SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
ANNUAL REVIEW Reprint July 2019
������������������
���������������
��������������������
Cyber Security &
Risk Management
Financier Worldwide canvasses the opinions of leading professionals around the world on
the latest trends in cyber security & risk management.
Published by Financier Worldwide Ltd
©2019 Financier Worldwide Ltd. All rights reserved.
Permission to use this reprint has
been granted by the publisher.
REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com
A N N UA L R E V I E W
C Y B E R S E C U R I T Y &
R I S K M A N AG E M E N T
EMANUELE CAVALLERO
Tokio Marine HCC
Senior Underwriter
+34 93 530 7322
ecavallero@tmhcc.com
Emanuele Cavallero is a senior
underwriter for Italy, Greece and
the Middle East at Tokio Marine
HCC, with over 10 years experience
in financial lines products. Over
the last five years, he has been
focusing on the underwriting of
cyber risks with the ultimate goal
of customising cyber security
insurance products for his markets.
Mr Cavallero holds a Bachelor’s
degree in Economics from the
Università degli Studi di Torino
and he speaks Italian, English and
Spanish.
Italy■
■ Q. In your opinion, what are the major
cyber threats to which today’s companies
are vulnerable? Could you comment on any
recent, high profile cyber attacks in Italy?
CAVALLERO: Today, cyber attacks are perpetrated
from a variety of places, using constantly evolving
methods and techniques. Though some threats
are more invasive than others, they can be
equally devastating for unprepared businesses.
Consequently, understanding the state of cyber
security is key to successfully protecting a business
from advanced cyber attacks. Not having a cyber
security plan creates high-risk situations, including
the potential compromising of private data, costly
recovery expenses or weakened client trust. Italy
fell victim to two major cyber attacks during the
last two months of 2018. The first saw a server
near Rome targeted and accessed by unknown
hackers. The server handles certified email accounts
for public administrators. Then, less than a month
later, an Italian oil company, Saipem, was targeted
by hackers utilising a modified version of the
‘Shamoon’ virus. Due to this, hundreds of the
companies’ servers and personal computers in
the United Arab Emirates (UAE), Saudi Arabia,
Scotland and India were taken down.
A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T
JULY 2019 • FINANCIER WORLDWIDE • REPRINT 8www.financierworldwide.com
ITALY • EMANUELE CAVALLERO • TOKIO MARINE HCC
■ Q. Given the risks, do you believe
companies are placing enough importance
on cyber security? Are board members
taking a proactive, hands-on approach to
improving policies and processes?
CAVALLERO: Many companies think IT
systems security is important, but only a few
have a formal strategy in place to protect their
data and devices. Cyber threats can no longer
be considered exceptional circumstances for
businesses. Until recently, most companies had
a small group of staff responsible for their IT
and cyber security. Organisations now need
greater defences as hackers and malware
become increasingly sophisticated. With around
4000 ransomware attacks being conducted per
day, and the frequency of ransomware attacks
estimated to occur every 14 seconds by the end
of 2019, building defences against ransomware
should, therefore, be a top priority for companies
worldwide.
■ Q. To what extent have cyber security
and data privacy regulations changed
in Italy? How is this affecting the
way companies manage and maintain
compliance?
CAVALLERO: Organisations need to conduct
data protection impact assessments (DPIAs) as
part of the General Data Protection Regulation’s
(GDPR’s) mandate. DPIAs are required in
specific circumstances and used to identify,
understand and address any privacy issues that
might arise when developing new products
and services that involve the processing of
personal data. Nevertheless, some of the main
risks to businesses continue to stem from
cyber security. In addition to fines for a lack of
compliance, businesses that are not on top of
security could face very real risks arising from
socially engineered attacks, ransomware and
other targeted, advanced assaults. In the first
nine months since the GDPR came into force,
just over €55m was collected in fines issued by
the European Union’s (EU’s) data protection
supervisory authorities (DPAs). The DPAs have
seen a huge increase in the number of personal
data breaches being reported, with over 89,000
personal data breaches being notified in less than
12 months. Only 63 percent of cases investigated
by DPAs have been closed. Over 144,000 queries
and complaints are reported to have been made
by individuals who believe their rights under
GDPR have been violated.
REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com
A N N UA L R E V I E W
C Y B E R S E C U R I T Y &
R I S K M A N AG E M E N T
■ Q. In your experience, what steps
should companies take to avoid potential
cyber breaches – either from external
sources such as hackers or internal
sources such as rogue employees?
CAVALLERO: Cyber attacks are rapidly
evolving and are becoming increasingly
sophisticated. Therefore, it is no longer enough
to simply protect a company’s perimeter alone.
Today, both technology which helps detect and
contain malicious activities and the inclusion of
cyber security as part of a company’s corporate
culture are essential. The latter is important and
necessary when assessing today’s workplace.
Simple factors, such as the extensive usage of
cloud services, the usage of external Wi-Fi for
accessing internal documents, the increasing
popularity of bring your own device (BYOD)
and the increasingly popular work from home
policies must be considered. On a basic level,
there are certain threats that can be effectively
eradicated if security becomes part of workforce
culture, thus helping to avoid or reduce the
success of future social engineering and phishing
attacks.
■ Q. How should firms respond
immediately after falling victim to cyber
crime, to demonstrate that they have done
the right thing in the event of a cyber
breach or data loss?
CAVALLERO: The ‘golden hour’ refers to the
fact that once a system hack is confirmed, action
needs to be taken immediately. Every minute
is important. The first step for a hacked firm
