Better Risk Assessment for Cyber Insurance: How Will We Get There?

RSA Conference
7 Jun 202350:25

Summary

TLDREric Skinner from Trend Micro and Theresa Le, Chief Claims Officer at Cowbell Cyber, discuss the evolving cyber insurance market's approach to risk assessment amidst rising cyber threats. They highlight the importance of continuous assessment, the impact of ransomware, and the need for better security practices like EDR and MFA. The talk emphasizes the role of insurers in fostering security resilience and the potential for policy pricing to reflect an organization's risk management efforts.

Takeaways

  • 😀 The cybersecurity landscape has been chaotic, with the cyber insurance market evolving to better assess risk in response to turbulent years.
  • 🛡️ Eric Skinner from Trend Micro and Theresa Le from Cowbell Cyber discussed the importance of cybersecurity and how the insurance industry is adapting to foster better practices and risk mitigation.
  • 📈 Cyber insurance has seen significant changes, including increased difficulty in obtaining policies and higher rates due to a rise in severe claims and ransomware incidents.
  • 💡 The insurance industry has historically driven the adoption of safety measures, such as seatbelts and carbon monoxide detectors, and aims to do the same for cybersecurity practices.
  • 📚 Theresa highlighted the limitations of traditional cyber insurance questionnaires in accurately assessing an organization's risk posture, emphasizing the need for more dynamic and continuous assessment methods.
  • 🔒 Eric emphasized the importance of having proper security controls in place, such as EDR and MFA, noting that their absence can lead to immediate rejection by insurers.
  • 📉 Despite an uptick in ransomware severity, there has been a momentary decline attributed to companies becoming more resilient with better incident response plans and backup strategies.
  • 🤖 The use of AI, such as chat GPT, is aiding attackers in creating more convincing phishing and BEC emails, making it increasingly difficult for employees to detect threats.
  • 💻 Attack surface management is emerging as a key strategy for organizations to continuously discover and assess their assets, misconfigurations, and vulnerabilities, helping prioritize mitigation efforts.
  • 🔑 Continuous assessment by cyber insurance providers, using telemetry from various sources, allows for more accurate risk evaluation and personalized policy offerings, potentially leading to better terms for policyholders.
  • 🔮 Looking forward, the panel predicts that ransomware and extortion tactics will continue to evolve, emphasizing the need for ongoing vigilance, improved data science for threat detection, and the mainstream adoption of cybersecurity best practices.

Q & A

  • What is the main focus of the discussion between Eric Skinner and Theresa Le?

    -The main focus of the discussion is the evolution of the cyber insurance market and how it is getting better at assessing risk in the context of a chaotic few years in cybersecurity.

  • What is Trend Micro's current focus in cybersecurity?

    -Trend Micro is currently focusing on areas like Extended Detection and Response (XDR), attack surface management, and cloud security.

  • What is Cowbell Cyber and what role does Theresa Le hold there?

    -Cowbell Cyber is a cyber insurance provider in the InsureTech space, and Theresa Le is the Chief Claims Officer at Cowbell Cyber.

  • How has the cyber insurance landscape changed in recent years?

    -The cyber insurance landscape has changed significantly with increased claims due to severe breaches and ransomware attacks, leading to higher rates and more difficulty in obtaining cyber insurance.

  • Why is the insurance industry interested in promoting best practices and risk mitigation?

    -The insurance industry is interested in promoting best practices and risk mitigation to foster adoption of safer measures, reduce the frequency and severity of claims, and maintain a sustainable business model.

  • What are some of the challenges faced by the cyber insurance industry in assessing risks?

    -Some challenges include the dynamic nature of cyber risks, the outdated nature of questionnaires used for risk assessment, and the difficulty in capturing the real-time state of an organization's cybersecurity posture.

  • What is the impact of ransomware on small to medium-sized enterprises?

    -Ransomware has a significant financial impact on small to medium-sized enterprises, with an average impact of half a million dollars to an organization.

  • How do attackers use AI and machine learning to improve their phishing and BEC attacks?

    -Attackers use AI and machine learning tools like Chat GPT to write more convincing phishing and BEC emails in various languages, making it harder for employees to recognize these threats.

  • What is the significance of continuous assessment in the context of cyber insurance?

    -Continuous assessment allows cyber insurance providers to collect real-time data on an organization's security posture, enabling more accurate risk assessment and the ability to offer tailored insurance products and services.

  • What are some of the emerging trends in the cyber insurance industry?

    -Emerging trends include the use of data science for better risk assessment, continuous monitoring of policyholder's security posture, and a shift towards a more collaborative relationship between insurers and policyholders to improve cybersecurity practices.

  • What advice do Eric and Theresa give to organizations preparing for cyber insurance renewal or application?

    -They advise organizations to start early, work closely with brokers and insurers to understand their requirements, and consider implementing attack surface management to get ahead of the assessment process.

Outlines

00:00

😀 Introduction and Cyber Insurance Market Overview

Eric Skinner from Trend Micro and Theresa Le from Cowbell Cyber introduce themselves and set the stage for a discussion on the evolving cyber insurance market. Eric highlights Trend Micro's focus on XDR, attack surface management, and cloud security, while Theresa shares her background in cyber insurance and legal expertise. They emphasize the importance of cyber insurance in fostering risk mitigation and best practices, drawing parallels with historical examples like boiler inspections and seatbelt usage. The session aims to cover the challenges in the cyber insurance industry, practical tips for better terms, and a look into the future of the market.

05:02

📈 The Impact of Cybercrime on Insurance Rates

Theresa and Eric delve into the financial impact of cybercrime, particularly ransomware, on organizations. They discuss how data breaches and cybercrime have become significant drivers of cyber insurance, noting the substantial financial and reputational damage they cause. Eric highlights the increase in attack frequency and the stabilization in severity, while also mentioning the resurgence of some attack groups. Theresa discusses the significant increase in insurance premiums and deductibles, attributing it to the rise in claims and the financial impact of cyber incidents. They also touch on the role of cyber insurance in requiring and promoting better security practices.

10:05

🔍 Challenges in Assessing Cyber Risks

Theresa and Eric discuss the challenges in accurately assessing cyber risks for insurance purposes. They highlight the limitations of traditional questionnaires used by insurers, which provide a static snapshot of an organization's security posture rather than a dynamic, real-time assessment. Eric shares anecdotes from incident response teams, illustrating how misconfigured security controls can lead to significant breaches despite the presence of basic security measures. Theresa emphasizes the need for insurers to evolve their risk assessment methods to better reflect the reality of an organization's cyber resilience.

15:07

📉 The Evolution of Cyber Insurance Questionnaires

Theresa and Eric explore the evolution of cyber insurance questionnaires, acknowledging their limitations and the need for a more dynamic approach to risk assessment. They discuss how insurers are beginning to ask more detailed questions about an organization's security controls and practices, but still face challenges in keeping up with the rapidly changing threat landscape. Eric emphasizes the need for continuous assessment and the potential for insurers to provide more value through proactive engagement with their policyholders.

20:07

💡 The Importance of Continuous Assessment in Cyber Insurance

Theresa and Eric discuss the concept of continuous assessment in cyber insurance, highlighting its potential to provide a more accurate and dynamic understanding of an organization's risk profile. They explain how insurers can collect telemetry data from various sources to inform underwriting decisions and help organizations identify and address security gaps. Theresa emphasizes the benefits of this approach, including the ability to benchmark organizations against their peers and provide tailored advice for risk mitigation.

25:09

🛡️ The Role of Attack Surface Management in Risk Assessment

Eric and Theresa explore the role of attack surface management in continuous risk assessment, explaining how it helps organizations discover and prioritize their assets and vulnerabilities. They discuss how this approach can provide real-time visibility into an organization's security posture, allowing for more proactive and effective risk management. Theresa also touches on the potential for insurers to use this data to offer more competitive pricing and better coverage based on an organization's actual risk.

30:11

💼 The Future of Cyber Insurance and Continuous Monitoring

Theresa and Eric conclude their discussion by looking into the future of cyber insurance, predicting that ransomware and extortion will continue to evolve and that phishing and business email compromise will remain significant threats. They emphasize the importance of continuous monitoring and assessment, suggesting that it will become more mainstream and valued as a partnership between insurers and policyholders. They also highlight the potential for insurers to provide additional value through risk engineering services and incident response support.

