Reducing the Challenges to Making Cybersecurity Investments in the Private Sector
|
|
|
- Bernard Blair
- 10 years ago
- Views:
Transcription
1 Cyber Security Division 2012 Principal Investigators Meeting TTA: Cyber Economics PI - Dr. Lawrence A. Gordon* ([email protected]), (301) Co-PI Dr. Martin P. Loeb* ([email protected]), (301) Co-PI Mr. William Lucyshyn** ([email protected]), (301) *Smith School of Business, Accounting and Information Assurance Department, University of Maryland **School of Public Policy, Center for Public Policy and Private Enterprise, University of Maryland
2 Primary Objective: to understand more fully the challenges associated with making cybersecurity investments in the private sector and to recommend policies for facilitating the appropriate level of such investments (emphasis will be given to firms that own and/or operate assets critical to the national infrastructure). In pursuing this objective, we begin by developing a conceptual framework for making cybersecurity investments. In other words, since cybersecurity investments compete with other investment opportunities available to firms, they need to be justified by showing that the benefits exceed the costs, in terms of NPV. 2
3 Technical Approach: Examine Existing Literature Develop Model(s) for Investing in Cybersecurity Conduct In-Depth Interviews with CFOs & CIOs from major firms Conduct Survey and Analyze Data Develop Recommendations for Policies and Procedures that Incentivize Appropriate Level of Private Sector Cybersecurity Investment 3
4 The Business Case for Cybersecurity Investments Total Costs Dollars Cost of Cybersecurity Breaches Cost of Cybersecurity Optimal Level Level of Cybersecurity 4
5 Conceptual View of Costs of Security Breaches 5
6 H1: The uncertainties associated with measuring the benefits from cybersecurity have created a situation such that it is more difficult for managers to get funds for cybersecurity investments than for investments related to traditional revenue generating projects. H2: The risk associated with cybersecurity investments is poorly understood by most individuals involved in making cybersecurity investments. H3: Due to externalities, when firms only consider private profits they tend to under-invest in cybersecurity. 6
7 Research Design 1. Provide Conceptual Framework for Making Cybersecurity Investments Z 1 = argmin [P(z)L +z] Z 2 = argmin [P(z)L +z + CS(z)] 2. Conduct 4-6 in-depth case studies of the cybersecurity investment activities of organizations operating in critical infrastructure industries, based on interviews with the CFOs and CSOs. The case studies will be viewed as a series of miniexperiments. 3. Design questionnaire for conducting a large empirical survey. The data collected from the survey will be used to statistically test the hypotheses underlying the study. The questionnaire will be sent to the CFOs and CSOs of approximately 300 major organizations from a variety of critical structure industries. 4. Analyze survey data via statistical and econometric procedures. Y = β 0 + β 1 X 1 + β 2 X 2 + Σ α i C i n i=1 7
8 Inappropriate regulatory strategies can cause firms to reduce their overall levels of cybersecurity 8
9 Deliverables Monthly Progress Reports Interim Report after the first 12 months. Final Report after the 24 months that will summarize the entire research project, including: (a) survey of private sector firms, (b) case studies, (c) cyber security investment models, and (d) policy recommendations. Preparation of Articles for submission to major Research Journals Presentations at Academic and Professional Conferences 9
10 Application of research Inform the formulation of policies and regulations aimed at incentivizing an appropriate level of investment in cybersecurity measures by the private sector Assist firms as they analyze their cybersecurity requirements, and work to determine the appropriate level of investment 10
11 Gordon, L.A., M.P. Loeb, and L. Zhou, "The Impact of Information Security Breaches: Has There Been a Downward Shift in Costs?" Journal of Computer Security, Vol. L. A. Gordon 11 19, No. 1, 2011, pp Selected References Bodin, L., L.A. Gordon and M.P. Loeb, Information Security and Risk Management, Communication of the ACM, Vol. 51, No. 4, 2008, pp Campbell, K., L.A. Gordon, M.P. Loeb and L. Zhou, The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market, Journal of Computer Security, Vol. 11, No.3, 2003, pp Gansler, J. S. and W. Lucyshyn, Improving the Security of Financial Management Systems: What Are We to Do? Journal of Accounting and Public Policy, Vol. 24, No.1, pp Gordon, L.A. and M.P. Loeb, Managing Cybersecurity Resources: A Cost-Benefit Perspective (McGraw-Hill), Gordon, L.A. and M.P. Loeb, Information Security Budgeting Process: An Empirical Study, Communications of the ACM, Jan. 2006, pp Gordon, L.A., M.P. Loeb, Economic Aspects of Information security: An Emerging Field of