should be to call the incident response unit
or emergency response team (ERT), which is
composed of specific individuals who have been
trained in what to do after a cyber attack. This
can be an in-house group or an external company
on retainer. Having an incident team further
minimises the damage a company may endure
and helps reduce the cost of a cyber attack. The
GDPR requires companies to notify users of a
data breach within 72 hours. With significant
financial penalties, it is even more critical to
develop and test a company’s cyber security
incident response plan (CSIRP) before a breach
occurs. A comprehensive CSIRP, regularly tested
and updated, can help incident response teams
save valuable time and resources. In the event
of an incident, it is critical to answer three key
questions: What has happened? What data have
the attackers accessed? How can the damage
be quickly contained and remediated? A robust
response plan will answer these questions.
■ Q. In what ways can risk transfer
and insurance help companies and their
D&Os to deal with cyber risk, potential
losses and related liabilities?
CAVALLERO: Evolving cyber attacks and
tightening regulatory requirements are increasing
the need for organisations to transfer those risks,
as cyber security management alone is no longer
enough. By arranging a cyber security insurance
policy, the risk is transferred effectively. This
recent need for a holistic approach in terms
of cyber security has created a path where
insurance companies have seen a surge of
business, especially following the implementation
of tougher regulations like the GDPR. A more
mature cyber insurance market in Europe is
now leading some carriers to develop additional
services beyond basic risk transfer, like, for
example, post-incident services in order to
JULY 2019 • FINANCIER WORLDWIDE • REPRINTwww.financierworldwide.com
A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T
support customers that suffer a breach or
tools to help monitor risks as part of a trusted
partnership between insurer and insured.
■ Q. What are your predictions for cyber
crime and data security in Italy over the
coming years?
CAVALLERO: Technology is always evolving,
which means that cyber crime itself must adapt
if it wants to survive. This is why hackers are
constantly devising new lines of attack and
adapting in order to avoid detection. Cyber
security by itself will not be enough to secure our
most sensitive data or our privacy. Security will
also have to focus on enabling organisations to
leverage and monetise the data they hold without
being exposed to data breaches or IP theft,
particularly in the era of artificial intelligence
(AI) and Big Data. ■
“ Today, both technology which helps detect and
contain malicious activities and the inclusion of cyber
security as part of a company’s corporate culture are
essential.”
ITALY • EMANUELE CAVALLERO • TOKIO MARINE HCC
www.tmhcc.com
Tokio Marine HCC is a leading specialty insurance group with offices in the
United States, the United Kingdom, Spain and Ireland, transacting business in
approximately 180 countries and underwriting more than 100 classes of specialty
insurance.
EMANUELE CAVALLERO
Senior Underwriter
+34 93 530 7322
ecavallero@tmhcc.com
GÜLSAH DAGDELEN
Senior Underwriter – Cyber
+34 93 530 7358
gdagdelen@tmhcc.com
SIMON CALDERBANK
Senior Underwriter – Cyber
+44 (0)20 7680 2910
scalderbank@tmhcc.com
REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com
A N N UA L R E V I E W
C Y B E R S E C U R I T Y &
R I S K M A N AG E M E N T
PAULINA RADGOWSKA
Tokio Marine HCC
Senior Underwriter
+34 93 530 7422
pradgowska@tmhcc.com
Paulina Radgowska is as senior
underwriter for Switzerland and
Central & Eastern Europe for
financial lines insurance, focusing
on cyber risks. Prior to joining Tokio
Marine HCC she worked as a broker
for Marsh in its Finpro practice and
spent some time in its cyber centre
of excellence in New York. She has
a BA in Spatial Economics from
Warsaw University and a masters
degree from Warsaw School of
Economics where she specialised
in business management and real
estate management. She speaks
Polish, English, Portuguese and
Spanish.
Poland■
■ Q. In your opinion, what are the major
cyber threats to which today’s companies
are vulnerable? Could you comment on any
recent, high profile cyber attacks in Poland?
RADGOWSKA: According to a recent KPMG
survey of 100 Polish companies, cyber criminals are
still the biggest threat companies face. Attackers
include both individual hackers and organised
groups using ransomware and social engineering
techniques to steal confidential data and funds. The
recent attacks on the biggest financial institutions in
Poland were performed using spyware and phishing
techniques. However, it is always difficult to obtain
detailed information on losses made as companies
do not like to publicise the fact that they have been
hacked. Data theft by employees is also a concern.
Employees, contractors and temporary workers who
have direct access to critical resources, introduce
risks that need to be understood and countered.
Human error is also a great challenge for all
businesses.
■ Q. Given the risks, do you believe
companies are placing enough importance
on cyber security? Are board members
taking a proactive, hands-on approach to
improving policies and processes?
A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T
JULY 2019 • FINANCIER WORLDWIDE • REPRINT 8www.financierworldwide.com
POLAND • PAULINA RADGOWSKA • TOKIO MARINE HCC
RADGOWSKA: Many companies are improving
their approaches to cyber security; however,
there is still a lot of work to be done. Security
policies, procedures and guidelines are written,
to a large extent, based on auditor instructions
but are then never shared, explained or used with
employees. To be useful, the procedures need
to be put into action and appropriately adapted.
No one is going to follow the rules if people do
not know they exist. The consequences of non-
compliance are expensive liability issues for the
company, which makes it crucial that employees
are aware of what is expected of them in terms
of preventing cyber incidents. An increasing
number of organisations are developing business
continuity plans or at least crisis management
procedures. However, many of these documents
go untested.
■ Q. To what extent have cyber security
and data privacy regulations changed