35:12

🤝 Closing Remarks and Call for Audience Engagement

In their closing remarks, Eric and Theresa thank the audience for their participation and invite them to engage in a Q&A session. They reflect on the importance of the topics discussed and encourage attendees to consider the insights shared as they prepare for their cyber insurance renewals or applications. The session ends on a positive note, with an emphasis on the value of continuous learning and adaptation in the face of evolving cyber threats.

Mindmap

Keywords

💡Cyber Insurance

Cyber insurance is a type of insurance specifically designed to protect businesses and individuals from internet-based risks, such as cyber attacks, data breaches, and business interruption due to such incidents. In the video, Eric and Theresa discuss how the cyber insurance market is evolving to better assess risk, particularly in light of increasing cyber threats. The theme of the video revolves around the importance of cyber insurance in mitigating the financial impact of cyber incidents.

💡Risk Assessment

Risk assessment is the process of identifying, analyzing, and evaluating risks to determine how they might impact an organization. In the context of the video, risk assessment is crucial for cyber insurance as it helps insurers understand the likelihood and potential impact of cyber threats. The speakers discuss how traditional methods of risk assessment, such as questionnaires, are being supplemented with continuous assessment tools to provide a more accurate and dynamic view of an organization's risk profile.

💡Cybersecurity

Cybersecurity refers to the practice of protecting internet-connected systems, including hardware, software, and data, from theft or damage. In the video, cybersecurity is a central theme as it is the primary area of concern for cyber insurance. The speakers discuss how cybersecurity measures, such as endpoint detection and response (EDR) and multi-factor authentication (MFA), are critical in preventing cyber incidents and thus reducing the need for insurance claims.

💡Attack Surface Management

Attack surface management is a cybersecurity discipline focused on identifying, assessing, and prioritizing an organization's assets that could be targeted by attackers. In the video, Eric explains how this approach helps organizations proactively manage their security by continuously monitoring and assessing their attack surface, which can be beneficial for both internal security teams and for cyber insurance underwriters who need to assess risk.

💡Ransomware

Ransomware is a type of malicious software that encrypts a victim's data and demands payment to restore access. The video highlights ransomware as a significant driver of cyber insurance claims due to its financial impact on organizations. The speakers discuss the evolving nature of ransomware and the challenges it poses to both cybersecurity defenses and insurance underwriting.

💡Data Breaches

A data breach occurs when unauthorized individuals gain access to sensitive information. In the video, data breaches are mentioned as a primary concern for cyber insurance, as they can lead to significant financial and reputational damage for affected organizations. The discussion emphasizes the importance of robust security measures to prevent such breaches and the role of insurance in mitigating their consequences.

💡Incident Response

Incident response is the process of addressing and managing the aftermath of a security breach or cyber attack. Eric mentions incident response teams in the context of helping customers deal with serious cyber threats. The video underscores the importance of having a well-defined incident response plan as part of an organization's cybersecurity strategy, which can also be a factor in cyber insurance assessments.

💡Phishing

Phishing is a form of social engineering where attackers trick individuals into revealing sensitive information or performing actions that compromise security. In the video, phishing is highlighted as a common initial attack vector in many cyber incidents. The speakers discuss the importance of training and awareness programs to reduce the risk of successful phishing attacks, which can lead to significant insurance claims.

💡Business Email Compromise (BEC)

Business Email Compromise (BEC) is a type of scam where attackers impersonate executives or other trusted individuals to trick employees into transferring funds or sharing sensitive data. The video discusses BEC as a significant cause of cyber insurance claims, emphasizing the need for robust email security measures and employee training to detect and prevent such scams.

💡Continuous Assessment

Continuous assessment in the context of cyber insurance refers to the ongoing evaluation of an organization's cybersecurity posture and risk profile. Theresa explains how this approach, facilitated by technology and data science, allows insurers to provide more accurate coverage and pricing while also helping organizations improve their security. The video highlights the benefits of this dynamic method over traditional, static risk assessments.

💡Risk Engineers

Risk engineers are professionals who work with organizations to identify, assess, and mitigate risks, particularly in the context of insurance. In the video, Theresa mentions risk engineers as part of the cyber insurance process, emphasizing their role in providing guidance and support to policyholders to improve their security posture and potentially reduce insurance premiums.

Highlights

Cyber insurance market is improving in risk assessment after a chaotic few years.

Trend Micro's focus on XDR, attack surface management, and cloud security.

Theresa Le's background as a Chief Claims Officer at Cowbell Cyber and her experience in cyber insurance.

Historical context of insurance industry's role in fostering safety standards, like boiler inspections and seatbelt usage.

Cyber insurance's potential to influence mainstream adoption of cybersecurity best practices.

The shift in the cyber insurance landscape from 2019 to 2021, with increased claims and premium rates.

Ransomware's significant financial impact on organizations, even for small to medium-sized enterprises.

The importance of continuous monitoring and improvement in cybersecurity measures.

The challenges in the dynamic cyber threat environment and the need for rapid response.

The role of AI in enhancing phishing and BEC email effectiveness for attackers.

The significant increase in loss ratio between 2018 and 2021 in the cyber incident realm.

The stabilization of cyber insurance rates post-2021 and the importance of risk assessment.

The limitations of traditional cyber insurance questionnaires in accurately assessing risk.

The need for insurers to adapt to the evolving risk landscape and the importance of continuous risk assessment.

The emergence of attack surface management as a key strategy for continuous risk assessment and mitigation.

Cyber insurance's new approach involving in-house cybersecurity experts and risk engineers to guide policyholders.

The future of cyber insurance with predictions of continuous evolution in ransomware and the importance of proactive security measures.

Transcripts

play00:01

- [Eric] Hey everybody. Thanks for coming.

play00:04

It's really nice to be in front of big audiences again.

play00:07

After a few years,

play00:10

Theresa and I are gonna talk about

play00:12

how the cyber insurance market

play00:15

is getting better at assessing risk

play00:18

because it's been a chaotic few years.

play00:20

So I'm Eric Skinner. I'm from Trend Micro.

play00:23

Trend Micro is a longtime security vendor,

play00:27

currently huge focus in areas like XDR

play00:29

and attack surface management and cloud security.

play00:33

And I've been in cybersecurity for about 25 years.

play00:37

My first RSA was the year 2000,

play00:41

so I guess I'm showing my age

play00:43

and I've had the pleasure

play00:46

of working with Theresa.

play00:48

- [Theresa] Hi everyone.

play00:49

It's nice to be here and see all of you

play00:50

and spend some time this afternoon together.

play00:52

My name is Theresa Le.

play00:54

I'm the Chief Claims Officer at Cowbell Cyber.

play00:56

So we're a cyber insurance provider in InsureTech.

play01:00

And before this I was also in VP at Swiss Re,

play01:05

which is a cyber reinsurer and XXL also.

play01:08

So I've been in cyber insurance.

play01:09

And then also I should say

play01:11

that I'm a recovering coverage attorney.

play01:13

So represented cyber insurers for over a decade,

play01:17

the first part of my career,

play01:18

trying to keep them out of trouble.

play01:20

And so we can just get started, I think, right?

play01:23

- [Eric] Let's do it. - [Theresa] Okay.

play01:26

So because I'm the lawyer in the room,

play01:28

this is the disclaimer you guys have seen,

play01:30

please read it and remember it and abide by it, Lala.

play01:32

(both chuckling)

play01:34

And so why are we talking about cyber insurance today?

play01:39

Especially with respect to cybersecurity.

play01:41

And you'll see in this picture,

play01:43

it's a boiler that blew up.

play01:46

And in the 1800s,

play01:48

this is just to depict that sometimes

play01:50

there needs to be an industry,

play01:52

an insurance, you know, it's type of, you know,

play01:54

it's not that interesting,

play01:56

but it did have some very influential ways

play02:00

to foster adoption.

play02:03

And so best practices, better practices,

play02:06

risk mitigation is oftentimes forwarded

play02:09

by the insurance industry.

play02:10

So when the boilers were blowing up

play02:13

and causing lots of property and bodily injury damage,

play02:17

a Hartford steam and boiler,

play02:19

they said we should do inspections.

play02:20

And that's one way that we can mitigate against loss.

play02:24

I think the, and then more recently, I mean,

play02:26

everybody in this room seems too young to remember

play02:29

the days that we didn't have to wear seatbelts,

play02:31

but the auto insurance industry, yes, you are.

play02:36

Now, it's not even that controversial.

play02:37

You just get in the car, you put on your seatbelt,

play02:39

but it was the auto insurance industry that really forwarded

play02:42

that adoption of a better practice

play02:44

to mitigate against bodily injury.

