SlideShare a Scribd company logo
VivoSecurity Inc., Los Altos, CA. Email: ThomasL@VivoSecurity.com
Carl Friedrich Gauss who discovered the Normal (Gaussian)
distribution, which characterizes random events.
A CYBER LOSS MODEL
For Demonstrating Cyber Insurance Adequacy
Demonstrate a strong risk management culture
Through CCAR/DFAST idiosyncratic scenarios for operational risk. Compliant with SR 11-7 and SR 15-18.
The Federal Reserve Requires Credible Evidence of
Insurance Adequacy for a Large Data Breach
Large data breaches are rare events and any single company does not have sufficient
historical data to predict the cost. A statistical analysis of historical industry data
across many companies is therefore the only credible way to address the risk posed by
a large data breach.
VivoSecurity helps financial institutions demonstrate a strong risk management
culture by addressing operational risk posed by data breach, using statistical models
built on historical industry data. These models have the additional benefit of bringing
cyber risk under the bank's financial risk management framework.
✓ Strengthen Idiosyncratic Scenarios for CCAR/DFAST operational risk.
✓ Challenge Models for the banks Champion Models
✓ Champion Models if the bank has no models
✓ Justify a stance not to use cyber insurance
✓ Demonstrate better control over risks to tier 1 capital
VivoSecurity Inc, 1247 RussellAve, Los Altos California; Contact:ThomasL@VivoSecurity.com, (650)919-3050
What is a Cyber-Loss Model?
The Cyber-Loss Model is essentially a complex formula that can explain the
variability in cost of historical data breaches. It was trained upon a large set of
data breaches and tested for accuracy on a randomly selected set of validation
cases. It was developed in the statistical language R using standard statistical
techniques such as linear regression and Bayesian Model Averaging.
The Cyber-Loss Model is deployed in an easy to use Excel Spreadsheet which
requires a small number of variable inputs that have been found to be predictive
of cost. No information is needed about a banks security posture.
What is Model Validation? Federal Reserve has created guidance for model
management (SR11-7 & SR15-18). This guidance assures that models are
developed following sound statistical practices. Many banks have an internal
validation process for establishing compliance for bank models. We can supply all
documentation needed for model validation, including quarterly maintenance,
and we can support internal validation efforts.
Possible data breach cost is break down by incident and data type. The model also
provides a probability distribution for the range of costs, and the probability of
lawsuits.
$0
$20
$40
$60
$80
$100
MeanDataBreachCosts
Millions
Incident & Data Type
0%
20%
40%
60%
80%
100%
0 >0 1 2 3 4 5
Probability
Number of Lawsuits
Model Outputs
$0
$5
$10
$15
$20
$25
Likelihood
Breach Cost
Millions
$19.8M
80% Confidence Interval
What Does the Cyber-Loss Model Include?
VivoSecurity Inc, 1247 RussellAve, Los Altos California; Contact:ThomasL@VivoSecurity.com, (650)919-3050
Included Detail
Deployment Models are deployed as an easy to use Excel
Spreadsheet.
Training We provide training on the use of the spreadsheet,
how to think about confidence intervals, and how to
guide insurance purchases.
Documentation We provide complete model documentation in the
bank’s own format.
Validation Support We provide support for the bank’s model validation
team, including data turnover, troubleshooting R and
SQL code, and discussions on modeling methodology.
Quarterly Maintenance We provide new data as it becomes available, model