in Poland? How is this affecting the
way companies manage and maintain
compliance?
RADGOWSKA: Unfortunately, many
organisations do not understand all relevant
legislation. In addition, technology changes
at such a fast pace that all new laws and
regulations, if too detailed, would never
represent reality. For this reason, the European
Union’s (EU’s) General Data Protection
Regulation (GDPR), is a good example of a
high-level requirement that still puzzles many
companies. It is now, when fines for non-
compliance start to crop up in Poland and
regulators place privacy issues under more
scrutiny, that companies not taking cyber
security seriously may get a wake-up call.
However, while some organisations are still
getting to grips with the GDPR, another EU
regulation requires their attention: the new EU
ePrivacy Regulation (ePR). The scope of the ePR
applies to any business that provides any form
of online communication services, uses online
tracking technologies or engages in electronic
direct marketing. Regulation on the protection of
undisclosed know-how and business information
against their unlawful acquisition, use and
disclosure, as well as the Directive on security
of network and information systems (NIS
Directive), which is the first piece of EU-wide
legislation on cyber security, are worth studying
thoroughly.
REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com
A N N UA L R E V I E W
C Y B E R S E C U R I T Y &
R I S K M A N AG E M E N T
■ Q. In your experience, what steps
should companies take to avoid potential
cyber breaches – either from external
sources such as hackers or internal
sources such as rogue employees?
RADGOWSKA: Compiling an inventory and
categorising companies’ information systems
should be the first step in assessing any potential
data breach. Without knowing the quantity
and type of data existing in the company, it is
extremely difficult to choose and implement
proper security mechanisms. When this is
done, it is crucial that companies monitor the
effectiveness of any controls which have been
put in place alongside employees’ compliance
with internal rules. The latter should be linked
to frequent cyber awareness training for all
employees and should be supported and directed
by senior management. Companies should limit
employees’ access to their more critical data and
make sure that third-party vendors comply with
their privacy requirements.
■ Q. How should firms respond
immediately after falling victim to cyber
crime, to demonstrate that they have done
the right thing in the event of a cyber
breach or data loss?
RADGOWSKA: Organisations should have
a clear response protocol in place to help
employees focus in high-pressure situations.
Moreover, having the right team on the job is
critical. There should be one leader from the
C-suite, or reporting directly to the C-suite,
with overall responsibility for responding to the
breach. This way, decisions can be made quickly.
It is also very important to hire a public relations
expert who will take care of the company’s
external communication. It takes years to build a
reputation and gain client trust, but only seconds
to lose it. This applies even more in today’s
increasingly interconnected world. Finally, if
it is not possible to tell exactly what data has
been compromised, it may be wise to take a
conservative approach and, in more serious
cases, proactive notification is generally the right
strategy.
■ Q. In what ways can risk transfer
and insurance help companies and their
D&Os to deal with cyber risk, potential
losses and related liabilities?
RADGOWSKA: Risk quantification, which
details the sensitivity and critical importance of
assets, and defines risk appetite, should be the
first step for companies to determine the level of
insurance coverage. Cyber insurance is designed
to help organisations mitigate risk exposure by
offsetting the costs involved with recovery after
a cyber-related security breach or similar event.
In Poland, the biggest driver for purchasing this
insurance is liability, as companies fear costs
related to handling data breaches. Nevertheless,
more entities are now focusing on responding
to business interruption, ensuring that they are
not losing money when their systems are down.
Cyber insurance provides organisations with
a panel of specialists, including an incident
coordinator and response teams for any legal,
information technology (IT) and public relation
issues that may arise in relation to a cyber event.
Moreover, preventive consulting services are
becoming a great added value for companies.
JULY 2019 • FINANCIER WORLDWIDE • REPRINTwww.financierworldwide.com
A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T
■ Q. What are your predictions for cyber
crime and data security in Poland over the
coming years?
RADGOWSKA: Criminals simply shift their
focus and adapt their tactics to locate and steal
the data they consider most valuable. Organised
criminals will continue to conduct attacks,
damaging companies and individuals alike.
The landscape globally, not just in Poland, is
transitioning from ‘smash and grab’ attacks to
slower and more determined ones, like Advanced
Persistent Threat. According to the Certified
Information Systems Security Professional
(CISSP) All-in-one guide, there has been a
decrease in the number of viruses created just
for populating as many systems as possible, and
it is predicted that more dangerous malware will
increase its range. What is even scarier is that
the next generation of AI-powered attacks will
likely be sophisticated enough to emulate the
behaviours of specific users to fool even skilled
and experienced security personnel. ■
“ It takes years to build a reputation and gain client
trust, but only seconds to lose it. This applies even
more in today’s increasingly interconnected world. ”
POLAND • PAULINA RADGOWSKA • TOKIO MARINE HCC
www.tmhcc.com
Tokio Marine HCC is a leading specialty insurance group with offices in the
United States, the United Kingdom, Spain and Ireland, transacting business in
approximately 180 countries and underwriting more than 100 classes of specialty
insurance.
PAULINA RADGOWSKA
Senior Underwriter
+34 93 530 7422
pradgowska@tmhcc.com
GÜLSAH DAGDELEN
Senior Underwriter – Cyber
+34 93 530 7358
gdagdelen@tmhcc.com
SIMON CALDERBANK
Senior Underwriter – Cyber
+44 (0)20 7680 2910
scalderbank@tmhcc.com