play02:46

So if you wear your seatbelt,

play02:48

then you as a condition to getting auto coverage

play02:50

if you get hurt.

play02:52

And then more recently, carbon monoxide detectors,

play02:56

sprinklers, things that are now part of the building code,

play03:01

but they were forwarded by the insurance industry.

play03:03

So just kind of a signal towards, you know,

play03:05

maybe there'll be another circle here, 2020 something.

play03:09

The cyber insurance industry was how X, Y,

play03:12

and Z got adopted mainstream.

play03:15

That would be good.

play03:17

And so today we hope to cover some things in our agenda,

play03:21

really to have a little look back.

play03:24

And in cyber insurance,

play03:25

which is a relatively new line of insurance,

play03:27

looking back really means five years.

play03:29

It's shifted a lot,

play03:30

but we'll see what the challenges were in recent memory,

play03:34

how risks have been assessed historically

play03:38

in the past few years and where we're going with that.

play03:41

And then we'll give you some practical tips and things

play03:43

to how you may get better terms for cyber insurance

play03:48

and what the future holds.

play03:48

I think I'll show you my insurance crystal ball later.

play03:54

So let's talk about some of the challenges that we've seen.

play03:57

Again, I mentioned that it's a space

play04:00

that's shifted quite a lot recently.

play04:02

So in 2019, just, you know,

play04:04

four or five years ago, the claims were relatively low.

play04:07

This is also pre pandemic.

play04:09

So the, the policies were relatively easy to get.

play04:13

There was expansive coverage,

play04:15

not too much you needed to do

play04:17

to even get high limits on cyber insurance.

play04:20

In the next two years,

play04:22

yes, we had the pandemic,

play04:23

the attack surface increased quite a bit,

play04:25

but also claims case started to come in

play04:28

very severe claims, lots of breaches.

play04:30

Ransomware really got its, you know, traction here.

play04:33

And then as procurers of cyber insurance,

play04:37

you may have seen the rates go up quite remarkably.

play04:40

So I'll go through that adjustment later on

play04:43

in the presentation.

play04:45

But there was also a challenge in getting cyber insurance.

play04:48

So even if you had what used to be relatively good controls

play04:53

and were seen as a good risk,

play04:54

the cyber insurance industry was having a different look,

play04:57

a different approach,

play04:58

and then you might not have had that much success

play05:02

even getting cyber insurance.

play05:03

And we'll go into a little bit more of the future

play05:05

of what that looks like.

play05:07

There is some good news, hopefully.

play05:09

One of the drivers of cyber insurance

play05:12

is obviously data breaches, cybercrime and ransomware.

play05:16

And ransomware, I just put this up here.

play05:18

Net diligence did a survey and it's no surprise

play05:21

that a ransomware event is very financially impactful

play05:25

to an organization.

play05:27

And in recent times, even, you know,

play05:29

small to medium size enterprises.

play05:31

So the mom and pops up to $2 billion in annual revenue.

play05:37

Even that space that did not used to be a focus

play05:39

for the threat actors now is,

play05:41

and it's quite impactful with an average of

play05:43

half a million dollars impact to an organization.

play05:47

And then the other impacts to, you know,

play05:49

reputational, business interruption,

play05:53

other things that are quantified,

play05:55

but also we often hear from the SME policy holders that,

play06:00

but for the support of the cyber insurance policy,

play06:03

it would be very difficult

play06:04

if at all possible to get through a cyber event

play06:08

such as a ransomware.

play06:11

Hand it over to Eric.

play06:13

- [Eric] Yeah, so let's talk,

play06:14

let's talk a little bit about some of the dynamic

play06:17

in this environments

play06:18

because for customers as well as for insurers,

play06:21

the last few years have been pretty turbulent

play06:23

and for cybersecurity vendors as well with respect

play06:26

to the way attackers have been behaving

play06:29

and the way environments have been changing for customers.

play06:32

So let's have a brief look at what Trend and Cowbell

play06:36

are seeing with respect to the dynamics

play06:38

in the ransomware space and some of the other threats

play06:42

that result in some of these high claims.

play06:44

So at a high level,

play06:46

what we've seen is that the frequency has been increasing

play06:50

on these kinds of ransomware attacks.

play06:53

The severity has been mostly stabilizing,

play06:57

but we'll touch on this a bit later.

play06:58

There was a little bit of an uptick in late 2022

play07:01

and into Q1.

play07:03

Some of the attack groups are having a little bit

play07:05

of a resurgency.

play07:06

There's been a lot of growth in exfiltration behavior.

play07:11

Some of the attack groups got a little bit too much heat

play07:14

for some of the destructive stuff they were doing.

play07:16

And in order to take some of the pressure off themselves

play07:20

and for a variety of other reasons

play07:22

as well as just being able to exert more pressure,

play07:26

even if people had good backups,

play07:27

they've pivoted into doing a lot of data exfiltration.

play07:30

The speed is intensifying.

play07:32

So attackers are able to move a lot more quickly through

play07:36

your organization and that means that organizations

play07:40

have less time to react.

play07:42

And at the same time, when people are paying ransoms,

play07:47

they are funding these attack groups.

play07:49

And I think we're all interested in seeing

play07:51

the attackers get less money, right?

play07:53

When the attackers do get money,

play07:54

they're subsidizing attacks against

play07:56

a further six to 10 victims according

play07:59

to some data science work that Trend was doing.

play08:02

And then when we look at BEC, this is,

play08:05

it doesn't get as much attention as ransomware

play08:08

and yet it it's a pretty substantial cause of claims.

play08:11

And historically that's been, hey,

play08:14

pay this fake invoice and using various pressure tactics

play08:17

and social engineering tactics to get invoices paid.

play08:21

And a few strategies are evolving there

play08:24

because of course organizations

play08:25

are implementing more process around this.

play08:28

So we've noticed that attackers are now leveraging

play08:33

other social engineering and phishing

play08:35

to take control of a legit account

play08:36

and then send the BEC emails from

play08:39

an internal valid account

play08:40

and that avoids certain legacy email controls,

play08:44

a gateway controls, things like that.

play08:46

And it's of course more credible, it's more effective,

play08:49

but they're also using strategies,

play08:53

avoiding the finance team altogether.

play08:55

And they're, for example,

play08:56

making a request for confidential data that look like

play08:59

they're coming from an executive.

play09:00

And then the employee provides tons of confidential data

play09:03

and the attack returns right around

play09:05

and tries to extort the company for

play09:08

otherwise they're gonna leak that data.

play09:09

So it's really hard for employees to recognize this.

play09:14

For example, I know everyone's talking about AI,

play09:16

who's sick and tired of hearing about AI yet?

play09:19

Yeah, okay.

play09:20

I'm kind of like half putting my hand up,

play09:21

but one thing we have seen is that cha GPT is helping

play09:24

the attackers write better phishing emails,

play09:26

write better BEC emails.

play09:27

I was in Finland a few weeks ago,

play09:29

our team there said, yeah, you know,

play09:31

the attackers used to do a terrible job of writing phishing

play09:36

emails in finish because finish is a really hard language,

play09:38

but chat GPT does perfect finish for example, right?

play09:42

So it is hard for employees to recognize these things.

play09:46

So this has an impact on losses.

play09:49

- [Theresa] So the cybercrime is one of the top three types

play09:51

of cyber claims that have coming in,

play09:53

but there was a lot,

play09:54

there's been a lot of loss in the cyber incident realm.

play09:58

And so just this depicts that there's,

play10:00

between 2018 and 2021,

play10:05

there was a doubling of the loss ratio

play10:07

and that's quite severe.

play10:08

So there are lots of claims were coming in,

play10:10

the premium wasn't keeping up.

play10:12

You'll see between 2020 and 21,

play10:14

just within that year there was a doubling of premium.

play10:16

So you might have felt that as you were working

play10:19

with your brokers and thinking,

play10:20

why did cyber insurance get so expensive?

play10:22

Why did my rates double?

play10:24

And that's why, there was a historic, you know,

play10:27

in that time, severe claims that came in.

play10:29

So to sustain us all,

play10:31

that's what happened with the rates.

play10:33

Another depiction here is quarter over quarter,

play10:37

that time period that we saw remarkable increases

play10:40

in the cost quite painful.

