framework-cyber-insurance/
Page 3: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Feedback Loops in Cyber Insurance: A Vicious Circle

Page 4: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Risk Assessment is the Key• The essential solution to the informational asymmetry problem is

better risk assessment.• Narrow down the information gap between the insureds and the insurers.• Separate insureds with different risk levels and price policies more accurately.• Periodical risk assessment helps insurers monitor their risk exposures.• Better estimation of cost after losses.

• We can address this problem from several angles:• Technological Risk (Cyber Risk Scoring and Mitigation (CRISM))• Portfolio Risk (Cyber Insurance Portfolio Analysis of Risk (CIPAR))• Legal Risk (Cyber Litigation Analysis Database (CLAD))

Page 5: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

TECHNOLOGICAL RISK

© 2016 CIRI / A Homeland Security Center of Excellence 5

Page 6: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Cyber RIsk Scoring and Mitigation (CRISM©)

6

• Problem• Need to understand and quantify the impacts of threats

to cyber systems and networks in order to develop prioritized mitigation plan

• Approach• Built over a platform optimized for vulnerability

detection, attack graph analysis, and risk assessment. • Provides quantitative risk assessment and categorizes

attack paths based on the impact of vulnerabilities.

• Technology Transition• Cyber Risk Scoring and Mitigation (CRISM) tool• Software License• Provisional Patent application filed

Page 7: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Measuring Security Risk

© 2016 CIRI / A Homeland Security Center of Excellence 7

Challenges SolutionsIdentification of Attack Surfaces Acquisition of vulnerability scores from live threat

intelligence feeds and vulnerability databases

Identification of Exploitable AttackPaths

Network Vulnerability Tests and Attack graph generation

Modeling and assessing risk for cyber-insurance

Bayesian attack graph modeling techniques to categorizeattack paths by impact, cost and degree of difficulty

On demand and real-time access to quantifiable cyber risks

Cloud based risk assessment tool

Page 8: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Cyber RIsk Scoring and Mitigation (CRISM©)

Page 9: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Cyber RIsk Scoring and Mitigation (CRISM©)Bayesian Attack Graph• Extract topology and vulnerability

information for enterprise systems and network from scanning, vulnerability tests and vulnerability databases

• Generation of attack graph to model security state of enterprise system and network

• Developed probabilistic security metric using Bayesian Networks by leveraging attack graph

• Encoding contribution of different security conditions during system compromise.

Page 10: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Cyber RIsk Scoring and Mitigation (CRISM©)Bayesian Attack Graph Analysis• Examples of vulnerabilities-

• Unsafe security policy, corrupted file, memory access permission, unsafe firewall properties, unauthorized access

• System and network states represented as attributes and modeled using Bernoulli distribution

• Attacker success to reach goal depends on state of attributes

• Bayesian Attack Graph captures cause-consequence relationships between attributes

Page 11: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Cyber RIsk Scoring and Mitigation (CRISM©)

Page 12: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Portfolio RISK

© 2016 CIRI / A Homeland Security Center of Excellence 12

Page 13: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

CIPAR—Cyber Insurance Portfolio Analysis of Risk• A web-based cyber risk assessment tool built on our data and analyses• Gives firms from all market segments an easy way to estimate their

exposure to cyber risk• Help cyber insurance carriers manage portfolio risk more efficiently

and improve product pricing• Key features:

• Cyber incident lookup• Cyber risk data visualization• Cyber risk scores based on firm characteristics

• Demo

Page 14: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Cyber Insurance Portfolio Analysis of Risk (CIPAR)• CIPAR improves cyber insurance pricing and underwriting by:

• Using cyber incident data more efficiently• Mitigate the data scarcity problem

• Improving risk modeling • Make companies with different risk level distinguishable

• CIPAR provides insights into cyber losses based on Advisen’s cyber incident database

• Integrates corporate finance data from ComputStat to provide relation between company characteristics and cyber incidents

• Computes quantified risk indicators and outputs a risk map based on company characteristics.

