Founder and Managing Director, Cyber Special Ops, LLC
Mr. Suhs serves as the Founder and Managing Director for Cyber Special Ops, LLC, a cyber risk company that provides its clients with Concierge Cyber®, a revolutionary new delivery solution for cyber risk services modeled on concierge medicine.
Many insurance professionals have compared cyber insurance to employment practices liability (EPL) insurance which took decades for organizations to adopt; however that is where the comparison ends. Cyber insurance is more analogous to catastrophic commercial property insurance, in which state-sponsored actors and sophisticated crime syndicates target and seek to burn down your building 24/7/365 days per year.
According to FM Global, the three main reasons sprinklered buildings burn are 1) design deficiencies, 2) system impairments before a fire, and 3) system impairments during a fire. Let’s evaluate how each of these causes compare with cyber loss.
Sometimes due to design deficiency or system impairment, an automated sprinkler system fails to suppress a fire sufficiently and thus a building burns despite the system.
Is the water source
—a public water supply?
—a fire pond?
Is the data breach team
—an external third-party service provider?
—an internal legal and infosec team?
Is the system design adequate?
What is the system trying to protect?
Is the network architecture adequate?
What is the system trying to protect?
Changes in occupancy
Changes in electronic assets
The building (organization) was devastated by fire (a cyberattack). The cause of the devastation was multifaced. The water supply (incident response plan) was limited because a single connection from the public water main (a few data breach firms) supplied the entire sprinkler system (cyber insurance market). However, the water supply (incident response plan) was limited and the water flow (insured’s cyber insurance coverage and limit) to the automatic sprinklered system (network defense) was marginally adequate for the task. The sprinkler system (network defense) was designed for a facility (organization) that processed a specific amount and type of paper (electronic assets). The plant (organization) was changed to process a new and greater amount of hazardous coated paper (sensitive information). This change was made without reevaluating the sprinkler design (network design) or water supply (incident response plan).
The system (network) simply couldn’t generate enough water (cyber insurance) to mitigate this type of fire (cyberattack) and suppress it because it wasn’t designed for this use and didn’t have enough water (cyber insurance coverage and limit) for this type of fire (cyberattack). Furthermore, the local fire department (cyber insurer) wasn’t aware of the change in the amount and type of paper (the exposure basis) and thus didn’t know they were responding to a hazardous chemical fire (state-sponsored actor), which requires a very different firefighting response (incident response) as compared to a traditional uncoated paper fire (simple malware).
System Impairments Before a Fire
A fire that would normally be adequately controlled or suppressed completely can instead rage out of control and destroy the building.
There are three type of impairments that can occur before a fire (cyberattack) as follows:
- renovation of building (network)
- inadequate maintenance of property (network)
- arson (state-sponsored actors and sophisticated crime syndicates).
Deliberate action by an arsonist (state-sponsored actor or sophisticated crime syndicate) can impair or disable an automatic sprinkler system (computer network) so the arsonist’s (threat actor) fire setting (cyberattack) actions will cause damage.
Arsonists (cyber attackers) learn how sprinkler systems (computer networks) work and find ways to defeat or overtax them. Limited only by their imagination, for example, they may close valves (software applications) or attempt to overtax the system (all computer servers) by setting multiple fires (cyberattacks) designed to circumvent, damage or destroy the building (organization).
System Impairments During a Fire
System impairments that can occur during a fire are often the result of human action that cause a protection breakdown.
The most common system impairment that can occur during a fire (cyberattack) is premature closure of a sprinkler system’s control valve (network defenses).
Another common system impairment is the inadequate monitoring of the sprinkler control valve (network defenses).
Call to Action:
For most businesses, the five most important categories of risk are tied to 1) theft of intellectual property, 2) business interruption, 3) theft or corruption of personally identifiable information, protected healthcare information, 4) credit and debit card data and 5) diminished cash flow. But which of these is a priority, to what degree, and for which organization assets?
If we really want to make cybersecurity better, we first need to ask what do we need to protect within the organization? All of this is highly dependent on the business, the internal network structure, and the other security controls that are in place premised upon the zero-trust information security model.
Organizations will never outpace the sophisticated cyber threat actor. Remember, the cyber adversary only has to be right once while your organization has to be right 100% of the time.
When thinking about cyber risk (which both Kurt and I have been doing for a long time), I try to give a lot of weight to reputational impacts.
While failure to properly prepare for and respond to a fire loss is damaging to an organization’s reputation, with limited exceptions I think the same failures in cyber can be far more damaging. Clients, customers, regulators, and business partners have far less tolerance for failures in cyber security than for most fire prevention failures.
Thanks for presenting a nice framework to think about cyber protections.