play10:41

Like acknowledge that at the same time the deductibles

play10:45

and retentions what what policy holders were paying

play10:47

out of pocket before the insurance

play10:48

that was even triggered was also going up

play10:51

if the premium wasn't enough.

play10:54

And then of course the difficulty in getting cyber insurance

play10:58

at the same time because claims were coming in

play11:01

and a recognition that cyber instance

play11:03

were financially impactful as well as having other impacts

play11:07

to your reputation and ability to do business

play11:09

or be competitive that lots of contracts

play11:14

were requiring cyber insurance to make sure

play11:17

that if I do business with you,

play11:19

if I trade with you that I provide your, you know,

play11:21

you with my data, with my customers data,

play11:23

that you have a financial mechanism to transfer that risk.

play11:27

So contractually cyber insurance was becoming more of

play11:31

a requirement and to be competitive.

play11:34

After the last quarter of 2021,

play11:37

the rates did stabilize a little bit.

play11:39

They're still increasing but not

play11:40

at as the rates that historically we saw.

play11:44

So they are going down in the sense that

play11:47

they're not increasing as much.

play11:48

- [Eric] And 28% year over year

play11:50

is still pretty painful. Right?

play11:51

So we all have to, we all have to do better and

play11:55

that's what we're gonna talk about.

play11:56

- [Theresa] Yeah.

play11:57

So we recognize this in the cyber insurance industry

play12:01

and would, you know,

play12:02

have taken on a different approach

play12:04

to try to help policy holds and

play12:06

the space in general to still get coverage.

play12:10

But how we do that is to properly assess the risk

play12:12

so that we can be prepared for those claims

play12:15

and and for the impact.

play12:17

- [Eric] Yeah, so at the end of the day,

play12:20

insurers have to measure risk, right?

play12:22

And we're gonna talk a little bit

play12:23

about how a risk is getting measured now.

play12:25

And I'm going to pull in some stories from trends,

play12:29

incident response teams to sort of contrast

play12:32

the risk measurements with the risk reality.

play12:36

How many people in the room, by the way, have,

play12:38

or their companies have cyber insurance?

play12:40

I'm just curious.

play12:41

Wow. Look at that.

play12:42

Right? Okay.

play12:43

So yeah, really depends on the country,

play12:45

but in the US a lot of organizations do.

play12:47

So you're feeling this pain, cool, so,

play12:50

well it's not cool that you're feeling the pain,

play12:51

but it's, you understand.

play12:53

So I don't like the pain.

play12:55

Yeah. So how many people know this podcast Risky Business?

play12:59

Some of you? Yeah.

play13:00

Okay. It's a really cool podcast.

play13:01

A guy in Australia, Patrick Gray hosts the podcast,

play13:06

very technical, but they did have a conversation.

play13:08

This is a little while ago,

play13:08

but the point is still valid, right?

play13:10

He was joking at the time, but he said, Hey,

play13:13

you know, like the cyber insurance business right now,

play13:15

it's a mess because if you set up your actuarial table

play13:18

and the risk equals 100%,

play13:20

you probably don't wanna offer insurance for that.

play13:22

But that's exactly the situation that

play13:24

the insurers were in a few years ago,

play13:26

is no ability to figure out who is more at risk

play13:29

than other people.

play13:30

And that's why rates and deductibles and everything go up

play13:34

because just like all of our businesses,

play13:38

insurance companies like to make money, I've heard.

play13:40

- [Theresa] Yeah, we do. - [Eric] Yeah, exactly.

play13:44

So we know how life insurance works and insurance companies

play13:48

have got really good at measuring risk and life insurance

play13:50

for a long, long time.

play13:51

And they've developed a very good data models.

play13:54

And these data models don't have to change every few weeks

play13:57

the way they do in cyber.

play13:58

But you know, they do questionnaires, they do medical tests,

play14:01

they ask a lot about your family history and oh, okay,

play14:03

you've got family history of cancer or you're a smoker,

play14:07

your risk is higher and they have a pretty good measure of

play14:11

your risk by doing that kind of basic thing.

play14:14

Well in cyber, they have been asking a lot of questions.

play14:19

Who's filled out one of these

play14:21

cyber insurance questionnaires personally?

play14:22

Yeah, exactly right.

play14:24

And these questionnaires have been evolving,

play14:27

but they happen once a year and like,

play14:31

let's talk about these questionnaires.

play14:33

- [Theresa] I'm sorry.

play14:34

We know it's a burden and this questionnaires from a few

play14:37

years ago and we've been trying to develop

play14:39

the application process to be more streamlined.

play14:41

We do have an approach,

play14:43

I think it will work, but this is just to,

play14:47

this is to display that even the questionnaire, just like,

play14:49

as Eric mentioned, it's not an ideal,

play14:53

it's not optimal for a cyber risk.

play14:56

And here you see that, you know,

play14:57

it's asking about endpoint detection,

play14:59

which is completely valid, but you know, doesn't,

play15:03

I don't know if you see it,

play15:04

but it doesn't go as far as well

play15:06

if you get an alert who's monitoring that?

play15:08

What's the action?

play15:09

So just to have it,

play15:10

doesn't necessarily give us insight into

play15:13

the cyber resiliency or controls

play15:15

that are actually being followed by the organization.

play15:19

And so we've worked to improve the questionnaire,

play15:21

the application process,

play15:23

also recognizing that it is a snapshot of that risk manager

play15:27

or financial persons understanding

play15:29

at the time that they signed it.

play15:32

And then of course, you know,

play15:33

it's one day out of the 12 month policy period,

play15:37

that that information is to the true to the best

play15:41

of their knowledge of the person signing.

play15:43

But what's going on the 364 other days of the year where

play15:47

that organization's cyber posture and architecture

play15:52

and other things and vulnerabilities,

play15:54

everything else is shifting around, changing.

play15:58

How do we capture that as a cyber insurer in order

play16:00

to provide the best service, the best product, to keep up,

play16:04

to make sure that we're properly assessing the exposure,

play16:09

questionnaires aren't perfect, we recognize that.

play16:12

And then also, is it really fair to then decline

play16:16

an organization because the questionnaire wasn't filled out

play16:19

in a way that, you know,

play16:20

that we were comfortable underwriting to that risk.

play16:24

They could improve and we could take another look,

play16:26

but what have they improved during the year?

play16:28

Should we not incentivize adoption

play16:31

of better control so that it's not just at renewal

play16:33

that we take an assessment.

play16:35

So a lot could change in a year also, I just,

play16:38

because the calendar's up there,

play16:39

I would remiss if I be remiss if I didn't mention that

play16:42

when you are preparing for renewal of your insurance program

play16:47

to start early,

play16:47

because if you're starting 90 days out or 120 days out,

play16:51

you'll have the opportunity to then adopt some measures

play16:54

and then when the application comes in,

play16:57

you'll be able to show that you're a better risk.

play16:59

But if you start too close to that deadline

play17:02

as we tend to do,

play17:03

you may not have time and there's an impact

play17:06

on the terms in that regard.

play17:07

So that was just my plug to start early if you can,

play17:10

on cyber insurance renewals.

play17:14

- [Eric] Totally agree.

play17:15

So really want to explore some of the cases

play17:18

that we have seen in incident response

play17:20

that teach us an important lesson

play17:23

about some of the challenges with the way cyber insurers

play17:27

have to assess risk.

play17:28

So we have an insurance, sorry,

play17:30

we have a incident response team.

play17:32

We do not have an insurance team,

play17:33

but we have an incident response team that helps customers

play17:38

and also other organizations

play17:40

that get into serious trouble.

play17:41

And I'm just gonna tell you two stories.

play17:45

They're anonymized of course,

play17:47

where it really points to some of the challenges

play17:50

with respect to insurers asking the right questions

play17:53

and not having enough detail.

play17:55

And I tried to pick some reasonably representative ones,

play17:58

but still perhaps with a little bit of diversity to them.

play18:03

So here's a situation where a customer had a server

play18:07

that was internet facing,

play18:10

but because they'd misconfigured now

play18:12

so they didn't realize the server was missed,

play18:15

was internet facing.

play18:17

And also because it wasn't internet facing,

play18:20

they thought well, you know, maybe,

play18:21

maybe we don't need to have active

play18:23

or properly configured MFA on that server.

play18:26

And then they did have EDR but they were not monitoring it

play18:33

and they weren't monitoring the logging.

play18:35

So there was a massive brute force attack

play18:37

against that external facing server.

play18:39

There were thousands and thousands and thousands

play18:41

of password attempts against the RDP server

play18:44

that nobody noticed,

play18:46

even though alerts were being generated.