Mais conteúdo relacionado

Mais procurados

Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesMohamed Amine Belarbi
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?PECB
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Business Days
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry BrianHuntMSFCPACRISC
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Business Days
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 

Mais procurados (20)

Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & Opportunities
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report2019 Hiscox Cyber Readiness Report
2019 Hiscox Cyber Readiness Report
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 

Semelhante a Financier Worldwide - Cyber Security annual review

Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveCyber Watching
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...Charmaine Servado
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Graeme Cross
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfEnterprise Insider
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Jef Lacson
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesSix Degrees
 
Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016Munich Re
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000finance40
 

Semelhante a Financier Worldwide - Cyber Security annual review (20)

Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspective
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
Re-imagine-Risk-Strategies-for-Success-IT-Internal-Audit-Conference-Highlight...
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six DegreesCybersecurity for manufacturing - Five practical steps, by Six Degrees
Cybersecurity for manufacturing - Five practical steps, by Six Degrees
 
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
 
Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016Topics Risk Solutions: Issue 1/2016
Topics Risk Solutions: Issue 1/2016
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 

Mais de Morgan Jones

Nota de Prensa - UNESPA
Nota de Prensa - UNESPANota de Prensa - UNESPA
Nota de Prensa - UNESPAMorgan Jones
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalMorgan Jones
 
El Mundo - Actualidad Económica
El Mundo - Actualidad EconómicaEl Mundo - Actualidad Económica
El Mundo - Actualidad EconómicaMorgan Jones
 
