Cyber-reputation: risk turbocharged

Similar documents
Reducing Cyber Risk in Your Organization

Understanding Reputation Risk

Business Continuity Management Systems. Protecting for tomorrow by building resilience today

10Minutes. on the stark realities of cybersecurity. The Cyber Savvy CEO. A changed business environment demands a new approach:

Need to protect your business from potential disruption? Prepare for the unexpected with ISO

FFIEC Cybersecurity Assessment Tool

OECD PROJECT ON CYBER RISK INSURANCE

Managing cyber risks with insurance

THE NEW INTERNATIONALS. Updating perceptions of SMEs in an increasingly globalised world

Surviving Contact with Reality Crisis exercises as a key element of cyber incident and crisis management response.

Cyber security Building confidence in your digital future

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

How GCs And Boards Can Brace For The Cybersecurity Storm - Law360

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

Whanganui Reputation Management Strategy

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

Assumption of Breach: A New Approach to Cyber Security

Partnership for Cyber Resilience

Business Continuity Policy. Version 1.0

REPORT. Next steps in cyber security

CYBER-RISK MANAGEMENT WHY HACKERS COULD CAUSE THE NEXT GLOBAL CRISIS RAJ BECTOR CLAUS HERBOLZHEIMER SANDRO MELIS ROBERT PARISI

PwC s Advanced Threat and Vulnerability Management Services

Cybersecurity The role of Internal Audit

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Ensure Absolute Protection with Our Backup and Data Recovery Services. ds-inc.com (609)

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Cybersecurity: Mission integration to protect your assets

Singapore Exchange Sustainability Reporting Guide. Guide to Sustainability Reporting for Listed Companies

Risk Management Policy

Change Management. Seven Steps to Successful Change Management

Responsible Investment Framework. Guardians of New Zealand Superannuation

FTI Consulting insurance services

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

Technology and Cyber Resilience Benchmarking Report December 2013

Portfolio Carbon Initiative

Cyber security Building confidence in your digital future

Into the cybersecurity breach

Supporting information technology risk management

Business Continuity Management

The Compliance Universe

Risk Management & Business Continuity Manual

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Manulife Financial s Workplace Solutions for Mental Health

Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud

Who s next after TalkTalk?

Cybersecurity Strategic Consulting

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re

Cyril Roux: Cybersecurity and cyber risk

impact ACTIONABLE INSIGHT FOR BUSINESS LEADERS / CYBER RISK / MARCH 2016 BOLSTERING INSURERS CYBER DEFENCES

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Cyber Security Evolved

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

ACE European Risk Briefing 2012

ICBA Summary of FFIEC Cybersecurity Assessment Tool

The PNC Financial Services Group, Inc. Business Continuity Program

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

CYBER SECURITY, A GROWING CIO PRIORITY

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

Cyber security: Are consumer companies up to the challenge?

NNIT Cybersecurity. A new threat landscape requires a new approach

Overview TECHIS Manage information security business resilience activities

Risk Management Strategy and Policy. The policy provides the framework for the management and control of risk within the GOC

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

PRIORITIZING CYBERSECURITY

Navigating Cyber Risk Exposure and Insurance. Stephen Wares EMEA Cyber Risk Practice Leader Marsh

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Combating a new generation of cybercriminal with in-depth security monitoring

CYBER SECURITY INFORMATION SHARING & COLLABORATION

QUANTITATIVE MODEL FOR INFORMATION SECURITY RISK MANAGEMENT

Tackling the growing risk of cyber crime

Data Security: Fight Insider Threats & Protect Your Sensitive Data

The new rules of customer engagement Russia/CIS results

Bridging the data gap in the insurance industry. Cyber crisis management: Readiness, response, and recovery

Transcription:

The GlobalEthicist MATEJ MODERC Cyber-reputation: risk turbocharged By Andrea Bonime-Blanc Companies that suffer a cyber-attack can find the biggest damage is to their reputation. They need to protect themselves from this risk of risks The Economist Intelligence Unit published a prescient report in 2007: Reputation: The Risk of Risks, which was if not the first, then certainly the most prominent and thoughtful treatment of the issue of reputation risk at that time. Today, almost 10 years later, we find ourselves in the unenviable position of not only living through the age of reputation risk but also through the age of cyber-risk. These two risks reputation and cyber are often strategically important risks to any given organisation whether a corporation, government agency, non-profit group or university. And the combination of the two cyber-reputation risk is a new and powerful strategic issue. In this article I will make this case and issue a call to arms to all leaders whether corporate executives, boards of directors, heads of non-profits or of government agencies. Leaders need to be sensitised to the fact that in addition to reputation risk and cyber-risk individually, the combination of the two is today s strategic risk of risks, turbocharged. Cyberreputation risk is a new and powerful strategic issue COLUMNIST: ANDREA BONIME-BLANC What is reputation risk and why do stakeholders matter? Reputation risk as it relates to organisations is unlike almost any other risk it is pervasive and cuts across many other kinds of risk. In The Reputation 51

The stakeholder universe Owners/shareholders Consumers/purchasers Partners Communities Governments Social media Reputation stakeholders Media Regulators Employees Prospective employees Third parties/supply chain Non-governmental organisations Risk Handbook, I offer the following definition: Reputation risk is an amplifier risk that layers on or attaches to other risks especially ESG risks adding negative or positive implications to the materiality, duration or expansion of the other risks on the affected organisation, person, product or service. The role of stakeholders in the reputation risk equation is critical: knowing who your stakeholders are, understanding their expectations of your organisation and how to prioritise them has everything to do with effective reputation risk management. Critical actors in managing cyber risk are the board and C-suite What is cyber risk? What is cyber-risk governance? Cyber-risk can be defined in a variety of ways, but the simplest and most to-thepoint I have seen which interestingly includes a reference to reputation is the following from the Institute of Risk Management: Cyber risk means any risk of financial loss, disruption or damage to the reputation of an organisation from some sort of failure of its information technology systems. In turn, cyber-risk governance involves those at the top of the organisation asking whether the proper approach to triangulating this risk exists. The Conference Board Report Emerging Practices in Cyber-Risk Governance says: Cyber-risk governance is a framework adopted within an organisation to deal with the new and evolving risks relating to cyber space both within the organisation and as the organisation interfaces with the outside world. In this framework, the critical actors are the board, the C-suite or executive team, and frontline top management in charge of executing cyber-risk management. One of the key take-aways of the report is the following: Cyber risk should be considered at the top of many companies risk prioritisation, whether they have suffered from a major or material cyber attack (yet) or not. When a company doesn t have the right overall cyber-risk governance programme in place, the potential reputation risk consequences can amplify the company s 52

exposure to both tangible and further intangible consequences that may be difficult, costly and lengthy to repair. The penny is beginning to drop There is a growing body of evidence that executives and board members are beginning to accept that reputation risk and cyber-risk are two of the top strategic risks of our time; that these risks separately or, even worse, together can have a strategically significant impact on the wellbeing, longevity and profitability of an organisation and its stakeholders. In October 2015, Marsh Risk Consulting released an important new survey of global corporate executives showing that the two top global risks concerning C-suites and risk executives today were cyber and reputation risk, but especially the reputation risk associated with cyber breaches: 79% of respondents selected reputational damage from a sensitive data breach as the most likely and high-impact risk, the survey said. The chart on page 55 provides a snapshot of the reputation risk impact on four companies that suffered major public cyber-security attacks over the past few years. The RepRisk Index reflects big data analytics gathered daily from global media sources with respect to each company and its risk exposure, analysed and prioritised along a 100-point system where exposure above 50 generally represents a high or very high reputation risk exposure, according to a strict methodology developed by and proprietary to RepRisk. It can be gleaned from this data that each company retained significantly higher reputation risk consequences over time after its cyber-event compared with its peer group of companies (the grey bar in the chart). Sony Pictures HQ in Los Angeles. Its cyber hack cost it dear What works and what doesn t While this article is not intended to rattle cages or scare directors and executives, it is a call to arms on both reputation risk and cyber-risk governance, two of today s most important strategic risks. And strategic risk is first and foremost the responsibility of boards of directors/trustees and chief executive officers, presidents, heads of agencies and their C-suites. 53 Boards now see that reputation and cyber-risk are two of the top strategic risks of our time DAN ALTO