play18:48

And I wanna pause for a second.

play18:50

I'm in no way, you know,

play18:52

trying to blame customers for this.

play18:54

We're gonna talk about the evolution and how vendors

play18:57

and insurers and everybody has to do better

play18:59

in these kinds of circumstances.

play19:00

We do a lot in our product team to learn

play19:03

from these incidents to figure out

play19:04

how we can better protect customers

play19:06

and not all these products are trend products.

play19:08

You can recognize these situations anywhere, right?

play19:11

So behavioral detection, misconfigured, not running,

play19:15

you know, various other types of configurations.

play19:17

So the controls were present but they were not configured

play19:21

in a way that was going to catch these attackers.

play19:24

And that is very typical of things

play19:28

that end up in incident response.

play19:29

And they could truthfully answer yes to all the questions on

play19:33

their insurance form about these controls

play19:35

and the insurance company would not have

play19:37

any awareness of these misconfigurations.

play19:39

So that's one example.

play19:41

- [Theresa] You might wonder would this have been covered?

play19:44

And yes it would because again,

play19:48

things will happen even if the questionnaire was truthful,

play19:51

even if you have controls and these things get missed.

play19:55

But again,

play19:56

to to not cause anyone to be defensive for anything.

play20:00

And we recognize that this is something we need to address

play20:03

as an interest with the cybersecurity industry as well.

play20:05

Like's the insurance industry

play20:06

'cause they are costly to address.

play20:09

- [Eric] Yeah, mistakes get made, right?

play20:11

and they're gonna keep on getting made

play20:12

and it's all of our jobs as defenders and vendors

play20:16

to try to control those.

play20:17

Here's an interesting one.

play20:18

So the employee receives a phishing email,

play20:21

all that Phish training worked.

play20:22

He read the email and he said, "Hmm, this looks suspicious,

play20:24

I better send it to IT."

play20:26

IT read the email and clicked the link

play20:28

and infected the network.

play20:29

(Theresa laughing)

play20:31

And yeah, we all laugh and it's like,

play20:33

think about could that happen to me, right?

play20:36

So they had a legacy email gateway, right?

play20:40

The more modern approaches to plug in to Office 365 directly

play20:44

because then you can see internal emails

play20:46

and things like that.

play20:47

But they did not have those kinds of controls and

play20:50

the IT employee opened the link and didn't notice

play20:58

the suspicious activity and the attacker was able

play21:03

to move laterally in the environment

play21:05

because they had some misconfigurations

play21:07

in their EDR deployment and they had

play21:10

some incomplete coverage.

play21:11

So they had various assets in the organization

play21:13

that had no security controls on them

play21:16

and the attacker was able to obviously use those

play21:18

for various forms of privilege, elevation and so on.

play21:21

This is a very typical story

play21:23

and the EDR was not regularly monitored.

play21:26

So where there was EDR detection,

play21:28

it was not actioned in a prompt way.

play21:31

Some customers, some organizations have got

play21:33

into the habit of, you know,

play21:34

because they're stress teams, right?

play21:36

Oh wow. You know, weekends, evenings, et cetera.

play21:38

Small teams,

play21:39

they're not at the cadence yet of the attackers

play21:43

and who wants to be monitoring EDR alerts

play21:45

at three in the morning on Saturday, right?

play21:48

We'll talk about where that has to go.

play21:50

But this is another example where, hey,

play21:52

they're doing all the right things superficially and

play21:54

insurance would've said, sounds good, here's your policy.

play21:58

And that's how we got into the trouble

play21:59

of these policies resulting in big claims.

play22:03

So when we zoom out a little bit

play22:04

and we look at trend IR data over a longer period of time,

play22:09

I really get interested in these conversations.

play22:11

I ask 'em like, hey, how do these attacks start?

play22:14

And the first time I asked 'em this,

play22:15

I was kind of surprised to hear the answer.

play22:17

Oh it's really only two things.

play22:18

So was really only two things.

play22:20

Like half of it's fishing,

play22:22

half of it is exploitation of unknown

play22:25

or misconfigured internet facing assets.

play22:27

And then the trouble flows from there, right?

play22:30

Fishing and other kinds of social engineering, right?

play22:32

But broadly, and then when we did

play22:35

a little bit more digging, right,

play22:37

35% of the cases there were alerts but they were missed

play22:40

or they weren't acted on promptly.

play22:42

72% of the time security controls were there,

play22:45

but they were misconfigured.

play22:47

We had a situation for example,

play22:48

where a customer had a different EPP product, not trends,

play22:52

but this could happen with any product.

play22:55

They had misconfigured an exclusion and .star

play22:58

was excluded in the EPP and that's wrong.

play23:03

So the EPP was not looking at any files, for example,

play23:06

39% of cases the security controls were present

play23:09

but they were outta date, right?

play23:11

They were using old versions of software and so on.

play23:13

So these are things that are typically not visible

play23:17

on insurance forms.

play23:18

So there is a way to do this better

play23:20

and we're gonna pair into that right now.

play23:23

- [Theresa] Yeah.

play23:24

And one of the things that just pains us as a group I think

play23:29

is when these cyber incidents,

play23:32

whether it's social engineering, monetization of a breach,

play23:37

ransomware, the money, the resources of your,

play23:40

you know, your premium and that the policy resources,

play23:43

they're going to be funneled into these threat actor groups.

play23:46

And so the ransom payments,

play23:48

we did an analysis of the ransomware payments and

play23:54

there was a dip between 2021 and 2022, which is good news.

play24:00

I would asterisk that and that's the last point

play24:02

that there's been a rebound at

play24:04

the end of last year and the first quarter

play24:06

has seen an uptick in ransomware severity.

play24:10

We can attribute the momentarily momentary decline

play24:15

on some geopolitical things that were happening

play24:17

at the beginning of 2022.

play24:19

But also we think that the decline in the last year

play24:25

between 2021 and 22 was due to a variety of factors.

play24:28

And I just wanted to point those out

play24:29

because it does give some insight into things

play24:32

that are happening that could improve this situation.

play24:34

For instance, more companies now are being more resilient.

play24:38

So they have strategies in place of incident response plans,

play24:41

business continuity,

play24:42

a lot of these things the insurance industry is pushing,

play24:45

these are you know,

play24:46

value add free resources that will help an organization

play24:51

be more resilient in the face of a cyber event.

play24:53

But in particular ransomware,

play24:55

we particularly focus on the backup situation.

play24:59

So making sure that if they are hit with ransom,

play25:02

where there's a viable backup strategy there

play25:06

as well as other controls that could be in place

play25:08

that we hope and that we see have had an impact

play25:11

on the amount of ransom, when there is a ransomware event

play25:14

that the amount of ransom is declining

play25:16

or the instances where ransom has to be paid

play25:19

as a last resort, there's no other option available.

play25:22

Good option, that is decreasing.

play25:25

- [Eric] Yeah and I've talked to several insurers

play25:27

and several other cybersecurity vendors

play25:29

and everyone agrees, yeah there is an uptick happening now

play25:33

in the ransomware success and that's

play25:36

because attackers adapt and they've also regrouped

play25:40

they were disrupted in various ways.

play25:42

But now they're finding new things to do

play25:44

that will be effective.

play25:46

And so yeah,

play25:47

we can't pat ourselves on the back yet.

play25:50

- [Theresa] It is concerning because

play25:51

even with the backup strategies in place,

play25:54

we can have double extortion.

play25:56

It's the suppression of data or the,

play25:58

you know, you'll see the threat actors say, fine,

play26:01

you don't need the crypto,

play26:02

but I'm still gonna ask you for a million dollars,

play26:04

otherwise I will publish your secrets.

play26:06

Or there could be even triple extortion too when they go

play26:12

and actually calling family members and customers

play26:18

and clients of that organization and really basically

play26:22

embarrassing them that they don't have good controls.

play26:25

And so there's a lot more ways to exert pressure

play26:28

on an organization to pay the ransom

play26:31

even if the decryptor is not the primary need

play26:33

for that transaction.

play26:35

So it is concerning they're getting just more tricky.

play26:42

And so the questionnaires have improved.

play26:44

So I just wanted to show an example

play26:46

of a more recent application

play26:48

and you'll see that because phishing

play26:51

is such a key gateway to an organization's infrastructure

play26:57

that we have focused on, you know,

play26:59

let's go a little bit more in detail.