Commercial Risk Europe - Nov/Dec Issue 2019
Commercial Risk Europe - Nov/Dec Issue 2019Commercial Risk Europe - Nov/Dec Issue 2019
Commercial Risk Europe - Nov/Dec Issue 2019Morgan Jones
 
Cyber Crime, una minaccia che evolve
Cyber Crime, una minaccia che evolveCyber Crime, una minaccia che evolve
Cyber Crime, una minaccia che evolveMorgan Jones
 
GoingPublic Magazine - M&A Insurance Special
GoingPublic Magazine - M&A Insurance SpecialGoingPublic Magazine - M&A Insurance Special
GoingPublic Magazine - M&A Insurance SpecialMorgan Jones
 
Risk and Compliance Oct 2018 Adrià Vázquez
Risk and Compliance Oct 2018 Adrià VázquezRisk and Compliance Oct 2018 Adrià Vázquez
Risk and Compliance Oct 2018 Adrià VázquezMorgan Jones
 

Mais de Morgan Jones (7)

Nota de Prensa - UNESPA
Nota de Prensa - UNESPANota de Prensa - UNESPA
Nota de Prensa - UNESPA
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
El Mundo - Actualidad Económica
El Mundo - Actualidad EconómicaEl Mundo - Actualidad Económica
El Mundo - Actualidad Económica
 
Commercial Risk Europe - Nov/Dec Issue 2019
Commercial Risk Europe - Nov/Dec Issue 2019Commercial Risk Europe - Nov/Dec Issue 2019
Commercial Risk Europe - Nov/Dec Issue 2019
 
Cyber Crime, una minaccia che evolve
Cyber Crime, una minaccia che evolveCyber Crime, una minaccia che evolve
Cyber Crime, una minaccia che evolve
 
GoingPublic Magazine - M&A Insurance Special
GoingPublic Magazine - M&A Insurance SpecialGoingPublic Magazine - M&A Insurance Special
GoingPublic Magazine - M&A Insurance Special
 
Risk and Compliance Oct 2018 Adrià Vázquez
Risk and Compliance Oct 2018 Adrià VázquezRisk and Compliance Oct 2018 Adrià Vázquez
Risk and Compliance Oct 2018 Adrià Vázquez
 

Último

Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTSkajalroy875762
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Availablepr788182
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubaijaehdlyzca
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Availablepr788182
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistanvineshkumarsajnani12
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxDitasDelaCruz
 

Último (20)

Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 

Financier Worldwide - Cyber Security annual review

  • 1. ANNUAL REVIEW Reprint July 2019 ������������������ ��������������� �������������������� Cyber Security & Risk Management Financier Worldwide canvasses the opinions of leading professionals around the world on the latest trends in cyber security & risk management. Published by Financier Worldwide Ltd ©2019 Financier Worldwide Ltd. All rights reserved. Permission to use this reprint has been granted by the publisher.
  • 2. REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com A N N UA L R E V I E W C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T EMANUELE CAVALLERO Tokio Marine HCC Senior Underwriter +34 93 530 7322 ecavallero@tmhcc.com Emanuele Cavallero is a senior underwriter for Italy, Greece and the Middle East at Tokio Marine HCC, with over 10 years experience in financial lines products. Over the last five years, he has been focusing on the underwriting of cyber risks with the ultimate goal of customising cyber security insurance products for his markets. Mr Cavallero holds a Bachelor’s degree in Economics from the Università degli Studi di Torino and he speaks Italian, English and Spanish. Italy■ ■ Q. In your opinion, what are the major cyber threats to which today’s companies are vulnerable? Could you comment on any recent, high profile cyber attacks in Italy? CAVALLERO: Today, cyber attacks are perpetrated from a variety of places, using constantly evolving methods and techniques. Though some threats are more invasive than others, they can be equally devastating for unprepared businesses. Consequently, understanding the state of cyber security is key to successfully protecting a business from advanced cyber attacks. Not having a cyber security plan creates high-risk situations, including the potential compromising of private data, costly recovery expenses or weakened client trust. Italy fell victim to two major cyber attacks during the last two months of 2018. The first saw a server near Rome targeted and accessed by unknown hackers. The server handles certified email accounts for public administrators. Then, less than a month later, an Italian oil company, Saipem, was targeted by hackers utilising a modified version of the ‘Shamoon’ virus. Due to this, hundreds of the companies’ servers and personal computers in the United Arab Emirates (UAE), Saudi Arabia, Scotland and India were taken down.
  • 3. A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T JULY 2019 • FINANCIER WORLDWIDE • REPRINT 8www.financierworldwide.com ITALY • EMANUELE CAVALLERO • TOKIO MARINE HCC ■ Q. Given the risks, do you believe companies are placing enough importance on cyber security? Are board members taking a proactive, hands-on approach to improving policies and processes? CAVALLERO: Many companies think IT systems security is important, but only a few have a formal strategy in place to protect their data and devices. Cyber threats can no longer be considered exceptional circumstances for businesses. Until recently, most companies had a small group of staff responsible for their IT and cyber security. Organisations now need greater defences as hackers and malware become increasingly sophisticated. With around 4000 ransomware attacks being conducted per day, and the frequency of ransomware attacks estimated to occur every 14 seconds by the end of 2019, building defences against ransomware should, therefore, be a top priority for companies worldwide. ■ Q. To what extent have cyber security and data privacy regulations changed in Italy? How is this affecting the way companies manage and maintain compliance? CAVALLERO: Organisations need to conduct data protection impact assessments (DPIAs) as part of the General Data Protection Regulation’s (GDPR’s) mandate. DPIAs are required in specific circumstances and used to identify, understand and address any privacy issues that might arise when developing new products and services that involve the processing of personal data. Nevertheless, some of the main risks to businesses continue to stem from cyber security. In addition to fines for a lack of compliance, businesses that are not on top of security could face very real risks arising from socially engineered attacks, ransomware and other targeted, advanced assaults. In the first nine months since the GDPR came into force, just over €55m was collected in fines issued by the European Union’s (EU’s) data protection supervisory authorities (DPAs). The DPAs have seen a huge increase in the number of personal data breaches being reported, with over 89,000 personal data breaches being notified in less than 12 months. Only 63 percent of cases investigated by DPAs have been closed. Over 144,000 queries and complaints are reported to have been made by individuals who believe their rights under GDPR have been violated.
  • 4. REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com A N N UA L R E V I E W C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T ■ Q. In your experience, what steps should companies take to avoid potential cyber breaches – either from external sources such as hackers or internal sources such as rogue employees? CAVALLERO: Cyber attacks are rapidly evolving and are becoming increasingly sophisticated. Therefore, it is no longer enough to simply protect a company’s perimeter alone. Today, both technology which helps detect and contain malicious activities and the inclusion of cyber security as part of a company’s corporate culture are essential. The latter is important and necessary when assessing today’s workplace. Simple factors, such as the extensive usage of cloud services, the usage of external Wi-Fi for accessing internal documents, the increasing popularity of bring your own device (BYOD) and the increasingly popular work from home policies must be considered. On a basic level, there are certain threats that can be effectively eradicated if security becomes part of workforce culture, thus helping to avoid or reduce the success of future social engineering and phishing attacks. ■ Q. How should firms respond immediately after falling victim to cyber crime, to demonstrate that they have done the right thing in the event of a cyber breach or data loss? CAVALLERO: The ‘golden hour’ refers to the fact that once a system hack is confirmed, action needs to be taken immediately. Every minute is important. The