re-evaluation, all required validation documentation,
validation team support, re-deployment, and evidence
of testing.
Investigation
Notification
Call center
Remediation
o Business Loss
o Damage to personal credit
o Theft of money & goods
o Credit card replacement costs
Business loss; theft of
money & goods
Credit monitoring &
privacy insurance.
Fines & settlements
Public & Other BusinessesBreach Company
Totalcosts
Mitigate
Transfer
via suits
VivoSecurity Inc, 1247 RussellAve, Los Altos California; Contact:ThomasL@VivoSecurity.com, (650)919-3050
Data Breach Costs Covered by the Cyber-Loss Model
ResponseCostsDamagecosts
Function of
Incident Type
Functionofpeopleaffected
Term Meaning
Investigation Cost of investigating what happened in a data breach including data
that was exposed. Costs ofupdating agencies ofinvestigationprogress.
Remediation Cost to preventingfuture data breach.
Notification Legal costs ofnotifying federal agencies and states attorney general.
Call Center Cost of hiring or expanding call centers to handle calls from people
affected by data breach.
Business Loss, theft
of money & goods
Loss of business and customers, fraud costs, cost of goods purchased
with stolen cards
Credit Monitoring &
Privacy Insurance
Cost of providing credit monitoring such as Experian, insurance to
cover personal loss by people affected by the data breach.
Fines & Settlements Government fines, lawsuit awards and settlements, defense costs.
Glossary
Evaluation
Bank receives the model as an Excel spreadsheet and performs initial evaluation using approximate
model inputs. VivoSecurity provides training for how to use the model, how to think about
confidence intervalsand apply results to insurance purchases.
Model Owner
The owner (sponsor) of the risk model is decided. The owner might be, for example, the CFO or
CRO group. The model owner might draft documents to officially sponsor the model as preparation
for model validation.
Validation Support
Data Owner
VivoSecurity produces SR11-7 compliant validation documentation, following the bank’s format.
VivoSecurity then works with the bank’s validationteam to support validate activities.
Departments are identified that will produce validated numbers that will be entered into the
model. This might include creating and approving SQL to query systems and to generate the
numbers.
Insurance Adequacy
The model owner receives validated numbers from data owners and performs a model based
evaluation of insurance adequacy. Considerations are documented and approved.
Adjust Insurance
Insurance coverage can be adjusted and premiums lowered using model based arguments and
historical industry data. Note that neither carriers nor brokers have models as rigorous as ours,
giving the bank an advantage in negotiations.
Document Considerations for insurance adequacy along with validated models and evidence of insurance are
incorporated into regulator reporting documentation, e.g., FR Y-14A.
Use Case
The diagram below shows the process for a typical retail bank that uses the Cyber-Loss Model in satisfying regulatory requirements. Activities
need not proceed sequentially. For example, after a model owner is determined, model validation (which takes the most time) can be performed
concurrently with other activities.
About VivoSecurity
✓ Silicon Valley Startup since 2012
✓ PhD level scientists & statisticians
✓ Advanced data analysis techniques
✓ Strong cyber security domain knowledge
✓ Strong software, hardware and enterprise knowledge
VivoSecurity Inc, 1247 RussellAve, Los Altos California; Contact:ThomasL@VivoSecurity.com, (650)919-3050