play27:01

So is an organization conducting fishing training

play27:05

and how often and if if there's a failure rate,

play27:08

are those individuals being retrained?

play27:12

So things like that where

play27:13

we can really improve the questionnaire.

play27:15

That being said,

play27:16

it's still an imperfect process in many people's opinion

play27:20

just because it's not as accurate a depiction

play27:23

of the real state of affairs.

play27:25

- [Eric] Yeah and even if they're starting

play27:27

to ask better questions, which they are,

play27:30

there's constantly new TTPs, right?

play27:33

The attackers are doing new things and the questionnaires

play27:35

outta date almost instantly, right?

play27:36

So actually if we go back to that one for just a second.

play27:41

Great. So they used to say, what email security do you have?

play27:44

And that was about it, right?

play27:46

And it turns out that even asking what vendor you have

play27:48

isn't necessarily indicative of your risk

play27:50

'cause you can misconfigure any vendor, right?

play27:52

But now they're asking a bunch of questions, that's great,

play27:55

but they're still not, for example asking, well, okay,

play27:58

does your email security have visibility to internal emails?

play28:01

Because that's a new tactic.

play28:02

Well that questionnaire is six months old so, right?

play28:06

Or maybe a year old.

play28:07

So it's really hard for these questions to keep up.

play28:11

And the other thing is they're really painful, right?

play28:13

They're getting longer now they ask more questions.

play28:15

Do you want to answer more questions? No, you do not.

play28:18

- [Theresa] The page is long

play28:19

and then we're not going to be sending them out

play28:20

every month just to get more current information.

play28:22

- [Eric] I saw one form that was 35 pages long.

play28:24

- [Theresa] Not a us but yeah.

play28:25

- [Eric] I know, right?

play28:27

So there is a better way

play28:29

and we're gonna talk a bit about some of the stuff

play28:31

that's going on that is helping.

play28:33

So, and it's really,

play28:36

there's kind of an echo that something we can relate to.

play28:39

Perhaps some of you in the room do this,

play28:40

although I think we're all cyber security people

play28:42

so we might shy away from this particular thing,

play28:44

but some of the car insurance providers will give you

play28:48

a discount if you run their app or you plug in this device

play28:51

into your ODB port and it will monitor your driving

play28:54

continuously and then they get a better picture

play28:57

of correlation of driving habits to claims.

play29:01

So if you're driving crazy and breaking heavily

play29:05

and speeding all the time,

play29:07

they can understand that and they can rate your policy

play29:10

a little bit differently.

play29:10

So that has been going on for a little while and there is

play29:15

a similar approach to that continuous assessment

play29:19

that's happening in two ways that are kind of converging.

play29:21

So Theresa and I are gonna talk about that.

play29:23

So the first thing that's going on

play29:25

inside organizations themselves,

play29:27

and you've been hearing about this,

play29:29

it's a space that's been sort of emerging

play29:32

and getting a little bit higher profile in the last year.

play29:34

Some analysts call it different thing of course

play29:37

'cause they all have to have their own acronyms.

play29:40

But attack surface management is a market category

play29:43

that broadly is about discovering your assets.

play29:47

So you know, finding those internet facing assets,

play29:49

finding the misconfigurations, finding so on,

play29:52

assessing the risk across that and then prioritizing

play29:55

for security teams the relevant mitigations.

play29:58

So it's kinda like,

play29:59

hey, what are the top five things that you

play30:01

or team should be focusing on today

play30:03

based on broad visibility?

play30:06

And that's something that organizations

play30:08

can obviously do for non-insurance reasons,

play30:11

'cause it really helps you keep attackers out in general,

play30:14

but also can be done before insurance applications.

play30:16

You can get into a cadence.

play30:18

And then the other thing that's going on is cyber insurance

play30:21

is also doing continuous assessment in a few cases.

play30:25

So some cyber vendors are starting to do

play30:28

this more continuous assessment approach where

play30:30

they're pulling telemetry on your security controls

play30:33

and then understanding those controls and doing

play30:35

data modeling and data science to understand the risk

play30:39

and have an opportunity to engage

play30:41

with the customer much more often.

play30:43

So let's start with that last one, the cyber insurance.

play30:46

Tell us about it. - [Theresa] Sure, sure.

play30:47

So this is exciting and sorry,

play30:50

the middle diagram is a bit small,

play30:52

but I can talk through it and I have it large

play30:54

on the next one, so don't strain your eyes.

play30:56

But part of the challenge

play30:59

as we've talked about is that application process is just,

play31:03

it's a static data point,

play31:05

just that one moment in time where it's signed

play31:07

and the risk manager or whomever,

play31:09

maybe not even the cyber security team

play31:12

is providing information,

play31:14

but that is an imperfect way to underwrite,

play31:17

to risk a risk that's dynamic,

play31:19

that's shifting, that has many risk signals

play31:21

and requires a more in-depth risk assessment.

play31:25

So the automated continuous collection of telemetry

play31:29

in the cyber insurance space is what Cowbell

play31:32

and other intratex have been starting to do.

play31:34

And we've done it for a while,

play31:35

is to collect data points from various many sources.

play31:42

So it's not just

play31:43

the one source of the risk manager providing

play31:46

that questionnaire, it's scanners,

play31:48

it's third party databases, it's telegraphic,

play31:51

thermographics,

play31:54

anywhere we can grab data from on that organization.

play31:58

And this is the outside in.

play31:59

We also have live connectors through APIs that will provide

play32:03

us inside out data behind the firewall,

play32:05

which is extremely valuable, extremely insightful.

play32:08

And that is in going into the machine too.

play32:12

And then these data-driven immediate types of input

play32:17

can really inform the underwriting decisions,

play32:20

the data selection, the creation and adaption

play32:23

of an insurance product that works for that organization,

play32:26

their particular risk and exposures.

play32:30

Also, we can incentivize that organization by,

play32:33

I'll go into it a little bit later by subjectivity.

play32:35

So if they're not doing so well in a particular area,

play32:38

we can help them identify that security gap

play32:41

and help them get better.

play32:42

And they are our customer.

play32:43

So the goal of being resilient to claims is the same.

play32:48

And so there's a good partnership there

play32:50

that we see an opportunity with policy holders.

play32:54

One of the really interesting aspects

play32:57

of how the cyber insurance,

play32:58

especially those that follow

play33:01

this continuous assessment model,

play33:03

is that we can benchmark how organizations

play33:05

are doing relative to their peers.

play33:08

This is important because if you look from the perspective

play33:12

of perhaps a threat actor that's focused on healthcare

play33:17

and that industry in particular,

play33:19

and they're thinking that's a rich data source,

play33:21

so there's a lot of money there

play33:22

or whatever it is that's attractive,

play33:25

how would our policy holder or prospective policy holder

play33:29

rank relative to the peers in that industry?

play33:31

So it has to be a more granular analysis and focus

play33:35

and so benchmarking how

play33:38

a particular perspective policy holder's doing

play33:40

relative to their peers can then

play33:42

in turn provide better pricing

play33:44

or more relative pricing to that actual risk.

play33:47

But also we can help them by saying, look,

play33:49

your peers are doing X, Y,

play33:50

and Z that's why maybe they have

play33:52

a different premium rate than you.

play33:55

And we can help with that.

play33:57

The point here is that if you're doing very well,

play34:00

if you're doing better than

play34:02

your industry partners or industry colleagues

play34:05

and that benchmark and that's that blue kind of line.

play34:08

And then we also break it down so that it's not just

play34:12

are you susceptible to a cyber incident but you know,

play34:16

how are you doing on compliance?

play34:17

How are you doing on supply chain?

play34:19

There's different factors that feed

play34:21

into the overall risk pricing, data science of it.

play34:24

So there's cloud security, endpoint security,

play34:26

dark intelligence, funds transfer,

play34:29

different ways that we can analyze those thousands

play34:31

of data points into some clear benchmarking and ranking.

play34:36

And then the idea is that if you are better,

play34:40

if you are doing better, if you have better controls,

play34:42

if you're more resilient than your peers,

play34:44

then you should get better pricing than your peers.

play34:46

If you're not doing so well then your insurance coverage

play34:50

because your risk here perhaps is going to be higher.

play34:54

And then if you're in the middle, you know,

play34:56

there's some things that you could do better on.

play34:58

And so this particular profile,

play35:01

this organization's not doing too well

play35:04

on the funds transfer.