first step for a hacked firm should be to call the incident response unit or emergency response team (ERT), which is composed of specific individuals who have been trained in what to do after a cyber attack. This can be an in-house group or an external company on retainer. Having an incident team further minimises the damage a company may endure and helps reduce the cost of a cyber attack. The GDPR requires companies to notify users of a data breach within 72 hours. With significant financial penalties, it is even more critical to develop and test a company’s cyber security incident response plan (CSIRP) before a breach occurs. A comprehensive CSIRP, regularly tested and updated, can help incident response teams save valuable time and resources. In the event of an incident, it is critical to answer three key questions: What has happened? What data have the attackers accessed? How can the damage be quickly contained and remediated? A robust response plan will answer these questions. ■ Q. In what ways can risk transfer and insurance help companies and their D&Os to deal with cyber risk, potential losses and related liabilities? CAVALLERO: Evolving cyber attacks and tightening regulatory requirements are increasing the need for organisations to transfer those risks, as cyber security management alone is no longer enough. By arranging a cyber security insurance policy, the risk is transferred effectively. This recent need for a holistic approach in terms of cyber security has created a path where insurance companies have seen a surge of business, especially following the implementation of tougher regulations like the GDPR. A more mature cyber insurance market in Europe is now leading some carriers to develop additional services beyond basic risk transfer, like, for example, post-incident services in order to
  • 5. JULY 2019 • FINANCIER WORLDWIDE • REPRINTwww.financierworldwide.com A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T support customers that suffer a breach or tools to help monitor risks as part of a trusted partnership between insurer and insured. ■ Q. What are your predictions for cyber crime and data security in Italy over the coming years? CAVALLERO: Technology is always evolving, which means that cyber crime itself must adapt if it wants to survive. This is why hackers are constantly devising new lines of attack and adapting in order to avoid detection. Cyber security by itself will not be enough to secure our most sensitive data or our privacy. Security will also have to focus on enabling organisations to leverage and monetise the data they hold without being exposed to data breaches or IP theft, particularly in the era of artificial intelligence (AI) and Big Data. ■ “ Today, both technology which helps detect and contain malicious activities and the inclusion of cyber security as part of a company’s corporate culture are essential.” ITALY • EMANUELE CAVALLERO • TOKIO MARINE HCC www.tmhcc.com Tokio Marine HCC is a leading specialty insurance group with offices in the United States, the United Kingdom, Spain and Ireland, transacting business in approximately 180 countries and underwriting more than 100 classes of specialty insurance. EMANUELE CAVALLERO Senior Underwriter +34 93 530 7322 ecavallero@tmhcc.com GÜLSAH DAGDELEN Senior Underwriter – Cyber +34 93 530 7358 gdagdelen@tmhcc.com SIMON CALDERBANK Senior Underwriter – Cyber +44 (0)20 7680 2910 scalderbank@tmhcc.com
  • 6. REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com A N N UA L R E V I E W C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T PAULINA RADGOWSKA Tokio Marine HCC Senior Underwriter +34 93 530 7422 pradgowska@tmhcc.com Paulina Radgowska is as senior underwriter for Switzerland and Central & Eastern Europe for financial lines insurance, focusing on cyber risks. Prior to joining Tokio Marine HCC she worked as a broker for Marsh in its Finpro practice and spent some time in its cyber centre of excellence in New York. She has a BA in Spatial Economics from Warsaw University and a masters degree from Warsaw School of Economics where she specialised in business management and real estate management. She speaks Polish, English, Portuguese and Spanish. Poland■ ■ Q. In your opinion, what are the major cyber threats to which today’s companies are vulnerable? Could you comment on any recent, high profile cyber attacks in Poland? RADGOWSKA: According to a recent KPMG survey of 100 Polish companies, cyber criminals are still the biggest threat companies face. Attackers include both individual hackers and organised groups using ransomware and social engineering techniques to steal confidential data and funds. The recent attacks on the biggest financial institutions in Poland were performed using spyware and phishing techniques. However, it is always difficult to obtain detailed information on losses made as companies do not like to publicise the fact that they have been hacked. Data theft by employees is also a concern. Employees, contractors and temporary workers who have direct access to critical resources, introduce risks that need to be understood and countered. Human error is also a great challenge for all businesses. ■ Q. Given the risks, do you believe companies are placing enough importance on cyber security? Are board members taking a proactive, hands-on approach to improving policies and processes?
  • 7. A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T JULY 2019 • FINANCIER WORLDWIDE • REPRINT 8www.financierworldwide.com POLAND • PAULINA RADGOWSKA • TOKIO MARINE HCC RADGOWSKA: Many companies are improving their approaches to cyber security; however, there is still a lot of work to be done. Security policies, procedures and guidelines are written, to a large extent, based on auditor instructions but are then never shared, explained or used with employees. To be useful, the procedures need to be put into action and appropriately adapted. No one is going to follow the rules if people do not know they exist. The consequences of non- compliance are expensive liability issues for the company, which makes it crucial that employees are aware of what is expected of them in terms of preventing cyber incidents. An increasing number of organisations are developing business continuity plans or at least crisis management procedures. However, many of these documents go untested. ■ Q. To what extent have cyber security and data privacy