What you need to know 1. Effective cyber-risk governance requires a triangular framework, including the board, the C-suite and key functional executives. 2. Cyber-risk is a strategic risk closely related to another strategic risk: reputation risk. 3. Effective cyber-risk governance requires knowledge of who your cyber-risk actors and stakeholders Know what your crown jewels are and how to protect them are. 4. Successful cyber-risk governance requires a deep understanding of the organisation s crown jewels ie what are the highest value cyber-targets in the organisation intellectual property, personal information, financial account, etc? 5. A private sector/government agency partnership may be necessary in some industries, such as banking and critical infrastructure. 6. Effective cyber-risk governance requires a cross-disciplinary approach and segmental/ divisional approach where all divisions or business units collaborate on a cyber-defence strategy. 7. Cyber-risk should be an essential part of an organisation s resilience planning. It should be incorporated in any crisis management business continuity and disaster recovery planning system. 8. Organisations that are able to manage their cyber-risk successfully may find embedded opportunities for cost savings, process improvement and even new revenue streams. EDSTOCK The book describes five models of cyber-risk governance only three of which are successful. Success depends on meeting whether leadership is providing the necessary resources, budget and care required on this issue and whether the organisation has low/medium/high cyber-risk exposure depending on its footprint, focus, sector, etc. The Irresponsible Model is one in which leadership in a medium- to high-risk setting is not tackling the issue. The Complacent Model is one in which leadership in a lower-risk environment is not properly addressing the issue. Those that are more successful are the Vigilant Model, for leaders in a low-risk environment, Integrated Model, where leaders are working in a higher risk environment with a decentralised business model, and the Command and Control Model, where leaders in a higher-risk environment are working with a centralised business model. Finally, and more focused on the combined threat of cyber-reputation 54

Reputation risk effects at the four companies examined 80 70 60 Peak RRI 50 July 2015 RRI 40 Scan the horizon of strategic nonfinancial risk regularly July 2015 RRI of peer companies 30 20 10 0 Target JP Morgan Chase Sony Anthem risk, here are additional guidelines that leaders (boards and executives) of any type of organisation (corporate, NGO, governmental or educational) should consider to understand and tackle the combined threats and effects of cyber-reputation risk that new turbocharged risk of risks of our time. Have at least one independent member of the board with deep and broad risk expertise and if you re deep into technology, maybe even a technology executive. Don t just think about financial risks scan the horizon of strategic non-financial risk regularly and understand what it means to your business/ sector. Require your CEO/leader to spend time on non-financial risk and integrating this properly into the organisation s strategy. Measure the effect of these steps. Have access to the right technology gurus for your organisation: - Start with the chief technology officer, chief information security officer or chief information officer - Make sure your C-suite and board also have technology savvy players - Get the right outside experts to help you, regularly - Benchmark what others are doing both within and outside of your sector Reputation risk is not public relations it s risk management that requires the participation of public relations and a number of other key players and experts. Consider appointing a chief risk and reputation officer. Cyber-reputation risk management is a team sport not an individual one. Gather the key decision-makers and experts together and do it regularly before, during and after a cyber-reputation risk incident. This is the only way that your organisation can hope to build the long-term resilience muscle it will need to manage this turbocharged strategic risk, which is going nowhere any time soon. n Dr Andrea Bonime- Blanc is chief executive of GEC Risk Advisory, a global strategic governance, risk & reputation consultancy and tweets @ GlobalEthicist 55