© 2017 CIRI / A Department of Homeland Security Center of Excellence

Page 15: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Data• Analyzing over 40,000+ cyber incident records from public sources

(WHID, VCDB) and from Advisen, Ltd., a leading provider of data for the commercial property and casualty insurance market

• Each record has:• Timeline (first notice date, report data, etc.)• Case characteristics (case type, causes, etc.) • Legal information (juris trigger, court, etc.) • Outcome (Loss amounts, injuries, etc.)• Victim company information (name, sector, size, etc.)• Detailed incident description from news media

Page 16: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

16

• Given the scarcity of cyber incident data, we must consider the trade-off between partition and abstraction

• Abstraction removes excessive information• Partition gives more details, but breaks data into small pieces

• 15 incident types in Advisen’s dataset, some have very few observations making it hard to study these incident types

• May need an abstraction by grouping together some incident types

• When we determine the optimal level of partition, we think about attributes of an incident that are the most important to insurers:

• Cause – whether a peril is covered by policy• Loss (first-party damage, third-party liability, etc.) – whether a loss is covered

© 2017 CIRI / A Department of Homeland Security Center of Excellence

Improving Efficiency in Data Usage

Page 17: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Cyber Risk Factors – Frequency• Firm size variable has a statistically significant coefficient of 0.035

• In the same industry, larger firms experience cyber attacks more frequently than smaller firms in a given period

• Because firm size variable is log scaled, the attack frequency for smaller firms is more sensitive to firm size changes

• From 100 employees to 200 employees, ~3-year incident number goes up 0.024• From 1000 employees to 1100 employees, ~3-year incident number goes up 0.003

• Coefficient varies across different industries• Firms in some industries are more often attacked than the others

Industry Coefficient Standard Error

NAICS-51 Information 1.47 0.09

NAICS-52 Finance and Insurance 0.97 0.08

Presenter
Presentation Notes
Firm size is a statistically significant factor that determined the frequency of being attacked, and industry could possibly another important factor
Page 18: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Cyber Risk Factors – Severity• Firm size has a statistically

significant coefficient of 0.1627

• In the same year and same industry, larger firms suffer more breaches

• Again, pairwise t-test suggests that firms in industry-51 (information industry) experience more severe data breaches than firms in other industries

11 21 22 23 31 32 33 42 44 45 48 49 51 52 53 54 55 56 61 62 71 72 8121 122 1 123 1 1 131 1 1 1 132 1 1 1 1 133 1 1 1 1 1 142 1 1 1 1 1 1 144 1 1 1 1 1 1 1 145 1 1 1 1 1 1 1 1 148 1 1 1 1 1 1 1 1 1 149 1 1 1 1 1 1 1 1 1 1 151 1 1 1 1 0.06 0.03 0.00 0.00 0.00 0.00 0.16 152 1 1 1 1 1 1 1 1 1 1 1 1 0.0053 1 1 1 1 1 1 1 1 1 1 1 1 0.35 154 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 155 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 156 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 161 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 162 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 171 1 1 1 1 1 1 1 1 1 1 1 1 0.04 1 1 1 1 1 1 172 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 181 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1 192 1 1 1 1 1 1 1 1 1 1 1 1 0.00 1 1 1 1 1 1 1 1 1 1

Presenter
Presentation Notes
Again firms in most industries do not differ in terms on the severity of incidents they experience, information industry is an exception
Page 19: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

19

Improving Efficiency in Data Usage (Cont.)