More Related Content

PDF
How to Use a Cyber Loss Model within a Retail Bank
PDF
Half the Picture
PDF
Cyber loss model for all industries
PDF
Cyber Op Risk Model, banks v7p4
PDF
Peer Risk Model for Cyber Security Risk
PDF
Richmond reprint 20151106
PDF
SecurityScorecard_2016_Financial_Report
PDF
2016 Finance industry cybersecurity report
How to Use a Cyber Loss Model within a Retail Bank
Half the Picture
Cyber loss model for all industries
Cyber Op Risk Model, banks v7p4
Peer Risk Model for Cyber Security Risk
Richmond reprint 20151106
SecurityScorecard_2016_Financial_Report
2016 Finance industry cybersecurity report

What's hot (19)

PDF
Enterprise Fraud Risk Management
PDF
My blogs on big data and cybersecurity in banks
PDF
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
PDF
Using Data Analytics to Conduct a Forensic Audit
PDF
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
PPT
How really to prepare for a credit card compromise (PCI) forensics investigat...
PPTX
Winning Tactics for Data Governance
PDF
My blogs on big data and compliance in financial services and health industry
PDF
Enterprise Fraud Management: How Banks Need to Adapt
PDF
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
PDF
Fiserv FCRM Platform Brochure
PDF
Proactive IT management: eliminating mean time to surprise
PPT
Business Intelligence For Anti-Money Laundering
PPT
Ibm financial crime management solution 3
PDF
IBM Smarter Analytics Solution for insurance
PDF
5 AI Solutions Every Chief Risk Officer Needs
PPTX
PPTX
Reduce your aml compliance workload
Enterprise Fraud Risk Management
My blogs on big data and cybersecurity in banks
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Using Data Analytics to Conduct a Forensic Audit
Streamlining Submission Intake in Commercial Underwriting for Middle Market S...
How really to prepare for a credit card compromise (PCI) forensics investigat...
Winning Tactics for Data Governance
My blogs on big data and compliance in financial services and health industry
Enterprise Fraud Management: How Banks Need to Adapt
Ten Commandments for Tackling Fraud: The Role of Big Data and Predictive Anal...
Fiserv FCRM Platform Brochure
Proactive IT management: eliminating mean time to surprise
Business Intelligence For Anti-Money Laundering
Ibm financial crime management solution 3
IBM Smarter Analytics Solution for insurance
5 AI Solutions Every Chief Risk Officer Needs
Reduce your aml compliance workload
Ad

Viewers also liked (20)

PDF
How to Become a Thought Leader in Your Niche
PDF
10 Reasons to buy Cyber Liability Insurance
PDF
Securing Yourself in the Cyber World
PPTX
Attacks on the cyber world
PDF
A Multidisciplinary Perspective on Cybersecurity
PDF
Stalking in the Cyberspace
PPT
Cyber ppt
PDF
ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...
DOCX
Ethical Dilemma/Issues is Cyberworld
PDF
5 Media Innovations From The Secret Deep Web
PPTX
Cyber Security in the Interconnected World
PPTX
A Brave New World of Cyber Security and Data Breach
PDF
Cyber Risk in Healthcare Industry- Are you Protected?
PPTX
Deep Web - what to do and what not to do
PPTX
The Deep Web, TOR Network and Internet Anonymity
PPT
cyber terrorism
PPT
PDF
Malaysia's National Cyber Security Policy
PPTX
Cyber Terrorism
PDF
The Emerging Global Web
How to Become a Thought Leader in Your Niche
10 Reasons to buy Cyber Liability Insurance
Securing Yourself in the Cyber World
Attacks on the cyber world
A Multidisciplinary Perspective on Cybersecurity
Stalking in the Cyberspace
Cyber ppt
ATME Travel Marketing Conference - How Big Data, Deep Web & Semantic Technolo...
Ethical Dilemma/Issues is Cyberworld
5 Media Innovations From The Secret Deep Web
Cyber Security in the Interconnected World
A Brave New World of Cyber Security and Data Breach
Cyber Risk in Healthcare Industry- Are you Protected?
Deep Web - what to do and what not to do
The Deep Web, TOR Network and Internet Anonymity
cyber terrorism
Malaysia's National Cyber Security Policy
Cyber Terrorism
The Emerging Global Web
Ad

Similar to Cyber Loss Model for the cost of a data breach. (20)

PDF
How to prevent data breach risk from impacting capital ratios
PPTX
CyberTechEurope.pptx
PDF
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
PDF
Predicting exploitability-forecasts-for-vulnerability-management
PDF
Evidence-Based Risk Management
PDF
Model Risk Management : Best Practices
DOCX
modeling and predicting cyber hacking breaches
PDF
Model Risk Management: Using an infinitely scalable stress testing platform f...
PPT
Quantitive Time Series Analysis of Malware and Vulnerability Trends
PPTX
8 rajib chakravorty risk
PDF
Cyber Insurance - What you need to know
PDF
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
PPTX
Model Validation
PPTX
Assessing Quality in Cyber Risk Forecasting
PPTX
Economically driven Cyber Risk Management
PDF
Programmatic risk management workshop (handbook)
DOCX
An Evaluation of Investment Models within Information Security
PPTX
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
PDF
MRM: PwC Top Issues
PDF
How close is your organization to being breached | Safe Security
How to prevent data breach risk from impacting capital ratios
CyberTechEurope.pptx
Advantages of Regression Models Over Expert Judgement for Characterizing Cybe...
Predicting exploitability-forecasts-for-vulnerability-management
Evidence-Based Risk Management
Model Risk Management : Best Practices
modeling and predicting cyber hacking breaches
Model Risk Management: Using an infinitely scalable stress testing platform f...
Quantitive Time Series Analysis of Malware and Vulnerability Trends
8 rajib chakravorty risk
Cyber Insurance - What you need to know
Tips for IT Risk Management Prof. Hernan Huwyler Information Security Institute
Model Validation
Assessing Quality in Cyber Risk Forecasting
Economically driven Cyber Risk Management
Programmatic risk management workshop (handbook)
An Evaluation of Investment Models within Information Security
PACE-IT, Security+ 2.1: Risk Related Concepts (part 2)
MRM: PwC Top Issues
How close is your organization to being breached | Safe Security