Research, Information System Frontiers, Vol. 8, No. 5, 2006, pp Gordon, L.A. and M.P. Loeb, The Economics of Information Security Investment, ACM Transactions on Information and System Security, November 2002, pp (reprinted in Economics of Information Security, 2004). Gordon, L.A. and M.P. Loeb, Return on Information Security Investments: Myths vs. Reality, Strategic Finance, November 2002, pp Gordon, L.A., M.P. Loeb, and W. Lucyshyn, Sharing Information on Computer Systems Security: An Economic Analysis, Journal of Accounting and Public Policy, Vol. 22, No. 6, 2003, pp , Gordon, L.A., M.P. Loeb, and W. Lucyshyn, Information Security Expenditures and Real Options: A Wait-and-See Approach, Computer Security Journal, Vol. 19, No. 2, 2003, pp Gordon, L.A., M.P Loeb, W. Lucyshyn, and R. Richardson, CSI/FBI Computer Crime and Security Survey, Computer Security Journal, Summer Gordon, L.A., M.P. Loeb and T. Sohail, Market Value of Voluntary Disclosures Concerning Information Security, MIS Quarterly, September 2010, pp Gordon, L.A., M.P. Loeb, and T. Sohail, A Framework for Using Insurance for Cyber-Risk Management, Communications of the ACM, March 2003, pp Gordon, L.A., M.P. Loeb, T. Sohail, C-Y Tseng and L. Zhou, Cybersecurity Capital Allocation and Management Control Systems, European Accounting Review, Vol. 17, No. 2, 2008, pp
ECONOMIC ASPECTS OF CYBER/INFORMATION SECURITY
ECONOMIC ASPECTS OF CYBER/INFORMATION SECURITY Lawrence A. Gordon Ernst & Young Alumni Professor of Managerial Accounting & Information Assurance The Robert H. Smith School of Business University of Maryland
INVESTING IN CYBERSECURITY:
INVESTING IN CYBERSECURITY: Insights from the Gordon-Loeb Model Lawrence A. Gordon EY Alumni Professor of Managerial Accounting & Information Assurance Affiliate Professor in University of Maryland Institute
Information Security and Risk Management
Information Security and Risk Management by Lawrence D. Bodin Professor Emeritus of Decision and Information Technology Robert H. Smith School of Business University of Maryland College Park, MD 20742
Incentives for Improving Cybersecurity in the Private Sector: A Cost-Benefit Perspective
Incentives for Improving Cybersecurity in the Private Sector: A Cost-Benefit Perspective Testimony for the House Committee on Homeland Security s Subcommittee on Emerging Threats, Cybersecurity, and Science
How To Understand The 2004 Csi/Fbi Computer Crime And Security Survey
NINTH ANNUAL 2004 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY GoCSI.com by Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson The Computer Crime and Security Survey is conducted
Master of Business Administration, State University of New York at Albany, Accounting/Finance Concentration, 6/67
LAWRENCE A. GORDON ([email protected]) EY Alumni Professor of Managerial Accounting and Information Assurance Robert H. Smith School of Business, University of Maryland - College Park, MD 20742 Affiliate
THE IMPACT OF INFORMATION SECURITY BREACHES ON FINANCIAL PERFORMANCE OF THE BREACHED FIRMS: AN EMPIRICAL INVESTIGATION
Journal of Information Technology Management ISSN #1042-1319 A Publication of the Association of Management THE IMPACT OF INFORMATION SECURITY BREACHES ON FINANCIAL PERFORMANCE OF THE BREACHED FIRMS: AN
ELEVENTH ANNUAL CSI/FBI COMPUTER CRIME AND SECURITY SURVEY. GoCSI.com
ELEVENTH ANNUAL 2006 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY GoCSI.com 2006 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY by Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson The
TENTH ANNUAL CSI/FBI COMPUTER CRIME AND SECURITY SURVEY. GoCSI.com
TENTH ANNUAL 2005 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY GoCSI.com 2005 CSI/FBI COMPUTER CRIME AND SECURITY SURVEY by Lawrence A. Gordon, Martin P. Loeb, William Lucyshyn and Robert Richardson The
PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS
CYBERSECURITY PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS by Dr. Lawrence A. Gordon ([email protected]) EY Professor of Managerial Accounting and Information Assurance Affiliate
Private Sector Cyber Security Investment Strategies: An Empirical Analysis *
Private Sector Cyber Security Investment Strategies: An Empirical Analysis * Brent R. Rowe Technology Economics and Policy RTI International [email protected] Michael P. Gallaher Technology Economics and Policy
SECURITY BREACH IN TRADING SYSTEM- COUNTERMEASURE USING IPTRACEBACK
American Journal of Applied Sciences 11 (3): 492-498, 2014 ISSN: 1546-9239 2014 Science Publication doi:10.3844/ajassp.2014.492.498 Published Online 11 (3) 2014 (http://www.thescipub.com/ajas.toc) SECURITY
Sharing Information on Computer Systems Security: An Economic Analysis
Sharing Information on Computer Systems Security: An Economic Analysis Lawrence A. Gordon Ernst & Young Alumni Professor of Managerial Accounting and Information Assurance The Robert H. Smith School of
S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.