© 2017 CIRI / A Department of Homeland Security Center of Excellence

K-means clustering method is applied to group together incident types with similar loss profile• Optimal number of clusters

is determined by the Elbow method

• Choosing the smallest number that makes the model have enough explanatory power

• In this case, the optimal number is 6

• 6 clusters would be sufficient to explain 90% of in-cluster variance

• Indicating the original data having lots of unnecessary information (6 clusters vs 15 incident types)

The Elbow Method

Presenter
Presentation Notes
1. Cyber Extortion 2. Data - Malicious Breach 3. Data - Physically Lost or Stolen 4. Data - Unintentional Disclosure 5. Denial of Service (DDOS)/System Disruption 6. Digital Breach/Identity Theft 7. Identity - Fraudulent Use/Account Access 8. Industrial Controls & Operations 9. IT - Configuration/Implementation Errors 10. IT - Processing Errors 11. Network/Website Disruption 12. Phishing, Spoofing, Social Engineering 13. Privacy - Unauthorized Contact or Disclosure 14. Privacy - Unauthorized Data Collection 15. Skimming, Physical Tampering
Page 20: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

20

6 Types of Outcomes

© 2017 CIRI / A Department of Homeland Security Center of Excellence

Many types of incidents are similar based on the criteria of cause and loss• Incidents in the

same group tend to lead to same types of losses

• E.g. incidents in group 4 usually cause only first-party losses and rarely result in any third party liabilities

• They also share similarity in causes, which makes intuitive sense

Group Causes Note

1Privacy - Unauthorized Contact or Disclosure

Privacy ViolationPrivacy - Unauthorized Data Collection

2Denial of Service (DDOS)/System Disruption Cyber disruptions that affect business

operationsNetwork/Website Disruption

3 Industrial Controls & Operations Industrial Controls & Operations

4

Cyber Extortion

Unauthorized access to information systems for financial gain

Digital Breach/Identity TheftIdentity - Fraudulent Use/Account AccessPhishing, Spoofing, Social EngineeringSkimming, Physical Tampering

5

Data - Malicious Breach

Malicious data breach and IT failuresData - Physically Lost or StolenIT - Configuration/Implementation ErrorsIT - Processing Errors

6 Data - Unintentional Disclosure Unintentional data disclosure

Page 21: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

6 Types of Outcomes• 5-level scale indicating likelihood of having the type of lossGroup Cause Financial Losses Fines and Penalties Plaintiff Legal Expenses Other

1Privacy - Unauthorized Contact or Disclosure

High Low Low Very LowPrivacy - Unauthorized Data Collection

2Denial of Service (DDOS)/System Disruption

High Very Low Very Low LowNetwork/Website Disruption

3 Industrial Controls & Operations Low Very Low Very Low High

4

Cyber Extortion

Very High Very Low Very Low Very LowDigital Breach/Identity TheftIdentity - Fraudulent Use/Account AccessPhishing, Spoofing, Social EngineeringSkimming, Physical Tampering

5

Data - Malicious Breach

Medium Low Very Low Very LowData - Physically Lost or StolenIT - Configuration/Implementation ErrorsIT - Processing Errors

6 Data - Unintentional Disclosure Low Medium Low Very Low

Presenter
Presentation Notes
There are 6 types of outcomes, each has different chances of resulting on certain types of losses. For example, for privacy violation incidents, they often result in financial losses and sometimes fines and penalties and plaintiff legal expenses
Page 22: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Cyber Incident Types• Malicious data breach

is the most common cyber-incident type in maritime industry, and it causes an average loss of 3.41 million per incident, which is alsoquite high compared to other incident types

• IT processing errors has a low occurrence frequency, but can cause large losses

2,744

761,427

8,208,625

737,586

2,213,283

862,388

1,836,229

521,836

1,916,667

772,981

125,342

2,205,123

3,410,871

0 5000000 10000000

0 1000 2000 3000 4000

Industrial Controls & OperationsCyber Extortion

IT - Configuration/Implementation ErrorsIT - Processing Errors

Privacy - Unauthorized Data CollectionPhishing, Spoofing, Social Engineering

Network/Website DisruptionIdentity - Fraudulent Use/Account Access

Skimming, Physical TamperingUndetermined/Other

Data - Unintentional DisclosureData - Physically Lost or Stolen

Privacy - Unauthorized Contact or DisclosureData - Malicious Breach

Incident Number Average Losses

Page 23: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Cyber Incident Losses• The maximum possible loss in a

single cyber incident is getting higher in recent years

• Average loss remains low, indicating that incidents with small losses are becoming more frequent

