




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、Occasional PaperCyber Insurance and the Cyber Security ChallengeJamie MacColl, Jason R C Nurse and James SullivanCyber Insurance and the Cyber Security ChallengeJamie MacColl, Jason R C Nurse and James SullivanRUSI Occasional Paper, June 2021Royal United Services Institutefor Defence and Security St
2、udiesiiCyber Insurance and the Cyber Security Challenge190 years of independent thinking on defence and securityThe Royal United Services Institute (RUSI) is the worlds oldest and the UKs leading defence and security think tank. Its mission is to inform, influence and enhance public debate on a safe
3、r and more stable world. RUSI is a research-led institute, producing independent, practical and innovative analysis to address todays complex challenges.Since its foundation in 1831, RUSI has relied on its members to support its activities. Together with revenue from research, publications and confe
4、rences, RUSI has sustained its political independence for 190 years.The views expressed in this publication are those of the author(s), and do not reflect the views of RUSI or any other institution to which the authors are or were affiliated.Published in 2021 by the Royal United Services Institute f
5、or Defence and Security Studies.This work is licensed under a Creative Commons Attribution Non-Commercial No-Derivatives 4.0 International Licence. For more information, see .RUSI Occasional Paper, June 2021. ISSN 2397-0286 (Online).Royal United Services Institutefor Defence and Security StudiesWhit
6、ehall London SW1A 2ET United Kingdom+44 (0)20 7747 2600 HYPERLINK / RUSI is a registered charity (No. 210639)Contents HYPERLINK l _bookmark1 Acknowledgements HYPERLINK l _bookmark1 v HYPERLINK l _bookmark2 Executive Summary HYPERLINK l _bookmark2 vii HYPERLINK l _bookmark3 Recommendations HYPERLINK
7、l _bookmark3 ix HYPERLINK l _bookmark4 Introduction HYPERLINK l _bookmark4 1 HYPERLINK l _bookmark5 Structure HYPERLINK l _bookmark5 3 HYPERLINK l _bookmark5 Methodology HYPERLINK l _bookmark5 3 HYPERLINK l _bookmark6 Limitations HYPERLINK l _bookmark6 5 HYPERLINK l _bookmark7 I. Cyber Insurance and
8、 the Cyber Security Challenge HYPERLINK l _bookmark7 7 HYPERLINK l _bookmark8 Cyber Insurance Uptake HYPERLINK l _bookmark8 8 HYPERLINK l _bookmark9 Why Cyber Insurance? HYPERLINK l _bookmark9 9 HYPERLINK l _bookmark10 II. Unfulfilled Potential: The Role of Cyber Insurance in the Cyber Security Chal
9、lenge HYPERLINK l _bookmark10 11 HYPERLINK l _bookmark11 Assessing Risk Profiles and Security Practices HYPERLINK l _bookmark11 12 HYPERLINK l _bookmark12 Driving Best Practices HYPERLINK l _bookmark12 15 HYPERLINK l _bookmark13 Linking Risk Profiles and Security Practices to Financial Incentives HY
10、PERLINK l _bookmark13 17 HYPERLINK l _bookmark14 Increasing Awareness of Risk HYPERLINK l _bookmark14 18 HYPERLINK l _bookmark15 Providing Access to Services HYPERLINK l _bookmark15 19 HYPERLINK l _bookmark16 Limitations of Cyber Insurance as an Incentive for Cyber Security HYPERLINK l _bookmark16 2
11、3 HYPERLINK l _bookmark17 III. The Key Challenges HYPERLINK l _bookmark17 25 HYPERLINK l _bookmark17 Challenge 1: Dynamics in the Cyber Insurance Market HYPERLINK l _bookmark17 25 HYPERLINK l _bookmark18 Challenge 2: Defining Best Practices and Minimum Standards HYPERLINK l _bookmark18 27 HYPERLINK
12、l _bookmark19 Challenge 3: Collecting and Modelling Cyber Risk Data HYPERLINK l _bookmark19 29 HYPERLINK l _bookmark20 Challenge 4: The Financial Viability of the Cyber Insurance Market HYPERLINK l _bookmark20 32 HYPERLINK l _bookmark21 Challenge 5: Barriers to Increasing Uptake HYPERLINK l _bookmar
13、k21 33 HYPERLINK l _bookmark22 Challenge 6: Incentivising Negative Behaviours HYPERLINK l _bookmark22 36 HYPERLINK l _bookmark23 IV. Helping the Cyber Insurance Industry Fulfil Its Potential HYPERLINK l _bookmark23 41 HYPERLINK l _bookmark23 Who Can Help Drive Positive Change? HYPERLINK l _bookmark2
14、3 41 HYPERLINK l _bookmark24 Minimum Security Standards and Best Practices HYPERLINK l _bookmark24 42 HYPERLINK l _bookmark25 Data Collection and Risk Assessments HYPERLINK l _bookmark25 43 HYPERLINK l _bookmark26 Data Sharing HYPERLINK l _bookmark26 45 HYPERLINK l _bookmark27 Overcoming Barriers to
15、 Uptake HYPERLINK l _bookmark27 46 HYPERLINK l _bookmark28 Mitigating Systemic Cyber Risk HYPERLINK l _bookmark28 50 HYPERLINK l _bookmark29 Ransomware HYPERLINK l _bookmark29 52 HYPERLINK l _bookmark30 Conclusions HYPERLINK l _bookmark30 55 HYPERLINK l _bookmark0 About the Authors HYPERLINK l _book
16、mark0 57AcknowledgementsThe authors are grateful to the UKs National Cyber Security Centre and the Research Institute for Sociotechnical Cyber Security for providing funding for this paper and their support throughout the research process.A great deal of thanks must go to the RUSI team that helped t