regulations changed in Poland? How is this affecting the way companies manage and maintain compliance? RADGOWSKA: Unfortunately, many organisations do not understand all relevant legislation. In addition, technology changes at such a fast pace that all new laws and regulations, if too detailed, would never represent reality. For this reason, the European Union’s (EU’s) General Data Protection Regulation (GDPR), is a good example of a high-level requirement that still puzzles many companies. It is now, when fines for non- compliance start to crop up in Poland and regulators place privacy issues under more scrutiny, that companies not taking cyber security seriously may get a wake-up call. However, while some organisations are still getting to grips with the GDPR, another EU regulation requires their attention: the new EU ePrivacy Regulation (ePR). The scope of the ePR applies to any business that provides any form of online communication services, uses online tracking technologies or engages in electronic direct marketing. Regulation on the protection of undisclosed know-how and business information against their unlawful acquisition, use and disclosure, as well as the Directive on security of network and information systems (NIS Directive), which is the first piece of EU-wide legislation on cyber security, are worth studying thoroughly.
  • 8. REPRINT • FINANCIER WORLDWIDE • JULY 2019 www.financierworldwide.com A N N UA L R E V I E W C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T ■ Q. In your experience, what steps should companies take to avoid potential cyber breaches – either from external sources such as hackers or internal sources such as rogue employees? RADGOWSKA: Compiling an inventory and categorising companies’ information systems should be the first step in assessing any potential data breach. Without knowing the quantity and type of data existing in the company, it is extremely difficult to choose and implement proper security mechanisms. When this is done, it is crucial that companies monitor the effectiveness of any controls which have been put in place alongside employees’ compliance with internal rules. The latter should be linked to frequent cyber awareness training for all employees and should be supported and directed by senior management. Companies should limit employees’ access to their more critical data and make sure that third-party vendors comply with their privacy requirements. ■ Q. How should firms respond immediately after falling victim to cyber crime, to demonstrate that they have done the right thing in the event of a cyber breach or data loss? RADGOWSKA: Organisations should have a clear response protocol in place to help employees focus in high-pressure situations. Moreover, having the right team on the job is critical. There should be one leader from the C-suite, or reporting directly to the C-suite, with overall responsibility for responding to the breach. This way, decisions can be made quickly. It is also very important to hire a public relations expert who will take care of the company’s external communication. It takes years to build a reputation and gain client trust, but only seconds to lose it. This applies even more in today’s increasingly interconnected world. Finally, if it is not possible to tell exactly what data has been compromised, it may be wise to take a conservative approach and, in more serious cases, proactive notification is generally the right strategy. ■ Q. In what ways can risk transfer and insurance help companies and their D&Os to deal with cyber risk, potential losses and related liabilities? RADGOWSKA: Risk quantification, which details the sensitivity and critical importance of assets, and defines risk appetite, should be the first step for companies to determine the level of insurance coverage. Cyber insurance is designed to help organisations mitigate risk exposure by offsetting the costs involved with recovery after a cyber-related security breach or similar event. In Poland, the biggest driver for purchasing this insurance is liability, as companies fear costs related to handling data breaches. Nevertheless, more entities are now focusing on responding to business interruption, ensuring that they are not losing money when their systems are down. Cyber insurance provides organisations with a panel of specialists, including an incident coordinator and response teams for any legal, information technology (IT) and public relation issues that may arise in relation to a cyber event. Moreover, preventive consulting services are becoming a great added value for companies.
  • 9. JULY 2019 • FINANCIER WORLDWIDE • REPRINTwww.financierworldwide.com A N N UA L R E V I E W • C Y B E R S E C U R I T Y & R I S K M A N AG E M E N T ■ Q. What are your predictions for cyber crime and data security in Poland over the coming years? RADGOWSKA: Criminals simply shift their focus and adapt their tactics to locate and steal the data they consider most valuable. Organised criminals will continue to conduct attacks, damaging companies and individuals alike. The landscape globally, not just in Poland, is transitioning from ‘smash and grab’ attacks to slower and more determined ones, like Advanced Persistent Threat. According to the Certified Information Systems Security Professional (CISSP) All-in-one guide, there has been a decrease in the number of viruses created just for populating as many systems as possible, and it is predicted that more dangerous malware will increase its range. What is even scarier is that the next generation of AI-powered attacks will likely be sophisticated enough to emulate the behaviours of specific users to fool even skilled and experienced security personnel. ■ “ It takes years to build a reputation and gain client trust, but only seconds to lose it. This applies even more in today’s increasingly interconnected world. ” POLAND • PAULINA RADGOWSKA • TOKIO MARINE HCC www.tmhcc.com Tokio Marine HCC is a leading specialty insurance group with offices in the United States, the United Kingdom, Spain and Ireland, transacting business in approximately 180 countries and underwriting more than 100 classes of specialty insurance. PAULINA RADGOWSKA Senior Underwriter +34 93 530 7422 pradgowska@tmhcc.com GÜLSAH DAGDELEN Senior Underwriter – Cyber +34 93 530 7358 gdagdelen@tmhcc.com SIMON CALDERBANK Senior Underwriter – Cyber +44 (0)20 7680 2910 scalderbank@tmhcc.com