• Implications:• Firms in maritime industry

should give data protection high priority when managing cyber risk, and take extra care to prevent IT process errors

• Firms may want to transfer some risks (cyber insurance) since cyber risks are becoming more unretainable

0

20

40

60

80

100

120

1995 1997 1999 2001 2003 2005 2007 2009 2011 2013 2015M

illio

ns

Loss Amount per Incident

Average Loss Max Loss

Page 24: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Claim Rate Estimation• Methodology:

• Randomly sampling 1,000 companies from the list to form a portfolio of policyholders

• Assuming each company has the same likelihood of purchasing cyber-insurance• Repeat the process a 1,000 times to create 1,000 portfolios.

• Looking up the companies from each portfolios in the Advisen’s database to see how many of them have cyber incidents in a given year

• We use data points from 2011 to 2014, since they have the best quality• Recording the cyber incident number for each portfolio. Since we have 1,000

portfolios in each year, we get a good distribution of portfolio risk in terms of claim counts.

Page 25: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Claim Rate Estimation – Results

050

100150200250300350

Freq

uenc

y (o

ut o

f 100

0 po

rtfo

lios)

Cyber Incident Rate in Each Portfolio

Cyber incident rate in different years

2011 2012 2013 2014

Presenter
Presentation Notes
Portfolios typically have normally distributed claim rate, During the 4-year period from 2011 to 2014, the mean claim rate is 2.4% for public companies, and the standard deviation is 0.53%
Page 26: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Claim Rate Estimation – Results (cont’d)• Findings:

• Portfolios typically have normally distributed claim rate• During the 4-year period from 2011 to 2014, the mean claim rate is 2.4% for

public companies, and the standard deviation is 0.53%• The distribution is shifting to the right over time

• 2% claim rate in 2011 vs. 3% in 2014• The variance is getting larger

• 0.4% in 2011 vs. 0.47% in 2014• Insurer’s portfolio risk is getting higher

Page 27: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Integrating CRISM with CIPAR• Sector specific risk scores

• Exploitation of vulnerabilities are function of sector and company characteristics

• Update probabilities in CRISM’s Bayesian attack graph with information of vulnerabilities exploited in targeted sectors

• Update portfolio risk profile in real time

Cyber Incident Number in Food Sector across Different Incident Types

Page 28: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Legal RISK

© 2016 CIRI / A Homeland Security Center of Excellence 28

Page 29: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

© 2017 CIRI / A Department of Homeland Security Center of Excellence 29

Analysis of Litigation Identifies the Current Legal Ambiguities

• Inconsistent legal standards aggravate the uncertainty within an already uncertain cyber insurance market.

Cyber Litigation Analytics Database (CLAD)

• Our research emphasized insurance litigation only

• We were able to collect more federal cases than state cases.

CLAD: Insurance Litigation Duration Federal State

< 1 year 37 4

1-2 years 40 9

2-3 years 12 4

3-4 years 9 2

4+ years 4 2

N/A 2 5

Ongoing 14 2

Total 118 28

Presenter
Presentation Notes
identified and analyzed litigation relevant to cyber insurance policies to evaluate legal needs in this area.
Page 30: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

© 2017 CIRI / A Department of Homeland Security Center of Excellence 30

Frequently raised issues• Issues raised by parties varied, but several occurred frequently. A majority

of the cases involved exclusions, the duty to defend, and coverage for underlying litigation.

CLAD: Insurance Litigation (Cont.)