Recently uploaded (20)

PDF
Fluorescence-microscope_Botany_detailed content
PDF
Introduction to Business Data Analytics.
PPTX
Major-Components-ofNKJNNKNKNKNKronment.pptx
PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPTX
Database Infoormation System (DBIS).pptx
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PPTX
STUDY DESIGN details- Lt Col Maksud (21).pptx
PPT
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
Foundation of Data Science unit number two notes
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
Business Acumen Training GuidePresentation.pptx
PPTX
IB Computer Science - Internal Assessment.pptx
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PDF
Mega Projects Data Mega Projects Data
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Fluorescence-microscope_Botany_detailed content
Introduction to Business Data Analytics.
Major-Components-ofNKJNNKNKNKNKronment.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Database Infoormation System (DBIS).pptx
climate analysis of Dhaka ,Banglades.pptx
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
STUDY DESIGN details- Lt Col Maksud (21).pptx
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
IBA_Chapter_11_Slides_Final_Accessible.pptx
Foundation of Data Science unit number two notes
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Business Acumen Training GuidePresentation.pptx
IB Computer Science - Internal Assessment.pptx
Galatica Smart Energy Infrastructure Startup Pitch Deck
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Mega Projects Data Mega Projects Data
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb

Cyber Loss Model for the cost of a data breach.