S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in
FC 2 Collaborative Seed Grant Program
FC 2 Collaborative Seed Grant Program Program Description: The Florida Center for Cybersecurity (FC 2 ) supports and encourages collaboration across the State University System (SUS) to promote research
Pharmacoeconomic, Epidemiology, and Pharmaceutical Policy and Outcomes Research (PEPPOR) Graduate Program
Pharmacoeconomic, Epidemiology, and Pharmaceutical Policy and Outcomes Research (PEPPOR) Graduate Program Front from left: 2010 Graduates Rupali Nail, PhD & Pallavi Jaiswal, MS; Back from left: PEPPOR
Statistical Analysis on Relation between Workers Information Security Awareness and the Behaviors in Japan
Statistical Analysis on Relation between Workers Information Security Awareness and the Behaviors in Japan Toshihiko Takemura Kansai University This paper discusses the relationship between information
Big Data Analytics; The value of the right action. April 1 st, 2014 Edwin Steenvoorden VP Business Analytics & Information Strategy
Big Data Analytics; The value of the right action April 1 st, 2014 VP Business Analytics & Information Strategy Better intelligence, smarter decisions Introduction Better intelligence, smarter decisions
2.2 Reviewing the company s internal financial controls and the company s internal control and risk management systems;
Beazley plc Audit and Terms of reference Approved by board resolution dated 23 July 2015 1. Objectives To assist the board of directors in fulfilling its oversight responsibilities for the financial reporting
Driving Strategic Impact. Mastering the Tools of Strategy Consulting Spring 2016
Updated October 2015 B8624-001: Mastering the Tools of Strategy Consulting Spring 2016 Time: Thursdays, 9:00am 12:15pm Room: Uris 326 Session: January 28th - March 10th Professor: Marco Viola Contact info:
Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know
Cyber Security for the Private Sector: What Companies and Their Lawyers Need to Know Gus Coldebella, Goodwin Procter LLP John Geschke, VP and General Counsel, Zendesk, Inc. Jim Jaeger, VP, Cybersecurity
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT
QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT Rok Bojanc ZZI d.o.o. [email protected] Abstract: The paper presents a mathematical model to improve our knowledge of information security and
USF Graduate Catalog 2015 2016 SECTION 18. http://www.grad.usf.edu/
SECTION 18 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 18 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
AHMED BIN MOHAMED MILITARY COLLEGE DESCRIPTION OF THE COURSES OFFERED IN THE BACHELOR DEGREE IN THE BUSINESS ADMINISTRATION CURRICULUM
AHMED BIN MOHAMED MILITARY COLLEGE DESCRIPTION OF THE COURSES OFFERED IN THE BACHELOR DEGREE IN THE BUSINESS ADMINISTRATION CURRICULUM Course Code 2503101 Course Name Principles of Management Prerequisite
129. Using Reputation System to Motivate Knowledge Contribution Behavior in Online Community
129. Using Reputation System to Motivate Knowledge Contribution Behavior in Online Community Sarah P.W. Shek City University of Hong Kong [email protected] Choon-Ling Sia City University of Hong Kong
Voluntary Participation in Cyber-insurance Markets
1 Voluntary Participation in Cyber-insurance Markets Parinaz aghizadeh, Mingyan Liu Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, Michigan, 4819-1 Email:
University of Maryland Cybersecurity Center (MC 2 )
University of Maryland Cybersecurity Center (MC 2 ) Responding to the Needs of the State, the Nation, and the Global Community Pat Prof. Michael Hicks Director www.cyber.umd.edu/ Cybersecurity Challenge
How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity
HR Business Value Metrics Study
HR Business Value Metrics Study SharedXpertise What we will cover Business Value Metrics Study Project Description Participants & Approach HR Industry Practices Discussion Traditional Business Case HR