17、o guide and shape this paper. Sneha Dawda, Chris Goodenough, Hugh Oberlander, Dina Mansour-Ille, Demi Starks, Zenab Hotelwala, Tom Sayner and Sarah Hudson all provided valuable support and editing. The authors would also like to thank Rebecca Lucas, formerly of RUSI, for her outstanding work on the
18、literature review and other data collection that helped form the basis of much of the paper.Thanks also go to Josephine Wolff, Graham Walsh and Ioannis Agrafiotis for peer reviewing the paper with such diligence, as well as the various individuals from government, the insurance industry and cyber se
19、curity providers who provided insightful feedback on the recommendations.A final thank you goes to the participants in this research, to all those who very kindly gave up their time to participate in interviews and workshops when 2020 and 2021 were and continue to be challenging for us all. Every si
20、ngle interview contributed greatly to the authors thinking and findings.MacColl, Nurse and Sullivan viiExecutive SummaryGOVERNMENTS AND BUSINESSES are struggling to cope with the scale and complexity of managing cyber risk. Over the last year, remote working, rapid digitalisation and the need for in
21、creased connectivity have emphasised the cyber security challenge. Asthe pursuit of approaches to prevent, mitigate and recover from malicious cyber activity has progressed, one tool that has gained traction is cyber insurance. If it can follow the path of other insurance classes, it could play a si
22、gnificant role in managing digital risk.This paper explores whether cyber insurance can incentivise better cyber security practices among policyholders. It finds that the shortcomings of cyber insurance mean that its contribution to improving cyber security practices is more limited than policymaker
23、s and businesses might hope. Although several means by which cyber insurance can incentivise better cyber security practices are identified, they have significant limitations. Interviewees from across government, industry and business consistently stated that the positive effects of cyber insurance
24、on cyber security have yet to fully materialise. While some mature insurers are moving in the right direction, cyber insurance as a whole is still struggling to move from theory into practice when it comes to incentivising cyber security.If this is to change, the insurance industry must overcome sig
25、nificant challenges. One is the competitiveness of the nascent cyber insurance market over the last two decades. Most of the market has used neither carrots (financial incentives) nor sticks (security obligations) to improve the cyber security practices of policyholders. The industry is also struggl
26、ing to collect and share reliable cyber risk data that can inform underwriting and risk modelling. The difficulties inherent in understanding cyber risk, which is anthropogenic and systemic, mean insurers and reinsurers are unable to accurately quantify its causes and effects. This limits insurers a
27、bility to accurately assess an organisations risk profile or security practices and price policy premiums accordingly. The spectre of systemic incidents such as NotPetya1 and SolarWinds2 has also limited the availability of capital for cyber insurance markets.However, the most pressing challenge cur
28、rently facing the industry is ransomware. Although it is a societal problem, cyber insurers have received considerable criticism for facilitating ransom payments to cybercriminals. These add fuel to the fire by incentivising cybercriminals engagement in ransomware operations and enabling existing op
29、erators to invest in and expand their capabilities. Growing losses from ransomware attacks have also emphasised that the current reality is not sustainable for insurers either.Andy Greenberg, The Untold Story of NotPetya, the Most Devastating Cyberattack in History,Wired, 22 August 2018.Dina Temple-
30、Raston, A “Worst Nightmare” Cyberattack: The Untold Story of the SolarWinds Hack,NPR, 16 April 2021.viiiCyber Insurance and the Cyber Security ChallengeTo overcome these challenges and champion the positive effects of cyber insurance, this paper calls for a series of interventions from government an
31、d industry. Some in the industry favour allowing the market to mature on its own, but it will not be possible to rely on changing market forces alone. To date, the UK government has taken a light-touch approach to the cyber insurance industry. With the market undergoing changes amid growing losses,