play35:05

So they're susceptible more than their peers at 65

play35:09

and the industry benchmark is 75

play35:12

that we help them focus on that particular function

play35:15

in their organization.

play35:16

So maybe that is training,

play35:17

maybe that's the financial department

play35:19

that needs some best practices guidance.

play35:23

The subjectivities that middle,

play35:25

so they could be doing better.

play35:27

We're not going to decline them

play35:28

as compared to a few years ago.

play35:31

But how can we help that organization do X, Y, and Z

play35:34

and then get better rates,

play35:36

but we're still gonna take them on

play35:39

as a policy holder as a customer.

play35:41

And this is where it gets interesting

play35:43

'cause we really do see that organizations

play35:45

are taking the guidance of cyber insurers

play35:47

because now we have this financial incentive that they can,

play35:51

most often the security team can go to their C-suite

play35:55

or the whoever holds the purse strings and say, look,

play35:57

are cyber insurers recommending that we do A, B and C?

play36:01

And if we do that we're gonna get, you know, better terms,

play36:03

we're gonna get higher limits,

play36:04

we're gonna get a reduction in our premium perhaps.

play36:07

But this is the driving of adoption of better practices

play36:11

of security controls that might otherwise take longer

play36:15

to kind of get there.

play36:16

So the subjectivities,

play36:17

and if we do recognize that the smaller to medium size

play36:22

enterprises have challenges

play36:24

in the cybersecurity departments,

play36:27

so maybe not as robust and underfunded

play36:30

and very tired cybersecurity professionals.

play36:33

And so a lot of cyber insurers are now also taking

play36:36

the approach of having in-house cybersecurity experts,

play36:41

risk engineers that then can get on calls with organizations

play36:45

with their customers and say, look, if you don't, you know,

play36:47

we recognize you haven't patched or we can,

play36:49

we're monitoring you,

play36:50

we know that you've maybe missed a few updates,

play36:53

let's get that taken care of.

play36:55

Or we see that you had a subjectivity,

play36:58

so that might mean your ransomware limit is, you know,

play37:00

$500,000 perhaps,

play37:03

but would you like to have it increased to the full

play37:05

$2 million limits with no increase in premium?

play37:08

By the way, how you get there is, you know,

play37:11

let's make sure you have MFA on everything.

play37:13

Let's make sure your RDPs are protected

play37:17

and take a look if you really need them open.

play37:19

Things like that.

play37:20

So the cyber insurance industry

play37:24

has provided these value adds to the piece of paper

play37:27

that historically was, you know, you get your policy,

play37:29

you put it in a drawer, you cross your fingers,

play37:31

make sure you don't, you know,

play37:32

hope you don't get a cyber incident.

play37:33

Now it's a more constant engagement.

play37:37

And that's a necessity because

play37:39

the threats are constantly changing too.

play37:42

So something could happen this afternoon

play37:44

and I would like my risk engineers to reach out

play37:48

to that particular policy holder population

play37:50

that's vulnerable and let them know, be vigilant,

play37:54

take note up.

play37:55

You know, these are some steps

play37:57

that you can take to mitigate.

play37:59

So we've seen, you know,

play38:00

some of your colleagues in this space experience

play38:03

this type of vulnerability being exploited,

play38:06

perhaps used to do A, B and C.

play38:07

So it's almost like an outside,

play38:11

you know, valued partnership that really is impactful

play38:15

to driving better practices inside.

play38:19

- [Eric] Yeah and then what I've seen

play38:21

is a fascinating parallel development

play38:25

of this other technology attack surface management

play38:28

that's really aiming to solve

play38:30

this same continuous assessment problem, right?

play38:33

So I've become a really big believer

play38:36

in the value of continuous assessment,

play38:38

not only for insurance where things are changing so often,

play38:42

but inside the organization there's all kinds of reasons

play38:45

to do it, including people

play38:46

who are doing zero trust projects, for example,

play38:48

where you want to understand the risk of any particular

play38:51

asset at any particular time

play38:52

when they're making a connection.

play38:54

But more broadly,

play38:56

customers being able to be more proactive security teams

play38:59

getting better visibility about what they need to do today

play39:02

compared to the list of thousands

play39:04

of other things they could be doing.

play39:06

So again, this is a market category,

play39:08

there's a bunch of different vendors doing it.

play39:09

There's a bunch of different vendors showing you sort of

play39:11

risk scores and visibility trend in a bunch of other people.

play39:14

So I'm generalizing here.

play39:16

The idea is that you're trying to first of all

play39:20

discover the assets in the organization.

play39:23

There was an early focus to find, you know,

play39:26

servers and and laptops and things like that.

play39:28

But now it's like what applications are in the mix?

play39:31

What SaaS applications are there?

play39:32

What kinds of AWS services are in use

play39:35

and where is the data?

play39:39

What identities are in the environment and so on.

play39:41

The first step is just finding what they are

play39:44

and where they are, the work from home employees,

play39:46

because we've seen some incidents, right,

play39:48

where threat actors were able to get into an organization

play39:52

by compromising somebody's home computer.

play39:56

But after you do that discovery,

play39:59

the value comes from this risk assessment

play40:02

and the goal there is to weigh all kinds of factors

play40:06

that get collected across that inventory

play40:08

with respect to where they are

play40:10

on the network, criticality, who's using them?

play40:13

Is it the CEO's laptop, is it my laptop?

play40:16

Is it internet facing?

play40:18

Is it in the DMZ? What's the story?

play40:22

What controls are present, how they're configured?

play40:25

Basically everything you can collect about it.

play40:27

And you can also build an asset graph

play40:28

and you can understand what the data flows are.

play40:30

So which people talk to,

play40:32

which assets in various different ways

play40:35

and that leads to the ability

play40:37

which is constantly refined, right?

play40:40

So none of these solutions are gonna be perfect

play40:42

at telling you here's your worst risk

play40:44

or giving you the right number on your risk score.

play40:47

But things do bubble to the top of the list.

play40:50

And that's the idea.

play40:51

It's kind of like, hey,

play40:52

for the wide array of things in your organization,

play40:56

there's always gonna be misconfigurations,

play40:58

there's always gonna be vulnerabilities and so on.

play41:01

There is a limited team size.

play41:02

So what are the five things

play41:04

that you should focus on today based on

play41:08

as accurate an assessment as can be made

play41:11

by one of these tools to say, okay, well yeah, you know,

play41:14

that vulnerable server that's internet facing,

play41:17

that's a highly exploited vulnerability right now

play41:19

that's probably one of your top tasks or hey,

play41:22

there's a lot of misconfigurations,

play41:23

but your domain controller in the bottom left

play41:25

of the picture there.

play41:26

Yeah, maybe you should fix that one first, right?

play41:28

Trying to prioritize based on what the vendor knows about

play41:33

how attackers behave, how they exploit certain TTPs.

play41:36

And then the next level is trying to get predictive to say,

play41:39

well okay,

play41:39

we expect that the attackers are gonna do these other things

play41:42

next and that can influence the weighting of these graphs.

play41:45

So this is helping, right?

play41:48

We're gonna talk a little bit about how organizations accept

play41:51

these kinds of controls.

play41:53

For attack surface management,

play41:54

they're not that intrusive, right?

play41:56

So the idea of simply getting better visibility

play41:59

across your environment, is it helping,

play42:01

I think the concern early on is it just gonna generate

play42:04

more noise or is it actually gonna help?

play42:06

And the experience so far in talking to our own customers

play42:10

but also other vendors and analysts in this space is, yeah,

play42:14

you know, the prioritization is helping, it's not perfect,

play42:17

but it is guiding people towards getting

play42:21

into a more proactive posture

play42:22

and focusing on the most important things

play42:24

versus dumping lists from all kinds

play42:27

of different security controls

play42:28

and then trying to figure it out from there,

play42:30

even inside those silos, right?

play42:32

Like the vulnerability assessment vendors

play42:33

that got really good at telling you, okay,

play42:35

here's priorities on your vulnerabilities.

play42:37

But some of those vendors are also doing

play42:40

attack surface management 'cause they're saying, yeah,

play42:41

the more we know about what else is in the environment

play42:43

and what the other controls are,

play42:44

we can actually prioritize better.

play42:46

So very, very valuable

play42:49

and it also helps prioritize detections.

play42:52

So if you're using EDR or XDR and the XDR product

play42:56

is able to understand more about the risk levels

play42:59

and the asset criticality and so on,

play43:02

it can actually prioritize detections in part based on

play43:05

that asset criticality.