Quality Information by Charity Organizations and its Relationship with Donations
Quality Information by Charity Organizations and its Relationship with Donations RUHAYA ATAN 1, SAUNAH ZAINON 2, YAP BEE WAH 3 Faculty of Accountancy 1,2 Faculty of Computer and Mathematical Science 3
Voluntary Participation in Cyber-insurance Markets
Voluntary Participation in Cyber-insurance Markets Parinaz aghizadeh and Mingyan Liu Abstract The study of cyber-insurance, both as a method for transferring residual cyber-security risks, and as an incentive
Roles of Practitioners and Strategic Planning Practices
Roles of Practitioners and Strategic Planning Practices *** Associate Professor Dr. Kanya Sirisagul Department of Advertising and Public Relations Business Administration Faculty Ramkhamhaeng University
Last update: December 19, 2013. Global Master of Finance Dual Degree Course Descriptions. Foundation Courses. FIN B62 510. Introduction to Finance
Last update: December 19, 2013 Global Master of Finance Dual Degree Course Descriptions Foundation Courses FIN B62 510. Introduction to Finance The main topics to be covered in this course are (1) principles
REQUEST FOR PROPOSALS: CENTER FOR LONG-TERM CYBERSECURITY
102 S Hall Rd Berkeley, CA 94720 510-664-7506 [email protected] REQUEST FOR PROPOSALS: CENTER FOR LONG-TERM CYBERSECURITY The University of California, Berkeley Center for Long-Term Cybersecurity (CLTC)
THE ROLE OF MARKETING IN MULTINATIONAL SUBSIDIARIES: STANDARDIZATION VERSUS LOCALIZATION
THE ROLE OF MARKETING IN MULTINATIONAL SUBSIDIARIES: STANDARDIZATION VERSUS LOCALIZATION Miroslav Karlíãek, Zuzana Chytková, Nikola Hofiej, Hana Mohelská, Jakub Fischer Introduction In the international
Objective. Background FSP FAS 142-3 FASB STAFF POSITION. No. FAS 142-3. Title: Determination of the Useful Life of Intangible Assets
FASB STAFF POSITION No. FAS 142-3 Title: Determination of the Useful Life of Intangible Assets Date Posted: April 25, 2008 Objective 1. This FASB Staff Position (FSP) amends the factors that should be
MKT3415 Internet Strategy And Marketing Semester I, 2014/2015 Course Outline August 2014
MKT3415 Internet Strategy And Marketing Semester I, 2014/2015 Course Outline August 2014 Professor: Ritu Narayan Office: BIZ 2, 03-22 Phone: (65) 6601 1598 Email: [email protected] Office Hours: By appointment
Healthcare and IT Working Together. 2013 KY HFMA Spring Institute
Healthcare and IT Working Together 2013 KY HFMA Spring Institute Introduction Michael R Gilliam Over 7 Years Experience in Cyber Security BA Telecommunications Network Security CISSP, GHIC, CCFE, SnortCP,
Security and privacy standardization for the SME community
Security and privacy standardization for the SME community NLO meeting, Athens, March 4th 2015 European Union Agency for Network and Information Security www.enisa.europa.eu PROJECT CONTEXT European Union
USF Graduate Catalog 2014 2015 SECTION 23. http://www.grad.usf.edu/
SECTION 23 COLLEGE OF GRADUATE STUDIES (ADMINISTERED BY THE OFFICE OF GRADUATE STUDIES) 616 Section 23 College of Graduate Studies Changes to Note The following curricular changes for the Office of Graduate
Cyber Security Incident Response High-level Maturity Assessment Tool
Cyber Security Incident Response High-level Maturity Assessment Tool Introduction Overview Many organisations are extremely concerned about potential and actual cyber security attacks, both on their own
DELEGATION OF FIDUCIARY POWER UNDER THE CALIFORNIA PRUDENT INVESTOR ACT
DELEGATION OF FIDUCIARY POWER UNDER THE CALIFORNIA PRUDENT INVESTOR ACT John A. Hartog, 1 Paul Sanderson 2 A practical innovation of the Uniform Prudent Investor Act 1 (UPIA) is the reversal of the prior
UNDERSTANDING THE COST ASSOCIATED WITH DATA SECURITY BREACHES
UNDERSTANDING THE COST ASSOCIATED WITH DATA SECURITY BREACHES Kholekile L. Gwebu, Associate Professor of Decision Sciences, Peter T. Paul College of Business and Economics, University of New Hampshire,
Cybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