32、more coordinated action by government and regulators is necessary to help the industry reach its full potential.The interventions recommended here are still relatively light, and reflect the fact that cyber insurance is only a potential incentive for managing societal cyber risk. They include: devel
33、oping guidance for minimum security standards for underwriting; expanding data collection and data sharing; mandating cyber insurance for government suppliers; and creating a new collaborative approach between insurers and intelligence and law enforcement agencies around ransomware.Finally, although
34、 a well-functioning cyber insurance industry could improve cyber security practices on a societal scale, it is not a silver bullet for the cyber security challenge. It is important to remember that the primary purpose of cyber insurance is not to improve cyber security, but to transfer residual risk
35、. As such, it should be one of many tools that governments and businesses can draw on to manage cyber risk more effectively.RecommendationsTHIS PAPER PROVIDES actionable recommendations for the UK cyber insurance market. Although they are specifically aimed at UK policymakers, regulators and insuran
36、ce providers and brokers, they could potentially also be applied to other national contexts.Recommendation 1: Insurers should collectively agree on a set of minimum security requirements as part of risk assessments for small and medium-sized enterprises (11250 employees). In the UK, this paper recom
37、mends using the controls used for Cyber Essentials3 as a minimum requirement, beyond which insurers can require additional controls based on claims data or other risk frameworks. This will help increase the baseline cyber security of many UK businesses.Recommendation 2: Cyber insurance carriers shou
38、ld explore partnerships with managed security service providers, cloud service providers and threat intelligence providers to gain access to additional sources of data (for example, beyond only external perimeter scans). In exchange, insurers can offer reduced premiums and other financial incentives
39、 to their customers.Recommendation 3: The insurance industry should take a more collegial approach to data sharing. The Treasury and the Department for Digital, Culture, Media and Sport (DCMS) should bring together relevant stakeholders, including relevant regulators, Lloyds of London and the Associ
40、ation of British Insurers, to create a working group and identify a timeline for the creation of a cyber insurance data-sharing exchange.Recommendation 4: The government and insurance regulators should review any current insurance regulation or legislation that impedes insurers collectively sharing
41、data on cyber insurance incidents and claims, including confidentiality requirements in contracts. This effort can be led by the Treasury in the UK.Recommendation 5: The government should ensure mandatory breach notification data is made available to the insurance industry. DCMS should work with the
42、 Information Commissioners Office to find a compromise on providing anonymised breach data to the insurance industry. If one cannot be found, the government should amend the relevant legislation.Recommendation 6: The government, underwriters and brokers should focus awareness and marketing campaigns
43、 around articulating and quantifying the financial costs of cyber risk to businesses and consumers.Recommendation 7: The Cabinet Office and Crown Commercial Service should develop a policy and legal framework to mandate cyber insurance coverage for all government suppliers andCyber Essentials is a U
44、K government-backed cyber security certification scheme.xCyber Insurance and the Cyber Security Challengevendors. This should specify minimum requirements and inclusions for coverage, whether coverage needs to vary by government department and a reasonable cover limit to ensure all affected organisa
45、tions can access a policy.Recommendation 8: The government should help organisations identify cyber insurance products that drive cyber security best practices. To do so, the National Cyber Security Centre (NCSC) should add more detailed guidance to its buyers guide on services that may improve a po
46、licyholders cyber security practices.Recommendation 9: The Treasury, in coordination with the Bank of England and insurance industry stakeholders, should conduct a public study into the potential design and parameters of a government-backed financial backstop for cyber risk.Recommendation 10: The Na
47、tional Security Secretariat should conduct an urgent policy review into the feasibility and suitability of banning ransom payments. The review should aim to produce actionable recommendations within three to six months and consult widely with relevant government departments, intelligence agencies, l