Jurisdiction Exclusions Raised

Tangible Property and Damage

Occurrence Causation Dutyto Defend

Publication Presence of Underlying Suit

Federal 81 43 24 30 69 20 75

State 20 13 2 4 20 6 19

Total 101 56 26 34 89 26 94

Presenter
Presentation Notes
Occurrence – Does this event count as an occurrence under the policy? Causation – Is the claim based on harm caused by a covered event? Publication – This frequently arose with CGL cases where digital injuries from data breaches were argued to be covered by CGL provisions for personal injury and publication of sensitive information. When is leaked or stolen data “published” for the purposes of these provisions?
Page 31: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

© 2017 CIRI / A Department of Homeland Security Center of Excellence 31

Most of the Policies Were NotCyber Policies

• A lot of the insurance litigation involved applying Commercial General Liability policies to digital harms.

• Many cases involved multiple policies.

• “Technology” policies included cyber insurance policies as well as technology errors and omissions.

CLAD: Insurance Litigation(Cont.)

58

51123

23

1

11

9

23

Policies in 146 cases CGL

CGL and Technology

Crime policy

D&O

D&O and Technology

First party

First party andTechnology

Multiple

Other

Technology

Page 32: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

© 2017 CIRI / A Department of Homeland Security Center of Excellence 32

Insurers Prevail More Often at Trial Level• But statistical regression analysis found that policy holders prevail more often on first party

policies, while insurers prevail more often on third party policies • 87% of cases which raised an issue about policy exclusions did not result in a settlement (p-

value=0.03)

CLAD: Insurance Litigation (Cont.)

0

5

10

15

20

25

30

35

40

45

Trial court Appellate State Supreme Court

Insurer

Policy Holder

Mixed

Outcomes by Court Level, n = 107

Presenter
Presentation Notes
Excluding mixed outcome and settled cases, over 74% of cases which raised duty to defend provisions were upheld in the insurer's favor, which is statistically significantly higher than the portion of the cases that were upheld in the policy holder's favor, as shown by the Pearson chi-squared test (p-value=0.09). This result suggests that insurers are more likely to win a case  where the issue of duty to defend was raised. 72% of cases which did not involve an issue regarding lost business income or business interruption were upheld in the insurer's favor (p-value=0.01), suggesting that insurers are more likely to win the case if the policy holder does not address an issue about their lost business income or business interruption. We also employed the Pearson chi-squared test to explore statistically significant differences in the twenty-nine issues with respect to whether the cases were settled or litigated to an outcome . 87% of cases which raised an issue about policy exclusions did not result in a settlement (p-value=0.03), suggesting that parties are less likely to settle if any policy exclusion provisions were raised in the case. Among the other twenty-nine issues, we also have found statistically significant differences in the issues about coverage or incident timing (p-value=0.01), standing for plaintiffs in underlying litigation (p-value=0.03), and insurance concerns about damages (p-value=0.06) with respect to settled versus the non-settled (i.e., litigated to an outcome) cases. Our results suggest that a case is less likely to be settled if these three issues were not raised, even though most of the cases in our sample were litigated to an outcome, regardless of these three issues. However, we caution that the number of settled cases in our dataset is rather small.
Page 33: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Future Research Topics• How is a company’s financial performance related to characteristics of

the incident it experiences? • Positive correlation between the number of employees a company has and

the magnitude of loss it suffers in a cyber incident. • More factors like this from the combined database (assets, revenues, etc.) can

be examined

• How does a cyber incident affect a company’s financial performance?• Changes in reputation, profitability, stock price and etc. • Changes in company’s management style (risk management, investments in

cybersecurity)• How long can the influence last

Page 34: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

End User Engagement

© 2016 CIRI / A Homeland Security Center of Excellence 34

• Reliability First• Sentara Health

Page 35: Analyzing Cyber insurance as a Market Based Solution for ... · Risk Assessment is the Key • The essential solution to the informational asymmetry problem is . better risk assessment

Thank You