CAPITAL SHORTFALL: A NEW APPROACH TO RANKING and REGULATING SYSTEMIC RISKS Viral Acharya, Robert Engle and Matthew Richardson 1
CAPITAL SHORTFALL: A NEW APPROACH TO RANKING and REGULATING SYSTEMIC RISKS Viral Acharya, Robert Engle and Matthew Richardson 1 We discuss a method to estimate the capital that a financial firm would need
Berkshire Hathaway Inc. Audit Committee Charter
Berkshire Hathaway Inc. Audit Committee Charter Committee Membership: The Audit Committee of Berkshire Hathaway Inc. (the Company ) shall be comprised of at least three directors, each of whom the Board
Ranking Barriers to Implementing Marketing Plans in the Food Industry
Ranking Barriers to Implementing Marketing Plans in the Food Industry Shahram Gilaninia 1, Seyed Yahya Seyed Danesh 2, Mina Abroofarakh 3* 1 Department of Industrial Management, Rasht Branch, Islamic Azad
EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS
SENRA Academic Publishers, British Columbia Vol. 8, No. 3, pp. 3125-3129, October 2014 Online ISSN: 1920-3853; Print ISSN: 1715-9997 EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
Total Credits: 30 credits are required for master s program graduates and 51 credits for undergraduate program.
Middle East Technical University Graduate School of Social Sciences Doctor of Philosophy in Business Administration In the Field of Accounting-Finance Aims: The aim of Doctor of Philosphy in Business Administration
Personal Injury Accreditation Scheme
Personal Injury Accreditation Scheme Guidance In this guidance you can find: A. An introduction to the Accreditation Scheme B. Who is eligible to apply for membership? C. What types of membership are available?
EVALUATION OF THE EFFECTIVENESS OF ACCOUNTING INFORMATION SYSTEMS
49 International Journal of Information Science and Technology EVALUATION OF THE EFFECTIVENESS OF ACCOUNTING INFORMATION SYSTEMS H. Sajady, Ph.D. M. Dastgir, Ph.D. Department of Economics and Social Sciences
Effectiveness of Human Resource Information Systems: A Study with Reference to Greaves Cotton Limited
Asian Journal of Managerial Science ISSN: 2249-6300 Vol. 4 No. 1, 2015, pp.1-5 The Research Publication, www.trp.org.in Effectiveness of Human Resource Information Systems: A Study with Reference to Greaves
The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session
The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session Robert Smith Systemwide IT Policy Director Compliance & Audit Educational Series 5/5/2016 1 Today s reality There are two kinds
Gerald Whitney. Department of Economics and Finance University of New Orleans New Orleans, LA 70148 504-280-6903 [email protected]
Gerald Whitney Department of Economics and Finance University of New Orleans New Orleans, LA 70148 504-280-6903 [email protected] EDUCATION Ph.D. Tulane University, Economics, 1977. Fields: Monetary Theory
HBEH 750: Applied Research Methods Fall 2015
HBEH 750: Applied Research Methods Fall 2015 Department of Health Behavior, Gillings School of Global Public Health University of North Carolina at Chapel Hill Class: Tuesdays & Thursdays, 2:00 3:15 pm,
THE ABET CAC ACCREDITATION: IS ACCREDITATION RIGHT FOR INFORMATION SYSTEMS?
THE ABET CAC ACCREDITATION: IS ACCREDITATION RIGHT FOR INFORMATION SYSTEMS? Dr. Frederick G. Kohun, Robert Morris University, [email protected] Dr. David F. Wood, Robert Morris University, [email protected] ABSTRACT
Exploring the Drivers of E-Commerce through the Application of Structural Equation Modeling
Exploring the Drivers of E-Commerce through the Application of Structural Equation Modeling Andre F.G. Castro, Raquel F.Ch. Meneses and Maria R.A. Moreira Faculty of Economics, Universidade do Porto R.Dr.
Leveraging Regulatory Compliance to Improve Cyber Security
Leveraging Regulatory Compliance to Improve Cyber Security Leveraging Regulatory Compliance to Improve Cyber Security Brian Irish, Cyber Security Assurance Manager Salt River Project LEVERAGING REGULATORY