48、aw enforcement and industry stakeholders. This should form part of a wider UK government review into policy options for combating ransomware.Recommendation 11: The intelligence community, law enforcement and the insurance industry should establish a dedicated information-sharing partnership to excha
49、nge anonymised threat intelligence and incident response and cryptocurrency payment data relating to ransomware attacks. The NCSC, the National Crime Agency (NCA) and insurance industry stakeholders should leverage existing publicprivate partnership models for combating cyber threats and financial c
50、rime, such as the Joint Money Laundering Intelligence Taskforce.Recommendation 12: Insurers should specify that any ransomware coverage must contain a requirement for policyholders to notify the NCA and the NCSC in the event of an attack and before a ransom is paid.Recommendation 13: The insurance i
51、ndustry should work with the NCSC and cyber security partners to create a set of minimum ransomware controls based on threat intelligence and insurers claims data. Insurance carriers should require these controls to be implemented as part of any ransomware coverage. These controls should include:Tim
52、ely patching of critical vulnerabilities in external-facing IT infrastructure.Enabling multifactor authentication on remote-access services (such as remote desktop protocol instances).Limiting lateral movement by adopting network segmentation measures.Implementing procedures to ensure regular backup
53、s are created.4James Sullivan and James Muir, Ransomware: A Perfect Storm, RUSI Emerging Insights, March 2021.IntroductionCYBERCRIME IS THRIVING. One estimate puts global losses from cybercrime in 2020 at$945 billion,1 while a recent report from the World Economic Forum highlights cybercrime as one
54、of the most challenging risks facing societies in the next five years, alongside climate change and pandemics.2 Although this trend predates the coronavirus pandemic, the spread of Covid-19 has emboldened cybercriminals. The threat posed by targeted ransomware operations, in particular, has increase
55、d in complexity and severity over the last 18 months.3 Not only are the number of ransomware attacks increasing,4 but the payments demanded by attackers are also increasing in value. One report suggests that from Q4 2019 to Q1 2021, the average ransom payment rose from $84,116 to $220,298.5 It is cl
56、ear that both critical national infrastructure (CNI)6 and economic security are threatened by ransomware, and cybercrime more generally.7 Meanwhile, governments and businesses continue to struggle to manage cyberrisk.Zhanna Malekos Smith and Eugenia Lostri, The Hidden Costs of Cybercrime, McAfee, De
57、cember 2020, HYPERLINK /enterprise/en-us/assets/reports/rp-hidden-costs-of-cybercrime.pdf , accessed 23 March 2021.World Economic Forum, The Global Risks Report 2021: 16th Edition (Cologny: World Economic Forum, 2021).James Sullivan and James Muir, Ransomware: A Perfect Storm, RUSI Emerging Insights
58、, March 2021.Phil Muncaster, Ransomware Attacks Soared 150% in 2020, Infosecurity Magazine, 4 March 2021, accessed 23 March 2021.CoveWare, Ransomware Attack Vectors Shift as New Software Vulnerability Exploits Abound, 26 April 2021, , accessed 25 May 2021.Ransomware groups have frequently targeted t
59、he healthcare sector, including hospitals involved in the coronavirus pandemic response. See Zack Whittaker, Healthcare Giant UHS Hit By Ransomware Attack, Sources Say, TechCrunch, 28 September 2020, , accessed 23 March 2021.A ransomware attack on the currency exchange provider Travelex was believed
60、 to be a major factor in the firms collapse in August 2020. See Phil Muncaster, Travelex Forced intoAdministration After Ransomware Attack, Infosecurity Magazine, 10 August 2020, , accessed 23 March 2021.2Cyber Insurance and the Cyber Security ChallengeCyber insurance is one lever that could reduce
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 讀書技巧:2024年圖書管理員考試試題及答案
- 獸醫(yī)職業(yè)素養(yǎng)提升技巧試題及答案
- 2024年大氣污染治理措施題目及答案
- 圖書館用戶反饋收集方法試題及答案
- 寵物營(yíng)養(yǎng)與飲食試題及答案
- 全媒體平臺(tái)特色與功能試題及答案
- 養(yǎng)生館營(yíng)銷策略全解析
- 動(dòng)物疾病預(yù)防的主動(dòng)措施試題及答案
- 2025婦幼保健員考試多選題解答及試題及答案
- 動(dòng)物營(yíng)養(yǎng)補(bǔ)劑試題及答案
- 倉(cāng)儲(chǔ)行業(yè)倉(cāng)儲(chǔ)主管合同
- 成人商環(huán)內(nèi)置式包皮環(huán)切手術(shù)步驟
- 環(huán)保型廢品回收利用技術(shù)手冊(cè)
- 《建筑結(jié)構(gòu)荷載規(guī)范》-20220622095035
- 人教pep版小學(xué)英語三年級(jí)下冊(cè)各單元測(cè)試卷(全冊(cè))、期中、期末試卷
- 癡呆證候要素量表
- 2024人民醫(yī)院醫(yī)療場(chǎng)所安保項(xiàng)目服務(wù)合同
- 2023年浙江寧波交投公路營(yíng)運(yùn)管理有限公司招聘考試真題
- 護(hù)理中斷事件的風(fēng)險(xiǎn)及預(yù)防
- JJF(機(jī)械)1033-2019 吸油煙機(jī)測(cè)試裝置校準(zhǔn)規(guī)范
- 北京大學(xué)2024年強(qiáng)基計(jì)劃筆試數(shù)學(xué)試題(解析)
評(píng)論
0/150
提交評(píng)論