  • 1. VivoSecurity Inc., Los Altos, CA. Email: ThomasL@VivoSecurity.com Carl Friedrich Gauss who discovered the Normal (Gaussian) distribution, which characterizes random events. A CYBER LOSS MODEL For Demonstrating Cyber Insurance Adequacy Demonstrate a strong risk management culture Through CCAR/DFAST idiosyncratic scenarios for operational risk. Compliant with SR 11-7 and SR 15-18.
  • 2. The Federal Reserve Requires Credible Evidence of Insurance Adequacy for a Large Data Breach Large data breaches are rare events and any single company does not have sufficient historical data to predict the cost. A statistical analysis of historical industry data across many companies is therefore the only credible way to address the risk posed by a large data breach. VivoSecurity helps financial institutions demonstrate a strong risk management culture by addressing operational risk posed by data breach, using statistical models built on historical industry data. These models have the additional benefit of bringing cyber risk under the bank's financial risk management framework. ✓ Strengthen Idiosyncratic Scenarios for CCAR/DFAST operational risk. ✓ Challenge Models for the banks Champion Models ✓ Champion Models if the bank has no models ✓ Justify a stance not to use cyber insurance ✓ Demonstrate better control over risks to tier 1 capital
  • 3. VivoSecurity Inc, 1247 RussellAve, Los Altos California; Contact:ThomasL@VivoSecurity.com, (650)919-3050 What is a Cyber-Loss Model? The Cyber-Loss Model is essentially a complex formula that can explain the variability in cost of historical data breaches. It was trained upon a large set of data breaches and tested for accuracy on a randomly selected set of validation cases. It was developed in the statistical language R using standard statistical techniques such as linear regression and Bayesian Model Averaging. The Cyber-Loss Model is deployed in an easy to use Excel Spreadsheet which requires a small number of variable inputs that have been found to be predictive of cost. No information is needed about a banks security posture. What is Model Validation? Federal Reserve has created guidance for model management (SR11-7 & SR15-18). This guidance assures that models are developed following sound statistical practices. Many banks have an internal validation process for establishing compliance for bank models. We can supply all documentation needed for model validation, including quarterly maintenance, and we can support internal validation efforts.
  • 4. Possible data breach cost is break down by incident and data type. The model also provides a probability distribution for the range of costs, and the probability of lawsuits. $0 $20 $40 $60 $80 $100 MeanDataBreachCosts Millions Incident & Data Type 0% 20% 40% 60% 80% 100% 0 >0 1 2 3 4 5 Probability Number of Lawsuits Model Outputs $0 $5 $10 $15 $20 $25 Likelihood Breach Cost Millions $19.8M 80% Confidence Interval
  • 5. What Does the Cyber-Loss Model Include? VivoSecurity Inc, 1247 RussellAve, Los Altos California; Contact:ThomasL@VivoSecurity.com, (650)919-3050 Included Detail Deployment Models are deployed as an easy to use Excel Spreadsheet. Training We provide training on the use of the spreadsheet, how to think about confidence intervals, and how to guide insurance purchases. Documentation We provide complete model documentation in the bank’s own format. Validation Support We provide support for the bank’s model validation team, including data turnover, troubleshooting R and SQL code, and discussions on modeling methodology. Quarterly Maintenance We provide new data as it becomes available, model re-evaluation, all required validation documentation, validation team support, re-deployment, and evidence of testing.
  • 6. Investigation Notification Call center Remediation o Business Loss o Damage to personal credit o Theft of money & goods o Credit card replacement costs Business loss; theft of money & goods Credit monitoring & privacy insurance. Fines & settlements Public & Other BusinessesBreach Company Totalcosts Mitigate Transfer via suits VivoSecurity Inc, 1247 RussellAve, Los Altos California; Contact:ThomasL@VivoSecurity.com, (650)919-3050 Data Breach Costs Covered by the Cyber-Loss Model ResponseCostsDamagecosts Function of Incident Type Functionofpeopleaffected Term Meaning Investigation Cost of investigating what happened in a data breach including data that was exposed. Costs ofupdating agencies ofinvestigationprogress. Remediation Cost to preventingfuture data breach. Notification Legal costs ofnotifying federal agencies and states attorney general. Call Center Cost of hiring or expanding call centers to handle calls from people affected by data breach. Business Loss, theft of money & goods Loss of business and customers, fraud costs, cost of goods purchased with stolen cards Credit Monitoring & Privacy Insurance Cost of providing credit monitoring such as Experian, insurance to cover personal loss by people affected by the data breach. Fines & Settlements Government fines, lawsuit awards and settlements, defense costs. Glossary
  • 7. Evaluation Bank receives the model as an Excel spreadsheet and performs initial evaluation using approximate model inputs. VivoSecurity provides training for how to use the model, how to think about confidence intervalsand apply results to insurance purchases. Model Owner The owner (sponsor) of the risk model is decided. The owner might be, for example, the CFO or CRO group. The model owner might draft documents to officially sponsor the model as preparation for model validation. Validation Support Data Owner VivoSecurity produces SR11-7 compliant validation documentation, following the bank’s format. VivoSecurity then works with the bank’s validationteam to support validate activities. Departments are identified that will produce validated numbers that will be entered into the model. This might include creating and approving SQL to query systems and to generate the numbers. Insurance Adequacy The model owner receives validated numbers from data owners and performs a model based evaluation of insurance adequacy. Considerations are documented and approved. Adjust Insurance Insurance coverage can be adjusted and premiums lowered using model based arguments and historical industry data. Note that neither carriers nor brokers have models as rigorous as ours, giving the bank an advantage in negotiations. Document Considerations for insurance adequacy along with validated models and evidence of insurance are incorporated into regulator reporting documentation, e.g., FR Y-14A. Use Case The diagram below shows the process for a typical retail bank that uses the Cyber-Loss Model in satisfying regulatory requirements. Activities need not proceed sequentially. For example, after a model owner is determined, model validation (which takes the most time) can be performed concurrently with other activities.
  • 8. About VivoSecurity ✓ Silicon Valley Startup since 2012 ✓ PhD level scientists & statisticians ✓ Advanced data analysis techniques ✓ Strong cyber security domain knowledge ✓ Strong software, hardware and enterprise knowledge VivoSecurity Inc, 1247 RussellAve, Los Altos California; Contact:ThomasL@VivoSecurity.com, (650)919-3050