play43:07

So it can say, oh yeah,

play43:08

well this is an external facing asset that's involved

play43:11

in this particular detection, therefore bubble it up higher.

play43:14

So those things working together is very, very effective.

play43:17

How about customers when you're talking to them

play43:22

about plugging in their security controls

play43:24

into the insurance company, how do they react to that?

play43:27

- [Theresa] Well, there was a little bit of resistance

play43:29

at first because it's a new approach for sure,

play43:31

but it's been adopted and welcomed.

play43:34

The main reason why I think is because it does create

play43:37

a more accurate picture of that organization's risk

play43:40

and vulnerabilities.

play43:41

And not just that,

play43:42

but because we're helping them to then address it, right?

play43:46

So we're providing guidance as well.

play43:48

I think, you know,

play43:49

it's important to say that the rates have an ability

play43:52

to come down if you're a better risk.

play43:55

And so that's also incentivizing it

play43:58

and part of that welcoming in

play44:00

of the insurance partner to help them to lower rates.

play44:05

And this also obviously has an impact,

play44:08

greater impact because we're getting better data

play44:10

and with that better data,

play44:11

we're able to then tailor the product

play44:13

to focus on the actual risk to make sure that

play44:17

the policy holder when they do have a cyber incident

play44:20

that it's the right coverage.

play44:22

So, but just, you know,

play44:24

don't take my words and I don't (indistinct) for it.

play44:27

We do see,

play44:28

we've been monitoring and part of the continuous assessment

play44:32

that we do during the policy period,

play44:34

we do see that organizations throughout,

play44:36

just like the one year policy period will have a 9%

play44:39

improvement on their security posture just by becoming

play44:42

an insurance policy holder.

play44:46

They also have lower claims rate so that, you know,

play44:49

is music to my ears than the industry average.

play44:52

So this continuous assessment,

play44:54

because we have rich claims data, so no claims goes to risk,

play44:58

goes to waste even, you know, with a low claims rate.

play45:04

There's rich data in that instance

play45:06

that we can then provide insights to the greater population.

play45:09

So if we see something going on, we will advise,

play45:12

we'll send alerts out,

play45:14

we'll have our risk engineers reach out to policy holders so

play45:16

that the ones that don't have a claim can be better

play45:18

protected so they don't become one of the ones

play45:20

that do have a claim.

play45:22

And then also just with the value add.

play45:25

So we recognize that that pricing has increased of course,

play45:28

but the different resources that I mentioned

play45:31

that are part of the cyber insurance program now,

play45:34

the risk engineering services,

play45:35

the referral to vendors that we know are impactful and

play45:39

efficient that we've negotiated preferable rates for

play45:43

the incident response and other resources

play45:45

that are part of the insurance package now for cyber.

play45:50

We are coming to the end and so we wanted

play45:52

to kind of give you some insight

play45:54

into what you can do now to prepare for

play45:57

your cyber insurance renewal or apply for cyber insurance

play46:00

and just to be, have better posture.

play46:03

- [Eric] Yeah, so by the way,

play46:05

the RSA program committee reviews these slides in advance

play46:08

and they provide feedback and so on.

play46:09

And one funny comment, so across the bottom there,

play46:13

they wanted a timeline on our recommendations

play46:15

and so next week and then they said, you know,

play46:17

it might be a little aggressive

play46:19

to get people to deploy EDR next week.

play46:21

And I said, yeah, I know, I know,

play46:23

I work at an EDR vendor, we know we can't do that in a week.

play46:26

The point is,

play46:27

there are organizations out there

play46:29

that don't yet have EDR and don't yet have MFA

play46:32

and if you haven't started rolling those out,

play46:34

you should start making that plan right away

play46:36

because you will not get cyber insurance

play46:38

if you do not have EDR and MFA complaint controls in place,

play46:43

especially with the traditional insurers.

play46:46

They will just reject you on site.

play46:49

So those are very, very important steps.

play46:51

Of course we know they're not magical things

play46:53

that will make all problems go away,

play46:55

but we just have to point out you will get rejected

play46:57

if you don't have these controls.

play47:00

And then of course it's worth starting early,

play47:02

as Theresa mentioned.

play47:03

So if you wait until you're filling out the application form

play47:07

to realize that they're asking about certain things,

play47:09

by then it's probably too late.

play47:10

So work with your broker,

play47:12

work with your insurer to understand what it is

play47:15

that they're going to be looking for

play47:16

because that always changes.

play47:18

So consider a tax surface management to help you get in

play47:21

front of that, but work with your broker.

play47:25

Theresa, some of the right hand column stuff.

play47:26

- [Theresa] Yeah, sure.

play47:28

And basically here every insurer has a different approach

play47:30

and so what I've said today

play47:32

is the approach that generally intro techs are taking with

play47:36

the continuous assessment and scanning and outside in,

play47:39

inside out data approach.

play47:41

But you know, talk to your broker about

play47:43

what would work if there are other options.

play47:46

'Cause really you do need the coverage at the rates

play47:50

that are right for your organization.

play47:53

And if there's an insurance company out there,

play47:55

cyber insurer that's going to help you,

play47:57

guide you to what that would be,

play47:58

whether it's this policy period or, you know,

play48:00

come back next year and when you're at better risk

play48:02

and we'll give you terms then,

play48:04

but just to understand that

play48:05

there's different approaches out there.

play48:07

- [Eric] So let's do the one minute crystal ball

play48:10

before we have to let this people go.

play48:11

- [Theresa] Here's my crystal ball.

play48:12

- [Eric] Yeah, I know, right?

play48:13

It's a pretty one.

play48:14

So quick predictions from both of us with respect to

play48:17

where this is headed.

play48:18

No surprise,

play48:19

ransomware and extortion is gonna continue to evolve.

play48:21

So there's not gonna be a near-term moment in time

play48:23

where we say, wow, okay, we beat those guys.

play48:26

It's continuously evolving.

play48:29

We all have to recognize fishing and BC in particular,

play48:31

which is again,

play48:33

like Phish is 50% of the initial attack vector,

play48:36

BC is a huge chunk of claims.

play48:38

It's getting harder and harder for humans to detect.

play48:40

So you really have to consider the policies,

play48:43

the procedures in-house for things like invoice payments.

play48:45

You have to think about how these attacks

play48:48

are gonna get through.

play48:49

And vendors like us,

play48:50

we have to think about how we can do better.

play48:53

Nobody should be saying, oh wow,

play48:54

the user clicked on a thing they shouldn't have clicked on.

play48:57

It is getting super hard for them to figure that out

play49:00

and hey, yeah, data science is getting better.

play49:02

- [Theresa] Data science is getting better.

play49:04

It's, you know, we started out by saying,

play49:07

oh well it used to be not weird,

play49:08

but different that you'd have to wear a seatbelt

play49:10

or have a carbon monoxide thing in your house

play49:14

and maybe one day these things

play49:16

that are kind of sounding like, oh,

play49:17

this is a burden to have,

play49:18

like really the insurance companies

play49:20

making me do X, Y, and Z.

play49:22

That that won't even be such

play49:24

a controversial thing that we're talking about.

play49:25

That these controls will be more mainstream with the goal

play49:28

that we'll have better data even something like

play49:31

a connector into your organization

play49:33

so that we have some of that good data

play49:35

so that we can see if there's something adrift

play49:37

that we can then help the organization come back on

play49:40

and be more resilient that those things will be seen

play49:43

as a value add,

play49:44

as a different type of partnership

play49:46

with your cyber insurance partner.

play49:48

And so I think there'll be more widespread adoption

play49:52

of this continuous monitoring assessment and approach.

play49:57

- [Eric] Thank you so much for coming to our session.

play49:59

It's really fun to have you here and nodding

play50:01

and putting up your hands at different times.

play50:04

It's been a pleasure.

play50:05

If any of you have questions, we are happy to stick around.

play50:09

I think they told us we actually have the room

play50:10

for a bit longer,

play50:11

so if people want to do audience Q and A, that's fine.

play50:13

Otherwise just come on up and chat with us.

play50:16

Thank you so much.

play50:16

- [Theresa] Thank you very much.

play50:17

(audience applauds)

Rate This

5.0 / 5 (0 votes)

Связанные теги
Cyber InsuranceRisk AssessmentCybersecurityTrend MicroCowbell CyberAttack SurfaceData BreachesRansomwareIncident ResponseInsurance RenewalSecurity Controls
Вам нужно краткое изложение на английском?